Chinese Intelligence Operations


Book Description

Nicholas Eftimiades examines the infiltration of Chinese espionage agents into foreign governments and private businesses. He specifically addresses the human source in intelligence operations, and how these tactics fit into the conduct of internal and foreigh affairs in China.




Chinese Communist Espionage


Book Description

This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China's espionage organs, and links to an extensive online glossary of Chinese language intelligence and security terms. Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad.




Chinese Spies


Book Description

Are the Chinese secret services now the most powerful in the world?




Historical Dictionary of Chinese Intelligence


Book Description

Historical Dictionary of Chinese Intelligence, Second Edition covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.




Chinese Industrial Espionage


Book Description

This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US. This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.




China's Security State


Book Description

China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and operation by providing new evidence and offering alternative interpretations of major events throughout Chinese Communist Party history. This analysis promotes a better understanding of the CCP's mechanisms for control over both Party members and the general population. This study specifies some of the broader implications for theory and research that can help clarify the nature of Chinese politics and potential future developments in the country's security and intelligence services.




OSS in China


Book Description

Maochun Yu tells the story of the intelligence activities of the Office of Strategic Services (OSS) in China during World War II. Drawing on recently released classified materials from the U.S. National Archives and on previously unopened Chinese documents, Yu reveals the immense and complex challenges the agency and its director, General William Donovan, confronted in China. This book is the first research-based history and analysis of America's wartime intelligence and special operations activities in the China, Burma and India during WWII. It presents a complex and compelling story of conflicting objectives and personalities, inter-service rivalries, and crowning achievements of America's military, intelligence and political endeavors, the significance of which goes far beyond WWII and China.




The Shadow War


Book Description

Are we losing a war few of us realize we’re fighting? Jim Sciutto, CNN’s Chief National Security Correspondent, reveals the invisible fronts that make up 21st century warfare, from disinformation campaigns to advanced satellite weapons. Poisoned dissidents. Election interference. Armed invasions. International treaties thrown into chaos. Secret military buildups. Hackers and viruses. Weapons deployed in space. China and Russia (and Iran and North Korea) spark news stories by carrying out bold acts of aggression and violating international laws and norms. Isn’t this just bad actors acting badly? That kind of thinking is outdated and dangerous. Emboldened by their successes, these countries are, in fact, waging a brazen, global war on the US and the West. This is a new Cold War, which will not be won by those who fail to realize they are fighting it. The enemies of the West understand that while they are unlikely to win a shooting war, they have another path to victory. And what we see as our greatest strengths—open societies, military innovation, dominance of technology on Earth and in space, longstanding leadership in global institutions—these countries are undermining or turning into weaknesses. In The Shadow War,CNN anchor and chief national security correspondent Jim Sciutto provides us with a revealing and at times disturbing guide to this new international conflict. This Shadow War is already the greatest threat to America’s national security, even though most Americans know little or nothing about it. With on-the-ground reporting from Ukraine to the South China Sea, from a sub under the Arctic to unprecedented access to America’s Space Command, Sciutto draws on his deep knowledge, high-level contacts, and personal experience as a journalist and diplomat to paint the most comprehensive and vivid picture of a nation targeted by a new and disturbing brand of warfare. Thankfully, America is adapting and fighting back. In The Shadow War, Sciutto introduces readers to the dizzying array of soldiers, sailors, submariners and their commanders, space engineers, computer scientists, civilians, and senior intelligence officials who are on the front lines of this new kind of forever war. Intensive and disturbing, this invaluable and important work opens our eyes and makes clear that the war of the future is already here.




Tiger Trap


Book Description

“A stunningly detailed history . . . from sexy socialite double agents to ‘kill switches’ implanted offshore in the computer chips for our electric grid” (R. James Woolsey, former director of Central Intelligence). For decades, while America obsessed over Soviet spies, China quietly penetrated the highest levels of government. Now, for the first time, based on numerous interviews with key insiders at the FBI and CIA as well as with Chinese agents and people close to them, David Wise tells the full story of China’s many victories and defeats in its American spy wars. Two key cases interweave throughout: Katrina Leung, code-named Parlor Maid, worked for the FBI for years even after she became a secret double agent for China, aided by love affairs with both of her FBI handlers. Here, too, is the inside story of the case, code-named Tiger Trap, of a key Chinese-American scientist suspected of stealing nuclear weapons secrets. These two cases led to many others, involving famous names from Wen Ho Lee to Richard Nixon, stunning national security leaks, sophisticated cyberspying, and a West Coast spy ring whose members were sentenced in 2010. As concerns swirl about US-China relations and the challenges faced by our intelligence community, Tiger Trap provides an important overview from “America’s premier writer on espionage” (The Washington Post Book World). “Wise’s conclusion is sobering—China’s spying on America is ongoing, current, and shows no signs of diminishing—and his book is a fascinating history of Chinese espionage.” —Publishers Weekly “A fact-filled inside account, with sources named and no one spared.” —Seymour M. Hersh




The Secret World


Book Description

“A comprehensive exploration of spying in its myriad forms from the Bible to the present day . . . Easy to dip into, and surprisingly funny.” —Ben Macintyre in The New York Times Book Review The history of espionage is far older than any of today’s intelligence agencies, yet largely forgotten. The codebreakers at Bletchley Park, the most successful WWII intelligence agency, were completely unaware that their predecessors had broken the codes of Napoleon during the Napoleonic wars and those of Spain before the Spanish Armada. Those who do not understand past mistakes are likely to repeat them. Intelligence is a prime example. At the outbreak of WWI, the grasp of intelligence shown by US President Woodrow Wilson and British Prime Minister Herbert Asquith was not in the same class as that of George Washington during the Revolutionary War and eighteenth-century British statesmen. In the first global history of espionage ever written, distinguished historian and New York Times–bestselling author Christopher Andrew recovers much of the lost intelligence history of the past three millennia—and shows us its continuing relevance. “Accurate, comprehensive, digestible and startling . . . a stellar achievement.” —Edward Lucas, The Times “For anyone with a taste for wide-ranging and shrewdly gossipy history—or, for that matter, for anyone with a taste for spy stories—Andrew’s is one of the most entertaining books of the past few years.” —Adam Gopnik, The New Yorker “Remarkable for its scope and delightful for its unpredictable comparisons . . . there are important lessons for spymasters everywhere in this breathtaking and brilliant book.” —Richard J. Aldrich, Times Literary Supplement “Fans of Fleming and Furst will delight in this skillfully related true-fact side of the story.” —Kirkus Reviews “A crowning triumph of one of the most adventurous scholars of the security world.” —Financial Times Includes illustrations