1594
Comments (19)
sorted by:
12
LivebytheTendies 12 points ago +12 / -0

This probably goes back decades

7
AngryAsian 7 points ago +8 / -1

Let's get that list...need to name and shame EVERY SINGLE ONE of these companies that have hired these people...what do you want to bet that Nike is one of them.

7
deleted 7 points ago +7 / -0
4
deleted 4 points ago +4 / -0
3
LibertyDay 3 points ago +3 / -0

It's just names, addresses, and positions of CCP members. Nothing about them being spies or what companies they've infiltrated. It looks more like "We know where you live" kind of leak.

3
Liver-Eatin-Johnson 3 points ago +3 / -0

Someone will come along and translate.

You may by able to upload the csv file to a translation site and see if it spits out something readable.

5
overtotheright 5 points ago +5 / -0

That “rob, replicate, replace” strategy is literally bill gates’ business strategy: “embrace, extend, extinguish”.

Gates used that strategy to scupper any startups or new market entrants from taking market share from Microsoft:

Embrace: that means that Microsoft would embrace the competitor’s unique selling point and build it into their products [for the crayon eaters amongst us: basically they “rob” the competitor’s IP]

Extend: that means Microsoft uses their vast wealth and infrastructure to sell that new unique selling point at a loss to flood the market with a Microsoft product which fulfills the same niche as the competitor product, while forcing the competitor to compete so hard that they can’t make a profit [that is the “replicate” portion]

Extinguish: now that the competitor can’t sell their product at a profit, they go bankrupt OR Microsoft can buy them for pennies on the dollar. End result: competitors fail, Microsoft guarantees its victory. [replace]

Kinda funny how many times bill gates pops up in all of this!

3
LibertyDay 3 points ago +3 / -0

China is basically just leveraging their cheap manufacturing by stealing IP. They don't have to compete on innovation and will win because they don't have to invest into R&D.

4
PatriotGeneral 4 points ago +4 / -0

Anyone remember GNews and the three hard drives? Maybe it wasn’t a laptop after all

3
Cbllbc 3 points ago +3 / -0

Do these two characters show up in the file often, 美国?

3
FAQ-REDDIT 3 points ago +3 / -0

Fly into Detroit International Airport if you want to learn Mandarin ( chinese ). Just hang around and listen to english and chinese repeated announcements 24/7. You can learn by listening association.

Oh yeah, WTF so many china man in Detroit doing... 1 voting for Democrats, 2 stealing our of out Motor City automotive technology.

3
snakeoil 3 points ago +3 / -0

Holy shit..

2
Aisle-is-closed 2 points ago +2 / -0

Damn it, it’s all in Chinese names. I need to cross reference American names in the huge multi-national I work for, but I can’t.

What’s the best way to do this?

2
Truglow 2 points ago +2 / -0

How many are involved in any part of the federal election process?

Accordingly, I hereby order:

Section 1. (a) Not later than 45 days after the conclusion of a United States election, the Director of National Intelligence, in consultation with the heads of any other appropriate executive departments and agencies (agencies), shall conduct an assessment of any information indicating that a foreign government, or any person acting as an agent of or on behalf of a foreign government, has acted with the intent or purpose of interfering in that election. The assessment shall identify, to the maximum extent ascertainable, the nature of any foreign interference and any methods employed to execute it, the persons involved, and the foreign government or governments that authorized, directed, sponsored, or supported it. The Director of National Intelligence shall deliver this assessment and appropriate supporting information to the President, the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, and the Secretary of Homeland Security.

1
deleted 1 point ago +2 / -1
1
maxtolerance 1 point ago +1 / -0

Checking for potential corporate espionage risk will require a translated version. Where can we find (or how can we generate) an English translation?