Espionage involving China

Blackstone

Brigadier
Just how much does the U.S. Air Force spy on China?

Redacted docs offer some clues


By David Axe and Joe Trevithick, War is Boring | 8:30am ET

Please, Log in or Register to view URLs content!

The story is much ado about nothing. US government is very open about spying on China in international air, space, and waters. The pertinent question isn't how many times a year US platforms spy on China, but what's necessary to do a good job of it. If the answer is once a week's sufficient, then the US should ease tensions and cut back, but if the answer is 24/7/365, then once a day isn't nearly enough. The bottom line is let security interest and not ideology dictate frequencies of spy missions. There's every reason to pursue US security interests, but no reason to needlessly provoke China or anyone else.
 

AssassinsMace

Lieutenant General
Please, Log in or Register to view URLs content!


It's interesting how Glen Greenwald has been reporting on US economic espionage lately and the mainstream media reports none of it. That's basically the only thing left to spin China out to be a worse offender.
 

shen

Senior Member
Chinese Espionage Now Rampant in Taiwan
Oct. 11, 2014 - By WENDELL MINNICK | defensenews.com

TAIPEI — As relations improve between Beijing and Taipei, military morale still continues to fall as fewer Taiwan military officers see a future in an ever-shrinking armed forces. Many are beginning to cash in on their intimate knowledge of military secrets, including classified information on US military equipment.

Over the past several years, Taiwan military officers have sold China information on the E-2K Hawkeye airborne early warning aircraft, Patriot Advanced Capability-3 and PAC-2 anti-ballistic missile systems, Hawk air defense missile system, and the Raytheon Palm IR-500 radiometric infrared camera.

Taiwan defense sources said that on the Taiwan side, China has collected all the data needed to compromise the Po Sheng C4I upgrade program and the Anyu-4 air defense network upgrade program, Shuan-Ji Plan (electronic warfare technology project), and the Wan Chien (Ten Thousand Swords) joint standoff weapon.

A common anecdote used by the Western media suggests China uses a “grains of sand” or “mosaic” approach to collecting intelligence. That is, China collects intelligence from a broad effort by low-level, often amateur, sources to form an overall picture. However, Chinese efforts in Taiwan indicate otherwise.

The mosaic theory is a common misperception, said Peter Mattis, a fellow at the Jamestown Foundation. “As far as operational techniques, I think the breadth of alleged and proven approaches by Chinese intelligence demonstrates [the usage of] oriented professionals, not the amateur free-for-all that most analysts use to describe Chinese intelligence operations.” Mattis also discovered that the majority of Taiwan spy cases from 2004 to 2011 were cash-driven and not ideological.

Mattis, who wrote the 2012 book, “Chinese Intelligence Operations Reconsidered: Toward a New Baseline,” said the recent case of retired Vice Adm. Ko Cheng-sheng shows the myriad of Chinese spy agencies chasing Taiwan targets.

Ko, formerly deputy Navy commander in 2003, was sentenced to 14 months for violating the National Security Act this month. Ko spied for China from 1998 to 2007 after being recruited by a Taiwan businessman who introduced him to members of the United Front Work Department and “Shanghai City No. 7 Office.” Ko is accused of providing China with the military’s Gu’an Combat Plan for the defense of Taiwan and Penghu.

“In addition to the Ministry of State Security and Second Department of the People’s Liberation Army [PLA] General Staff Department, Taiwanese doing business in the People’s Republic of China will find the PLA’s General Political Department, the United Front Work Department, and any of the local level state security elements” all vying to recruit them, Mattis said.

This year has been harsh. In September, Military Intelligence Bureau’s Col. Lo Chi-cheng was sentenced to 18 years for selling the names of Taiwan spies working in the mainland from 2007 to 2010. In March, retired Marine Corps Col. Liao Yi-tsung was indicted for spying for China. Liao was recruited during a visit to Shanghai in 2010, then recruited Hu Kuang-tai, a special forces instructor who then attempted to recruit up to 10 students before one turned him into authorities. In April, Air Force Maj. Hau Chih-hsiung was sentenced to 20 years for providing data on the E-2K Hawkeye aircraft. A local karaoke club owner allegedly recruited him for Chinese intelligence.

The most devastating case was the 2011 arrest of Maj. Gen. Lo Hsien-che, a Taiwan military attaché assigned to Thailand from 2002 to 2005. According to government sources, Lo was recruited in Thailand and upon returning to Taiwan was given the sensitive post of head of the Army’s telecommunications and electronic information department, where he provided China with information about Taiwan’s cryptography, signal intelligence capabilities, and intelligence sharing with the United States. Lo was sentenced to life in 2012.

China uses retired Taiwan military officers to help recruit spies in the armed forces. Retired officers receive all-expense paid trips to China by the United Front Work Department, said a Taiwan security specialist. While there, they are lionized for returning to the “homeland” and given tours of their ancestral homes. Before they return, money is offered to help the “motherland” in the future, and “unfortunately many take it,” he said.

“The cross-strait contest on intelligence gathering is one of asymmetric warfare,” said Lin Chong-Pin, a former Taiwan deputy minister of defense.

Lin said China enjoys a number of advantages over Taiwan. First, China is a “tightly controlled authoritarian society versus a democratic one given to excess of freedom and laxity of discipline and regulations in Taiwan.” Second, China has a long tradition of winning the espionage war against its rivals, including the Chinese Nationalist Party during the Chinese civil war.

Third, Beijing is resolved in achieving unification with Taiwan versus “the severely divided political persuasion between pro-Taiwanese consciousness and pro-Chinese consciousness in Taiwan.”

Please, Log in or Register to view URLs content!
 

shen

Senior Member
Please, Log in or Register to view URLs content!


TAIPEI, Taiwan -- Police transferred three retired fighter pilots to the Taipei District Prosecutors Office (TDPO) yesterday. The pilots in question, Sung Chia-lu (宋嘉祿), Ma Po-le (馬柏樂) and Chao Tai-chi (趙泰祈), allegedly leaked classified national security information to Chen Hsiao-chiang (鎮小江), a former member of the mainland's People's Liberation Army (PLA).

Chen came to Taiwan to recruit former Air Force Lieutenant-Colonel Chou Tzu-li (周自立) as a spy. Chou then introduced the three retired pilots to Chen. The three had been visiting countries in Southeast Asia to meet and trade classified information with agents from mainland China since 2008.

Chen and Chou have been held incommunicado by the Taipei District Court since September. Prosecutor Hsu Tse-hsien (徐則賢) requested search warrants to search the residences of the three retired pilots and seized suspicious documents there yesterday. The three pilots were questioned and sent to the TDPO yesterday evening.

Prosecutors will launch a large-scale investigation of the case, which would be a violation of national security, and look into what information was leaked.

DSP Director-General once Owned a Green Card

The Ministry of National Defense's (MND) Department of Strategic Planning (DSP) Director-General Cheang Yun-peng (成雲鵬) was reported to have been the owner of a U.S. green card for over one year, yesterday.

While holding the high-ranking positions of deputy Director-General and Director-General of the DSP, Cheang owned a green care for one and a half years. In response to the uproar, Cheang said that his conduct is up to standard, since he applied to give up the green card right after he became the Director-General of the DSP.

Cheang applied for the green card because he was about to retire in 2010. Cheang said that after he obtained a green card through his daughter's marriage with an American in 2010, he gave up his U.S. residence status in 2011.

According to local reports, since the DSP is an important military department which handles a large amount of classified information, civil servants serving in the DSP are not allowed to own a green card. The fact that Cheang, a top-ranking official of the DSP, owned a green card for more than one year proves that the MND fails to run proper background checks on its civil servants.

According to a military official, a civil servant is not allowed to have dual citizenship but permanent residence in another country is not restricted.
 

balance

Junior Member
An interesting article. China has been penetrated by foreign spies. I thought it would be difficult to penetrate Chinese military.
What do you think about the veracity of this article?

Please, Log in or Register to view URLs content!


Is China Swarming With Foreign Spies?
The Communist Party is finally getting serious about ferretting out Western spooks. But a new counterespionage law, passed on Nov. 1, may be just a finger in the dike.

BY Adam Brookes

NOVEMBER 4, 2014

Sometime in 2011, Gen. Jin Yinan gave what he thought was a closed-door briefing at a corporate conference in China, where he spoke about the dangers of espionage. In September of that year, what appeared to be the official video of his remarks turned up briefly on the Chinese video sharing site tudou.com, before being taken down. Jin gave tantalizing details of eight recent cases in which senior Chinese officials had allegedly spied for foreign governments, several of which had never previously been made public. The highest-ranking official was Kang Rixin, a member of the elite Chinese Communist Party (CCP) leadership body, the Central Committee, and head of China National Nuclear Corporation, which oversees China's nuclear programs. The official version held that Kang was sentenced to life in prison in November 2010 for bribe-taking. But Jin said the real sentence was espionage:
Kang had sold nuclear secrets to an undisclosed foreign nation, in a case that made the top leadership "extremely nervous."

Concerns about foreign espionage in China seem only to have grown. On Nov. 1 of this year, Xi signed a Counterespionage Law, replacing the 1993 National Security Law. The biggest change appears to be a greater emphasis on rooting out both foreign spies and their Chinese collaborators. When Chinese Communist Party (CCP) Secretary Xi Jinping and President Barack Obama meet in Beijing on Nov. 11 and 12, cyberspying will almost certainly be part of their discussion. But the new law suggests that it's the potential of human spies to wreak havoc that has China really worried.

It's difficult to build an open-source picture of foreign espionage operations in China: as in Kang's case, the Chinese authorities appear to hide espionage cases behind other crimes, to save themselves embarrassment. It's likely that many arrests and trials simply never come to public attention.

But outside observers can assume two things: First, much of the foreign spying against China is related to deciphering the country's military capabilities and strategic intentions. This may seem rather obvious, but it's in contrast to China's spying abroad, much of which appears aimed at stealing industrial and commercial secrets.

Second, it may seem that China would be a tough place for a foreign spy to operate, but you can bet that the United States and its allies have dozens of assets in place. Anyone who has lived and worked in China's surveillance-saturated cities could be forgiven for wondering how on Earth a foreign spy could function there. But function they do. China appears to be infested with spies, and it knows it. In early August, a graduate student in aerospace engineering surnamed Chang in the northeastern city of Harbin was reportedly arrested for selling sensitive information to a foreign intelligence agency -- he allegedly spied for two years, for which he received more than $32,000. He appears to have been recruited online, and to have conveyed his product the same way. As is often the case, the reports don't identify the foreign agency involved. Perhaps the Chinese authorities don't even know from where his handlers hailed.

Occasionally, a story breaks that is sufficiently detailed and well sourced to give a real flavor of what's going on. In May, the Communist Party newspaper People's Daily reported the story of a man surnamed Li who, while living and working in an unnamed seaside city in the wealthy southern province of Guangdong, struck up acquaintance over the Internet with a user calling himself Feige, which means "Flying Brother." Feige reportedly paid Li over several years to gather and forward military publications from libraries and online bookstores, to glean information from chatrooms used by military enthusiasts, and to take photographs of military installations. Feige was working for a foreign intelligence agency, said the paper, without specifying which one. Li ended up with a 10-year prison sentence, which seems lenient, and could suggest that the snippets of information and the military journals marked "neibu" or "internal" that he supplied were relatively low-level material.

But Feige's Internet trail led investigators to no fewer than 40 other suspected spies across the country, suggesting 1) that the operative was part of an effort to take advantage of the explosion of connectivity in China, and 2) the difficulty for Beijing of ensuring that sensitive information does not leak onto public servers. As the analyst Peter Mattis points out, the digital Chinese state is now a very leaky place, and the majority of publicly reported state secrets cases have an online component to them.

The cyber and signals intelligence elements of U.S. collection efforts take advantage of this leakiness on a grander scale. Edward Snowden's 2013 revelations of the National Security Agency's penetration of China, particularly of the telecommunications behemoth Huawei, are well documented: According to materials viewed by the New York Times, the NSA penetrated Huawei's network and stole source codes for its products, in the hope that this would enhance the NSA's signals intelligence capabilities. In an activity that really annoys the Chinese military, U.S. spy planes and spy ships routinely loiter off the Chinese coast, sucking up electronic signals, which a spokesman for China's Ministry of National Defense Yang Yujun called in August "large-scale, high-frequency, close-proximity surveillance."

But despite all this activity, China watchers here in Washington say that the holy grail of political intelligence collection -- an understanding of the intentions and vulnerabilities of the CCP -- remains frustratingly elusive. Little emerges from U.S. intelligence agencies on the inner workings of the CCP, one Washington consumer of intelligence on China told me. "We still don't really understand the mechanics of how Xi Jinping became general secretary," he said, referring to the intra-party drama that lifted Xi to the country's top position in November 2012. For an indication of the way U.S. intelligence views the task of collecting intelligence from China, take a look at the recently issued 2014 National Intelligence Strategy of the United States. China is the first country mentioned in the document, and "remains opaque in its strategic intentions and is of concern due to its military modernization." In other words, spying on China is difficult and necessary.

Occasionally, though, signs suggest the CCP has been penetrated at a senior level in a way that might provide the kind of insight Washington seeks. In mid-2012, Reuters reported that an aide to Vice Minister Lu Zhongwei of the Ministry of State Security, the agency responsible for much foreign intelligence collection and counterintelligence, had been arrested for spying for the CIA. Since then, little else has emerged: no official version of events, no news of a conviction or a sentence. The Hong Kong press spat out florid reports that the alleged agent had been recruited in true "honey-trap" style by a beautiful seductress. All of this makes for great copy, but none of it appears to have been confirmed.

A half-seen human drama such as this tantalizes the journalist and the writer. What kinds of people serve, and then betray, the Chinese state? In my 2014 novel, Night Heron, an angry Chinese aerospace engineer sells classified documents to Britain's Secret Intelligence Service. In imagining his motives, I thought of the corruption and arbitrariness permeating the Chinese justice system and the broader party state, and the resentment that might breed. It seemed plausible to me that, despite the Leninist legacy of state secrecy, Beijing might be a place where potential agents abound, even among the military and CCP elites.

Certainly, General Jin's leaked video testimony would seem to support such a notion. He describes how an Air Force attaché in Tokyo, Wang Qingjian, planted listening devices in the Chinese Embassy on behalf of Japanese intelligence. Another Air Force officer, Jia Shiqing, angry at being passed over for promotion, loaded memory sticks with information, stuck them up his own rectum and smuggled them out to Hong Kong to hand to a foreign intelligence agency, Jin said. It's the human spy -- the Chinese citizen who turns on his own country, negating every national narrative of unity and patriotism -- that the Party finds most threatening and demoralizing.

Jin confirmed that Li Bin, no less a figure than the former Chinese ambassador to South Korea, was charged with corruption, but was actually deemed guilty of passing state secrets to Seoul. "What country has an ambassador who spies?" the general asked plaintively. "We do."
 
Last edited:

broadsword

Brigadier
China's Huawei given clean bill of health by UK security board

LONDON Wed Mar 25, 2015 12:59pm EDT

(Reuters) - China's Huawei Technologies Co Ltd [HWT.UL], the telecoms equipment company whose products are now integral to various mobile and fixed-line networks, poses no threat to Britain's national security, a board established to monitor the company's operations said.

The world's second largest telecoms equipment maker set up an independent cyber security evaluation center in Oxford in 2010 in conjunction with the government to check whether its equipment could pose a threat to national security.

The company has been involved in Britain's telecoms networks for a decade, initially through a multi-billion pound deal to supply BT, the country's largest fixed-line operator, and later mobile service operators O2, EE and Talktalk.

But questions have been raised, in Britain and elsewhere, about the potential security implications of allowing the Chinese company access to critical networks.

British lawmakers said in 2013 that Huawei, which was founded by Ren Zhengfei, a former People's Liberation Army officer, should have been scrutinized more closely by ministers before it signed its first major deal with BT.

The board set up to oversee the work of the center, which includes representatives from government, intelligence agencies, and the company, said it was satisfied with the independence and quality of its tests.

"Any risks to UK national security from Huawei's involvement in the UK's critical networks have been sufficiently mitigated," it said.

Huawei said the center showed how governments, operators and equipment providers could work together on cyber security.

"In the globalized, interconnected digital age, we must all work together to deliver the best solutions to the challenges we face," the company said in a statement.
 

delft

Brigadier
China's Huawei given clean bill of health by UK security board

LONDON Wed Mar 25, 2015 12:59pm EDT

(Reuters) - China's Huawei Technologies Co Ltd [HWT.UL], the telecoms equipment company whose products are now integral to various mobile and fixed-line networks, poses no threat to Britain's national security, a board established to monitor the company's operations said.

The world's second largest telecoms equipment maker set up an independent cyber security evaluation center in Oxford in 2010 in conjunction with the government to check whether its equipment could pose a threat to national security.

The company has been involved in Britain's telecoms networks for a decade, initially through a multi-billion pound deal to supply BT, the country's largest fixed-line operator, and later mobile service operators O2, EE and Talktalk.

But questions have been raised, in Britain and elsewhere, about the potential security implications of allowing the Chinese company access to critical networks.

British lawmakers said in 2013 that Huawei, which was founded by Ren Zhengfei, a former People's Liberation Army officer, should have been scrutinized more closely by ministers before it signed its first major deal with BT.

The board set up to oversee the work of the center, which includes representatives from government, intelligence agencies, and the company, said it was satisfied with the independence and quality of its tests.

"Any risks to UK national security from Huawei's involvement in the UK's critical networks have been sufficiently mitigated," it said.

Huawei said the center showed how governments, operators and equipment providers could work together on cyber security.

"In the globalized, interconnected digital age, we must all work together to deliver the best solutions to the challenges we face," the company said in a statement.
US companies should set up such centers in China ... :)
 

AssassinsMace

Lieutenant General
Well in the US if I recall correctly some organization found no security threats in Huawei equipment but laws were enacted to prevent US government entities from buying it anyway. So it's not about espionage. It's all about preventing Chinese tech companies from taking over. South Korea was persuaded not to buy Huawei. Concerns over AIIB has nothing to with good governance. It's about China building infrastructure in developing markets with Chinese technology. I was reading someone's comment to an article about China and this poster said everything from China is stolen, copied, or full of toxins. This is about discouraging anyone from buying Chinese. I just posted recently a story about how popular US wines have high levels of man-made not natural arsenic. It has nothing with China. If it did, they would say China is conspiring to intentionally poison people as they do with everything else. So are US wine makers intentionally trying to poison people like they accuse of China? No it's the process and methods that introduces arsenic. In this case the wine makers are throwing wood chips into the wine making process to create the color. Just like lead found in paint is for creating the shine and gloss look. They're not concern with the wood chips that come from trees that may have been sprayed with a pesticide that uses poisonous arsenic as an ingredient. Outsourcers to China are only concern with making every penny they can. So unrefined and maybe harmful materials are used because they're the cheapest. I don't see a public outcry that a US industry, that has nothing to with China, is poisoning people by taking "Chinese-style" short cuts. Why the inconsistency? It has nothing to do with preventing from being poisoned. Suspicion over Chinese technology has nothing to do with national security. It has everything to do with getting people not to buy it.
 

JayBird

Junior Member
Please, Log in or Register to view URLs content!

Please, Log in or Register to view URLs content!


The four men arrested were charged with selling military secrets to foreign intelligence agencies. All from sichuan province working for the same defence firm. And Sichuan province is home of Chengdu Aircraft Design Institute. It was alleged they sold inside informations such as what type of special materials used, the monthly output, and what military model, testing time, induction time of equipments etc for for money to "foreign journalist".
 

Ultra

Junior Member
Please, Log in or Register to view URLs content!

Please, Log in or Register to view URLs content!


The four men arrested were charged with selling military secrets to foreign intelligence agencies. All from sichuan province working for the same defence firm. And Sichuan province is home of Chengdu Aircraft Design Institute. It was alleged they sold inside informations such as what type of special materials used, the monthly output, and what military model, testing time, induction time of equipments etc for for money to "foreign journalist".


Aww... They could have sell it to us! :D
We could start a fund on Kickstarter or Indiegogo to buy some insider "leaked" photos of J-20 or J-31 or Type 055! All we want is to have a little peek.... ;)

C'mon! Its been many months without any photo of J-20. I suspect this arrests will most definitely make it even more difficult for any photo to leak out. :(
 
Top