China's Tianhe-3: Ready for Espionage

February 24, 2017


China has a collective mind regarding mathematics, science, and technology. Europe and North America are more apt to give their prizes to their own kind rather than recognizing what China is accomplishing today. China’s breakthroughs are based on a collective mind open to expansion while paving the road for innovative engineering. They progress as a unit rather than individually and bring together the best minds as a whole.


China is building a new generation of supercomputers that are expected to outpace the leading competitor tenfold. Using breakthrough high-performance processors, China is expected to complete the world’s first prototype exascale supercomputer by early 2018. The name of this next generation machine is the Tianhe-3.


The benefits of this supercomputer are not only the projected economic benefits of 10 billion Chinese Yuan ($1.49 billion), but also the decoding of human genes, its breakneck speed, and the identification of biological and chemical sequences to find medicines faster than any previous method known to mankind.


However, under the veil of secrecy lies a more disturbing trend. The speed at which this computer operates makes it easier to penetrate firewalls and decode classified information, all while staying underneath the radar to avoid detection from foreign counterparts. The speed of the computer will rely on normalcy that caters to everyone’s belief that intelligence information was never compromised.


Barack Obama did sign an executive order for the US to expedite its own supercomputer for the purpose of gaining an edge against the rising power of China. Computers benefit the world in terms of information, but the brain does act on self-preservation and utilizing information that raises the expectation of a nation to be first in technology and science. However, China refuses to be overwhelmed by the most powerful nation on Earth.


We need to enlighten ourselves as to how the 21st century will unfold. Macroeconomists need to challenge themselves. Using theories and certain paradigms, we can look into the future. We all know that economic perfection is unattainable. We also know that economies are a symbolic life-form and have become predatory for their growth. It is daunting to come up with a macroeconomic theory. It may force economists to change their perception of how we think of the changing economic world. However, with recent developments, we can offer a glimpse into the changing economic conditions in our world.


Xi Jinping's disposition is based on silence, whereas the U.S., Russia, and other nations are preoccupied by territorial disputes and regional wars. The media is flooded with these nations struggling to demonstrate dominance by positioning their interests against one another. In the background, Jinping is engineering and advocating projects that provide massive worldwide economic benefits, all while China expands its global market share. Jinping possesses a stealth quality that seems to put China under the radar. He seems to solidify agreements with national leaders through respect of their national interests and the mutual benefits that agreeing nations can aspire to. This also quantifies emerging nations' aspirations to grow with them.


Xi Jinping is advocating assimilation without the loss of a country's national identity. This economic thinking goes against the predatory dominance, superiority, and exceptionalism of the almighty American dollar.


One of the leading firewall companies and defense organizations for the United States is Palo Alto Networks Inc. The House of Representatives recently passed The Protecting Cyber Networks Act, allowing for increased sharing of cyber-security threat data between government agencies and corporations. Many nations are eyeing this, particularly China and Russia. It will mean that corporate espionage won’t take a back seat and the scale of attacks will increase at an unprecedented level. When you’re dealing with corporate and government information, you’re only as good as every other individual with access to it. With the Protecting Cyber Networks Act, hackers are eager to write new viruses that complement corporate and government involvement in protecting their data. The US government can not ensure corporate liability to software piracy.


Unbeknownst to the rest of the world, China and Russia have a national program of hackers. These hackers believe in the intellectual exploration to tap into computer networks that are virtually unbreakable. Hackers believe that it is their given right to possess the capability to attack any network and stretch their resources to make the computer do what they want it to do. They have the virtuosity of penetrating computer systems for national recognition and reward.


Cyber attacks are part of a geopolitical game in maneuvering to place the blame on one country against another. Israel and the US are good at playing this game. Any type of large scale cyber attack would be perceived as an act of war, a retaliatory response would most likely be issued. The attack of infrastructure grids is a real imminent threat to the economic wellbeing of all nations.


So far the line has not been crossed, but a supercomputer that can decode intelligence rapidly while under the veil of secrecy hidden from the eyes of every nation will elevate China’s hand to succeed in dominating their agenda. Geopolitical power rests on who is the strongest in alleviating any potential threat in the economic expansion that fosters China’s assimilation and vortex in drawing nations into their sphere of influence.

Share on Facebook
Share on Twitter
Please reload

© 2023 by "This Just In". Proudly created with