Nicholas Eftimiades examines the infiltration of Chinese espionage agents into foreign governments and private businesses. He specifically addresses the human source in intelligence operations, and how these tactics fit into the conduct of internal and foreigh affairs in China.
This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China's espionage organs, and links to an extensive online glossary of Chinese language intelligence and security terms. Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad.
This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US. This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and operation by providing new evidence and offering alternative interpretations of major events throughout Chinese Communist Party history. This analysis promotes a better understanding of the CCP's mechanisms for control over both Party members and the general population. This study specifies some of the broader implications for theory and research that can help clarify the nature of Chinese politics and potential future developments in the country's security and intelligence services.
Historical Dictionary of Chinese Intelligence, Second Edition covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.
Intelligence Operations: Understanding Data, Tools, People, and Processes helps readers understand the various issues and considerations an intelligence professional must tackle when reviewing, planning, and managing intelligence operations, regardless of level or environment. The book opens by introducing the reader to the many defining concepts associated with intelligence, as well as the main subject of intelligence: the threat. Additional chapters examine the community of intelligence, revealing where intelligence is actually practiced, as well as what defines and characterizes intelligence operations. Readers learn about the four critical components to every intelligence operation--data, tools, people, and processes--and then explore the various operational and analytic processes involved in greater detail. Throughout, the text encourages discovery and discussion, urging readers to first understand the material, then break it down, adapt it, and apply it in a way that supports their particular operations or requirements. Unique in approach and designed to assist professionals at all levels, Intelligence Operations is an excellent resource for both academic courses in the subject and practical application by intelligence personnel. Erik Kleinsmith is Associate Vice President for Strategic Relations in Intelligence, National, Homeland and Cyber Security for American Military University. Culminating his military career as Chief of Intelligence for the U.S. Army's Land Information Warfare Activity, Erik pioneered the development of asymmetric threat analysis using data mining technology. In this capacity, he gained national prestige related to his involvement in the Able Danger program as the military lead of a team of analysts profiling and mapping Al Qaeda prior to 9/11. Erik continued his career in intelligence as a defense contractor, managing intelligence training with the U.S. Army for over a decade. His areas of expertise include intelligence, security-related training and analysis, counterintelligence, and information operations.
"With this timely study, a seasoned sinologist publicly examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts to collect state and technological secrets, he says, have been going on mostly uninterrupted for decades while Western intelligence services focused on the Soviet Union. Now, with the end of the cold war and the collapse of the USSR, attention must turn to these invasive operations." "Unstinting in his research, the author has made full use of Chinese sources and his own longtime study of China. In addition, he draws on his expertise as a counterintelligence analyst to examine the structure, objectives, and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreign affairs in China. The author's interviews with a number of Chinese diplomats, military and civilian intelligence officers, and secret agents reveal the cloak-and-dagger activities common to Chinese operatives in the United States. These astonishing descriptions read like a gripping espionage novel. Yet the book is uncompromising in its studious documentation. The monograph from which this work sprung was honored in 1992 as the best scholarly article on the subject of intelligence by the National Intelligence Study Center - a think tank founded by former top CIA officials. Written in a style that will appeal to a broad range of readers, this book is a one-of-a-kind intelligence study." "Intelligence and defense professionals congressional and foreign government staffers, industrial and business security professionals, as well as intelligence buffs will all find something of interest in this compelling and detailed book."--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved