Skip to main content
Skip to content
Case File
kaggle-ho-020332House Oversight

Alleged 2014 Chinese submarine ICBM test and historic nuclear espionage claims

Alleged 2014 Chinese submarine ICBM test and historic nuclear espionage claims The passage repeats unverified, sensational claims about a 2014 Chinese submarine launch and past espionage without providing concrete evidence, dates, transaction details, or new actors. It offers no actionable leads for investigators and largely restates already known public accusations, making it low‑value and speculative. Key insights: Claims a Chinese Jin‑class submarine launched an ICBM with 12 RVs in the Atlantic on Aug 11 2014.; Alleges the test was monitored by the NSA and demonstrated a sea‑based Chinese nuclear deterrent.; States China obtained U.S. nuclear weapon designs via espionage in the 1980s‑1990s.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020332
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Alleged 2014 Chinese submarine ICBM test and historic nuclear espionage claims The passage repeats unverified, sensational claims about a 2014 Chinese submarine launch and past espionage without providing concrete evidence, dates, transaction details, or new actors. It offers no actionable leads for investigators and largely restates already known public accusations, making it low‑value and speculative. Key insights: Claims a Chinese Jin‑class submarine launched an ICBM with 12 RVs in the Atlantic on Aug 11 2014.; Alleges the test was monitored by the NSA and demonstrated a sea‑based Chinese nuclear deterrent.; States China obtained U.S. nuclear weapon designs via espionage in the 1980s‑1990s.

Persons Referenced (1)

Tags

kagglehouse-oversightchinanuclear-weaponsespionageus-intelligencemilitary-technology

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
180 CHAPTER TWENTY-TWO The Chinese Puzzle “The first [false assumption] is that China is an enemy of the United States. It's not.” m Edward Snowden in Hong Kong On August 11, 2014, in the Atlantic Ocean, an even took place of enormous concern to U.S. intelligence. A Chinese Jin Class Submarine launched an Intercontinental ballistic missile. The missile released 12 independently-targeted re-entry vehicles, each simulating a nuclear warhead. Some 4400 miles away, in China’s test range in the Xinjiang desert, each of the 12 simulated nuclear warheads then hit their targets within a 12 inch radius. The test firing, which was closely monitored by the NSA, was a strategic game changer. It meant that a single Jin Class submarine, which carried 12 such missiles and 144 nuclear warheads, could destroy every city of strategic importance in the United States. U.S intelligence further reported at China would soon fully stealth its newer submarines against detection, “giving China its first credible sea-based nuclear deterrent” against an American attack. By 2015, as its test in the Atlantic had foreshadowed, China had armed its land-based as well as sea-based missiles with multiple independently targeted warheads. Combined with the state--of- the-art technology it had licensed from Russia, its systematic use of espionage made it possible for China to even build its own stealth fighters. Unlike the U.S, China did not achieve this remarkable capability to launch independently- targeted miniaturized nuclear weapons and stealth them by investing hundreds of billions of dollars in developing them. It obtained this technology mainly through espionage. The history of this enterprise, though unsung, is stunning. The Chinese intelligence service stole a large part, if not all of America’s secret technology for weaponizing nuclear bombs during the 1980s and 1990s. The theft was so massive that in 1998 the House of Representatives of the US Congress set up a special bipartisan investigative unit called the “Select Committee on National Security and Military and Commercial Concerns with the People's Republic of China.” Based on the intelligence amassed by the NSA, CIA and other intelligence services, it concluded in its report that the Chinese intelligence service had obtained both by electronic and conventional spying the wathead design of America’s seven most advance thermonuclear weapons. Moreover, it found that China’s espionage successes allowed China to so accelerate the design, development and testing of its own nuclear weapons that the new generation of Chinese weapons would be “comparable in effectiveness to the weapons used by the United States.” Further, it found that these thefts of nuclear secrets had not been isolated or opportunistic incidents. The Committee reported to Congress that they were the “results of decades of intelligence operations against U.S.

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.