Artigo Revisado por pares

Chinese Intelligence in the Cyber Age

2013; Taylor & Francis; Volume: 55; Issue: 1 Linguagem: Inglês

10.1080/00396338.2013.767405

ISSN

1468-2699

Autores

Nigel Inkster,

Tópico(s)

Intelligence, Security, War Strategy

Resumo

Click to increase image sizeClick to decrease image size Notes See for example, Zhao Suisheng, 'A State-led Nationalism: the Patriotic Education Campaign in post-Tiananmen China', Communist and Post-Communist Studies, vol. 31, no. 3, September 1998, pp. 287–302. David Ian Chambers, 'Edging in from the Cold: the Past and Present State of Chinese Intelligence Historiography', Studies in Intelligence, vol. 56, no. 3, September 2012, https://www.cia.gov/library/center-for-the-study-ofintelligence/csi-publications/csistudies/studies/vol.-56-no.-3/pdfs/Chambers-ChineseIntelHistoriography.pdf. 'Espionage: a Spy's Grisly Solution', Time, 3 March 1986, http://www.time.com/time/magazine/article/0,9171,960791,00.html. The defector was Yu Qiangsheng, a senior officer in the Ministry of State Security's counter-espionage division and brother of Yu Zhengsheng who was appointed a member of the Politburo Standing Committee in November 2012. See Mathew Brazil, 'Chinese Intelligence Work, an Abbreviated History', http://www.academia.edu/1250201/Chinese_Intelligence_Work_an_Abbreviated_History, p. 20. Bill Gertz, 'Chinese Spy who Defected Tells All', Washington Times, 19 March 2009, http://www.washingtontimes.com/news/2009/mar/19/exclusivechinese-spy-who-defected-tells-all/. Sam DuPont, 'China's War on the "Three Evil Forces"', Foreign Policy, 25 July 2007, http://blog.foreignpolicy.com/posts/2007/07/25/chinas_war_on_the_three_evil_forces. David Wise, 'China's Spies are Catching Up', New York Times, 10 December 2011, http://www.nytimes.com/2011/12/11/opinion/sunday/chinas-spies-are-catching-up. United States House of Representatives Select Committee on US National Security and Military/ Commercial Concerns with the People's Republic of China, 3 January 1999, http://www.house.gov/coxreport/pdf/gen.pdf, p. 29. For a detailed account of the genesis and evolution of Plan 863, see Evan A. Feigenbaum, China's Techno-warriors: National Security and Strategic Competition from the Nuclear to the Information Age (Palo Alto, CA: Stanford University Press, 2000), pp. 141–66. David Wise, Tiger Trap: America's Secret Spy War with China (Boston, MA: Houghton Mifflin Harcourt, 2011), pp. 81–98. Lee was arrested following a Grand Jury indictment, but was subsequently released. After federal investigators were unable to prove the initial accusations that Lee had passed nuclear secrets to China, a separate government investigation charged Lee with mishandling restricted data, one of the original 59 counts in the indictment, to which he pleaded guilty as part of a plea settlement. In 2006, Lee received $1.6 million from the government and various media organisations as part of a civil suit he filed for leaking his name to the press before he was formally charged. Huo Zhongwen and Wang Zhongxiao, Sources and Techniques of Obtaining National Defense Science and Technology Intelligence – guofang keji qingbaoyuan ji huoqu jishu (Beijing: Kexue Jishu Wenxuan Publishing Co., 1991), http://www.fas.org/irp/world/china/docs/sources.html. It appears that this book was never intended to be made public but somehow slipped through the cracks. Wise, Tiger Trap, pp. 1–5, 2–29, 109–21 and 187–202. 'Russia Paroles Physicist Valentin Danilov Jailed for Spying', Guardian, 13 November 2012, http://www.guardian.co.uk/world/2012/nov/13/russia-paroles-physicist-jailed-spying. Peter Mattis, 'Beyond Spy vs. Spy: the Analytical Challenge of Understanding Chinese Intelligence Services', Studies in Intelligence, vol. 56, no. 3, September 2012, https://www.cia.gov/library/center-for-thestudy-of-intelligence/csi-publications/csi-studies/index/html. 'CSIS Comments Anger Chinese Community', CBC News, 24 June 2010, http://www.cbc.ca/news/canada/british-columbia/story/2010/06/24/bccsis-vancouver-chinese-community.html. See http://baike.baidu.com/view/1799376.htm. For a detailed account of this incident see Ashley J. Tellis, 'China's Military Space Strategy', Survival, vol. 49, no. 3, Autumn 2007, pp. 41–3. In early 2011, China announced a 13.8% increase in spending on internal security, bringing that budget to RMB624.4 billion, compared with a military budget of RMB601bn. It was not made clear what percentage of this increase would go to the MSS. See Chris Buckley, 'China's Internal Security Spending Jumps Past Army Budget', Reuters, 5 March 2011. See Michael J. Swaine, 'China's Assertive Behavior Part Three: The Role of the Military in Foreign Policy', China Leadership Monitor No 36, http://media.hoover.org/sites/default/files/documents/CLM36MS.pdf. Linda Jakobson and Dean Knox, 'New Foreign Policy Actors in China', SIPRI Policy Paper 26, September 2010, http://books.sipri.org/files/PP/SIPRIPP26.pdf, p. 35. Author's conversations with policy advisers. Michael D. Swaine, The Role of the Chinese Military in National Security Policymaking (Santa Monica, CA: RAND, National Defense Research Institute, 1998), http://www.rand.org/pubs/monograph_reports/2007/MR782-1.pdf, p. ix. For a general account of China's Internet evolution see Nigel Inkster, 'China in Cyberspace', in Derek S. Reveron (ed.), Cyberspace and National Security: Threats, Opportunities and Power in a Virtual World (Washington DC: Georgetown University Press, September 2012), pp. 287–311. See http://www.internetworldstats.com/asia.htm. Liang Qiao and Wang Xiangsui, Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House, 1999). Bryan Krekel, Patton Adams and George Bakos, 'Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage', report prepared by the Northrop Grumman Corporation for the US–China Economic and Security Review Commission, 7 March 2012, http://www.washingtonpost.com/r/2010-2019/WashingtonPost/2012/03/08/National-Security/Graphics/USCC_Report_Chinese_Capabilities_for_Computer_Network_Operations_and_Cyber_Espionage.pdf, pp. 18–20. 'Inside the Hack Attack', Time, 25 August 2005, http://www.time.com/time/nation/article/0,8599,1098371,00.html. 'MI5 Warns Firms over China's Internet "Spying"', Daily Telegraph, 12 April 2008, http://www.telegraph.co.uk/news/worldnews/1571172/MI5-warns-firms-over-Chinasinternet-spying.html. 'Tracking GhostNet: Investigating a Cyber Espionage Network', Information Warfare Monitor, 29 March 2009, http://www.infowar-monitor.net/ghostnet. Dmitri Alperovitch, 'Revealed: Operation Shady Rat', McAfee Corporation, August 2011, http://www.mcafee.com/us/resources/whitepapers/wp-operation-shady-rat.pdf. Colin Clarke, 'China Attacked Internet Security Company RSA, General Tells SASC', AOL Defense, 27 March 2012, http://defense.aol.com/2012/03/27/china-attacked-internet-securitycompany-rsa-cyber-commander-te/. Bryan Krekel, George Bakos and Christopher Barnett, 'Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation', report prepared by the Northrop Grumman Corporation for the US–China Economic and Security Review Commission, 9 October 2009, http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_ApprovedReport_16Oct2009.pdf. Ken Dilanian, 'US Spy Agencies to Detail Cyber Attacks from Abroad', Los Angeles Times, 8 December 2012. He cites an official involved in investigating cyber espionage as saying: 'we have traced attacks back to a desk in a (People's Liberation Army) office building'. Josh Rogin, 'NSA Chief: Cybercrime Constitutes the "Greatest Transfer of Wealth in History"', The Cable, 9 July 2012, http://thecable.foreignpolicy.com/posts/2012/07/09/nsa_chief_cybercrime_constitutes_the_greatest_transfer_of_wealth_in_history. Michael Riley and Ashley Vance, 'Inside the Chinese Boom in Corporate Espionage', Bloomberg Businessweek, 15 March 2012, http://www.businessweek.com/articles/2012-03-14/inside-the-chinese-boom-in-corporateespionage. Laura Payton, 'Former Nortel Exec Warns against Working with Huawei', CBC News, 11 October 2012, http://www.cbc.ca/news/business/story/2012/10/11/pol-huawei-nortelexperience.html. Additional informationNotes on contributorsNigel InksterNigel Inkster is Director of Transnational Threats and Political Risk at the IISS. He served in the British Secret Intelligence Service (SIS) from 1975 to 2006, and spent seven years on the Board of SIS, the last two as Assistant Chief and Director for Operations and Intelligence.

Referência(s)
Altmetric
PlumX