Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Center for Strategic and International Studies (CSIS)

Report Part Title: INTELLIGENCE OPERATIONS

Report Title: COMPETING WITHOUT FIGHTING


Report Subtitle: CHINA’S STRATEGY OF POLITICAL WARFARE
Report Author(s): Seth G. Jones, Emily Harding, Catrina Doxsee, Jake Harrington and
Riley McCabe
Published by: Center for Strategic and International Studies (CSIS) (2023)
Stable URL: https://www.jstor.org/stable/resrep52615.6

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

Center for Strategic and International Studies (CSIS) is collaborating with JSTOR to
digitize, preserve and extend access to this content.

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
The ability of foreign affairs,
news, military, security, and
other departments to collect
information and intelligence has
been significantly improved, and
the ability of relevant leading
departments to comprehensively
eva l u ate i n fo r m at i o n a n d
intelligence has continuously
strengthened.
–Zhang Tuosheng1

INTELLIGENCE
OPERATIONS

㱧⪓璡鼨ꠅ䮣꥘⟔䕜䗯䥊氳耇ⱱ
伺侁䬠냖僗⪩겅㵗鼨ꠅ簧⺭陁⮮
⟔䕜䗯䥊氳耇ⱱ┘亇ⱶ䍠ն
ˑ䌫媛榟

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
3

This chapter examines Chinese tent of illuminating Chinese human intelligence

intelligence operations as part of


+80,17 WUDGHFUDIWDQGFROOHFWLRQSULRULWLHV
Overall, Chinese overseas intelligence activities
political warfare, particularly Chinese DUHPRUHFHQWUDOO\GLUHFWHGDQGGULYHQE\VSHFLȴF
actions against the United States. LQWHOOLJHQFHSULRULWLHVWKDQLVW\SLFDOO\DFNQRZO-
:KLOHHVSLRQDJHLVDQRUPDOSDUWRIVWDWHFUDIWWKLV HGJHG0DQ\ȃLQFOXGLQJWKHFKLHIRIWKH8QLWHG
report focuses on the political warfare aspects of .LQJGRPȇV6HFXULW\6HUYLFH 0, ȃGHVFULEH&KLQD
intelligence operations. Intelligence operations SXUVXLQJDȊWKRXVDQGJUDLQVRIVDQGȋLQWHOOLJHQFH
SOD\DFULWLFDOUROHLQSROLWLFDOZDUIDUHE\KHOSLQJ VWUDWHJ\GHVFULELQJKRZ&KLQDXVHVFLWL]HQVLQNH\
VWDWHVȃLQWKLVFDVH&KLQDȃREWDLQSROLWLFDOPLOLWDU\ positions to collect small pieces of information
economic, and other information to coerce or that together form a more complete intelligence
otherwise gain a competitive advantage over picture.66XFKDVWUDWHJ\LVPXFKKDUGHUWRGLVUXSW
DQDGYHUVDU\,QWHOOLJHQFHRSHUDWLRQVDOVRSOD\ As this chapter shows, the empirical, open-source
an important role in informing and supporting UHFRUGLQGLFDWHVWKDW&KLQHVH+80,17RSHUDWLRQV
other components of political warfare, such as DUHPHWKRGLFDOUHVRXUFHLQWHQVLYHDQGGULYHQE\
information and disinformation campaigns,
ZHOOGHȴQHGLQWHOOLJHQFHSULRULWLHV
XQLWHGIURQWDFWLYLW\DQGHFRQRPLFFRHUFLRQ$V
/LQGD5RELQVRQFRQFOXGHVLQKHUVWXG\RISROLWLFDO This chapter diverges from most existing literature
warfare, “Political warfare places a high demand RQ&KLQHVHLQWHOOLJHQFHDFWLYLWLHVE\DQDO\]LQJ
RQLQWHOOLJHQFHȋ3 As another assessment concludes, %HLMLQJȇV+80,17VHUYLFHVWKURXJKWKHOHQVRIWKH
Ȋ&RQGXFWLQJSROLWLFDOZDUIDUHE\WU\LQJWREXLOG +80,17DJHQWDFTXLVLWLRQF\FOHWKHȴYHSKDVH
XSIRUHLJQJURXSVUHTXLUHVUHOLDEOHLQWHOOLJHQFH SURFHVVXVHGE\LQWHOOLJHQFHRɚFHUVWRVSRWDVVHVV
about those groups’ motivations as well as about develop, recruit, and handle human sources.7 This
WKHLUFDSDFLWLHVȋ4
process is important in understanding Chinese
PHOTO: ED JONES/GETTY IMAGES

Few characterizations better describe the modern SROLWLFDOZDUIDUH7KHDQDO\VLVUHOLHVRQDUHYLHZRI


Chinese intelligence apparatus than a passage from cases of known or suspected Chinese intelligence
WKH\HDUROGPLOLWDU\WUHDWLVHThe Methods of activities, with a particular focus on cases dating
the SimaȊ,QJHQHUDOWRZDJHZDUHPSOR\VSLHV from 2015 to present. It includes an evaluation of
DJDLQVWWKHGLVWDQWREVHUYHWKHQHDUȋ5 Along these court records from more than 100 U.S. indictments
OLQHVWKLVFKDSWHUDQDO\]HVKRZ&KLQDȇVPLOLWDU\ of individuals accused of conducting activities on
DQGFLYLOLDQLQWHOOLJHQFHVHUYLFHVHPSOR\VSLHV EHKDOIRI&KLQDDVZHOODVDQDO\VLVRIVLPLODUFDVHV
DVSDUWRISROLWLFDOZDUIDUHZLWKWKHSULPDU\LQ- overseas where that data is available.

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 17
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING

$OWKRXJK&KLQHVHSULPDU\VRXUFHGRFXPHQWVGH- Intelligence serves a central role in broader Chi-


scribing the structure and operations of the coun- QHVH&RPPXQLVW3DUW\ &&3 KLVWRU\DQGORUH,Q
WU\ȇVFLYLOLDQDQGPLOLWDU\LQWHOOLJHQFHVHUYLFHVDUH 1931, three CCP spies who had penetrated the
scarce, recent Chinese counterintelligence inves- .XRPLQWDQJVHFXULW\DSSDUDWXVSURYLGHGHDUO\
WLJDWLRQVDQGGLVFORVXUHVE\LQWHOOLJHQFHDQGODZ ZDUQLQJWKDWDKLJKOHYHO&&3LQWHOOLJHQFHRɚFLDO
enforcement agencies worldwide are generating had defected to the Kuomintang. Mao Zedong later
an increasing volume of data that illuminates the FODLPHGWKDWWKLVRSHUDWLRQȃNQRZQDVWKH7KUHH
operational tradecraft of China’s intelligence ser- +HURHVRIWKH'UDJRQȇV/DLUȃFKDQJHGWKHFRXUVHRI
YLFHV7KHVHGLVFORVXUHVH[SRVHNH\SDWWHUQVDQG WKHUHYROXWLRQE\ZDUQLQJNH\XQGHUJURXQGFDGUH
commonalities across cases during each phase WKDWWKH\ZRXOGVRRQEHH[SRVHG$PRQJWKRVH
of China’s efforts to recruit sources and to shape who were saved was China’s future premier Zhou
WKHVHVRXUFHVȇFROOHFWLRQ:KLOHWKHPDMRULW\RIGDWD (QODLZKRVHUYHGDNH\UROHLQ&KLQHVHLQWHOOLJHQFH
DQDO\]HGLQVXSSRUWRIWKLVFKDSWHUZHUHGHULYHG DQGVHFXULW\DIIDLUVXQWLOKLVGHDWKLQ9
from U.S. federal court documents, there is ample
evidence that the Chinese intelligence tradecraft and The Chinese intelligence apparatus has been reor-
FROOHFWLRQSULRULWLHVDSSO\HTXDOO\WR86SDUWQHUV JDQL]HGUHSHDWHGO\VLQFHWKHIRXQGLQJRIWKH&&3
$VVXFKWKHVHȴQGLQJVȃDOWKRXJKODUJHO\IRFXVHGRQ DQGWKHHVWDEOLVKPHQWRIWKH3HRSOHȇV5HSXEOLFRI
86H[DPSOHVȃFDQFRQWULEXWHWRJOREDOHIIRUWVWR &KLQD 35& :KLOHUROHVPLVVLRQVDQGRUJDQL]D-
detect and disrupt Chinese intelligence operations. tional structure have changed, the one constant
is that the CCP and China have maintained for-
The remainder of this chapter begins with a brief malized, professional intelligence services since
overview of China’s intelligence services. It then WKHSDUW\ȇVIRXQGLQJLQ10 This structure has
SURFHHGVLQWRIXUWKHUDQDO\VLVRIKRZWKH&KLQHVH HYROYHGWRGD\LQWRDEURDGHU&KLQHVHLQWHOOLJHQFH
intelligence services execute overseas operations FRPPXQLW\WKDWLQFOXGHVERWKFLYLOLDQDQGPLOLWDU\
across the spotting, assessing, developing, recruit- elements, as outlined in Figure 3.1.
ing, and handling phases, which are critical for
SROLWLFDOZDUIDUH)LQDOO\WKLVFKDSWHUH[DPLQHV 2QWKHFLYLOLDQVLGHWKH0LQLVWU\RI6WDWH6HFXULW\
Chinese intelligence and law enforcement efforts 066 KDVEHHQ%HLMLQJȇVSUHPLHUIRUHLJQLQWHOOL-
to intimidate and harass members of the Chinese gence service since it was established in 1983. The
GLDVSRUDOLYLQJRYHUVHDVȃLQFOXGLQJLQWKH8QLWHG MSS is often described as combining the foreign
6WDWHVȃE\VXFKRUJDQL]DWLRQVDVWKH0LQLVWU\RI intelligence collection responsibilities of the Central
3XEOLF6HFXULW\ ,QWHOOLJHQFH$JHQF\ &,$ ZLWKWKHGRPHVWLFFRXQ-
terintelligence and counterespionage authorities
of the Federal Bureau of Investigation (FBI). This
CHINA’S DQDORJ\LVXVHIXOȃXSWRDSRLQWȃLQGHVFULELQJWKH

INTELLIGENCE SERVICES RYHUDUFKLQJPLVVLRQRIWKH066+RZHYHUWKH066


combines these foreign and domestic authorities
LQXQLTXHZD\VZKHQFRQGXFWLQJLWVRSHUDWLRQV
&RQWHPSRUDU\&KLQHVHLQWHOOLJHQFHDFWLYLWLHVDUH This results in several hallmark characteristics
SULPDULO\FRQGXFWHGXQGHUWKH1DWLRQDO,Q- of Chinese intelligence operations. Perhaps most
WHOOLJHQFH/DZ7KHODZGRHVQRWH[SOLFLWO\GHȴQH QRWDEOHLV%HLMLQJȇVFRQWLQXHGUHOLDQFHRQPDLQODQG
the roles and responsibilities of the civilian and &KLQDQRWMXVWDVDKXEIRURSHUDWLRQDORYHUVLJKW
PLOLWDU\DJHQFLHVWKDWFRPSULVH&KLQDȇVLQWHOOLJHQFH and coordination but for the actual business of
FRPPXQLW\EXWLWGHVFULEHVPDQ\RIWKHLQWHOOL- recruiting and handling foreign sources.
gence services’ broader authorities. For example,
$UWLFOHUHTXLUHVWKDWȊDOORUJDQL]DWLRQVDQG 7KH066LVFRPSRVHGRIDKHDGTXDUWHUVFRPSR-
citizens shall support, assist, and cooperate with QHQWDQGDSSUR[LPDWHO\FRPSRQHQWEXUHDXV
national intelligence efforts in accordance with the Each of these subordinate bureaus is assigned a
law, and shall protect national intelligence work QXPEHUDQGFKDUJHGZLWKDVSHFLȴFIXQFWLRQDO
VHFUHWVWKH\DUHDZDUHRIȋ$UWLFOHDXWKRUL]HV or regional portfolio. For example, as of 2018,
China’s intelligence services to “establish cooper- the Sixth Bureau was responsible for overseas
ative relationships with relevant individuals and FROOHFWLRQRQVFLHQFHDQGWHFKQRORJ\LVVXHV11 The
RUJDQL]DWLRQVDQGUHWDLQWKHPWRFDUU\RXWUHODWHG 066DOVRPDLQWDLQVSURYLQFLDODQGFLW\GLYLVLRQV
ZRUNȋ8 Both of these provisions establish the legal DQGEXUHDXVVXFKDVWKH6KDQJKDL6WDWH6HFXULW\
basis for some of the Chinese intelligence services’ %XUHDXWKH%HLMLQJ6WDWH6HFXULW\%XUHDXDQGWKH
NH\SDWWHUQVRIEHKDYLRUVSHFLȴFDOO\WKHLUKHDY\ -LDQJVX6WDWH6HFXULW\'HSDUWPHQW -66' (DFK
reliance on various cut-outs and proxies. RIWKHVHUHJLRQDO066RɚFHVPLUURUVWKHQXP-

18 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS

EHUHGFRPSRQHQWVWUXFWXUHRI066KHDGTXDUWHUV WLRQȇVVRYHUHLJQW\RUUHIOHFWDEODWDQWUHIXVDO
so that the JSSD, for example, has its own Sixth to accept international law. These operations
%XUHDXWKDWOLNHO\FRRUGLQDWHVZLWKWKH6L[WK LQYROYHDWWHPSWVE\%HLMLQJWRH[WHQGWKHDUP
%XUHDXDW066KHDGTXDUWHUVLQ%HLMLQJ6HYHUDO RILWVLQFUHDVLQJO\DXWKRULWDULDQJRYHUQDQFHWR
VFKRODUVRYHUWKH\HDUVKDYHVFRXUHG&KLQHVH DQ\RILWVSHUFHLYHGHQHPLHVDQ\ZKHUHLQWKH
SULPDU\VRXUFHVLQDQHIIRUWWRPDSWKHVSHFLȴF ZRUOGȃHYHQLILWPHDQVYLRODWLQJWKHFRQVWLWXWLRQV
structure, roles, and responsibilities of the MSS. and laws of the democratic nations where the
+RZHYHUWKHDFFXUDF\RIWKLVZRUNLVYDULDEOH MPS conducts these activities. Examples include
DQGRIWHQEHFRPHVTXLFNO\GDWHG2QHDWWULEXWH uncoordinated law enforcement activities on a
that the Chinese intelligence services share with global scale, with recent reports indicating that
WKHLU:HVWHUQFRXQWHUSDUWVLVDWHQGHQF\WRUH- &KLQHVHODZHQIRUFHPHQWHOHPHQWVKDYHTXLHWO\
organize, including the MSS’s rearrangement of established more than 50 “overseas police service
EXUHDXQXPEHUV)RUH[DPSOH066ȴOHVGLVFORVHG FHQWHUVȋLQFRXQWULHVDFURVVȴYHFRQWLQHQWV16
in a U.S. court case revealed that the overseas
VFLHQFHDQGWHFKQRORJ\EXUHDXLQWKH-66'ZDV :LWKLQWKH3HRSOHȇV/LEHUDWLRQ$UP\ 3/$ WZR
renumbered from the Fourth Bureau to the Sixth EUDQFKHVDUHSULPDULO\FKDUJHGZLWKLQWHOOLJHQFH
Bureau in December 2013.12 duties. The Intelligence Bureau of the Joint Staff
'HSDUWPHQWRIWKH&HQWUDO0LOLWDU\&RPPLVVLRQLV
7KH0LQLVWU\RI3XEOLF6HFXULW\ 036 LV&KLQDȇV WKH3/$ȇVSULPDU\+80,17DUPURXJKO\HTXLY-
SULPDU\GRPHVWLFVHFXULW\VHUYLFH7KH036LV DOHQWWRWKH86'HIHQVH,QWHOOLJHQFH$JHQF\
PDLQO\UHVSRQVLEOHIRUSROLFHZRUNZLWKLQ&KL- (DIA).17 Prior to the large-scale reorganization
QDEXWLWDOVRKDVH[WHQVLYHLQWHUQDOVHFXULW\ DQGPRGHUQL]DWLRQRIWKH3/$LQODWHWKH
DXWKRULWLHV6LQFHWKHLQLWLDWLRQRI;L-LQSLQJȇV Intelligence Bureau was known as the Second
DQWLFRUUXSWLRQFDPSDLJQDWWKHWK3DUW\&RQ- Department of the General Staff Department of
JUHVVLQWKH036KDVEHHQLQFUHDVLQJO\ WKH3/$PRUHFRPPRQO\NQRZQDV3/$7KH
tied to overseas operations. These activities are EXUHDXZDVWUDGLWLRQDOO\FRPSOHPHQWHGE\VLJQDOV
less focused on collecting political, economic, or intelligence, electronic warfare, information op-
PLOLWDU\LQWHOOLJHQFHLQIRUPDWLRQ,QVWHDGWKH\ HUDWLRQVDQGRIIHQVLYHF\EHUFDSDELOLWLHVZLWKLQ
are an extension of a decades-long role for the WKH7KLUG'HSDUWPHQW 3/$ DQG)RXUWK'HSDUW-
036LQȊSROLWLFDOVHFXULW\ȋZKLFKLQFOXGHVHIIRUWV PHQW 3/$ 182IWKHVHJURXSV3/$PDLQWDLQV
to exert pressure on overseas dissidents and WKHKLJKHVWSXEOLFSURȴOHRXWVLGHRI&KLQD7KH
SHUFHLYHGHQHPLHV7KH036WUDGLWLRQDOO\KDV 86'HSDUWPHQWRI-XVWLFH '2- LQGLFWHGȴYH
undertaken domestic activities to send messages 3/$FRPSXWHUQHWZRUNRSHUDWRUVLQDQG
WRLWVWDUJHWVRYHUVHDVVXFKDVE\DUUHVWLQJIDP- the economic espionage activities of one of the
LO\PHPEHUVLQ&KLQD13 The MPS continues this
organization’s components (Unit 61398) were ex-
VSHFLȴFWHFKQLTXHEXWLVQRZDXJPHQWLQJWKLV
SRVHGE\D86F\EHUVHFXULW\ȴUPLQ19 Both
GRPHVWLFSUHVVXUHZLWKGHSOR\PHQWVRYHUVHDVWR
3/$DQG3/$ZHUHUHQDPHGDQGUHRUJDQL]HG
harass, intimidate, and repatriate overseas Chi-
GXULQJDVHULHVRI3/$UHIRUPVLQODWHZLWK
QHVHFLWL]HQVZKR%HLMLQJDFFXVHVRISROLWLFDORU
ERWKFRPSRQHQWVOLNHO\LQWHJUDWHGLQWRWKH1HW-
ȴQDQFLDOFRUUXSWLRQ147KHVHDFWLYLWLHVDUHOLNHO\
ZRUN6\VWHPV'HSDUWPHQWRIWKH3/$ȇV6WUDWHJLF
VSHDUKHDGHGE\WKH036ȇV)LUVW%XUHDXZKLFKLV
Support Force (SSF), which is also subordinate
UHSRUWHGO\UHVSRQVLEOHIRUPRQLWRULQJ&KLQHVH
WRWKH&HQWUDO0LOLWDU\&RPPLVVLRQ20
political dissidents who live outside of China.15

CHINA’S INTELLIGENCE
For the United States and its partners, the MPS’s
RYHUVHDVRSHUDWLRQVDUHDUJXDEO\WKHPRVWFRQ-
FHUQLQJRIDQ\RI&KLQDȇVRYHUVHDVLQWHOOLJHQFH
activities. This is because the MPS is engaged in
DOCTRINE AND THE
RSHUDWLRQVWKDWH[WHQGIDUEH\RQGWKHERXQGDU- AGENT ACQUISITION CYCLE
LHVRIWUDGLWLRQDOHVSLRQDJH(VSLRQDJHȃWKDWLV
VS\LQJRQRWKHUQDWLRQVWRJOHDQLQVLJKWVDERXW This chapter’s focus on examining Chinese intel-
WKHLUFDSDELOLWLHVDQGLQWHQWLRQVȃLVDQDFFHSW- ligence operations through the lens of the agent
HGDFNQRZOHGJHGDQGQRUPDOSUDFWLFHE\LQ- DFTXLVLWLRQF\FOHVHUYHVWZRSXUSRVHV7KHȴUVW
telligence agencies in the arena of geopolitics. purpose is to illuminate how China’s national-level
MPS operations, however, are often something intelligence collection priorities are operational-
HQWLUHO\GLIIHUHQW,QPDQ\FLUFXPVWDQFHVWKH\ L]HGE\WKHLQWHOOLJHQFHVHUYLFHV7KLVLQFOXGHV
manifest in egregious violations of another na- describing how the MSS and its counterparts

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 19
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING

LGHQWLI\DQGDSSURDFKSRWHQWLDOVRXUFHVWDVNDQG UHVSRQVLELOLW\DFURVVWKHLQWHOOLJHQFHVHUYLFHV
handle these sources, and how the services work research and academic institutions, and state-
ZLWKVSHFLȴFFXVWRPHUVWRUHȴQHLQIRUPDWLRQ RZQHGHQWHUSULVHV,WLVDV\VWHPWKDWPDLQWDLQV
QHHGVDQGUHTXLUHPHQWV7KHVHFRQGSXUSRVH QRFOHDUOLQHVEHWZHHQPLOLWDU\PRGHUQL]DWLRQ
is to examine how the various elements of the DQG HFRQRPLF JURZWK D GLVWLQFWLRQ WKDWȃDW
&KLQHVHVWDWHȃLQFOXGLQJWKH&&3VWDWHUHVHDUFK OHDVWLQWKH8QLWHG6WDWHVȃLVDOLQHHVWDEOLVKHG
institutions, private companies, and the technical, LQLQWHOOLJHQFHSROLF\DQGGRFWULQH22$V+XRDQG
F\EHUDQG+80,17HOHPHQWVRIWKHLQWHOOLJHQFH :DQJFRQFOXGHȊ,QWHOOLJHQFHZRUNZLOOEHFRPH
VHUYLFHVȃFRQWULEXWHWR&KLQHVHLQWHOOLJHQFHRS- WKHKHDUWRIWKHQHZLQGXVWULDOUHYROXWLRQȋ23
erations. The goal is to provide a more coherent This perspective on intelligence can be observed
alternative to the common characterization of in cases where China’s professional intelligence
the Chinese intelligence threat as “one thousand RɚFHUVFROODERUDWHZLWKVFLHQFHDQGWHFKQRORJ\
JUDLQVRIVDQGȋ7KLVWHUPFDQOHQGWKHLQDFFXUDWH LQVWLWXWLRQVWRLGHQWLI\FROOHFWLRQUHTXLUHPHQWV
impression that China’s activities are decentral- that advance China’s commercial interests.
ized and opportunistic, while also opening the
8QLWHG6WDWHVDQGLWVDOOLHVWRFULWLFLVPWKDWWKH\ +XRDQG:DQJȇVZRUNDOVRGHVFULEHV&KLQDȇV
DUHLQGLVFULPLQDWHO\WDUJHWLQJ&KLQHVHDFDGHP- historical reliance on open-source information,
LFVVWXGHQWVEXVLQHVVSHRSOHDQGMRXUQDOLVWVE\ which in their estimation accounted for 80 percent
labeling them all as suspected agents of the CCP. RI&KLQDȇVVFLHQFHDQGWHFKQRORJ\LQWHOOLJHQFH
The intent is to use fact-based, empirical evidence FROOHFWLRQ/LNHWKH6RYLHWVGXULQJWKH&ROG:DU
to illuminate Chinese intelligence tradecraft, China recognized the intelligence value of various
which includes the activities of the state organs, :HVWHUQSHULRGLFDOVDQGJRYHUQPHQWUHSRUWV
DɚOLDWHGUHVHDUFKDQGGHYHORSPHQWLQVWLWXWLRQV DQG+XRDQG:DQJȇVZRUNPHWKRGLFDOO\GHWDLOV
and various cut-outs, co-optees, and nontradi- WKHVSHFLȴFJRYHUQPHQWDODQGQRQJRYHUQPHQWDO
tional collectors.21 sources of technical insights that were of partic-
XODUEHQHȴWWR&KLQDȇVFRPPHUFLDODQGPLOLWDU\
&KLQHVHSULPDU\VRXUFHVGHVFULELQJ%HLMLQJȇV PRGHUQL]DWLRQ1HYHUWKHOHVVWKH\DFNQRZOHGJH
PRGHUQDSSURDFKWRLQWHOOLJHQFHWKHRU\GRFWULQH that the remaining 20 percent of China’s intelli-
and operations are less abundant compared to gence needs “must come through the collection
ZULWLQJVRQRWKHUVHFXULW\WRSLFVSDUWLFXODUO\ of information using special means, such as re-
%HLMLQJȇVYLHZVRQPLOLWDU\PRGHUQL]DWLRQDQG connaissance satellites, electronic eavesdropping,
VWUDWHJ\1HYHUWKHOHVV&KLQHVHGRFXPHQWVDFURVV and the activities of special agents (purchasing
WKHVSHFWUXPRIQDWLRQDOVHFXULW\VWUDWHJ\DQG RUVWHDOLQJ HWFȋ24
GRFWULQHUHȵHFWWKHDELGLQJLPSRUWDQFHRILQWHO-
ligence in statecraft and warfare. Information is 'HVSLWHWKHEOXUULQJRIQDWLRQDOVHFXULW\DQG
DWWKHKHDUWRI%HLMLQJȇVPLOLWDU\PRGHUQL]DWLRQ commercial interests in China’s approach to intel-
efforts, which emphasize the pursuit of “infor- OLJHQFHFROOHFWLRQ+XRDQG:DQJDUJXHWKDW&KLQD
PDWLRQGRPLQDQFHȋ:KLOHWKHVHGRFXPHQWV VKDUHVZLWKWKH:HVWVLPLODUSHUVSHFWLYHVRQWKH
UHȵHFWWKHHQGXULQJLPSRUWDQFHRILQWHOOLJHQFH EURDGHULQWHOOLJHQFHFROOHFWLRQSURFHVVVSHFLȴ-
WRPRGHUQ&KLQDPXFKRIZKDW:HVWHUQVFKRODUV FDOO\WKHLQWHOOLJHQFHF\FOH7KH\HPSKDVL]HWKH
NQRZDERXWWKHVSHFLȴFVRIKRZ&KLQDȇVFODQGHV- LPSRUWDQFHRIGHYHORSLQJFROOHFWLRQUHTXLUHPHQWV
WLQHVHUYLFHVDGYDQFH%HLMLQJȇVLQWHUHVWVFRPH LGHQWLI\LQJWKHPRVWHIIHFWLYHPHDQVRIFROOHFWLQJ
IURPWKH86SURVHFXWLRQRI&KLQHVHRɚFHUVDQG DJDLQVWFHUWDLQUHTXLUHPHQWVDQGȊLPPHGLDWHO\
DJHQWVSXEOLFZDUQLQJVIURP:HVWHUQOHDGHUV >DQDO\]LQJDQGVWXG\LQJ@WKHIHHGEDFNWKDWKDV
DQGQRQJRYHUQPHQWDQDO\VWV been received from the information consumer and
DGMXVWWKHFROOHFWLRQSURFHVVLQDWLPHO\PDQQHU
One of the few Chinese-language documents WKXVLPSURYLQJWKHZRUNRIFROOHFWLRQȋ25 Although
DYDLODEOHLQWKH:HVWLOOXPLQDWLQJ&KLQDȇVDS- WKHUHLVQRGHȴQLWLYHRSHQVRXUFH&KLQHVHLQWHO-
proach to intelligence work is a book published in ligence doctrine available, the cases reviewed
E\WZR&KLQHVHLQWHOOLJHQFHYHWHUDQVȃ+XR LQVXSSRUWRIWKLVFKDSWHUVWURQJO\VXJJHVWWKDW
=KRQJZHQDQG:DQJ=RQJ[LDRȃWLWOHGSources WKH066DQGLWVFRXQWHUSDUWVDGKHUHWRPDQ\RI
and Techniques of Obtaining National Defense the same fundamentals of the traditional intelli-
Science and Technology Intelligence. It describes JHQFHF\FOHDQGDVDQH[WHQVLRQRIWKDWF\FOHWKH
a broader Chinese intelligence apparatus that UHFUXLWPHQWRIKXPDQDJHQWVXVLQJWHFKQLTXHV
LVEXLOWWRDGYDQFHERWKQDWLRQDOVHFXULW\DQG WKDWDUHVKDUHGKLVWRULFDOO\ZLWK&KLQDȇVIRUHLJQ
commercial interests. The book examines how FRXQWHUSDUWVLQFOXGLQJWKH&,$0,DQG5XVVLDQ
VFLHQFHDQGWHFKQRORJ\FROOHFWLRQLVDVKDUHG intelligence agencies.

20 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS

SPOTTING AND ASSESSING Figure 3.1


The Agent Acquisition Cycle26
The overall agent recruiting process can be thought
RIDVDȴOWHUDVLOOXVWUDWHGLQ)LJXUH$WWKHWRS SPOT
are the two broadest phases: spotting and assess- individuals who have the potential to
LQJ$FWLYLWLHVZLWKLQWKHVHWZRSKDVHVDUHKLJKO\ ŅƓŜǚŜŜŌŢƎĴŜŜŌņĴŢīĴƃĴƂƓŌƃĴšĴŢƎƇĒƇ
LQWHUFRQQHFWHGDVWKH\DUHERWKODUJHO\DQDO\WLF ŌİĴŢƎŌǚĴİĪƱĒŢĒŜƱƇƎƇŨƃƀŨŜŌīƱšĒŚĴƃƇɳ
and, in most circumstances, passive. It is also in
these two phases where there is ample evidence
demonstrating how the Chinese intelligence services ASSESS
integrate all-source capabilities into their efforts the placement and access of these
WRLGHQWLI\DQGHYDOXDWHSRWHQWLDOKXPDQVRXUFHV individuals to determine if they can
6SHFLȴFDOO\&KLQDȇVLQWHOOLJHQFHVHUYLFHVHPSOR\ provide the desired information and
DQGRIWHQEOHQGWKUHHSULPDU\WHFKQLTXHVGXULQJ initiate an evaluation of their
the spotting and assessing phase: open-source in- motivations, vulnerabilities,
WHOOLJHQFHDQDO\VLVGRPHVWLFDQGRYHUVHDVFXWRXWV and suitability.
FRRSWHHVDQGSUR[LHVDQGWHFKQLFDORSHUDWLRQV
including computer network intrusions.
DEVELOP
,WLVGXULQJWKHVSRWDQGDVVHVVSKDVHVWKDW+80,17 relationships with these individuals to
collectors begin the process of transforming custom- further assess their motivations,
HULQWHOOLJHQFHUHTXLUHPHQWVLQWRDFWXDOFROOHFWLRQ vulnerabilities, and suitability and to
'HSHQGLQJRQWKHVSHFLȴFLW\RIWKHLQIRUPDWLRQ explore their receptiveness to initial
tasking for intelligence.
QHHGWKHSRWHQWLDOSRRORIVRXUFHVWKDWDUHLQLWLDOO\
VSRWWHGDQGDVVHVVHGFDQUDQJHIURPH[FHSWLRQDOO\
ODUJHWRH[FHSWLRQDOO\VPDOO)RUH[DPSOHRQH86
RECRUIT
EDVHGVSRWWHUIRUWKH066VLPSO\VRXJKWFRQWDFW
ZLWKLQGLYLGXDOVZLWKFXUUHQWRUSULRUPLOLWDU\RU agents and formalize the relationship
intelligence experience. Initial contacts would be with an overt recruitment pitch or by
paying them for information they
URXWHGEDFNWR066RɚFHUVLQ&KLQDIRUIXUWKHU
provide.
assessment of the individual’s potential access to
FODVVLȴHGRURWKHUQRQSXEOLFLQIRUPDWLRQWKDW
would be responsive to China’s information needs. HANDLE
In other circumstances, the spotting and assessing
agents by relaying collection
SRROZLOOEHQDUURZO\WDLORUHGVXFKDVIRFXVLQJ
requirements, receiving reporting
RQLQGLYLGXDOVZKRPD\KDYHDFFHVVWRKLJKO\ information, and conducting continued
specialized technologies that would contribute assessments of their placement
WR&KLQDȇVHFRQRPLFRUPLOLWDU\PRGHUQL]DWLRQ and access.

CUT-OUTS, CO-OPTEES, AND PROXIES


SOURCE: CSIS RESEARCH AND ANALYSIS; AND BURKETT, “AN ALTERNATIVE
One important trademark of Chinese intelligence FRAMEWORK FOR AGENT RECRUITMENT.”
operations is the use of various cut-outs, co-optees,
DQGSUR[LHV7KHXVHRIVXFKLQGLYLGXDOVȃZKRRIWHQ
WKDWWKH\XVHGWRUHFUXLWDQGKDQGOHKLJKOHYHO
present themselves as businesspeople, students,
VRXUFHVZLWKLQDQDGYHUVDU\ȇVJRYHUQPHQW
RUDFDGHPLFVȃFUHDWHVDEXIIHURISODXVLEOHGHQL-
DELOLW\EHWZHHQ&KLQDȇVLQWHOOLJHQFHDSSDUDWXVDQG &KLQDȇVLVRODWLRQGXULQJPRVWRIWKH&ROG:DUIRV-
its potential human sources. China’s clandestine WHUHGDYHU\GLIIHUHQW+80,17FXOWXUHRQHWKDW
VHUYLFHVKDYHQRWWUDGLWLRQDOO\DGRSWHGWKHVDPH involved a much less prominent overseas role for
RSHUDWLQJPRGHOVDVWKHLU868.5XVVLDQRU the intelligence cadre. Compounding this isola-
other counterparts. In these countries, intelligence WLRQZDVWKHSDUDQRLDRIWKH&XOWXUDO5HYROXWLRQ
RɚFHUVDUHRIWHQFHOHEUDWHGIRUWKHLUDELOLW\WR ZKHUHWKHUHOHQWOHVVIRFXVRQLGHRORJLFDOSXULW\
QDYLJDWHKRVWLOHRUGHQLHGHQYLURQPHQWV/HYHU- DQGZLGHVSUHDGVXVSLFLRQVRIIRUHLJQLQȵXHQFH
DJLQJYDULRXVW\SHVRIRɚFLDORUQRQRɚFLDOFRYHU resulted in purges within the intelligence and
&,$0,DQG.*%RɚFHUVGXULQJWKH&ROG:DU VHFXULW\DSSDUDWXV277KH066GLGGHSOR\VRPH
developed innovative and sophisticated tradecraft SHUVRQQHODEURDGȃIRUH[DPSOHXQGHUMRXUQDOLVWLF

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 21
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING

FRYHUȃGXULQJWKH&ROG:DUEXWWKHLUSULPDU\ E\*HUPDQ\ȇVGRPHVWLFLQWHOOLJHQFHVHUYLFHWKH
PLVVLRQZDVXQFOHDU7KH\OLNHO\DVVLVWHGEURDGHU Bundesamt für Verfassungsschutz (BfV), found
efforts to spot and assess potential sources while &KLQDȇVLQWHOOLJHQFHDSSURDFKHVRQ/LQNHG,QWR
also collecting insights and non-public information PDWFKWKHVFDOHREVHUYHGE\0,,QLWVUHSRUW
IURPLQGLYLGXDOVZKREHOLHYHGWKH\ZHUHVSHDNLQJ the BfV disclosed several inauthentic profiles
with Chinese state media.28+RZHYHUQRQHZHUH and front organizations, posting as headhunters,
GHȴQLWLYHO\WLHGWRVHQVLWLYHUHFUXLWPHQWVZLWKLQ consultants, think tanks, and scholars, who the
the U.S. government. service assessed were working for Chinese in-
telligence.35 This shift toward social media in the
In addition, Chinese intelligence services have HDUO\SKDVHVRIWKHUHFUXLWPHQWSURFHVVRIIHUVWKH
WUDGLWLRQDOO\SUHIHUUHGWKDWUHFUXLWPHQWVDQGVXE- Chinese intelligence services a platform to conduct
VHTXHQWVRXUFHPHHWLQJVRFFXULQVLGHRI&KLQDRU ORZFRVWORZULVNDFWLYLWLHVLQWKHHDUO\SKDVHVRI
DWKLUGFRXQWU\297KHFRPSDUDWLYHO\OLPLWHGRYHU- WKHUHFUXLWPHQWF\FOH
VHDVIRRWSULQWRI&KLQDȇV+80,17RɚFHUVOLNHO\
nurtured the culture of using proxies and cut-outs Several notable investigations in the United States
DVNH\FRPSRQHQWVLQWKHVSRWWLQJDQGDVVHVVLQJ VLQFHUHȵHFWKRZ&KLQDȇVLQWHOOLJHQFHVHUYLFHV
phase. In the current era, social media and the XVH/LQNHG,QWRLGHQWLI\DQGHYDOXDWHSRWHQWLDO
LQWHUQHWDUHLQFUHDVLQJO\XVHGIRUWKHVSRWWLQJDQG VRXUFHVRIFODVVLȴHGLQIRUPDWLRQWUDGHVHFUHWVDQG
assessing phases, though recent cases reinforce that RWKHUQRQSXEOLFLQIRUPDWLRQ,QPDQ\LQVWDQFHV
RYHUVHDVSUR[LHVFRQWLQXHWREHNH\FRQWULEXWRUV &KLQHVHLQWHOOLJHQFHXVHV/LQNHG,QWRLGHQWLI\DQG
WRHDUO\VWDJHUHFUXLWLQJHIIRUWV contact current and former cleared government em-
SOR\HHVRUWRDGYHUWLVHYDULRXVEXVLQHVVFRQVXOWLQJ
7KLVLQFOXGHVWKHFDVHRI-XQ:HL<HRD6LQJDSRUHDQ DQGHPSOR\PHQWRSSRUWXQLWLHVWKDWPD\LQWHUHVW
national who was convicted in the United States IRUPHUPHPEHUVRIWKHLQWHOOLJHQFHFRPPXQLW\
on charges that he was serving as a spotter and or U.S. Department of Defense.36-XQ:HL<HRXVHG
assessor for the MSS.30 Yeo received intelligence VRFLDOPHGLDSDUWLFXODUO\/LQNHG,QH[WHQVLYHO\LQ
UHTXLUHPHQWVIURP&KLQDEDVHG066RɚFHUVZKR his activities on behalf of the MSS. Yeo created a fake
relied on Yeo to spot and assess potential U.S.-based FRQVXOWLQJFRPSDQ\DQGSRVWHGMRERSSRUWXQLWLHV
sources. Yeo’s MSS handlers had a wide range of RQ/LQNHG,Q+HODWHUFODLPHGKHUHFHLYHGRYHU
intelligence interests, with a particular focus on 400 resumes, 90 percent of which were submitted
non-public U.S. government information. These E\FXUUHQWDQGIRUPHU86JRYHUQPHQWDQGPLOL-
WDVNLQJVLQFOXGHGUHTXHVWVIRU<HRWRLGHQWLI\VRXUF- WDU\SHUVRQQHOZLWKVHFXULW\FOHDUDQFHV<HRWKHQ
es who could report on Southeast Asia, the U.S. IRUZDUGHGWKHUHVXPHVWR066RɚFHUVLQ&KLQD
'HSDUWPHQWRI&RPPHUFHDUWLȴFLDOLQWHOOLJHQFH for further evaluation and guidance on potential
and the trade war between the United States and recruitment options.37 Yeo augmented his efforts
&KLQD2QPXOWLSOHRFFDVLRQV<HRPHWVHSDUDWHO\ RQ/LQNHG,QE\DWWHQGLQJSXEOLFHYHQWVWRFRQWDFW
ZLWKGLIIHUHQW066RɚFHUVLQ&KLQDDOORIZKRP LQGLYLGXDOVIURPOREE\LQJȴUPVRUGHIHQVHFRQ-
issued identical tasking.31 These incidents further tracting companies who could be possible targets.38
reinforce this chapter’s broader contention that
&KLQHVHLQWHOOLJHQFHFROOHFWLRQLVPRUHFHQWUDOO\
directed and organized than is often appreciated.32
COMPUTER NETWORK OPERATIONS
&KLQDȇVEXONGDWDWKHIWFDPSDLJQVȃLQFOXGLQJ
RSHUDWLRQVWDUJHWLQJWKH862ɚFHRI3HUVRQQHO
THE ROLE OF OPEN-SOURCE INTELLIGENCE 0DQDJHPHQW 230 (TXLID[$QWKHP0DUULRWWDQG
AND SOCIAL MEDIA RWKHUVȃDUHH[DPLQHGLQWKLVUHSRUWȇVFKDSWHURQ
:LWKLQWKHVSRWWLQJDQGDVVHVVLQJSKDVHVUHFHQW &KLQHVHF\EHURSHUDWLRQV &KDSWHU 39 Nevertheless,
investigations and global intelligence service it is important to acknowledge the extent to which
VWDWHPHQWVUHȵHFWWKDWRSHQVRXUFHLQWHOOLJHQFH %HLMLQJȇVDFTXLVLWLRQRIWKLVGDWDFDQFRQWULEXWH
DQDO\VLVȃSDUWLFXODUO\WKHH[SORLWDWLRQRIVRFLDO WR+80,17RSHUDWLRQV:KLOHWKHVHRSHUDWLRQV
PHGLDȃKDVEHFRPHDSUHIHUUHGWHFKQLTXHIRU have been attributed to various elements of the
China’s intelligence services. According to U.S., &KLQHVHLQWHOOLJHQFHVHUYLFHVȃSULPDULO\UHJLRQDO
8.DQG*HUPDQLQWHOOLJHQFHRɚFLDOV&KLQHVH FRPSRQHQWVRIWKH066DQGWKH3/$ȃWKHUHLV
LQWHOOLJHQFHRɚFHUVDQGSUR[LHVKDYHFRQGXFWHG OLWWOHGHȴQLWLYHHYLGHQFHDYDLODEOHGHWDLOLQJKRZ
WKRXVDQGVRIVRIWDSSURDFKHVRQ/LQNHG,QLQUHFHQW &KLQDPD\EHZHDSRQL]LQJWKLVGDWD40
\HDUV33 More than 10,000 such incidents have oc-
curred in the United Kingdom alone, according to +RZHYHUWKHLQIRUPDWLRQIURPWKHVHRSHUDWLRQV
MI5 chief Ken McCallum.34$VWXG\FRQGXFWHG FRXOGKHOS+80,17RɚFHUVDVVHVVSRWHQWLDODYH-

22 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS

nues to recruit a source. Examples might include 5HFUXLWHUVSUHVHQWWKHPVHOYHVDVUHSUHVHQWLQJSUL-


YHULI\LQJDQLQGLYLGXDOȇVFXUUHQWRUSULRUUHOD- vate or academic interests rather than China and
WLRQVKLSZLWKWKH86JRYHUQPHQWLGHQWLI\LQJ WKH&&37KLVDSSURDFKPD\DSSHDOWRSURVSHFWLYH
ZKHWKHUWKDWLQGLYLGXDOLVLQȴQDQFLDOGLVWUHVVRU recruits interested in rationalizing their openness
SRRUKHDOWKVFUXWLQL]LQJWKHLUWUDYHOKLVWRU\RU WRSURYLGLQJLQIRUPDWLRQWRDIRUHLJQHQWLW\,Q
VKDSLQJZD\VWRGHYHORSDQLQLWLDODSSURDFKDQG WKHFDVHRI.HYLQ0DOORU\KLVUHVSRQVLYHQHVVWR
DVRXUFHGHYHORSPHQWSODQ)RXUIDFWRUVW\SLFDO- LQLWLDOFRQWDFWYLD/LQNHG,QWUDQVODWHGLQWRDQ
O\LQȵXHQFHDQLQGLYLGXDOȇVGHFLVLRQWRVS\IRUD introduction to an individual who represented
IRUHLJQJRYHUQPHQWPRQH\LGHRORJ\FRPSUR- himself as working for a Chinese think tank, the
PLVHRUHJRRIWHQUHIHUUHGWRDVȊ0,&(ȋ41:KDW 6KDQJKDL$FDGHP\RI6RFLDO6FLHQFHV'HVSLWH
is known about the personal data that China has these efforts to operate under the nominal cover
H[ȴOWUDWHGVXJJHVWVWKDWWKHLQIRUPDWLRQFRXOGEH RIWKHDFDGHP\ZKLFKLVNQRZQWRKDYHFORVH
KLJKO\YDOXDEOHIRU&KLQHVH+80,17UHFUXLWHUV WLHVWRWKH0660DOORU\ȃDVDIRUPHU&,$DQG
ZHLJKLQJZKHWKHUDQLQGLYLGXDOPD\EHYXOQHUDEOH ',$RɚFHUȃDSSHDUVWRKDYHEHHQDZDUHWKDWWKH
to certain recruitment approaches. The U.S.-based individuals he met with were representatives of
066VSRWWHU-XQ:HL<HRDWWHVWHGWKDWWKHVHW\SHV Chinese intelligence.44
RIYXOQHUDELOLWLHVLQFOXGLQJȴQDQFLDOWURXEOHVMRE
dissatisfaction, or familial issues, were what he 7KHVHW\SHVRIDSSURDFKHVDQGLQLWLDOWDVNLQJV
ZDVWUDLQHGE\WKH066WRHYDOXDWHZKHQDVVHVVLQJ HSLWRPL]HWKHGHYHORSPHQWDOSKDVHVRI+80,17
source candidates.42 operations. Developmental recruits are often asked
WRVKDUHLQIRUPDWLRQWKDWPD\EHVRPHZKDWVHQVL-
WLYHȃWKRXJKQRWFODVVLȴHGȃDVDPHDQVWRJDXJH
DEVELOPING AND RECRUITING the source’s responsiveness to tasking, as well as
WROD\WKHJURXQGZRUNIRUJUDGXDOO\H[SDQGLQJ
the information-sharing relationship into more
Spotting and assessing are intended to narrow a
sensitive areas.457KHDGGHGH[FKDQJHRIPRQH\DW
pool of potential source candidates. It is against
WKLVSKDVHȃHYHQEHIRUHDQ\IRUPDOUHFUXLWPHQW
WKLVVPDOOHUJURXSWKDWLQWHOOLJHQFHRɚFHUVLQL-
SLWFKȃDOVRHVWDEOLVKHVWKHWHUPVRIZKDWZLOO
tiate the process of building a relationship with
XOWLPDWHO\EHFRPHDWUDQVDFWLRQDOUHODWLRQVKLS
SURVSHFWLYHVRXUFHV.H\PDUNHUVRIWKLVSKDVHIRU
In cases where the source is a U.S. government
Chinese intelligence operations include increased
HPSOR\HHRUFOHDUHGGHIHQVHFRQWUDFWRUWKLVLQ-
face-to-face contact, often in China during the
IRUPDWLRQH[SRVHVWKHUHFUXLWWROHJDOMHRSDUG\
VRXUFHGHYHORSPHQWSKDVH2YHUDOOWKHPDMRULW\
RIGHYHORSPHQWDSSURDFKHVDQDO\]HGLQVXSSRUW China’s development and recruitment of Shapour
RIWKLVUHVHDUFKLQYROYHGRIIHUVRIHPSOR\PHQW Moinian followed a similar pattern. After an initial
EXVLQHVVFRQVXOWLQJRURWKHUȴQDQFLDORSSRUWX- DSSURDFKRQ/LQNHG,Q0RLQLDQWUDYHOHGWR+RQJ
nities, with a smaller set of individuals driven Kong to meet with an individual who claimed to
E\LGHRORJLFDOVXSSRUWIRU&KLQDDQGWKH&&3 UHSUHVHQWDWHFKQLFDOUHFUXLWLQJFRPSDQ\VHHNLQJ
8OWLPDWHO\SRVWPRUWHPVRIKLVWRULF$PHULFDQ RXWDYLDWLRQLQGXVWU\FRQVXOWDQWV7KH&KLQHVH
HVSLRQDJHFDVHVȴQGWKDWPRVWVSLHVDUHPRWLYDWHG recruiter claimed she was seeking Moinian’s “rich
E\DFRPELQDWLRQRIWKH0,&(IDFWRUVUDWKHUWKDQ H[SHULHQFHVDQGVNLOOVȋIRUDFOLHQWZKRZDVZRUN-
E\RQHIDFWRUDORQH43 ing on aircraft design. Moinian agreed to provide
information and materials regarding various
The developing and recruiting phases of the agent aircraft designed or manufactured in the United
DFTXLVLWLRQF\FOHVXEVWDQWLDOO\LQFUHDVHWKHYROXPH 6WDWHVIRUZKLFKKHZDVȴQDQFLDOO\FRPSHQVDWHG
of risk that a recruiting organization incurs. The $QXQQDPHG8.DYLDWLRQH[SHUWPHQWLRQHGE\0,
VSRWWLQJDQGDVVHVVLQJSKDVHVDUHODUJHO\SDVVLYH LQ-XO\DOVRWUDYHOHGUHSHDWHGO\WR&KLQDWR
while the developing and recruiting phases are ac- EHȊZLQHGDQGGLQHGȋ7KH&KLQHVHLQWHUORFXWRUV
WLYHDQGLQFUHDVLQJO\H[SRVHUHFUXLWHUVWRSRWHQWLDO then asked and paid him for detailed technical
GLVFRYHU\&KLQDSDUWLDOO\FRPSHQVDWHVIRUWKLVULVN LQIRUPDWLRQRQPLOLWDU\DLUFUDIWDWZKLFKSRLQW
during the development and recruitment phases the UK government intervened.46
E\FRQWLQXLQJLWVUHOLDQFHRQFXWRXWVSUR[LHVDQG
RWKHUIRUPVRIFRYHU&KLQHVHLQWHOOLJHQFHRɚFHUV &RPPHUFLDOFRYHUZDVDOVRDNH\IHDWXUHRI&KLQDȇV
DQGWKHLUSUR[LHVSULPDULO\DSSURDFKGHYHORSPHQ- recruitment of former FBI electronics technician
tal sources under commercial or academic cover. .XQ6KDQȊ-RH\ȋ&KXQ+RZHYHUXQOLNHWKH0DOORU\
There is a dual logic in this approach, providing and Moinian cases, where the developmental phase
SODXVLEOHGHQLDELOLW\WRERWKUHFUXLWHUDQGWDUJHW UHTXLUHGRQO\RIDKDQGIXORIPHHWLQJV&KXQȇV

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 23
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING

relationship with Chinese intelligence took several sensitive IP and trade secrets, including items
\HDUVWRUHDFKWKHVWDJHZKHUHKHEHJDQPHHWLQJ such as design manuals, design and simulation
GLUHFWO\ZLWK&KLQHVHJRYHUQPHQWRɚFLDOVDQG VRIWZDUHFRPSRVLWHVSRZHUV\VWHPVDQGRWKHU
providing them with sensitive FBI information. LQIRUPDWLRQDERXWFLYLOLDQDQGPLOLWDU\DLUFUDIW50
Chun’s relationship originated in 2005, when a The MSS often augments its human source de-
&KLQDEDVHGSULQWHUFRPSDQ\VROLFLWHGDQLQYHVW- YHORSPHQWHIIRUWVGXULQJȊH[FKDQJHVȋLQ&KLQD
ment from one of Chun’s relatives. Over the next E\FRQGXFWLQJWHFKQLFDORSHUDWLRQVDJDLQVWWKHLU
ȴYH\HDUVWKH&KLQHVHFRPSDQ\SDLGIRU&KXQWR visitors’ devices.51
WUDYHORQDQDQQXDOEDVLVWUDYHOWKDWKHDFWLYHO\
FRQFHDOHGIURPWKH)%,,QWKHFRPSDQ\SDLG %H\RQGWKHSULPDU\PHWKRGVWKDW&KLQDXVHVWR
IRUDWULSWR(XURSHZKHUH&KXQPHWGLUHFWO\ZLWK VSRWDVVHVVGHYHORSDQGUHFUXLWVRXUFHVWKHȴQDO
D&KLQHVHJRYHUQPHQWRɚFLDOZKRWROG&KXQKH HOHPHQWLQYROYHVWKHVSHFLȴFWUDGHFUDIWWKDW&KLQD
knew he worked for the FBI. At this stage, Chun uses to handle its human sources.
began reporting information about FBI personnel,
structure, technological capabilities, surveillance
practices, and surveillance targets.47 HANDLING SOURCES:
One variation of China’s efforts to appeal to com- OPERATIONALIZING
mercial and economic interests of potential sources INTELLIGENCE REQUIREMENTS
is the manner in which the intelligence services
work through research institutes and universities. &KLQDȇVJOREDOLQWHOOLJHQFHDFWLYLWLHVDUHPHUHO\
This includes recruitment into China’s so-called one element of broader political warfare. Nev-
ȊWDOHQWSODQVȋVXFKDVWKH7KRXVDQG7DOHQWV3ODQ
HUWKHOHVVWKH\DUHDFULWLFDOHOHPHQWRI%HLMLQJȇV
DQGWKH+XQGUHG7DOHQWV3ODQ'LVDJJUHJDWLQJWKH
DSSURDFKWRVHFXULW\FRPSHWLWLRQ&KLQDȇVSXUVXLW
numerous licit and illicit mechanisms that China
RIYDULRXVIRUPVRIFODVVLȴHG86GHIHQVHDQG
UHOLHVXSRQWRDFTXLUHDGYDQFHGWHFKQRORJ\IURP
intelligence information contributes to broader
WKH8QLWHG6WDWHVLVEH\RQGWKHVFRSHRIWKLVFKDSWHU
efforts to secure an information advantage over
Nevertheless, several recent cases reveal how China’s
WKH8QLWHG6WDWHVSDUWLFXODUO\LI%HLMLQJZHUHWR
VWDWHDɚOLDWHGUHVHDUFKLQVWLWXWLRQVDQGWKHWDOHQW
learn information about the United States that
plans have served as critical platforms for China to
:DVKLQJWRQEHOLHYHVWREHSURWHFWHG7KLVORJLF
H[WUDFWWUDGHVHFUHWVDQGLQWHOOHFWXDOSURSHUW\ ,3 
H[WHQGVLQWRWKHVFLHQFHDQGWHFKQRORJ\VSKHUH
IURP86EDVHGVRXUFHV$OWKRXJKPDQ\FDVHVGR
not involve a direct connection between China’s where Chinese intelligence operations are de-
research institutions and the intelligence services, VLJQHGWRIXOȴOONH\NQRZOHGJHJDSVIRU&KLQDȇV
there are some striking exceptions. FRPPHUFLDODQGPLOLWDU\WHFKQRORJ\UHVHDUFKDQG
development efforts. China’s intelligence services
0RVWQRWDEOHLVWKHWULDORI<DQMXQ;XDQ066RI- SOD\DFUXFLDOUROHLQUHFUXLWLQJKXPDQVRXUFHV
ȴFHUZKRZDVWKHGHSXW\GLYLVLRQGLUHFWRURIWKH WRIXOȴOOVSHFLȴFFXVWRPHUVFLHQFHDQGWHFKQRORJ\
Sixth Bureau in the JSSD. In that case, the United UHTXLUHPHQWVIRU&KLQDȇVHFRQRPLFDQGPLOLWDU\
States disclosed how the Sixth Bureau, which is advantage. It is in this area that the case of MSS
responsible for overseas collection of science and RɚFHU<DQMXQ;XLVVRVWULNLQJ
WHFKQRORJ\LQIRUPDWLRQZRUNHGGLUHFWO\ZLWK
organizations such as the Jiangsu Science and $VSUHYLRXVO\QRWHG;XZDVDVHQLRU066Rɚ-
7HFKQRORJ\3URPRWLRQ$VVRFLDWLRQWKH$YLDWLRQ cer assigned to the JSSD Sixth Bureau, where he
,QGXVWU\RI&KLQD $9,& DQGWKH1DQMLQJ8QLYHUVLW\ was responsible for collecting overseas science
of Aeronautics and Astronomics (NUAA) to arrange DQGWHFKQRORJ\LQIRUPDWLRQ,QKLVDFWLYLWLHV
presentations and exchanges with overseas experts ;XZRUNHGFORVHO\ZLWKRɚFLDOVLQYDULRXVVWDWH
known to be working on technologies that were HQWLWLHVLQFOXGLQJ$9,&DQGWKH18$$WRUHȴQH
Chinese collection priorities.487KLVLQFOXGHG;XLQ DYLDWLRQUHODWHGFROOHFWLRQUHTXLUHPHQWV)RUH[-
KLVFDSDFLW\DVDQ066RɚFHUGLUHFWO\DUUDQJLQJ DPSOHLQ;XH[FKDQJHGPHVVDJHVZLWKDQ
a set of discussions in China with experts from RɚFLDODW$9,&ZKRUHOD\HGVSHFLȴFLQIRUPDWLRQ
DFURVVWKHJOREDODYLDWLRQLQGXVWU\LQFOXGLQJ WKDWWKH$9,&RɚFLDOZDVVHHNLQJIURP%RHLQJ
representatives of at least six of the world’s lead- LQFOXGLQJDQDO\WLFDOWRROVIRU%RHLQJȇVSURSULHWDU\
ing aerospace companies.49$VUHȵHFWHGLQ;XȇV DLUIUDPHDQGVSHFLȴFSRUWLRQVRIWKHBoeing Design
communications with his intelligence customers Manual.527KHVHW\SHVRIH[FKDQJHVDUHFULWLFDOLQ
ZLWKLQWKH&KLQHVHVFLHQFHDQGWHFKQRORJ\DSSD- XQGHUVWDQGLQJWKHVSHFLȴFLW\RI&KLQHVHVFLHQFH
ratus, the purpose of these exchanges was to elicit DQGWHFKQRORJ\FROOHFWLRQUHTXLUHPHQWVWKDWZHUH

24 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS

GLUHFWO\SDVVHGIURPVWDWHRZQHGHQWHUSULVHVDQG dents living in the United States.55/X-LDQZDQJȇV


research institutions to China’s foreign intelligence RɚFLDOUROHZDVSUHVLGHQWRIWKH$PHULFD&KDQJOH
service. Separate communications revealed how $VVRFLDWLRQ1<DQRQSURȴWRUJDQL]DWLRQZKRVH
;XDQGWKH066ZRXOGUHSRUWEDFNLQIRUPDWLRQ RɚFHVKRXVHGWKHSROLFHRXWSRVW56 In its response
WKDWKDGEHHQFROOHFWHG,QRQHLQVWDQFH;XVHQW WRWKHDUUHVWVWKH&KLQHVHHPEDVV\LQ:DVKLQJWRQ
detailed technical information about various aspects GHVFULEHGWKHRUJDQL]DWLRQDVEHLQJȊSURYLGHGE\
RIWKH.&DHULDOUHIXHOLQJDLUFUDIWUHTXHVWLQJ local overseas Chinese communities who would
that the recipient review the information and OLNHWREHKHOSIXOȋDQGWKDWȊWKH\DUHQRWSROLFH
provide feedback on the MSS’s report. SHUVRQQHOIURP&KLQDȋ57

7KHVHW\SHVRILQVLJKWVLQWRWKHLQQHUZRUNLQJVRI ,QDVHSDUDWHFDVHWKH'2-FKDUJHG036RɚFHUV
WKH066DQGLWVFXVWRPHUVPDQLIHVWLQWKHZD\VWKDW in April 2023 with conducting an intimidation
&KLQDKDQGOHVLWVKXPDQVRXUFHV,Q;XȇVFDVHWKH campaign against Chinese nationals residing in
066DQGWKH18$$GLUHFWO\FROODERUDWHGWRVKDSH the United States whose political views and actions
WKHVSHFLȴFWRSLFVWKDWYLVLWRUVZRXOGEULHIGXULQJ were critical of China.58 The DOJ has referred to
WKHLUSUHVHQWDWLRQVLQ&KLQD,QRQHFDVH;XDQG WKLVW\SHRIDFWLYLW\DVȊUHSUHVVLRQVFKHPHVȋ59
WKH18$$RɚFLDOZRUNHGLQWDQGHPWRHQFRXUDJH $OVRLQ$SULODIHGHUDOMXU\FRQYLFWHG3UDV
a U.S.-based aerospace engineer to provide a pre- 0LFKHOD*UDPP\ZLQQLQJDUWLVWDQGIRUPHU
VHQWDWLRQRQKLJKO\WHFKQLFDOWRSLFVUHODWHGWR*( member of the hip-hop group Fugees, of working
Aviation’s trade secrets and IP. As the relationship with the MPS to conduct a clandestine campaign to
EHWZHHQ;XDQGWKHHQJLQHHUSURJUHVVHG;XZDV LQȵXHQFHVHQLRU86RɚFLDOV600RUHEURDGO\WKH
FOHDUDERXWKRZLQIRUPDWLRQUHTXLUHPHQWVZHUH Chinese government has conducted widespread
being developed, writing to the engineer: “I will harassment of Chinese critics of China abroad,
WRXFKEDVHZLWKWKHVFLHQWLȴFUHVHDUFKGHSDUWPHQW WKRXJKLWLVQRWDOZD\VFOHDULIȃDQGWRZKDWGH-
KHUHWRVHHZKDWWHFKQRORJ\LVGHVLUHGDQG,ZLOO JUHHȃ&KLQHVHLQWHOOLJHQFHDQGODZHQIRUFHPHQW
OHW\RXNQRZZKDWWRSUHSDUHȋ;XODWHUUHȴQHG organizations are involved. Beginning in October
the specific areas of interest for the engineer, IRUH[DPSOH&KLQDZDVDOOHJHGO\LQYROYHG
expressing that there was particular interest in making more than a dozen false bomb threats
LQVRIWZDUHV\VWHPVSHFLILFDWLRQVDQGGHVLJQ DWOX[XU\KRWHOVDQGHPEDVVLHVLQ(XURSHWKH
SURFHVVHV/DWHUZKHQWKHHQJLQHHUH[SUHVVHG United States, the Middle East, and Asia using
concern about sending certain information from the names of Chinese dissidents.61
KLV*($YLDWLRQHPDLODGGUHVV;XUHVSRQGHGȊ,W
PLJKWEHLQDSSURSULDWHWRVHQGGLUHFWO\IURPWKH ,QDGGLWLRQWR2SHUDWLRQ)R[+XQW&KLQDKDVDOVR
FRPSDQ\ULJKW"ȋ53 HQJDJHGLQ2SHUDWLRQ6N\QHWDSDUDOOHOSURJUDP
WRWDUJHWWKHȴQDQFHVRI&KLQHVHFLWL]HQVLQFOXG-
ing dissidents, residing overseas. According to
OVERSEAS HARASSMENT WKH)%,2SHUDWLRQ6N\QHWLQFOXGHV35&HIIRUWVWR

AND REPRESSION UHSDWULDWHPRQH\E\VRPH&KLQHVHOLYLQJDEURDG


ȊE\ERWKUHVWULFWLQJDQGVHL]LQJDVVHWVVWLOOORFDWHG
LQWKH35&ȋ62 In 2022, for example, DOJ charged
Chinese intelligence agencies have also been in- 6XQ+RL<LQJZLWKFRQGXFWLQJLOOHJDODFWLYLWLHV
FUHDVLQJO\DFWLYHLQLQWLPLGDWLQJPHPEHUVRIWKH DVSDUWRI2SHUDWLRQ6N\QHW63
Chinese diaspora overseas and in conducting
LQȵXHQFHRSHUDWLRQV0DQ\RIWKHVHLQVWDQFHVDUH &KLQHVHGLSORPDWLFRɚFLDOVDUJXHGWKDWWKHVH
SDUWRI2SHUDWLRQ)R[+XQWDJOREDODQGH[WUDOHJDO RUJDQL]DWLRQVȃLQFOXGLQJWKHVRFDOOHGSROLFH
35&HIIRUWWRPRQLWRUKDUDVVDQGLQVRPHFDVHV VWDWLRQVȃZHUHQRWDFWXDOO\HQJDJHGLQSROLFHDQG
repatriate Chinese diaspora living abroad. In June LQWHOOLJHQFHZRUNDQGWKDWWKH\ZHUHVWDIIHGE\
IRUH[DPSOHDIHGHUDOMXU\LQ1HZ<RUNFRQ- ȊYROXQWHHUVȋZKRZHUHUHVSRQVLEOHIRUDVVLVWLQJ
victed three individuals of stalking and coercing Chinese nationals with routine tasks, such as
several residents of the United States.54 In April renewing drivers’ licenses.64 In some cases, re-
WKH)%,DUUHVWHGWZRLQGLYLGXDOVȊ+DUU\ȋ/X VHDUFKHUVLGHQWLȴHGFRQQHFWLRQVEHWZHHQYDULRXV
Jianwang and Chen Jinping, in connection with RYHUVHDVSROLFHRXWSRVWVDQGVSHFLȴFUHJLRQDO
opening and operating an illegal police station FRPSRQHQWVRIWKH036W\LQJVXFKVWDWLRQVGLUHFWO\
LQ0DQKDWWDQ1HZ<RUN&LW\$FFRUGLQJWRWKH back to Chinese intelligence and law enforcement.
FBI and DOJ, the two individuals were working 2QHVWXG\RIWKHVH036VWDWLRQVDVVHVVHGWKDW
for the Fuzhou branch of the MPS to locate and there are at least 104 of these outposts across 53
conduct coercive activities against Chinese dissi- countries.65 As an FBI investigation into a Chi-

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 25
All use subject to https://about.jstor.org/terms
COMPETING WITHOUT FIGHTING

QHVHSROLFHVWDWLRQLQ1HZ<RUN&LW\IRXQGWKH ,QDGGLWLRQWKHUHDUHFRQFHUQVDERXWF\EHUHQDEOHG
036ZDVXQDPELJXRXVO\LQYROYHGLQKDUDVVLQJ HFRQRPLFLQWHOOLJHQFHHIIRUWVZKLFKDUHDQDO\]HG
members of the Chinese diaspora in the United LQWKLVUHSRUWȇVFKDSWHURQ&KLQHVHF\EHURSHUDWLRQV
States. According to the lead FBI agent involved &KDSWHU 7KHHFRQRPLFDQGVWUDWHJLFEHQHȴWV
in the investigation: RIWKHVHDFWLYLWLHVDUHYDVWSDUWLFXODUO\LQWHUPV
RIWUDGHVHFUHWVPLOLWDU\WHFKQRORJ\DQGVHQVLWLYH
$OWKRXJKWKH036LVJHQHUDOO\LGHQWLȴHGDV U.S. government information stolen. In 2012,
WKH35&ȇVSULPDU\GRPHVWLFODZHQIRUFHPHQW WKHQKHDGRIWKH1DWLRQDO6HFXULW\$JHQF\ 16$ 
DJHQF\ȃUHVSRQVLEOHIRUSXEOLFVDIHW\JHQ- *HQHUDO.HLWK$OH[DQGHUGHVFULEHGF\EHUHQDEOHG
HUDOFULPLQDOLQYHVWLJDWLRQQDWLRQDOVHFXULW\ economic espionage as “the greatest transfer of
DQGLQWHUQHWVHFXULW\ȃLWVPLVVLRQH[WHQGV ZHDOWKLQKLVWRU\ȋ69 The economic loss to the
EH\RQGODZHQIRUFHPHQWDQGLQWRIXQFWLRQV United States alone is often estimated at $30–600
more associated with an intelligence service. ELOOLRQDQQXDOO\70
7KH036URXWLQHO\PRQLWRUVDPRQJRWKHUV
Chinese political dissidents who live in the 86HFRQRPLFORVVHVDOVRWUDQVODWHGLUHFWO\LQWR
United States and in other locations outside the &KLQHVHPLOLWDU\DGYDQFHV6X%LQD&KLQHVH&D-
QDGLDQEXVLQHVVPDQDVVLVWHG&KLQHVH3/$F\-
35&7KH036KDVXVHGFRRSHUDWLYHFRQWDFWV
EHURɚFHUVLQWKHLUHIIRUWVWRVWHDOWUDGHVHFUHWV
ERWKLQVLGHWKH35&DQGDURXQGWKHZRUOGWR
regarding the C-17, F-22, and F-35 aircraft. This
LQȵXHQFHWKUHDWHQDQGFRHUFHSROLWLFDOGLV-
LQFOXGHGPRUHWKDQȴOHVȃWRWDOLQJPRUH
sidents abroad. Indeed, I am aware that the
WKDQJLJDE\WHVȃRQWKH&DLUFUDIW6XFKWKHIW
35&JRYHUQPHQWKDVWKUHDWHQHGDQGFRHUFHG
allows China to evade the costs, both in time and
Chinese political dissidents living in the United
PRQH\WRPRGHUQL]HLWVV\VWHPV)RUDVHQVHRIWKH
States in an effort to silence them.66 scale of the investments that went into the three
aircraft targeted during the Su Bin case, the U.S.
CONCLUSION government spent more than $100 billion over a
period of more than three decades to modernize
WKHVHDLUOLIWDQGȴJKWHUV\VWHPV71
Measuring the impact of Chinese intelligence
operations as part of political warfare is chal- 7KHRYHUDOOHFRQRPLFGDPDJHFDXVHGE\&KL-
OHQJLQJRQVHYHUDOOHYHOV7KHȴUVWFKDOOHQJHLV QHVHOLFLWTXDVLOLFLWDQGF\EHUFROOHFWLRQOLNHO\
GHȴQLQJZKDWFRXQWVDVLQWHOOLJHQFHRSHUDWLRQV far outpaces that which can be attributed to the
LQWKHPRGHUQHUD&KLQDHPSOR\VDZLGHUDQJH FRXQWU\ȇV+80,17VHUYLFHV+RZHYHUWKLVLVQRWWR
RIOLFLWDQGTXDVLOLFLWPHDQVWRDFTXLUHVHQVLWLYH XQGHUVHOOWKHHFRQRPLFGDPDJHFDXVHGE\+80,17
and critical information. This includes investing FROOHFWLRQRSHUDWLRQV$OWKRXJKQRWH[SOLFLWO\
LQIRUHLJQȴUPVWKDWSRVVHVVYDOXDEOH,3WKDWFDQ connected to the MSS, one recent U.S. conviction
VXSSRUW&KLQDȇVPLOLWDU\RUFRPPHUFLDOLQWHUHVWV involved a scientist stealing trade secrets valued
,WLQFOXGHVWKHXVHRIȊWDOHQWSURJUDPVȋDQGRWKHU DWELOOLRQIURPD86SHWUROHXPFRPSDQ\72
MRLQWUHVHDUFKLQLWLDWLYHVWRIDFLOLWDWHWKHWUDQVIHU 066RɚFHU;X<DQMXQZRUNHGWRWDUJHW*($YL-
of valuable technical knowledge back to Chinese ation’s processes for manufacturing composite
institutions. As the U.S. Senate Select Committee MHWHQJLQHIDQEODGHVDWHFKQRORJ\WKDWQRRWKHU
on Intelligence acknowledged in a comprehensive JOREDOFRPSDQ\KDVGXSOLFDWHGLQWKHPRUHWKDQ
VWXG\RIWKH86FRXQWHULQWHOOLJHQFHHQWHUSULVH \HDUVVLQFHLWZDVȴUVWFHUWLȴHGE\WKH)HGHUDO
Aviation Administration.73
FRPSHWLWRUVQHHGQRWEUHDN86ODZVWRIXOȴOO
NH\LQWHOOLJHQFHFROOHFWLRQQHHGV,QRQHQRWH- ,WLVDOVRGLɚFXOWWRPHDVXUHWKHLPSDFWRI&KLQHVH
ZRUWK\UHFHQWVWXG\D86SULYDWHLQWHOOLJHQFH HIIRUWVWRDFTXLUHSULYDWHLQIRUPDWLRQDERXW86
ȴUPLGHQWLȴHGLQGLYLGXDOVFRQQHFWHGWR/RV DQGDOOLHGGHFLVLRQPDNLQJDQGSROLF\WKRXJKLW
$ODPRV1DWLRQDO/DERUDWRU\ZKRKDGUHWXUQHG LVFULWLFDOWRDVVHVVWKHWRWDOLW\RI&KLQHVHFDVHV
WR&KLQDWRZRUNLQDUHDVFULWLFDOWRWKH3/$ȇV rather than isolated incidents. The reason is that
PLOLWDU\PRGHUQL]DWLRQLQFOXGLQJK\SHUVRQLF &KLQHVHLQWHOOLJHQFHRɚFHUVKDYHORQJUHFRJQL]HG
weapons, deep-penetrating munitions, and un- the value of what is often referred to as the “mo-
GHUVHDV\VWHPV67$VHSDUDWHLQYHVWLJDWLRQE\WKH VDLFWKHRU\ȋRIVHFUHF\LQZKLFKLQGLYLGXDOIDFWV
Washington PostIRXQGWKDW&KLQHVHK\SHUVRQLF FDQLOOXPLQDWHDQRWKHUZLVHRSDTXHSLFWXUHZKHQ
UHVHDUFKHUVDUHVLPSO\SXUFKDVLQJIURP86 LQWHJUDWHGLQWRDEURDGHUERG\RINQRZOHGJH74 As
suppliers software that aids in designing and +XRDQG:DQJZURWHȊ%\SLFNLQJKHUHDQGWKHUH
PRGHOLQJK\SHUVRQLFV\VWHPV68 among the vast amount of public materials and

26 This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00
All use subject to https://about.jstor.org/terms
INTELLIGENCE OPERATIONS

accumulating information a drop at a time, often discovered traveling with a notebook that included
LWLVSRVVLEOHWREDVLFDOO\UHYHDOWKHRXWOLQHVRI “CIA-related operational notes from asset meetings,
VRPHVHFUHWLQWHOOLJHQFHDQGWKLVLVSDUWLFXODUO\ operational meeting locations, operational phone
WUXHLQWKHFDVHRIWKH:HVWHUQFRXQWULHVȋ75 Cor- numbers, true names of assets, and information
UHVSRQGLQJO\FDVHVVXFKDV&KLQDȇVVXFFHVVIXO DERXWFRYHUWIDFLOLWLHVȋ790RUHEURDGO\&KLQDKDV
UHFUXLWPHQWRI&DQGDFH&ODLERUQHDFRPSDUDWLYHO\ expanded its signals intelligence collection capa-
ORZUDQNLQJ866WDWH'HSDUWPHQWRɚFLDOVKRXOG ELOLWLHVDJDLQVWWKH8QLWHG6WDWHVE\HVWDEOLVKLQJ
EHYLHZHGPHUHO\DVRQHSLHFHZLWKLQDEURDGHU LQWHOOLJHQFHFROOHFWLRQIDFLOLWLHVLQ&XEDURXJKO\
PRVDLF:KLOH&ODLERUQHPD\QRWKDYHRSHUDWHG 100 miles from Florida, and other locations.80
within the inner circles of U.S. decisionmaking,
KHUUHSRUWLQJRQWKHSHULSKHU\RIWKHVHFLUFOHV As China’s U.S. counterparts can attest, the public
XQGRXEWHGO\FRQWULEXWHGWR%HLMLQJȇVEURDGHU RIWHQRQO\KHDUVDERXWLQWHOOLJHQFHIDLOXUHVQRW
HIIRUWVWRSHQHWUDWH86SROLF\GHOLEHUDWLRQVZLWK VXFFHVVHV1HYHUWKHOHVVWKHFDVHVDQDO\]HGLQ
respect to China. connection to this chapter all included notable
tradecraft failures on the part of the Chinese intel-
There is also a subset of cases that have undermined ligence services. One of the more amusing is that,
86DQGDOOLHGQDWLRQDOVHFXULW\LQZD\VWKDWDUH LQWKHFORVLQJDUJXPHQWVDW<DQMXQ;XȇVWULDOKLV
GLɚFXOWWRPHDVXUHȃEXWDUHOLNHO\VLJQLȴFDQW GHIHQVHDWWRUQH\VSRLQWHGWRKLVSRRUWUDGHFUDIW
Consider the damage associated with the 2015 skills as a reason to doubt the U.S. government’s
230EUHDFKGXULQJZKLFK&KLQHVHF\EHUDFWRUV FRQWHQWLRQWKDWKHZDVDVHQLRU066RɚFHU
stole detailed background investigation informa-
WLRQIRUQHDUO\PLOOLRQ86FLWL]HQV7KLVGDWD Some historians of Chinese intelligence have cited
LQFOXGHGȊ6RFLDO6HFXULW\1XPEHUVUHVLGHQF\ WKHFRXQWU\ȇVODFNRIDVWURQJH[WHUQDO+80,17
DQGHGXFDWLRQDOKLVWRU\HPSOR\PHQWKLVWRU\ WUDGLWLRQDVRQHRIWKHUHDVRQVZK\%HLMLQJKDV
LQIRUPDWLRQDERXWLPPHGLDWHIDPLO\DQGRWKHU FRPSHQVDWHGE\EXLOGLQJDPDVVLYHF\EHURSHUD-
SHUVRQDODQGEXVLQHVVDFTXDLQWDQFHVKHDOWK WLRQVFDSDELOLW\+RZHYHUWKHUHDUHVRPHW\SHVRI
FULPLQDODQGȴQDQFLDOKLVWRU\DQGRWKHUGHWDLOVȋ information critical to China’s broader strategic
DVZHOODVȊȴQGLQJVIURPLQWHUYLHZVFRQGXFWHG LQWHUHVWVWKDWFDQRQO\EHSXUVXHGZLWKKXPDQ
E\EDFNJURXQGLQYHVWLJDWRUVDQGȴQJHUSULQWVȋ VRXUFHV0DQ\RIWKHFDVHVFLWHGLQWKLVFKDSWHU
for some individuals.76)URPD+80,17WDUJHWLQJ LQYROYHGWUDGHFUDIWWKDWLVOLNHO\XQZRUNDEOHLQ
SHUVSHFWLYHWKH&KLQHVHJRYHUQPHQWȃDWDPLQ- an era of heightened technical surveillance. This
LPXPȃLVLQSRVVHVVLRQRIGHWDLOHGGRVVLHUVRQ REVHUYDWLRQLVGRXEO\LURQLFJLYHQWKDW&KLQDLWVHOI
QHDUO\PLOOLRQ$PHULFDQVZKRKDYHDSSOLHG has built the world’s most advanced surveillance
IRUDFFHVVWRFODVVLȴHGLQIRUPDWLRQ VWDWH%XW&KLQDȇVVXUYHLOODQFHVWDWHRQO\UHVROYHV
KDOIRIWKHJXLGDQFHIURPWKH\HDUROGMeth-
)LQDOO\WKHUHDUHWKHLQVWDQFHVZKHUH&KLQHVH ods of the Sima noted at the beginning of this
DJHQWVKDYHVXFFHVVIXOO\SHQHWUDWHG86LQWHOOL- FKDSWHU:KLOH%HLMLQJKDVQHDUO\SHUIHFWHGLWV
gence agencies and gained access to government DELOLW\WRȊREVHUYHWKHQHDUȋWKHFXUUHQWHUDRI
secrets, details of overseas intelligence operations, +80,17ZLOOUHTXLUH&KLQDȇVVSLHVWRPRGHUQL]H
DQGWKHLGHQWLWLHVRI86VRXUFHVLQ&KLQD7KHȴUVW KRZWKH\ȊHPSOR\VSLHVDJDLQVWWKHGLVWDQWȋ$QG
$PHULFDQLQWHOOLJHQFHRɚFHUFKDUJHGZLWKVS\LQJ the success of Chinese political warfare will hinge,
IRU&KLQDZDV/DUU\:X7DL&KLQDUHWLUHGFDUHHU to some degree, on how well China can improve
linguist for the CIA’s Foreign Broadcast Informa- LWV+80,17FDSDELOLWLHV
WLRQ6HUYLFHZKRSDVVHGFODVVLȴHGLQIRUPDWLRQ
WR%HLMLQJIRUGHFDGHVEHIRUHKLVFRQYLFWLRQLQ
1986. Prosecutors said of Chin at his trial, “For 30
\HDUVKHZDVDGLUHFWIXQQHOIURPWKH$PHULFDQ
LQWHOOLJHQFHFRPPXQLW\WRWKH3HRSOHȇV5HSXEOLFRI
&KLQDȋ777ZRPRUHUHFHQWFDVHVDUHWKRVHRI-HUU\
&KXQ6KLQJ/HHDQG$OH[DQGHU<XN&KLQJ0DERWK
IRUPHU&,$FDVHRɚFHUV0DȇVFDVHZKLFKLVVWLOO
pending, includes the submission into evidence
of a 2001 video recording of Ma and a colleague
PHHWLQJZLWK066RɚFHUVDQGUHYHDOLQJ&,$Rɚ-
cer identities, human asset identities, operational
WUDGHFUDIWDQGVHFXULW\FRPPXQLFDWLRQSUDFWLFHV78
/HHZDVFRQYLFWHGLQDFDVHZKHUHKHZDV

This content downloaded from 111.95.102.253 on Thu, 23 May 2024 08:20:42 +00:00 27
All use subject to https://about.jstor.org/terms

You might also like