- Obama: Hole U.S. ‘digging out of’ requires billions more in unemployment benefits
- Obama’s regulatory agenda will cost U.S. economy $143B next year: report
- Patriot Act author on James Clapper: Fire, prosecute him
- Russia P.M. Medvedev: No amnesty for political prisoners
- Michigan GOP Senate hopeful reminds government is the ‘servant’
- Christmas, by Congress: Members mull a 15-cent tax on trees
- U.S. unemployment falls to five-year low of 7 percent; 203K jobs added
- World mourns Nelson Mandela and celebrates his life; burial set for Dec. 15
- Bill O’Reilly reminds: Nelson Mandela ‘was a communist’
- John Boehner says GOP should support gay candidates: ‘I do’
Thefts of U.S. technology boost China’s weaponry
Question of the Day
Part I:Chinese dragon awakens
Second of two parts.
China is stepping up its overt and covert efforts to gather intelligence and technology in the United States, and the activities have boosted Beijing’s plans to rapidly produce advanced-weapons systems.
“I think you see it where something that would normally take 10 years to develop takes them two or three,” said David Szady, chief of FBI counterintelligence operations.
He said the Chinese are prolific collectors of secrets and military-related information.
“What we’re finding is that [the spying is] much more focused in certain areas than we ever thought, such as command and control and things of that sort,” Mr. Szady said.
“In the military area, the rapid development of their ‘blue-water’ navy — like the Aegis weapons systems — in no small part is probably due to some of the research and development they were able to get from the United States,” he said.
The danger of Chinese technology acquisition is that if the United States were called on to fight a war with China over the Republic of China (Taiwan), U.S. forces could find themselves battling a U.S.-equipped enemy.
“I would hate for my grandson to be killed with U.S. technology” in a war over Taiwan, senior FBI counterintelligence official Tim Bereznay told a conference earlier this year.
The Chinese intelligence services use a variety of methods to spy, including traditional intelligence operations targeting U.S. government agencies and defense contractors.
Additionally, the Chinese use hundreds of thousands of Chinese visitors, students and other nonprofessional spies to gather valuable data, most of it considered “open source,” or unclassified information.
“What keeps us up late at night is the asymmetrical, unofficial presence,” Mr. Szady said. “The official presence, too. I don’t want to minimize that at all in what they are doing.”
China’s spies use as many as 3,200 front companies — many run by groups linked to the Chinese military — that are set up to covertly obtain information, equipment and technology, U.S. officials say.
- Obama administration issues permits for wind farms to kill more eagles
- Spike in battlefield deaths linked to restrictive rules of engagement
- Bill OReilly reminds: Nelson Mandela was a communist
- Kill team: Obama war chiefs widen drone death zones
- Rush Limbaugh: Obama trying to make Mandela death about himself
- Obama: Hole U.S. 'digging out of' requires billions more in unemployment benefits
- PRUDEN: British press horrified as London's new mayor dares to proclaim the truth
- CARSON: Getting to the top by starting at the bottom
- Federal deficit shrinks 20 percent in fiscal 2014
- Colorado judge: Bakery owner discriminated against gay couple
Independent voices from the The Washington Times Communities
Great discoveries in the world of restaurants and chefs fulfill the quest for delicious food and cooking.
Television commentary, reviews, news and nonstop DVR catch-up by Lisa King Dolloff and friends.
Red Alert focuses on the hottest political topics in the nation and calls Americans to action.
History doesn't have to be grim; there is a lot to be learned from the pages of time.
White House pets gone wild!