Chinese intelligence operations in the United States

Chinese intelligence operations in the United States

The People's Republic of China (PRC) has and is currently using a widespread effort to acquire U.S. military technology and classified information. To fulfill its long-term military development goals, the PRC uses a variety of methods to obtain U.S. technology; including espionage, the exploitation of commercial entities, and a network of scientific, academic, and business contacts.[1] The Chinese operate in ways that take advantage of U.S. laws to avoid prosecution. The PRC uses a vast network of agents and contacts to collect pieces of information that are collated and put together in the PRC. Often each individual piece is not enough to warrant any suspicion or prosecution from U.S. government personnel. The aggressiveness of Chinese penetration is well documented in multiple espionage cases including those of Larry Wu-Tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak, and Peter Lee.[2][3] In addition to traditional espionage, the PRC uses civilian companies to partner with American businesses in order to acquire advanced technology and economic data.[4] Additionally, the PRC utilizes cyber-espionage to penetrate the computer networks of U.S. businesses and government agencies. This is evidenced by a recent Chinese cyber-attack on Google's computer systems in December 2009.[5] PRC intelligence operations in the United States have become so pervasive that U.S. law enforcement officials have identified China as the most active foreign power involved in illegal acquisition of American technology.[6]

Contents

Methods

The PRC utilizes a variety of methods to operate in the United States.[7] The individuals attempt to acquire the targeted information by utilizing open sources such as libraries, research institutions and unclassified databases.[7] In addition to co-opting Chinese travelers to carry out specific intelligence operational activities, the PRC often debriefs Chinese scientists who participate in scholarly exchange programs, or who attend trade missions, scientific cooperation programs and other similar events.[8] Moreover, the character of the Chinese political system allows the state great power to compel Chinese citizens to cooperate.[9] Consequently, the PRC is able to utilize a vast network of contacts recruited to collect and steal intelligence on cutting edge U.S. technologies, including the most sensitive military developments.

Partnerships are started between Chinese civilian companies and foreign companies in order to give Chinese defense industries access to advanced technologies.[10] The regulatory and commercial environment in China places intense pressure on American and other foreign companies to transfer technology to their Chinese partner companies as part of doing business in the PRC.[10] In order to remain globally competitive, foreign companies are almost always willing to provide technology, capital, and manufacturing expertise in order to obtain access to Chinese markets.[10] High-technology equipment is also purchased by PRC recruited agents running front companies in Hong Kong.[8][10] Some of the items acquired are dual-use components, which can be used for both military or civilian purposes.[11] These items may include computers, semiconductors, software, telecommunications devices, and integrated circuits.[10] Furthermore, the PRC will use Chinese state-run firms to outright purchase American companies with access to the targeted technology.[8]

The PRC also accesses restricted foreign technology through industrial espionage.[10] U.S. Immigration and Customs Enforcement officials have rated China's industrial espionage and theft operations as the leading threat to the security of U.S. technology.[12] Between October 2002 and January 2003 five Chinese businessmen were accused of illegally shipping equipment and trade secrets from California to China.[7] U.S. Officials were able to prevent one Chinese man from shipping a recently purchased high-speed computer from Sandia National Laboratories, which had been used on classified projects including the development of nuclear weapons.[7]

Nuclear espionage

A 1999 report of the United States House of Representatives Select Committee on U.S. National Security and Military and Commercial Concerns with the People's Republic of China, known as the Cox Report, warned that the PRC has stolen classified information on every thermonuclear warhead in the U.S. ICBM (intercontinental ballistic missile) arsenal.[13] Information is collected through espionage, as well as through rigorous reviews of U.S. technical and academic publications, and pervasive interaction with U.S. scientists.[14] The PRC tasks a large number of individuals to collect small pieces of information which is then collated and analyzed in the PRC.[14] In this way, individual PRC agents can more easily escape suspicion while carrying out their operations in the United States. U.S. Government personnel suspect that the PRC's intelligence collection efforts directed towards the development of modern nuclear weapons to be focused primarily on the Los Alamos, Lawrence Livermore, Sandia, and Oak Ridge National Laboratories.[14] The PRC is known to have stolen classified information on the following warheads: the W-56 Minuteman II ICBM, the W-62 Minuteman III ICBM, the W-70 Lance short-range ballistic missile (SRBM), the W-76 Trident C-4 submarine-launched ballistic missile (SLBM), the W-78 Minuteman III Mark 12A ICBM, the W-87 Peacekeeper ICBM, and the W-88 Trident D-5 SLBM. The PRC also has stolen classified information on U.S. weapons design concepts, weaponization features, and warhead reentry vehicles.[15]

Cyber warfare

The PRC operates a political and corporate espionage effort directed towards accessing the networks of major financial, defense and technology companies, and research institutions in the United States.[16] PRC efforts involve exploiting security flaws in software, and email attachments to sneak into the networks of important U.S. companies and organizations.[16] An example of such an attack, is a recipient opening an email attachment that seems to be from a familiar source. The attachment contains a "sleeper" program that embeds in the recipient's computer. The program is controlled remotely, allowing the attacker to access the recipient's email, send sensitive documents to specific addresses, and even turn on a web camera or microphone to record what is happening in the room.[16] In January 2010, Google reported, "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google."[17] According to investigators, the Google cyberattack was directed towards the company's password system that millions of people use to access Google's various web services, including email and business applications.[17] The attack targeted the Gmail accounts of Chinese human rights activists.[17] In addition to Google, at least 34 companies have been attacked including Yahoo, Symantec, Adobe, Northrop Grumman, and Dow Chemical.[16] Chinese cyberattacks seem to have largely targeted strategic industries in which China is lagging.[16] Specifically, attacks on defense companies target information on weapons systems, and attacks on technology companies seek valuable source code which is critical to software applications.[16] Chinese cyberattacks have emphasized what senior U.S. Government officials have said is an increasingly serious cyber threat to U.S. critical industries.[16]

Spy cases

Larry Wu-Tai Chin

Larry Wu-Tai Chin worked in the U.S. intelligence community for close to 35 years, all the while providing the PRC with sensitive classified information.[18] Chin was recruited as a spy by a Chinese Communist Official in 1948, while he was employed as an interpreter at the U.S. Consulate in Shanghai.[2] Chin was later hired by the CIA’s Foreign Broadcast Information Service office. After becoming an American Citizen in 1965, Chin was transferred to Arlington, Virginia, where he had access to highly sensitive information; including reports from intelligence agents abroad, and translations of documents acquired by CIA Officers in China.[2] In addition, Chin sold highly classified National Intelligence Estimates pertaining to China and Southeast Asia to the PRC.[2] Consequently, the PRC was able to uncover weaknesses in their intelligence agencies, and compromise U.S. intelligence activities in the region. Among the most damaging information Chin compromised, was highly sensitive information regarding President Nixon’s plans for normalizing relations with China two years before President Nixon traveled to China. In February 1986, Larry Wu-Tai Chin was finally convicted of 17 counts of espionage, conspiracy, and tax evasion.[2]

Katrina Leung

In 1982 FBI Special Agent James Smith recruited Leung, then a 28-year-old immigrant from China, to work in Chinese counterespionage.[19] Leung, a prominent business consultant, was seen as especially valuable due to the many contacts she had with high level officials in the Chinese Government.[2] Smith and Leung became involved in a long-term sexual affair lasting nearly two decades.[19] During this time, Smith made classified documents available to Leung, who was able to surreptitiously make copies of multiple classified documents.[19] Leung was able to provide the PRC with information on nuclear, military, and political issues.[20] Another FBI agent, William Cleveland, also became sexually involved with Leung.[19] Leung was able to exploit her personal relationships with her FBI handlers and provide the PRC with highly sensitive information for 18 years.

Peter Lee

Lee was a Chinese born physicist who worked at Los Alamos nuclear weapons laboratory, and later for TRW, a major California defense contractor. Lee pleaded guilty to lying on Security Clearance forms, and to passing classified national defense information to Chinese scientists on business trips to Beijing.[21] Lee compromised classified weapons information, microwave submarine detection technology, and other national defense data.[2] Later the Department of Energy concluded that Lee's disclosure of classified information, "was of significant material assistance to the PRC in their nuclear weapons development program...This analysis indicated that Dr. Lee's activities have directly enhanced the PRC nuclear weapons program to the detriment of U.S. national security."[2]

Chi Mak

Chi Mak is a Chinese-born engineer who worked for L-3 Communications, a California based defense contractor.[22] Chi worked as a support engineer on Navy quiet drive propulsion technology.[22] According to recovered documents, Chi was instructed by his Chinese contacts to join "more professional associations and participate in more seminars with 'special subject matters' and to compile special conference materials on disk."[22] Specifically, Chi was to seek information on: space-based electromagnetic intercept systems, space-launched magnetic levitation platforms, electromagnetic gun or artillery systems, submarine torpedoes, electromagnetic launch systems, aircraft carrier electronic systems, water jet propulsion, ship submarine propulsion, power system configuration technology, weapons system modularization, technologies to defend against nuclear attack, shipboard electromagnetic motor systems, shipboard internal and external communications systems, and information on the next generation of US destroyers.[22] Chi Mak was able to successfully secretly copy and send various sensitive documents on U.S. Navy ships, submarines and weapons to China via courier. In 2008, Chi was sentenced to a 24 and 1/2 year prison term for his espionage activities.[23]

Ko-Suen "Bill" Moo

Ko-Suen Moo was convicted of being a covert agent of the People's Republic of China in May 2006. He attempted to purchase United States military equipment to send back to China but was arrested by undercover United States agents. Some of the equipment Mr. Moo tried to purchase included an F-16 fighter jet engine, an AGM-129A cruise missile, UH-60 Black Hawk helicopter engines, and AIM-120 air-to-air missiles.

Chinese intelligence-gathering agencies

Ministry of State Security: Formerly a bureau under the Ministry of Public Security, it was raised to Ministry status in June 1983.[24] MSS is the principal Chinese agency responsible for intelligence collection and counterintelligence.[7] According to Western intelligence sources, MSS operates intelligence activities in more than 170 cities in close to 50 countries through its Foreign Affairs Bureau.[7] MSS reach beyond China allows it to pursue Chinese dissidents in foreign countries and establish cover for Chinese diplomats and agents who are planted among the 15,000 Chinese students who attend U.S. universities, as well as thousands of Chinese who travel to the U.S. as business representatives, or members of scientific, academic, and cultural delegations.[7]

People's Liberation Army: Intelligence elements of the PLA include: Second Department or Intelligence Department, Third or Electronic Warfare Department, Fourth Department (focuses on information warfare), General Armaments Department and General Logistics Department (both of which train technical collectors), and the PLA General Political Department.[9]

Political Legal Leading Group: Chinese Communist Party agency under the party's Military Commission (responsible for internal order), whose responsibilities include overseeing intelligence and law enforcement regarding internal affairs.[7]

Investigations Department: Chinese Communist Party agency that is responsible for political investigations of party members.[7]

United Front Works Department: Chinese Communist Party agency that is responsible for handling Chinese who are living in other countries and who are usually citizens of other countries. Works Department personnel are stationed in Chinese embassies and consulates, and attempt to influence important people of Chinese ancestry to follow Chinese Communist Party direction.[7] Works Department Agents also keep an eye on Chinese academics and scientists working in other countries and make sure they eventually go back home to China.[7]

The Commission of Science, Technology, and Industry for National Defense: Sends agents to foreign countries, including the United States, as employees of front organizations to purchase defense equipment and technologies restricted for export. Examples of Chinese cover organizations include, New Era Corp., Chinese International Trust and Investment Corp., and Poly Technologies.[7]

Various case histories

  • In 2007, McAfee, Inc. alleged that China was actively involved in "cyberwar." China was accused of cyber-attacks on India, Germany, and the United States, although they denied knowledge of these attacks. China has the highest number of computers vulnerable to be controlled, owing at least partially to the large population.[25]
  • On March 28, 2009, a cyber spy network, dubbed GhostNet, using servers mainly based in China has tapped into classified documents from government and private organizations in 103 countries, including the computers of Tibetan exiles,[26][27] but China denies the claim.[28][29]
  • In December 2009 through January 2010, a cyber attack, dubbed Operation Aurora, was launched from China against Google and over 20 other companies.[30] Google said the attacks originated from China and that it would "review the feasibility" of its business operations in China following the incident. According to Google, at least 20 other companies in various sectors had been targeted by the attacks. McAfee spokespersons claim that "this is the highest profile attack of its kind that we have seen in recent memory."[31]

See also

References

  1. ^ deGraffenreid, p. 30.
  2. ^ a b c d e f g h Global Security. "Ministry of State Security Operations." (accessed March 11, 2010).
  3. ^ Wortzel, p. 6.
  4. ^ Wortzel, p. 9.
  5. ^ Helft, Miguel and John Markoff, "In Rebuke of China, Focus Falls on Cybersecuirty," The New York Times, January 13, 2010.
  6. ^ Wortzel, p. 8.
  7. ^ a b c d e f g h i j k l Polmar, Norman and Thomas B. Allen, Spy Book: The Encyclopedia of Espionage, Second Edition, (New York, NY: Random House Reference, 2004), p. 125.
  8. ^ a b c Eftimiades, p. 28.
  9. ^ a b Wortzel, p. 5.
  10. ^ a b c d e f Wortzel, p. 4.
  11. ^ Wortzel, p. 3.
  12. ^ U.S. Department of Defense, Annual Report to Congress on the Military Power of the People's Republic of China, (Washington, DC: July 2007), p. 29.
  13. ^ deGraffenreid, p. 99.
  14. ^ a b c deGraffenreid, p. 98.
  15. ^ deGraffenreid, p. 100.
  16. ^ a b c d e f g Cha, Ariana Eunjung and Ellen Nakashima, "Google China cyberattack part of vast espionage campaign, experts say," The Washington Post, January 14, 2010.
  17. ^ a b c "Google cyberattack hit password system – NY Times," Reuters, April 19, 2010.
  18. ^ Eftimiades, p. 21.
  19. ^ a b c d "They let her clean the China," The Economist, May 15, 2003.
  20. ^ Lichtblau, Eric, "F.B.I. Was Told Years Ago Of Possible Double Agent," The New York Times, April 12, 2003.
  21. ^ Polmar, Norman and Thomas B. Allen, Spy Book: The Encyclopedia of Espionage, Second Edition, (New York, NY: Random House Reference, 2004).
  22. ^ a b c d Wortzel, p. 6.
  23. ^ Warrick, Joby and Carrie Johnson, "Chinese Spy 'Slept' In U.S. for 2 Decades," The Washington Post, April 3, 2008.
  24. ^ Eftimiades, p. 17.
  25. ^ "China 'has .75M zombie computers' in U.S.". http://www.upi.com/International_Security/Emerging_Threats/Briefing/2007/09/17/china_has_75m_zombie_computers_in_us/7394/. Retrieved 2007-11-30. 
  26. ^ AP: Researchers: Cyber spies break into govt computers
  27. ^ CTV News: Video clip
  28. ^ Foreign Ministry Spokesperson Qin Gang's Remarks on the So-called Chinese Cyber-Spy Ring Invading Computers in Countries
  29. ^ embassy scoffs at reports of cyber spying
  30. ^ "A new approach to China". Google Inc.. 2010-01-12. http://googleblog.blogspot.com/2010/01/new-approach-to-china.html. Retrieved 17 January 2010. 
  31. ^ "Google Attack Is Tip Of Iceberg", McAfee Security Insights, Jan. 13, 2010

Bibliography

  • deGraffenreid, Kenneth (ed.), The Unanimous and Bipartisan Report of the House Select Committee on U.S. National Security and Military Commercial Concerns with the People's Republic of China ("The Cox Report"). Select Committee, U.S. House of Representatives (Washington, DC: Regnery, 1999)
  • Eftimiades, Nicholas, Chinese Intelligence Operations (Annapolis, MD: Naval Institute Press, 1994)
  • Wortzel, Larry M., Hearing on "Enforcement of Federal Espionage Laws." Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security of the House Committee on the Judiciary, U.S. House of Representatives, January 29, 2008

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Cyberwarfare in the United States — is the United States Cyber Commands military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack.[1] The United States Department of Defense sees the use of computers and the Internet to conduct warfare in… …   Wikipedia

  • Chinese intelligence activity abroad — Chinese intelligence is believed to be highly active outside of the People s Republic of China.[1][2] China is the largest intelligence collector in the Netherlands, as well as in several other EU countries, and one of the top five intelligence… …   Wikipedia

  • Chinese Information Operations and Information Warfare — are based on concepts and terms similar to those used by the United States, but the Chinese have evolved them to be more suitable and relevant to Chinese culture and to communist doctrine. While the People s Republic of China has adopted the idea …   Wikipedia

  • Immigration to the United States — 2000 Census Population Ancestry Map Immigration to the United States has been a major source of …   Wikipedia

  • History of the United States Air Force — The United States Air Force became a separate military service on September 18, 1947, with the implementation of the National Security Act of 1947. [The primary source for the history of the USAF prior to 1947 is Winged Shield, Winged Sword: A… …   Wikipedia

  • Foreign policy of the United States — United States This article is part of the series: Politics and government of the United States …   Wikipedia

  • Society of the United States — The society or culture of the United States is a Western culture, and has been developing since long before the United States became a country with its own unique characteristics and developments such as dialect, music, arts, cuisine, etc. Today… …   Wikipedia

  • Military history of the United States — History of the United States This article is part of a series Timeline …   Wikipedia

  • George W. Bush's first term as President of the United States — began January 20 2001 and ended January 20 2005, with the beginning of his second term as president. Conservative agendaOn his first day in office, Bush moved to block federal aid to foreign groups that offered counseling or any other assistance… …   Wikipedia

  • Contents of the United States diplomatic cables leak (Africa) — Content from the United States diplomatic cables leak has depicted Sub Saharan Africa and related subjects extensively. The leak, which began on 28 November 2010, occurred when the website of WikiLeaks an international new media non profit… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”