By Eric Vandenbroeck and co-workers

Chinese Intelligence

Today we are witnessing some of the effects of a decision made years ago by China to use every means and medium of intelligence-gathering at its disposal against the West. Its strategy can be summarized in three words: collect, collect, collect. Most Westerners do not yet appreciate just how sweeping China’s intelligence onslaught directed at their countries is; for decades, their governments likewise didn’t understand because their attention was largely directed elsewhere.

After 9/11, the U.S. intelligence community was overwhelmingly geared toward counterterrorism. U.S. spy chiefs followed priorities for this agenda set by decision-makers in Washington. The U.S. government’s strategic focus on combating terrorism took place at the expense of focusing on resurgent states such as China and Russia. 

The strategy that China’s Ministry of State Security (MSS), its principal civilian intelligence service, took toward the United States after 9/11 followed a Chinese saying, ge an guan huo, which roughly translates as “watch the fires burn from the safety of the opposite river bank, which allows you to avoid entering the battle until your enemy is exhausted.” The MSS followed this saying to a T. Its long-term aim was to contain the United States and then supplant it in Southeast Asia. As the United States was mired in the Middle East, the gains made by the MSS went largely undetected or appreciated by U.S. intelligence.

The strategy that China’s Ministry of State Security (MSS), its principal civilian intelligence service, took toward the United States after 9/11 followed a Chinese saying, ge an guan huo, which roughly translates as “watch the fires burn from the safety of the opposite river bank, which allows you to avoid entering the battle until your enemy is exhausted.” The MSS followed this saying to a T. Its long-term aim was to contain the United States and then supplant it in Southeast Asia. As the United States was mired in the Middle East, the gains made by the MSS went largely undetected or appreciated by U.S. intelligence.

Beginning in 2005, the MSS declared war on the U.S. intelligence community. From that point on, all of the service’s best resources and personnel were marshaled against U.S. intelligence—while the United States was pivoting to the global war on terrorism. According to one CIA official with deep expertise on China, with whom I had an exclusive interview on condition of anonymity, internal MSS deliberations from that time were marked with glee as the U.S. government was consumed, if not distracted, by the global war on terrorism.

Chinese intelligence was soon winning its war on U.S. spies. In 2010 the MSS dismantled a major CIA network being run from its station in Beijing. This led to China’s recruitment of former CIA officer Jerry Chun Shing Lee. The justice department says Lee was contacted by Chinese intelligence agents in 2010. They offered him money, promising to take care of him "for life" in exchange for the required secret information. Hundreds of thousands of dollars were deposited in his Hong Kong bank account between May 2010 and December 2013. Lee created a document containing information about CIA activities, including locations to which US agents would be assigned.

Hong Kong media identified the man in the blue tie as Lee.

The justice department said that Lee was interviewed by CIA officers in 2012, during which he said he had met Chinese intelligence officers but concealed that they had set him tasks. In 2013 he first denied knowing about the document on his USB drive and then admitted he had created it but said he had never handed it on to Chinese agents. He was arrested at New York's JFK airport in January 2018.

The information provided by Lee is said to have helped China to bring down a network of informants between 2010 and 2012. About 20 informants were killed or jailed during that period - one of the most disastrous failures of US intelligence in recent years.

Lee is not the only former CIA officer convicted of working with China. A former CIA spy Kevin Mallory was sentenced to 20 years in prison after being convicted of conspiring to transmit US defense secrets to China.

At this point, you might say, fair enough, spies spy, just as robbers rob. Perhaps China has been doing what all states do, only better. This might be called the realist school of espionage in international affairs. Such a line of thought about China usually said with a shrug, is misleading. China’s intelligence services operate fundamentally different from the West in nature, scope, and scale.

Unlike those in Western democracies, China’s intelligence services are not held to account by independent political bodies or the public, nor are they subject to the rule of law. Instead, the Chinese government fuses a “whole of society” approach to collecting intelligence. This sets it apart from anything undertaken by Western governments. Chinese intelligence and commerce are integrated into ways without comparison in the West. Contrary to what may be thought, the U.S. government does not conduct industrial espionage to advantage U.S. businesses. In China, by contrast, thanks to successive national security legislation passed under President Xi Jinping, Chinese businesses must work with its intelligence services whenever requested. They are effectively silent partners in Chinese commerce with the outside world. Another difference between Chinese intelligence and Western powers concerns what those in the spy world call ubiquitous technical surveillance. Facial recognition, phone apps, and CCTV all make China an infinitely harder target for Western agencies to collect intelligence than Chinese services’ targets in open Western democracies. A fundamental asymmetry thus exists in the shadowy intelligence battles between China and the West.

China’s foreign intelligence offensive has reached new levels since Xi took power in 2012. Its purpose involves what all intelligence agencies do: to understand the intentions and capabilities of foreign adversaries. But China’s offensive goes much further: to steal as many scientific and technical secrets from Western powers, principally the United States, as possible to advance China’s position as a superpower, challenging and overtaking the United States on the world stage.

This century, China’s unprecedented economic boom has been fueled by an equally unprecedented theft of Western science and technology. In 2012, the U.S. National Security Agency director warned that cyber espionage constituted the greatest transfer of wealth in history. China was, and remains, the greatest perpetrator. Beginning around 2013 or 2014, Chinese operatives carried out a massive hack of the U.S. Office of Personnel Management (OPM), which holds some of the most sensitive information in the U.S.

China’s spy balloon this year was equipped with state-of-the-art sensors capable of eavesdropping on electronic signals from near space that satellites could not.

You can’t blame a wolf for going after chickens in a coop, especially if the door is open. A recent report by Strider Technologies, an open-source strategic intelligence start-up, has revealed how Chinese scientists obtained valuable research and development (R&D) from Los Alamos, home to the U.S. government’s cutting-edge laboratories. The report—which also demonstrates the power of open-source intelligence in today’s digital world, reveals that Chinese scientists at Los Alamos brought R&D from there back to China, which the Chinese government then used in defense technologies such as hypersonics. In some instances, the Chinese scientists at Los Alamos had been funded by U.S. research grants. The United States was thus effectively funding its competitive disadvantage with China in these sectors.

Cold wars tend to start before Western countries are prepared. Intelligence records reveal that in 1945 the Soviet government was effectively already engaged in a cold war with its Western counterparts. This was based on its long-term ideological opposition to capitalist powers and Soviet leader Joseph Stalin’s belief that he had to contain them. Before and during World War II, Soviet intelligence undertook an unprecedented espionage offensive against Western powers—including the Soviet Union’s wartime allies Britain and the United States—to collect political intelligence and steal as many scientific and technical secrets as possible. Soviet spy chiefs were pushing at an open door as their Western allies were distracted, if not consumed, by fighting the Axis powers. By the end of World War II, Soviet spies had acquired secrets of the nuclear bomb, whose later development would shape postwar international security. Soviet agents had also penetrated the most sensitive parts of Western governments. This allowed Stalin to calibrate his strategies toward his former wartime Western allies—who were never his allies in the sense they thought, based on secrets from the inside. Western powers were ill-equipped for a struggle they were already in by 1945.

History may not repeat itself, but it does rhyme. There are rhymes with the Cold War and U.S.-China relations today. As in the Cold War, from the view of intelligence and national security, the United States is already in a cold war with China. Like the last century’s superpower conflict, Western intelligence agencies are again racing to recalibrate and catch up.

The Cold War offers two warnings. First, Chinese spies are real in the same way. Soviet agents were real. An uncomfortable public policy conversation is urgently needed about the nature of Chinese students, academics, and businesspeople, some of whom may have malign intentions, as well as talent programs and cultural outreach programs in the United States. But that does not mean that Americans who happen to be of Chinese heritage are spies, any more so than left-leaning Americans were Soviet agents.

Second, sunlight is the best disinfectant. The U.S. government must be transparent about its knowledge of Chinese intelligence. If such information is not forthcoming and scrutinized, debated, and challenged, there is a real prospect of another McCarthyite witch hunt. Today, Chinese Americans are often the victims of the Chinese government and its intelligence services. Finding the balance between security and civil liberties is our challenge ahead. China will continue to spy, using all means available, balloons, businesses, and bytes. We need to determine what trade-offs we will put up with between security and civil liberties.

As for the recent TikTok hearing, TikTok provides the Chinese government a potential platform to collect intelligence behind the endless videos posted. It also offers the Chinese government the opportunity to shape public opinion. So far, however, it has not been demonstrated in Congress that TikTok actually does either. TikTok should certainly be banned from phones carrying Western state secrets because of the potential for Chinese espionage, but its wholesale ban in the United States is so far not justified on national security grounds. Unless or until evidence emerges that TikTok constitutes more than a potential security threat at large, it is surely the right of Americans to post as many videos as they want online and potentially have their data mined in China if they wish.

 

For updates click hompage here

 

 

 

 

shopify analytics