Cybersecurity Report 2000-2020: The Good, The Bad, and The Ugly

Raymund K.D. Kho
4 min readMar 15, 2022

--

The Wuhan Institute of Virology (WIV) Laboratory Leak, Pandemics or a Smoke-screen?

Our report starts in 2000 and tells a tale where Western nations fell in a well-orchestrated trap in what may have looked like Good business deals between 2000-2008 with the industrial rise of China.

However, soon after 2008, it turned Bad when Western Intelligence Agencies finally woke up to the challenge ignored over the past 8 years.

Even with the eyes open, the Ugly truth was yet to come, and like the title, we cannot even comprehend the magnitude of the first two words, the Good and the Bad, of what both China and Russia had in place starting from 2000.

The Europeans were the victims of deceptive contracts in dealing with the Chinese in 2008. Just fresh out of the financial crisis, Germany, France, and the Netherlands, whose priority was on controlling expenditure, were forced to re-evaluate the strategic purchase of networking components.

In the weeks after signing the contracts, the European networks became a listening beacon powered by Chinese networking components, thus allowing Chinese engineers access to every data node across Europe.

The situation became so precarious that at some point, the Dutch, German, and French Security Departments were themselves targets of infiltration of their confidential communications between 2009 and 2015 by Chinese engineers.

Meanwhile, the U.S. departments in 2008 correctly assessed the growing threat of Cyberterrorism applied onto Western alliances from communist state actors. It furthermore analyzed the movements of communist actors who set in motion a plan to disrupt Western operations dating back from the 1990s. The U.S. Intelligence Community (IC) then did produce a series of coherent reporting. They connected the string of Cyberattack events from 2003 till 2020 to state actors from Russia and China.

However, in our exclusive reporting, the U.S. Intelligence Community (IC) missed a crucial part connecting the 2019 world pandemics of the Covid-19 Coronavirus infections with the equally sinister plot to further disrupt Western economies. Not a single word of the U.S. IC managed to review the decades-long broad investigations by the Chinese Government to produce evidence of the Chinese HAN genetically code, the Haplogroup O2.

We start in 2002 with the hypothesis of the seemingly odd fixation of the CCP to investigate the origins of the Chinese. The CCP ordered through genetic research to provide a larger smokescreen, by eliminating the Chinese group with the deliberate engineered and spiked viral release as seen in September 2019 at the WIV.

In other words, the Chinese further engineered a highly optimized and aggressive Coronavirus between 2003-2017. Then deliberately released the strains, now the WIV laboratory leak, to cause extreme disruptions aimed against Western economies.

The reasons for the massive disruptions were to control major semiconductor industries, acquire semiconductor design specifications, acquire specific intellectual property from leading universities, and advanced technical designs.

China's smokescreen almost succeeded by introducing a pandemic but discounted the speedy response of Western Governments. The suspicions were further aggravated with the massive and well-coordinated Cyberattacks on U.S. and European systems from Russian and Chinese actors in 2019.

It became clear to the rest of the world that China and Russia were the major cause of data and economical disruptions between 2003 and 2021. The U.S. responded in Spring 2021 by rerouting the most vulnerable parts of the net to shadow networks outside the Internet's reach.

In Cybersecurity the digital footprints are hard to erase, and in September 2020, the U.S security report on the Wuhan Institute of Virology (WIV) mentioned the Gain of Function (GoF) ongoing research and the dismissal of the wet market, animal to human transmission theory.

Furthermore, the House Foreign Affairs Committee Report Minority Staff, lead by Republican Michael T. McCaul, of August 2021 mentioned the deliberate disconnect of WIV servers with 20,000 samples in September 2019, as the prelude in covering up the laboratory leak. Furthermore, at the same time, satellite data recorded activity around the WIV building with relatively minor human casualties after the release of the Covidvirus to the rest of the world.

This working paper explores and revisits data from over 20 years, the 2000 rise of Global terrorism, the 2003 first SARS Coronavirus case in Hong Kong, the Financial Crisis of 2007-2008, the aggressive introduction of HUAWEI and ZTE network products with backdoors, the 2010 collaboration between communist actors who successfully infiltrated the email systems worldwide, the 2013 find of a very aggressive Coronavirus family that would form the basis of the recent Covid-19 virus, and the 2019 massive ongoing campaigns led by communist actors to disable infrastructures and exploit academic institutions, NGOs, financial investments companies, MNC, U.S. and Western Governments.

Raymund K.D. Kho is the Chief Investigator of Connecting the Dots Institute (CTDI-NL), the Netherlands.

--

--