{"id":1552,"date":"2020-10-22T11:14:20","date_gmt":"2020-10-22T09:14:20","guid":{"rendered":"http:\/\/luftverteidigung.ch\/de\/?p=1552"},"modified":"2020-10-22T11:14:20","modified_gmt":"2020-10-22T09:14:20","slug":"the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state","status":"publish","type":"post","link":"https:\/\/luftverteidigung.ch\/de\/the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state\/","title":{"rendered":"The 5 Faces Of Chinese Espionage: The World\u2019s First \u2018Digital Authoritarian State\u2019"},"content":{"rendered":"<p><strong>The 5 Faces Of Chinese Espionage: The World\u2019s First \u2018Digital Authoritarian State\u2019.<\/strong><\/p>\n<p><a href=\"https:\/\/breakingdefense.com\/2020\/10\/the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state\/?utm_campaign=Breaking%20News&amp;utm_medium=email&amp;_hsmi=97999451&amp;_hsenc=p2ANqtz--lO9qsd_e9QqPohGCVFIz6yiTshZ8jqac0PsxWLm14NQxT5NNNE3I7mLaX5kZh4beK6KsQu-06Yx2E8IBVheK3coYfLw&amp;utm_content=97999451&amp;utm_source=hs_email\">Nicholas Eftimiades, breakingdefense.com, 22.10.2020<\/a><\/p>\n<figure id=\"attachment_1553\" aria-describedby=\"caption-attachment-1553\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/luftverteidigung.ch\/de\/the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state\/chinesecyberguys\/\" rel=\"attachment wp-att-1553\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1553\" src=\"https:\/\/luftverteidigung.ch\/de\/wp-content\/uploads\/sites\/2\/2020\/10\/chinesecyberguys.jpg\" alt=\"\" width=\"640\" height=\"360\" srcset=\"https:\/\/luftverteidigung.ch\/de\/wp-content\/uploads\/sites\/2\/2020\/10\/chinesecyberguys.jpg 640w, https:\/\/luftverteidigung.ch\/de\/wp-content\/uploads\/sites\/2\/2020\/10\/chinesecyberguys-300x169.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-1553\" class=\"wp-caption-text\">Chinese cyber operators<\/figcaption><\/figure>\n<p>Chinese spies are different from those of most other wealthy and developed countries where the majority of spies are highly trained, with some serving under diplomatic cover and others operating under what the US Intelligence Community calls Non Official Cover (NOC).<\/p>\n<p>Chinese intelligence operations are the first in modern times to use, as a foundation, the whole of society. Because of this, China\u2019s espionage tactics are sometimes artless, operating with little in the way of standard spy-fare, (encrypted communication, dead drops, etc.) instead relying on an overwhelming volume of espionage operations conducted by all manner of citizen and a sort of impunity inherent in the lack of substantive penalty for when a Chinese agent is discovered, a study I recently published analyzing 595 cases of intelligence collection efforts sanctioned and abetted by the Chinese Communist Party.<\/p>\n<p>Beijing has evolved to become the world\u2019s first \u2018digital authoritarian state\u2019. Its creativity and ability to combine all the elements of \u2018societal power,\u2019 including espionage, information control, industrial policy, political and economic coercion, foreign policy, threat of military force, and technological strength challenges the world\u2019s rules-based international order.<\/p>\n<p>Recent Chinese espionage cases such as Kevin Mallory, Edward Peng, Ron Rockwell Hansen, and Dickson Yeo show improvements in the handling \u2018tradecraft\u2019 of intelligence assets.<\/p>\n<p>My study, A Series on Chinese Espionage \u2014 Vol. 1 Operations and Tactics peels back, layer by layer, the Chinese espionage apparatus at-work in the United States, finding a burgeoning audacity. The willingness to employ average people with little or no training implies a failure of organization and also the same dearth of coordination that\u2019s plagued a Chinese intelligence infrastructure that\u2019s been purged over and through regime change, this Whole of Society operational strategy marks an emboldened departure for an intelligence community that has historically been a hackneyed doppelg\u00e4nger of the American CIA, British MI6, and Russian SVR.<\/p>\n<p>Analysis Findings<\/p>\n<p>Patterns emerged from the study indicating which technologies and information are being targeted. They can be grouped into clear categories which incidentally align with the CCP\u2019s Made in China 2025 industrial policy, Space Science and Technology Goals to 2050, and Beijing\u2019s 13th Five Year Plan.<\/p>\n<p>Major Chinese policy documents outline information objectives based on gaps identified within the Chinese technology, commercial, and military apparatus which become the basis for national strategic technology objectives. National Chinese information objectives have a strong correlation to China\u2019s espionage activities, reflecting a congruence between China\u2019s public and covert operational goals.<\/p>\n<p>Of the 595 cases herein considered, 435 cases targeted technologies or information identified in Chinese policy document information objectives. The analysis further identifies a disproportionate emphasis on Aerospace Technology (116 cases) and information Technology (113 cases).<\/p>\n<p>How China\u2019s Legal Framework Supports Espionage<\/p>\n<p>Chinese espionage emphasizes the development of China\u2019s industries and the theft of foreign wealth. To that end, the Chinese state employs government agencies, organizations, commercial entities, individual entrepreneurs, Chinese expatriates, Chinese and foreign researchers to attain its espionage goals.<\/p>\n<p>Most Chinese foreign operatives work under one the following:<\/p>\n<ul>\n<li>Central Military Commission (CMC) Joint Intelligence Bureau.<\/li>\n<li>The Ministry of State Security, China\u2019s pre-eminent civilian intelligence service.<\/li>\n<li>State Owned Enterprises (SOE). About 23 percent of all espionage analyzed in this report is committed by employees of these pseudo-commercial entities.<\/li>\n<\/ul>\n<p>China compels its citizens to divulge trade secrets and otherwise comply with intelligence-gathering efforts. The Chinese government and party threaten citizens with severe punishment if they do not help with espionage efforts if status and\/or money don\u2019t convince them to comply. The predominant form of Chinese tradecraft uses company employees to access restricted technology and trade secrets. There are estimated to be at least 500 Chinese talent programs designed to conscript academic and professional expertise from the West into scooping up information and technology to serve China\u2019s national development.<\/p>\n<p>China compels its citizens to divulge trade secrets and otherwise comply with intelligence-gathering efforts. The Chinese government and party threaten citizens with severe punishment if they do not help with espionage efforts if status and\/or money don\u2019t convince them to comply. The predominant form of Chinese tradecraft uses company employees to access restricted technology and trade secrets. There are estimated to be at least 500 Chinese talent programs designed to conscript academic and professional expertise from the West into scooping up information and technology to serve China\u2019s national development.<\/p>\n<p>Impact Of Chinese Espionage on American Interests<\/p>\n<p>Just how extensive Chinese espionage may be is a near impossible task to estimate without access to more data, but it\u2019s crystal clear that China is quickly eroding the US advantage in aerospace technology. Also, Chinese espionage compromises US dependency on space capabilities for communications, economic strength, critical infrastructure safety and resiliency, and our ability to project military power globally.<\/p>\n<p>The financial impact of intellectual property theft is more easily estimated. The annual losses to the US from China\u2019s IP theft are estimated to be $360 billion. The director of the FBI has publicly stated that the bureau opens a new counter-intelligence case involving China every 10 hours.<\/p>\n<figure id=\"attachment_1554\" aria-describedby=\"caption-attachment-1554\" style=\"width: 768px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/luftverteidigung.ch\/de\/the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state\/huawei_1-hq-in-china-768x616\/\" rel=\"attachment wp-att-1554\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1554\" src=\"https:\/\/luftverteidigung.ch\/de\/wp-content\/uploads\/sites\/2\/2020\/10\/Huawei_1-HQ-in-China-768x616-1.jpg\" alt=\"\" width=\"768\" height=\"616\" srcset=\"https:\/\/luftverteidigung.ch\/de\/wp-content\/uploads\/sites\/2\/2020\/10\/Huawei_1-HQ-in-China-768x616-1.jpg 768w, https:\/\/luftverteidigung.ch\/de\/wp-content\/uploads\/sites\/2\/2020\/10\/Huawei_1-HQ-in-China-768x616-1-300x241.jpg 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/a><figcaption id=\"caption-attachment-1554\" class=\"wp-caption-text\">Huawei HQ in Shenzhen, China<br \/>Bild: BreakingDefense.com<\/figcaption><\/figure>\n<p>America\u2019s response to China has become increasingly contentious under the Trump administration, exemplified by the Huawei technology stoppage, and the censuring of the popular Chinese-controlled apps Tik-Tok and WeChat.<\/p>\n<p>The issues I\u2019ve examined here concern only espionage operations pertaining to the United States. Obviously, America is only one in an international landscape of advanced technology countries trying to rebuff China\u2019s espionage efforts. A major question arises in consideration of this analysis: Do the 595 discovered cases of Chinese espionage represent 90 percent or 10 percent of the total?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 5 Faces Of Chinese Espionage: The World\u2019s First \u2018Digital Authoritarian State\u2019. Nicholas Eftimiades, breakingdefense.com, 22.10.2020 Chinese spies are different from those of most other wealthy and developed countries where the majority of spies are highly trained, with some serving<\/p>\n","protected":false},"author":2,"featured_media":1553,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"_links":{"self":[{"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/posts\/1552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/comments?post=1552"}],"version-history":[{"count":3,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/posts\/1552\/revisions"}],"predecessor-version":[{"id":1557,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/posts\/1552\/revisions\/1557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/media\/1553"}],"wp:attachment":[{"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/media?parent=1552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/categories?post=1552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/luftverteidigung.ch\/de\/wp-json\/wp\/v2\/tags?post=1552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}