Professional Documents
Culture Documents
COMPETING WITHOUT FIGHTING
COMPETING WITHOUT FIGHTING
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Center for Strategic and International Studies (CSIS) is collaborating with JSTOR to
digitize, preserve and extend access to this content.
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
The ability of foreign affairs,
news, military, security, and
other departments to collect
information and intelligence has
been significantly improved, and
the ability of relevant leading
departments to comprehensively
eva l u ate i n fo r m at i o n a n d
intelligence has continuously
strengthened.
–Zhang Tuosheng1
INTELLIGENCE
OPERATIONS
㱧⪓璡鼨ꠅ䮣⟔䕜䗯䥊氳耇ⱱ
伺侁䬠냖僗⪩겅㵗鼨ꠅ簧⺭陁⮮
⟔䕜䗯䥊氳耇ⱱ┘亇ⱶ䍠ն
ˑ䌫媛榟
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
3
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 17
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING
18 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS
EHUHGFRPSRQHQWVWUXFWXUHRI066KHDGTXDUWHUV WLRQȇVVRYHUHLJQW\RUUHIOHFWDEODWDQWUHIXVDO
so that the JSSD, for example, has its own Sixth to accept international law. These operations
%XUHDXWKDWOLNHO\FRRUGLQDWHVZLWKWKH6L[WK LQYROYHDWWHPSWVE\%HLMLQJWRH[WHQGWKHDUP
%XUHDXDW066KHDGTXDUWHUVLQ%HLMLQJ6HYHUDO RILWVLQFUHDVLQJO\DXWKRULWDULDQJRYHUQDQFHWR
VFKRODUVRYHUWKH\HDUVKDYHVFRXUHG&KLQHVH DQ\RILWVSHUFHLYHGHQHPLHVDQ\ZKHUHLQWKH
SULPDU\VRXUFHVLQDQHIIRUWWRPDSWKHVSHFLȴF ZRUOGȃHYHQLILWPHDQVYLRODWLQJWKHFRQVWLWXWLRQV
structure, roles, and responsibilities of the MSS. and laws of the democratic nations where the
+RZHYHUWKHDFFXUDF\RIWKLVZRUNLVYDULDEOH MPS conducts these activities. Examples include
DQGRIWHQEHFRPHVTXLFNO\GDWHG2QHDWWULEXWH uncoordinated law enforcement activities on a
that the Chinese intelligence services share with global scale, with recent reports indicating that
WKHLU:HVWHUQFRXQWHUSDUWVLVDWHQGHQF\WRUH- &KLQHVHODZHQIRUFHPHQWHOHPHQWVKDYHTXLHWO\
organize, including the MSS’s rearrangement of established more than 50 “overseas police service
EXUHDXQXPEHUV)RUH[DPSOH066ȴOHVGLVFORVHG FHQWHUVȋLQFRXQWULHVDFURVVȴYHFRQWLQHQWV16
in a U.S. court case revealed that the overseas
VFLHQFHDQGWHFKQRORJ\EXUHDXLQWKH-66'ZDV :LWKLQWKH3HRSOHȇV/LEHUDWLRQ$UP\ 3/$ WZR
renumbered from the Fourth Bureau to the Sixth EUDQFKHVDUHSULPDULO\FKDUJHGZLWKLQWHOOLJHQFH
Bureau in December 2013.12 duties. The Intelligence Bureau of the Joint Staff
'HSDUWPHQWRIWKH&HQWUDO0LOLWDU\&RPPLVVLRQLV
7KH0LQLVWU\RI3XEOLF6HFXULW\ 036 LV&KLQDȇV WKH3/$ȇVSULPDU\+80,17DUPURXJKO\HTXLY-
SULPDU\GRPHVWLFVHFXULW\VHUYLFH7KH036LV DOHQWWRWKH86'HIHQVH,QWHOOLJHQFH$JHQF\
PDLQO\UHVSRQVLEOHIRUSROLFHZRUNZLWKLQ&KL- (DIA).17 Prior to the large-scale reorganization
QDEXWLWDOVRKDVH[WHQVLYHLQWHUQDOVHFXULW\ DQGPRGHUQL]DWLRQRIWKH3/$LQODWHWKH
DXWKRULWLHV6LQFHWKHLQLWLDWLRQRI;L-LQSLQJȇV Intelligence Bureau was known as the Second
DQWLFRUUXSWLRQFDPSDLJQDWWKHWK3DUW\&RQ- Department of the General Staff Department of
JUHVVLQWKH036KDVEHHQLQFUHDVLQJO\ WKH3/$PRUHFRPPRQO\NQRZQDV3/$7KH
tied to overseas operations. These activities are EXUHDXZDVWUDGLWLRQDOO\FRPSOHPHQWHGE\VLJQDOV
less focused on collecting political, economic, or intelligence, electronic warfare, information op-
PLOLWDU\LQWHOOLJHQFHLQIRUPDWLRQ,QVWHDGWKH\ HUDWLRQVDQGRIIHQVLYHF\EHUFDSDELOLWLHVZLWKLQ
are an extension of a decades-long role for the WKH7KLUG'HSDUWPHQW 3/$ DQG)RXUWK'HSDUW-
036LQȊSROLWLFDOVHFXULW\ȋZKLFKLQFOXGHVHIIRUWV PHQW 3/$ 182IWKHVHJURXSV3/$PDLQWDLQV
to exert pressure on overseas dissidents and WKHKLJKHVWSXEOLFSURȴOHRXWVLGHRI&KLQD7KH
SHUFHLYHGHQHPLHV7KH036WUDGLWLRQDOO\KDV 86'HSDUWPHQWRI-XVWLFH '2- LQGLFWHGȴYH
undertaken domestic activities to send messages 3/$FRPSXWHUQHWZRUNRSHUDWRUVLQDQG
WRLWVWDUJHWVRYHUVHDVVXFKDVE\DUUHVWLQJIDP- the economic espionage activities of one of the
LO\PHPEHUVLQ&KLQD13 The MPS continues this
organization’s components (Unit 61398) were ex-
VSHFLȴFWHFKQLTXHEXWLVQRZDXJPHQWLQJWKLV
SRVHGE\D86F\EHUVHFXULW\ȴUPLQ19 Both
GRPHVWLFSUHVVXUHZLWKGHSOR\PHQWVRYHUVHDVWR
3/$DQG3/$ZHUHUHQDPHGDQGUHRUJDQL]HG
harass, intimidate, and repatriate overseas Chi-
GXULQJDVHULHVRI3/$UHIRUPVLQODWHZLWK
QHVHFLWL]HQVZKR%HLMLQJDFFXVHVRISROLWLFDORU
ERWKFRPSRQHQWVOLNHO\LQWHJUDWHGLQWRWKH1HW-
ȴQDQFLDOFRUUXSWLRQ147KHVHDFWLYLWLHVDUHOLNHO\
ZRUN6\VWHPV'HSDUWPHQWRIWKH3/$ȇV6WUDWHJLF
VSHDUKHDGHGE\WKH036ȇV)LUVW%XUHDXZKLFKLV
Support Force (SSF), which is also subordinate
UHSRUWHGO\UHVSRQVLEOHIRUPRQLWRULQJ&KLQHVH
WRWKH&HQWUDO0LOLWDU\&RPPLVVLRQ20
political dissidents who live outside of China.15
CHINA’S INTELLIGENCE
For the United States and its partners, the MPS’s
RYHUVHDVRSHUDWLRQVDUHDUJXDEO\WKHPRVWFRQ-
FHUQLQJRIDQ\RI&KLQDȇVRYHUVHDVLQWHOOLJHQFH
activities. This is because the MPS is engaged in
DOCTRINE AND THE
RSHUDWLRQVWKDWH[WHQGIDUEH\RQGWKHERXQGDU- AGENT ACQUISITION CYCLE
LHVRIWUDGLWLRQDOHVSLRQDJH(VSLRQDJHȃWKDWLV
VS\LQJRQRWKHUQDWLRQVWRJOHDQLQVLJKWVDERXW This chapter’s focus on examining Chinese intel-
WKHLUFDSDELOLWLHVDQGLQWHQWLRQVȃLVDQDFFHSW- ligence operations through the lens of the agent
HGDFNQRZOHGJHGDQGQRUPDOSUDFWLFHE\LQ- DFTXLVLWLRQF\FOHVHUYHVWZRSXUSRVHV7KHȴUVW
telligence agencies in the arena of geopolitics. purpose is to illuminate how China’s national-level
MPS operations, however, are often something intelligence collection priorities are operational-
HQWLUHO\GLIIHUHQW,QPDQ\FLUFXPVWDQFHVWKH\ L]HGE\WKHLQWHOOLJHQFHVHUYLFHV7KLVLQFOXGHV
manifest in egregious violations of another na- describing how the MSS and its counterparts
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 19
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING
LGHQWLI\DQGDSSURDFKSRWHQWLDOVRXUFHVWDVNDQG UHVSRQVLELOLW\DFURVVWKHLQWHOOLJHQFHVHUYLFHV
handle these sources, and how the services work research and academic institutions, and state-
ZLWKVSHFLȴFFXVWRPHUVWRUHȴQHLQIRUPDWLRQ RZQHGHQWHUSULVHV,WLVDV\VWHPWKDWPDLQWDLQV
QHHGVDQGUHTXLUHPHQWV7KHVHFRQGSXUSRVH QRFOHDUOLQHVEHWZHHQPLOLWDU\PRGHUQL]DWLRQ
is to examine how the various elements of the DQG HFRQRPLF JURZWK D GLVWLQFWLRQ WKDWȃDW
&KLQHVHVWDWHȃLQFOXGLQJWKH&&3VWDWHUHVHDUFK OHDVWLQWKH8QLWHG6WDWHVȃLVDOLQHHVWDEOLVKHG
institutions, private companies, and the technical, LQLQWHOOLJHQFHSROLF\DQGGRFWULQH22$V+XRDQG
F\EHUDQG+80,17HOHPHQWVRIWKHLQWHOOLJHQFH :DQJFRQFOXGHȊ,QWHOOLJHQFHZRUNZLOOEHFRPH
VHUYLFHVȃFRQWULEXWHWR&KLQHVHLQWHOOLJHQFHRS- WKHKHDUWRIWKHQHZLQGXVWULDOUHYROXWLRQȋ23
erations. The goal is to provide a more coherent This perspective on intelligence can be observed
alternative to the common characterization of in cases where China’s professional intelligence
the Chinese intelligence threat as “one thousand RɚFHUVFROODERUDWHZLWKVFLHQFHDQGWHFKQRORJ\
JUDLQVRIVDQGȋ7KLVWHUPFDQOHQGWKHLQDFFXUDWH LQVWLWXWLRQVWRLGHQWLI\FROOHFWLRQUHTXLUHPHQWV
impression that China’s activities are decentral- that advance China’s commercial interests.
ized and opportunistic, while also opening the
8QLWHG6WDWHVDQGLWVDOOLHVWRFULWLFLVPWKDWWKH\ +XRDQG:DQJȇVZRUNDOVRGHVFULEHV&KLQDȇV
DUHLQGLVFULPLQDWHO\WDUJHWLQJ&KLQHVHDFDGHP- historical reliance on open-source information,
LFVVWXGHQWVEXVLQHVVSHRSOHDQGMRXUQDOLVWVE\ which in their estimation accounted for 80 percent
labeling them all as suspected agents of the CCP. RI&KLQDȇVVFLHQFHDQGWHFKQRORJ\LQWHOOLJHQFH
The intent is to use fact-based, empirical evidence FROOHFWLRQ/LNHWKH6RYLHWVGXULQJWKH&ROG:DU
to illuminate Chinese intelligence tradecraft, China recognized the intelligence value of various
which includes the activities of the state organs, :HVWHUQSHULRGLFDOVDQGJRYHUQPHQWUHSRUWV
DɚOLDWHGUHVHDUFKDQGGHYHORSPHQWLQVWLWXWLRQV DQG+XRDQG:DQJȇVZRUNPHWKRGLFDOO\GHWDLOV
and various cut-outs, co-optees, and nontradi- WKHVSHFLȴFJRYHUQPHQWDODQGQRQJRYHUQPHQWDO
tional collectors.21 sources of technical insights that were of partic-
XODUEHQHȴWWR&KLQDȇVFRPPHUFLDODQGPLOLWDU\
&KLQHVHSULPDU\VRXUFHVGHVFULELQJ%HLMLQJȇV PRGHUQL]DWLRQ1HYHUWKHOHVVWKH\DFNQRZOHGJH
PRGHUQDSSURDFKWRLQWHOOLJHQFHWKHRU\GRFWULQH that the remaining 20 percent of China’s intelli-
and operations are less abundant compared to gence needs “must come through the collection
ZULWLQJVRQRWKHUVHFXULW\WRSLFVSDUWLFXODUO\ of information using special means, such as re-
%HLMLQJȇVYLHZVRQPLOLWDU\PRGHUQL]DWLRQDQG connaissance satellites, electronic eavesdropping,
VWUDWHJ\1HYHUWKHOHVV&KLQHVHGRFXPHQWVDFURVV and the activities of special agents (purchasing
WKHVSHFWUXPRIQDWLRQDOVHFXULW\VWUDWHJ\DQG RUVWHDOLQJ HWFȋ24
GRFWULQHUHȵHFWWKHDELGLQJLPSRUWDQFHRILQWHO-
ligence in statecraft and warfare. Information is 'HVSLWHWKHEOXUULQJRIQDWLRQDOVHFXULW\DQG
DWWKHKHDUWRI%HLMLQJȇVPLOLWDU\PRGHUQL]DWLRQ commercial interests in China’s approach to intel-
efforts, which emphasize the pursuit of “infor- OLJHQFHFROOHFWLRQ+XRDQG:DQJDUJXHWKDW&KLQD
PDWLRQGRPLQDQFHȋ:KLOHWKHVHGRFXPHQWV VKDUHVZLWKWKH:HVWVLPLODUSHUVSHFWLYHVRQWKH
UHȵHFWWKHHQGXULQJLPSRUWDQFHRILQWHOOLJHQFH EURDGHULQWHOOLJHQFHFROOHFWLRQSURFHVVVSHFLȴ-
WRPRGHUQ&KLQDPXFKRIZKDW:HVWHUQVFKRODUV FDOO\WKHLQWHOOLJHQFHF\FOH7KH\HPSKDVL]HWKH
NQRZDERXWWKHVSHFLȴFVRIKRZ&KLQDȇVFODQGHV- LPSRUWDQFHRIGHYHORSLQJFROOHFWLRQUHTXLUHPHQWV
WLQHVHUYLFHVDGYDQFH%HLMLQJȇVLQWHUHVWVFRPH LGHQWLI\LQJWKHPRVWHIIHFWLYHPHDQVRIFROOHFWLQJ
IURPWKH86SURVHFXWLRQRI&KLQHVHRɚFHUVDQG DJDLQVWFHUWDLQUHTXLUHPHQWVDQGȊLPPHGLDWHO\
DJHQWVSXEOLFZDUQLQJVIURP:HVWHUQOHDGHUV >DQDO\]LQJDQGVWXG\LQJ@WKHIHHGEDFNWKDWKDV
DQGQRQJRYHUQPHQWDQDO\VWV been received from the information consumer and
DGMXVWWKHFROOHFWLRQSURFHVVLQDWLPHO\PDQQHU
One of the few Chinese-language documents WKXVLPSURYLQJWKHZRUNRIFROOHFWLRQȋ25 Although
DYDLODEOHLQWKH:HVWLOOXPLQDWLQJ&KLQDȇVDS- WKHUHLVQRGHȴQLWLYHRSHQVRXUFH&KLQHVHLQWHO-
proach to intelligence work is a book published in ligence doctrine available, the cases reviewed
E\WZR&KLQHVHLQWHOOLJHQFHYHWHUDQVȃ+XR LQVXSSRUWRIWKLVFKDSWHUVWURQJO\VXJJHVWWKDW
=KRQJZHQDQG:DQJ=RQJ[LDRȃWLWOHGSources WKH066DQGLWVFRXQWHUSDUWVDGKHUHWRPDQ\RI
and Techniques of Obtaining National Defense the same fundamentals of the traditional intelli-
Science and Technology Intelligence. It describes JHQFHF\FOHDQGDVDQH[WHQVLRQRIWKDWF\FOHWKH
a broader Chinese intelligence apparatus that UHFUXLWPHQWRIKXPDQDJHQWVXVLQJWHFKQLTXHV
LVEXLOWWRDGYDQFHERWKQDWLRQDOVHFXULW\DQG WKDWDUHVKDUHGKLVWRULFDOO\ZLWK&KLQDȇVIRUHLJQ
commercial interests. The book examines how FRXQWHUSDUWVLQFOXGLQJWKH&,$0,DQG5XVVLDQ
VFLHQFHDQGWHFKQRORJ\FROOHFWLRQLVDVKDUHG intelligence agencies.
20 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 21
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING
FRYHUȃGXULQJWKH&ROG:DUEXWWKHLUSULPDU\ E\*HUPDQ\ȇVGRPHVWLFLQWHOOLJHQFHVHUYLFHWKH
PLVVLRQZDVXQFOHDU7KH\OLNHO\DVVLVWHGEURDGHU Bundesamt für Verfassungsschutz (BfV), found
efforts to spot and assess potential sources while &KLQDȇVLQWHOOLJHQFHDSSURDFKHVRQ/LQNHG,QWR
also collecting insights and non-public information PDWFKWKHVFDOHREVHUYHGE\0,,QLWVUHSRUW
IURPLQGLYLGXDOVZKREHOLHYHGWKH\ZHUHVSHDNLQJ the BfV disclosed several inauthentic profiles
with Chinese state media.28+RZHYHUQRQHZHUH and front organizations, posting as headhunters,
GHȴQLWLYHO\WLHGWRVHQVLWLYHUHFUXLWPHQWVZLWKLQ consultants, think tanks, and scholars, who the
the U.S. government. service assessed were working for Chinese in-
telligence.35 This shift toward social media in the
In addition, Chinese intelligence services have HDUO\SKDVHVRIWKHUHFUXLWPHQWSURFHVVRIIHUVWKH
WUDGLWLRQDOO\SUHIHUUHGWKDWUHFUXLWPHQWVDQGVXE- Chinese intelligence services a platform to conduct
VHTXHQWVRXUFHPHHWLQJVRFFXULQVLGHRI&KLQDRU ORZFRVWORZULVNDFWLYLWLHVLQWKHHDUO\SKDVHVRI
DWKLUGFRXQWU\297KHFRPSDUDWLYHO\OLPLWHGRYHU- WKHUHFUXLWPHQWF\FOH
VHDVIRRWSULQWRI&KLQDȇV+80,17RɚFHUVOLNHO\
nurtured the culture of using proxies and cut-outs Several notable investigations in the United States
DVNH\FRPSRQHQWVLQWKHVSRWWLQJDQGDVVHVVLQJ VLQFHUHȵHFWKRZ&KLQDȇVLQWHOOLJHQFHVHUYLFHV
phase. In the current era, social media and the XVH/LQNHG,QWRLGHQWLI\DQGHYDOXDWHSRWHQWLDO
LQWHUQHWDUHLQFUHDVLQJO\XVHGIRUWKHVSRWWLQJDQG VRXUFHVRIFODVVLȴHGLQIRUPDWLRQWUDGHVHFUHWVDQG
assessing phases, though recent cases reinforce that RWKHUQRQSXEOLFLQIRUPDWLRQ,QPDQ\LQVWDQFHV
RYHUVHDVSUR[LHVFRQWLQXHWREHNH\FRQWULEXWRUV &KLQHVHLQWHOOLJHQFHXVHV/LQNHG,QWRLGHQWLI\DQG
WRHDUO\VWDJHUHFUXLWLQJHIIRUWV contact current and former cleared government em-
SOR\HHVRUWRDGYHUWLVHYDULRXVEXVLQHVVFRQVXOWLQJ
7KLVLQFOXGHVWKHFDVHRI-XQ:HL<HRD6LQJDSRUHDQ DQGHPSOR\PHQWRSSRUWXQLWLHVWKDWPD\LQWHUHVW
national who was convicted in the United States IRUPHUPHPEHUVRIWKHLQWHOOLJHQFHFRPPXQLW\
on charges that he was serving as a spotter and or U.S. Department of Defense.36-XQ:HL<HRXVHG
assessor for the MSS.30 Yeo received intelligence VRFLDOPHGLDSDUWLFXODUO\/LQNHG,QH[WHQVLYHO\LQ
UHTXLUHPHQWVIURP&KLQDEDVHG066RɚFHUVZKR his activities on behalf of the MSS. Yeo created a fake
relied on Yeo to spot and assess potential U.S.-based FRQVXOWLQJFRPSDQ\DQGSRVWHGMRERSSRUWXQLWLHV
sources. Yeo’s MSS handlers had a wide range of RQ/LQNHG,Q+HODWHUFODLPHGKHUHFHLYHGRYHU
intelligence interests, with a particular focus on 400 resumes, 90 percent of which were submitted
non-public U.S. government information. These E\FXUUHQWDQGIRUPHU86JRYHUQPHQWDQGPLOL-
WDVNLQJVLQFOXGHGUHTXHVWVIRU<HRWRLGHQWLI\VRXUF- WDU\SHUVRQQHOZLWKVHFXULW\FOHDUDQFHV<HRWKHQ
es who could report on Southeast Asia, the U.S. IRUZDUGHGWKHUHVXPHVWR066RɚFHUVLQ&KLQD
'HSDUWPHQWRI&RPPHUFHDUWLȴFLDOLQWHOOLJHQFH for further evaluation and guidance on potential
and the trade war between the United States and recruitment options.37 Yeo augmented his efforts
&KLQD2QPXOWLSOHRFFDVLRQV<HRPHWVHSDUDWHO\ RQ/LQNHG,QE\DWWHQGLQJSXEOLFHYHQWVWRFRQWDFW
ZLWKGLIIHUHQW066RɚFHUVLQ&KLQDDOORIZKRP LQGLYLGXDOVIURPOREE\LQJȴUPVRUGHIHQVHFRQ-
issued identical tasking.31 These incidents further tracting companies who could be possible targets.38
reinforce this chapter’s broader contention that
&KLQHVHLQWHOOLJHQFHFROOHFWLRQLVPRUHFHQWUDOO\
directed and organized than is often appreciated.32
COMPUTER NETWORK OPERATIONS
&KLQDȇVEXONGDWDWKHIWFDPSDLJQVȃLQFOXGLQJ
RSHUDWLRQVWDUJHWLQJWKH862ɚFHRI3HUVRQQHO
THE ROLE OF OPEN-SOURCE INTELLIGENCE 0DQDJHPHQW 230 (TXLID[$QWKHP0DUULRWWDQG
AND SOCIAL MEDIA RWKHUVȃDUHH[DPLQHGLQWKLVUHSRUWȇVFKDSWHURQ
:LWKLQWKHVSRWWLQJDQGDVVHVVLQJSKDVHVUHFHQW &KLQHVHF\EHURSHUDWLRQV &KDSWHU 39 Nevertheless,
investigations and global intelligence service it is important to acknowledge the extent to which
VWDWHPHQWVUHȵHFWWKDWRSHQVRXUFHLQWHOOLJHQFH %HLMLQJȇVDFTXLVLWLRQRIWKLVGDWDFDQFRQWULEXWH
DQDO\VLVȃSDUWLFXODUO\WKHH[SORLWDWLRQRIVRFLDO WR+80,17RSHUDWLRQV:KLOHWKHVHRSHUDWLRQV
PHGLDȃKDVEHFRPHDSUHIHUUHGWHFKQLTXHIRU have been attributed to various elements of the
China’s intelligence services. According to U.S., &KLQHVHLQWHOOLJHQFHVHUYLFHVȃSULPDULO\UHJLRQDO
8.DQG*HUPDQLQWHOOLJHQFHRɚFLDOV&KLQHVH FRPSRQHQWVRIWKH066DQGWKH3/$ȃWKHUHLV
LQWHOOLJHQFHRɚFHUVDQGSUR[LHVKDYHFRQGXFWHG OLWWOHGHȴQLWLYHHYLGHQFHDYDLODEOHGHWDLOLQJKRZ
WKRXVDQGVRIVRIWDSSURDFKHVRQ/LQNHG,QLQUHFHQW &KLQDPD\EHZHDSRQL]LQJWKLVGDWD40
\HDUV33 More than 10,000 such incidents have oc-
curred in the United Kingdom alone, according to +RZHYHUWKHLQIRUPDWLRQIURPWKHVHRSHUDWLRQV
MI5 chief Ken McCallum.34$VWXG\FRQGXFWHG FRXOGKHOS+80,17RɚFHUVDVVHVVSRWHQWLDODYH-
22 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 23
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING
relationship with Chinese intelligence took several sensitive IP and trade secrets, including items
\HDUVWRUHDFKWKHVWDJHZKHUHKHEHJDQPHHWLQJ such as design manuals, design and simulation
GLUHFWO\ZLWK&KLQHVHJRYHUQPHQWRɚFLDOVDQG VRIWZDUHFRPSRVLWHVSRZHUV\VWHPVDQGRWKHU
providing them with sensitive FBI information. LQIRUPDWLRQDERXWFLYLOLDQDQGPLOLWDU\DLUFUDIW50
Chun’s relationship originated in 2005, when a The MSS often augments its human source de-
&KLQDEDVHGSULQWHUFRPSDQ\VROLFLWHGDQLQYHVW- YHORSPHQWHIIRUWVGXULQJȊH[FKDQJHVȋLQ&KLQD
ment from one of Chun’s relatives. Over the next E\FRQGXFWLQJWHFKQLFDORSHUDWLRQVDJDLQVWWKHLU
ȴYH\HDUVWKH&KLQHVHFRPSDQ\SDLGIRU&KXQWR visitors’ devices.51
WUDYHORQDQDQQXDOEDVLVWUDYHOWKDWKHDFWLYHO\
FRQFHDOHGIURPWKH)%,,QWKHFRPSDQ\SDLG %H\RQGWKHSULPDU\PHWKRGVWKDW&KLQDXVHVWR
IRUDWULSWR(XURSHZKHUH&KXQPHWGLUHFWO\ZLWK VSRWDVVHVVGHYHORSDQGUHFUXLWVRXUFHVWKHȴQDO
D&KLQHVHJRYHUQPHQWRɚFLDOZKRWROG&KXQKH HOHPHQWLQYROYHVWKHVSHFLȴFWUDGHFUDIWWKDW&KLQD
knew he worked for the FBI. At this stage, Chun uses to handle its human sources.
began reporting information about FBI personnel,
structure, technological capabilities, surveillance
practices, and surveillance targets.47 HANDLING SOURCES:
One variation of China’s efforts to appeal to com- OPERATIONALIZING
mercial and economic interests of potential sources INTELLIGENCE REQUIREMENTS
is the manner in which the intelligence services
work through research institutes and universities. &KLQDȇVJOREDOLQWHOOLJHQFHDFWLYLWLHVDUHPHUHO\
This includes recruitment into China’s so-called one element of broader political warfare. Nev-
ȊWDOHQWSODQVȋVXFKDVWKH7KRXVDQG7DOHQWV3ODQ
HUWKHOHVVWKH\DUHDFULWLFDOHOHPHQWRI%HLMLQJȇV
DQGWKH+XQGUHG7DOHQWV3ODQ'LVDJJUHJDWLQJWKH
DSSURDFKWRVHFXULW\FRPSHWLWLRQ&KLQDȇVSXUVXLW
numerous licit and illicit mechanisms that China
RIYDULRXVIRUPVRIFODVVLȴHG86GHIHQVHDQG
UHOLHVXSRQWRDFTXLUHDGYDQFHGWHFKQRORJ\IURP
intelligence information contributes to broader
WKH8QLWHG6WDWHVLVEH\RQGWKHVFRSHRIWKLVFKDSWHU
efforts to secure an information advantage over
Nevertheless, several recent cases reveal how China’s
WKH8QLWHG6WDWHVSDUWLFXODUO\LI%HLMLQJZHUHWR
VWDWHDɚOLDWHGUHVHDUFKLQVWLWXWLRQVDQGWKHWDOHQW
learn information about the United States that
plans have served as critical platforms for China to
:DVKLQJWRQEHOLHYHVWREHSURWHFWHG7KLVORJLF
H[WUDFWWUDGHVHFUHWVDQGLQWHOOHFWXDOSURSHUW\ ,3
H[WHQGVLQWRWKHVFLHQFHDQGWHFKQRORJ\VSKHUH
IURP86EDVHGVRXUFHV$OWKRXJKPDQ\FDVHVGR
not involve a direct connection between China’s where Chinese intelligence operations are de-
research institutions and the intelligence services, VLJQHGWRIXOȴOONH\NQRZOHGJHJDSVIRU&KLQDȇV
there are some striking exceptions. FRPPHUFLDODQGPLOLWDU\WHFKQRORJ\UHVHDUFKDQG
development efforts. China’s intelligence services
0RVWQRWDEOHLVWKHWULDORI<DQMXQ;XDQ066RI- SOD\DFUXFLDOUROHLQUHFUXLWLQJKXPDQVRXUFHV
ȴFHUZKRZDVWKHGHSXW\GLYLVLRQGLUHFWRURIWKH WRIXOȴOOVSHFLȴFFXVWRPHUVFLHQFHDQGWHFKQRORJ\
Sixth Bureau in the JSSD. In that case, the United UHTXLUHPHQWVIRU&KLQDȇVHFRQRPLFDQGPLOLWDU\
States disclosed how the Sixth Bureau, which is advantage. It is in this area that the case of MSS
responsible for overseas collection of science and RɚFHU<DQMXQ;XLVVRVWULNLQJ
WHFKQRORJ\LQIRUPDWLRQZRUNHGGLUHFWO\ZLWK
organizations such as the Jiangsu Science and $VSUHYLRXVO\QRWHG;XZDVDVHQLRU066Rɚ-
7HFKQRORJ\3URPRWLRQ$VVRFLDWLRQWKH$YLDWLRQ cer assigned to the JSSD Sixth Bureau, where he
,QGXVWU\RI&KLQD $9,& DQGWKH1DQMLQJ8QLYHUVLW\ was responsible for collecting overseas science
of Aeronautics and Astronomics (NUAA) to arrange DQGWHFKQRORJ\LQIRUPDWLRQ,QKLVDFWLYLWLHV
presentations and exchanges with overseas experts ;XZRUNHGFORVHO\ZLWKRɚFLDOVLQYDULRXVVWDWH
known to be working on technologies that were HQWLWLHVLQFOXGLQJ$9,&DQGWKH18$$WRUHȴQH
Chinese collection priorities.487KLVLQFOXGHG;XLQ DYLDWLRQUHODWHGFROOHFWLRQUHTXLUHPHQWV)RUH[-
KLVFDSDFLW\DVDQ066RɚFHUGLUHFWO\DUUDQJLQJ DPSOHLQ;XH[FKDQJHGPHVVDJHVZLWKDQ
a set of discussions in China with experts from RɚFLDODW$9,&ZKRUHOD\HGVSHFLȴFLQIRUPDWLRQ
DFURVVWKHJOREDODYLDWLRQLQGXVWU\LQFOXGLQJ WKDWWKH$9,&RɚFLDOZDVVHHNLQJIURP%RHLQJ
representatives of at least six of the world’s lead- LQFOXGLQJDQDO\WLFDOWRROVIRU%RHLQJȇVSURSULHWDU\
ing aerospace companies.49$VUHȵHFWHGLQ;XȇV DLUIUDPHDQGVSHFLȴFSRUWLRQVRIWKHBoeing Design
communications with his intelligence customers Manual.527KHVHW\SHVRIH[FKDQJHVDUHFULWLFDOLQ
ZLWKLQWKH&KLQHVHVFLHQFHDQGWHFKQRORJ\DSSD- XQGHUVWDQGLQJWKHVSHFLȴFLW\RI&KLQHVHVFLHQFH
ratus, the purpose of these exchanges was to elicit DQGWHFKQRORJ\FROOHFWLRQUHTXLUHPHQWVWKDWZHUH
24 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS
7KHVHW\SHVRILQVLJKWVLQWRWKHLQQHUZRUNLQJVRI ,QDVHSDUDWHFDVHWKH'2-FKDUJHG036RɚFHUV
WKH066DQGLWVFXVWRPHUVPDQLIHVWLQWKHZD\VWKDW in April 2023 with conducting an intimidation
&KLQDKDQGOHVLWVKXPDQVRXUFHV,Q;XȇVFDVHWKH campaign against Chinese nationals residing in
066DQGWKH18$$GLUHFWO\FROODERUDWHGWRVKDSH the United States whose political views and actions
WKHVSHFLȴFWRSLFVWKDWYLVLWRUVZRXOGEULHIGXULQJ were critical of China.58 The DOJ has referred to
WKHLUSUHVHQWDWLRQVLQ&KLQD,QRQHFDVH;XDQG WKLVW\SHRIDFWLYLW\DVȊUHSUHVVLRQVFKHPHVȋ59
WKH18$$RɚFLDOZRUNHGLQWDQGHPWRHQFRXUDJH $OVRLQ$SULODIHGHUDOMXU\FRQYLFWHG3UDV
a U.S.-based aerospace engineer to provide a pre- 0LFKHOD*UDPP\ZLQQLQJDUWLVWDQGIRUPHU
VHQWDWLRQRQKLJKO\WHFKQLFDOWRSLFVUHODWHGWR*( member of the hip-hop group Fugees, of working
Aviation’s trade secrets and IP. As the relationship with the MPS to conduct a clandestine campaign to
EHWZHHQ;XDQGWKHHQJLQHHUSURJUHVVHG;XZDV LQȵXHQFHVHQLRU86RɚFLDOV600RUHEURDGO\WKH
FOHDUDERXWKRZLQIRUPDWLRQUHTXLUHPHQWVZHUH Chinese government has conducted widespread
being developed, writing to the engineer: “I will harassment of Chinese critics of China abroad,
WRXFKEDVHZLWKWKHVFLHQWLȴFUHVHDUFKGHSDUWPHQW WKRXJKLWLVQRWDOZD\VFOHDULIȃDQGWRZKDWGH-
KHUHWRVHHZKDWWHFKQRORJ\LVGHVLUHGDQG,ZLOO JUHHȃ&KLQHVHLQWHOOLJHQFHDQGODZHQIRUFHPHQW
OHW\RXNQRZZKDWWRSUHSDUHȋ;XODWHUUHȴQHG organizations are involved. Beginning in October
the specific areas of interest for the engineer, IRUH[DPSOH&KLQDZDVDOOHJHGO\LQYROYHG
expressing that there was particular interest in making more than a dozen false bomb threats
LQVRIWZDUHV\VWHPVSHFLILFDWLRQVDQGGHVLJQ DWOX[XU\KRWHOVDQGHPEDVVLHVLQ(XURSHWKH
SURFHVVHV/DWHUZKHQWKHHQJLQHHUH[SUHVVHG United States, the Middle East, and Asia using
concern about sending certain information from the names of Chinese dissidents.61
KLV*($YLDWLRQHPDLODGGUHVV;XUHVSRQGHGȊ,W
PLJKWEHLQDSSURSULDWHWRVHQGGLUHFWO\IURPWKH ,QDGGLWLRQWR2SHUDWLRQ)R[+XQW&KLQDKDVDOVR
FRPSDQ\ULJKW"ȋ53 HQJDJHGLQ2SHUDWLRQ6N\QHWDSDUDOOHOSURJUDP
WRWDUJHWWKHȴQDQFHVRI&KLQHVHFLWL]HQVLQFOXG-
ing dissidents, residing overseas. According to
OVERSEAS HARASSMENT WKH)%,2SHUDWLRQ6N\QHWLQFOXGHV35&HIIRUWVWR
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 25
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING
QHVHSROLFHVWDWLRQLQ1HZ<RUN&LW\IRXQGWKH ,QDGGLWLRQWKHUHDUHFRQFHUQVDERXWF\EHUHQDEOHG
036ZDVXQDPELJXRXVO\LQYROYHGLQKDUDVVLQJ HFRQRPLFLQWHOOLJHQFHHIIRUWVZKLFKDUHDQDO\]HG
members of the Chinese diaspora in the United LQWKLVUHSRUWȇVFKDSWHURQ&KLQHVHF\EHURSHUDWLRQV
States. According to the lead FBI agent involved &KDSWHU 7KHHFRQRPLFDQGVWUDWHJLFEHQHȴWV
in the investigation: RIWKHVHDFWLYLWLHVDUHYDVWSDUWLFXODUO\LQWHUPV
RIWUDGHVHFUHWVPLOLWDU\WHFKQRORJ\DQGVHQVLWLYH
$OWKRXJKWKH036LVJHQHUDOO\LGHQWLȴHGDV U.S. government information stolen. In 2012,
WKH35&ȇVSULPDU\GRPHVWLFODZHQIRUFHPHQW WKHQKHDGRIWKH1DWLRQDO6HFXULW\$JHQF\ 16$
DJHQF\ȃUHVSRQVLEOHIRUSXEOLFVDIHW\JHQ- *HQHUDO.HLWK$OH[DQGHUGHVFULEHGF\EHUHQDEOHG
HUDOFULPLQDOLQYHVWLJDWLRQQDWLRQDOVHFXULW\ economic espionage as “the greatest transfer of
DQGLQWHUQHWVHFXULW\ȃLWVPLVVLRQH[WHQGV ZHDOWKLQKLVWRU\ȋ69 The economic loss to the
EH\RQGODZHQIRUFHPHQWDQGLQWRIXQFWLRQV United States alone is often estimated at $30–600
more associated with an intelligence service. ELOOLRQDQQXDOO\70
7KH036URXWLQHO\PRQLWRUVDPRQJRWKHUV
Chinese political dissidents who live in the 86HFRQRPLFORVVHVDOVRWUDQVODWHGLUHFWO\LQWR
United States and in other locations outside the &KLQHVHPLOLWDU\DGYDQFHV6X%LQD&KLQHVH&D-
QDGLDQEXVLQHVVPDQDVVLVWHG&KLQHVH3/$F\-
35&7KH036KDVXVHGFRRSHUDWLYHFRQWDFWV
EHURɚFHUVLQWKHLUHIIRUWVWRVWHDOWUDGHVHFUHWV
ERWKLQVLGHWKH35&DQGDURXQGWKHZRUOGWR
regarding the C-17, F-22, and F-35 aircraft. This
LQȵXHQFHWKUHDWHQDQGFRHUFHSROLWLFDOGLV-
LQFOXGHGPRUHWKDQȴOHVȃWRWDOLQJPRUH
sidents abroad. Indeed, I am aware that the
WKDQJLJDE\WHVȃRQWKH&DLUFUDIW6XFKWKHIW
35&JRYHUQPHQWKDVWKUHDWHQHGDQGFRHUFHG
allows China to evade the costs, both in time and
Chinese political dissidents living in the United
PRQH\WRPRGHUQL]HLWVV\VWHPV)RUDVHQVHRIWKH
States in an effort to silence them.66 scale of the investments that went into the three
aircraft targeted during the Su Bin case, the U.S.
CONCLUSION government spent more than $100 billion over a
period of more than three decades to modernize
WKHVHDLUOLIWDQGȴJKWHUV\VWHPV71
Measuring the impact of Chinese intelligence
operations as part of political warfare is chal- 7KHRYHUDOOHFRQRPLFGDPDJHFDXVHGE\&KL-
OHQJLQJRQVHYHUDOOHYHOV7KHȴUVWFKDOOHQJHLV QHVHOLFLWTXDVLOLFLWDQGF\EHUFROOHFWLRQOLNHO\
GHȴQLQJZKDWFRXQWVDVLQWHOOLJHQFHRSHUDWLRQV far outpaces that which can be attributed to the
LQWKHPRGHUQHUD&KLQDHPSOR\VDZLGHUDQJH FRXQWU\ȇV+80,17VHUYLFHV+RZHYHUWKLVLVQRWWR
RIOLFLWDQGTXDVLOLFLWPHDQVWRDFTXLUHVHQVLWLYH XQGHUVHOOWKHHFRQRPLFGDPDJHFDXVHGE\+80,17
and critical information. This includes investing FROOHFWLRQRSHUDWLRQV$OWKRXJKQRWH[SOLFLWO\
LQIRUHLJQȴUPVWKDWSRVVHVVYDOXDEOH,3WKDWFDQ connected to the MSS, one recent U.S. conviction
VXSSRUW&KLQDȇVPLOLWDU\RUFRPPHUFLDOLQWHUHVWV involved a scientist stealing trade secrets valued
,WLQFOXGHVWKHXVHRIȊWDOHQWSURJUDPVȋDQGRWKHU DWELOOLRQIURPD86SHWUROHXPFRPSDQ\72
MRLQWUHVHDUFKLQLWLDWLYHVWRIDFLOLWDWHWKHWUDQVIHU 066RɚFHU;X<DQMXQZRUNHGWRWDUJHW*($YL-
of valuable technical knowledge back to Chinese ation’s processes for manufacturing composite
institutions. As the U.S. Senate Select Committee MHWHQJLQHIDQEODGHVDWHFKQRORJ\WKDWQRRWKHU
on Intelligence acknowledged in a comprehensive JOREDOFRPSDQ\KDVGXSOLFDWHGLQWKHPRUHWKDQ
VWXG\RIWKH86FRXQWHULQWHOOLJHQFHHQWHUSULVH \HDUVVLQFHLWZDVȴUVWFHUWLȴHGE\WKH)HGHUDO
Aviation Administration.73
FRPSHWLWRUVQHHGQRWEUHDN86ODZVWRIXOȴOO
NH\LQWHOOLJHQFHFROOHFWLRQQHHGV,QRQHQRWH- ,WLVDOVRGLɚFXOWWRPHDVXUHWKHLPSDFWRI&KLQHVH
ZRUWK\UHFHQWVWXG\D86SULYDWHLQWHOOLJHQFH HIIRUWVWRDFTXLUHSULYDWHLQIRUPDWLRQDERXW86
ȴUPLGHQWLȴHGLQGLYLGXDOVFRQQHFWHGWR/RV DQGDOOLHGGHFLVLRQPDNLQJDQGSROLF\WKRXJKLW
$ODPRV1DWLRQDO/DERUDWRU\ZKRKDGUHWXUQHG LVFULWLFDOWRDVVHVVWKHWRWDOLW\RI&KLQHVHFDVHV
WR&KLQDWRZRUNLQDUHDVFULWLFDOWRWKH3/$ȇV rather than isolated incidents. The reason is that
PLOLWDU\PRGHUQL]DWLRQLQFOXGLQJK\SHUVRQLF &KLQHVHLQWHOOLJHQFHRɚFHUVKDYHORQJUHFRJQL]HG
weapons, deep-penetrating munitions, and un- the value of what is often referred to as the “mo-
GHUVHDV\VWHPV67$VHSDUDWHLQYHVWLJDWLRQE\WKH VDLFWKHRU\ȋRIVHFUHF\LQZKLFKLQGLYLGXDOIDFWV
Washington PostIRXQGWKDW&KLQHVHK\SHUVRQLF FDQLOOXPLQDWHDQRWKHUZLVHRSDTXHSLFWXUHZKHQ
UHVHDUFKHUVDUHVLPSO\SXUFKDVLQJIURP86 LQWHJUDWHGLQWRDEURDGHUERG\RINQRZOHGJH74 As
suppliers software that aids in designing and +XRDQG:DQJZURWHȊ%\SLFNLQJKHUHDQGWKHUH
PRGHOLQJK\SHUVRQLFV\VWHPV68 among the vast amount of public materials and
26 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS
accumulating information a drop at a time, often discovered traveling with a notebook that included
LWLVSRVVLEOHWREDVLFDOO\UHYHDOWKHRXWOLQHVRI “CIA-related operational notes from asset meetings,
VRPHVHFUHWLQWHOOLJHQFHDQGWKLVLVSDUWLFXODUO\ operational meeting locations, operational phone
WUXHLQWKHFDVHRIWKH:HVWHUQFRXQWULHVȋ75 Cor- numbers, true names of assets, and information
UHVSRQGLQJO\FDVHVVXFKDV&KLQDȇVVXFFHVVIXO DERXWFRYHUWIDFLOLWLHVȋ790RUHEURDGO\&KLQDKDV
UHFUXLWPHQWRI&DQGDFH&ODLERUQHDFRPSDUDWLYHO\ expanded its signals intelligence collection capa-
ORZUDQNLQJ866WDWH'HSDUWPHQWRɚFLDOVKRXOG ELOLWLHVDJDLQVWWKH8QLWHG6WDWHVE\HVWDEOLVKLQJ
EHYLHZHGPHUHO\DVRQHSLHFHZLWKLQDEURDGHU LQWHOOLJHQFHFROOHFWLRQIDFLOLWLHVLQ&XEDURXJKO\
PRVDLF:KLOH&ODLERUQHPD\QRWKDYHRSHUDWHG 100 miles from Florida, and other locations.80
within the inner circles of U.S. decisionmaking,
KHUUHSRUWLQJRQWKHSHULSKHU\RIWKHVHFLUFOHV As China’s U.S. counterparts can attest, the public
XQGRXEWHGO\FRQWULEXWHGWR%HLMLQJȇVEURDGHU RIWHQRQO\KHDUVDERXWLQWHOOLJHQFHIDLOXUHVQRW
HIIRUWVWRSHQHWUDWH86SROLF\GHOLEHUDWLRQVZLWK VXFFHVVHV1HYHUWKHOHVVWKHFDVHVDQDO\]HGLQ
respect to China. connection to this chapter all included notable
tradecraft failures on the part of the Chinese intel-
There is also a subset of cases that have undermined ligence services. One of the more amusing is that,
86DQGDOOLHGQDWLRQDOVHFXULW\LQZD\VWKDWDUH LQWKHFORVLQJDUJXPHQWVDW<DQMXQ;XȇVWULDOKLV
GLɚFXOWWRPHDVXUHȃEXWDUHOLNHO\VLJQLȴFDQW GHIHQVHDWWRUQH\VSRLQWHGWRKLVSRRUWUDGHFUDIW
Consider the damage associated with the 2015 skills as a reason to doubt the U.S. government’s
230EUHDFKGXULQJZKLFK&KLQHVHF\EHUDFWRUV FRQWHQWLRQWKDWKHZDVDVHQLRU066RɚFHU
stole detailed background investigation informa-
WLRQIRUQHDUO\PLOOLRQ86FLWL]HQV7KLVGDWD Some historians of Chinese intelligence have cited
LQFOXGHGȊ6RFLDO6HFXULW\1XPEHUVUHVLGHQF\ WKHFRXQWU\ȇVODFNRIDVWURQJH[WHUQDO+80,17
DQGHGXFDWLRQDOKLVWRU\HPSOR\PHQWKLVWRU\ WUDGLWLRQDVRQHRIWKHUHDVRQVZK\%HLMLQJKDV
LQIRUPDWLRQDERXWLPPHGLDWHIDPLO\DQGRWKHU FRPSHQVDWHGE\EXLOGLQJDPDVVLYHF\EHURSHUD-
SHUVRQDODQGEXVLQHVVDFTXDLQWDQFHVKHDOWK WLRQVFDSDELOLW\+RZHYHUWKHUHDUHVRPHW\SHVRI
FULPLQDODQGȴQDQFLDOKLVWRU\DQGRWKHUGHWDLOVȋ information critical to China’s broader strategic
DVZHOODVȊȴQGLQJVIURPLQWHUYLHZVFRQGXFWHG LQWHUHVWVWKDWFDQRQO\EHSXUVXHGZLWKKXPDQ
E\EDFNJURXQGLQYHVWLJDWRUVDQGȴQJHUSULQWVȋ VRXUFHV0DQ\RIWKHFDVHVFLWHGLQWKLVFKDSWHU
for some individuals.76)URPD+80,17WDUJHWLQJ LQYROYHGWUDGHFUDIWWKDWLVOLNHO\XQZRUNDEOHLQ
SHUVSHFWLYHWKH&KLQHVHJRYHUQPHQWȃDWDPLQ- an era of heightened technical surveillance. This
LPXPȃLVLQSRVVHVVLRQRIGHWDLOHGGRVVLHUVRQ REVHUYDWLRQLVGRXEO\LURQLFJLYHQWKDW&KLQDLWVHOI
QHDUO\PLOOLRQ$PHULFDQVZKRKDYHDSSOLHG has built the world’s most advanced surveillance
IRUDFFHVVWRFODVVLȴHGLQIRUPDWLRQ VWDWH%XW&KLQDȇVVXUYHLOODQFHVWDWHRQO\UHVROYHV
KDOIRIWKHJXLGDQFHIURPWKH\HDUROGMeth-
)LQDOO\WKHUHDUHWKHLQVWDQFHVZKHUH&KLQHVH ods of the Sima noted at the beginning of this
DJHQWVKDYHVXFFHVVIXOO\SHQHWUDWHG86LQWHOOL- FKDSWHU:KLOH%HLMLQJKDVQHDUO\SHUIHFWHGLWV
gence agencies and gained access to government DELOLW\WRȊREVHUYHWKHQHDUȋWKHFXUUHQWHUDRI
secrets, details of overseas intelligence operations, +80,17ZLOOUHTXLUH&KLQDȇVVSLHVWRPRGHUQL]H
DQGWKHLGHQWLWLHVRI86VRXUFHVLQ&KLQD7KHȴUVW KRZWKH\ȊHPSOR\VSLHVDJDLQVWWKHGLVWDQWȋ$QG
$PHULFDQLQWHOOLJHQFHRɚFHUFKDUJHGZLWKVS\LQJ the success of Chinese political warfare will hinge,
IRU&KLQDZDV/DUU\:X7DL&KLQDUHWLUHGFDUHHU to some degree, on how well China can improve
linguist for the CIA’s Foreign Broadcast Informa- LWV+80,17FDSDELOLWLHV
WLRQ6HUYLFHZKRSDVVHGFODVVLȴHGLQIRUPDWLRQ
WR%HLMLQJIRUGHFDGHVEHIRUHKLVFRQYLFWLRQLQ
1986. Prosecutors said of Chin at his trial, “For 30
\HDUVKHZDVDGLUHFWIXQQHOIURPWKH$PHULFDQ
LQWHOOLJHQFHFRPPXQLW\WRWKH3HRSOHȇV5HSXEOLFRI
&KLQDȋ777ZRPRUHUHFHQWFDVHVDUHWKRVHRI-HUU\
&KXQ6KLQJ/HHDQG$OH[DQGHU<XN&KLQJ0DERWK
IRUPHU&,$FDVHRɚFHUV0DȇVFDVHZKLFKLVVWLOO
pending, includes the submission into evidence
of a 2001 video recording of Ma and a colleague
PHHWLQJZLWK066RɚFHUVDQGUHYHDOLQJ&,$Rɚ-
cer identities, human asset identities, operational
WUDGHFUDIWDQGVHFXULW\FRPPXQLFDWLRQSUDFWLFHV78
/HHZDVFRQYLFWHGLQDFDVHZKHUHKHZDV
This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 27
All use subject to https://about.jstor.org/terms