- Pregnancies decline overall, up among older women
- Pentagon plans to destroy Syrian chemical arms on ship at sea
- Paris Metro issues ‘politeness manual’ to improve passengers’ behavior
- Justin Bieber, crew detained at Australian airport in drug search
- Lee Rigby trial: Muslim who machete-hacked soldier calls it ‘humane’ kill
- GM ending Chevy sales in Europe to focus on Opel and Vauxhall
- Putin’s diplomats to U.S. busted for living high life off $1.5M bilked from Medicaid
- Happy Meal: Couple goes to McDonald’s, leaves with bag packed with cash
- Boehner: It took me 3 to 4 hours to sign up for Obamacare
- Oh my God! Costco lists Bible as fiction, Ron Burgundy memoir as gospel
Thefts of U.S. technology boost China’s weaponry
Part I:Chinese dragon awakens
Second of two parts.
China is stepping up its overt and covert efforts to gather intelligence and technology in the United States, and the activities have boosted Beijing’s plans to rapidly produce advanced-weapons systems.
“I think you see it where something that would normally take 10 years to develop takes them two or three,” said David Szady, chief of FBI counterintelligence operations.
He said the Chinese are prolific collectors of secrets and military-related information.
“What we’re finding is that [the spying is] much more focused in certain areas than we ever thought, such as command and control and things of that sort,” Mr. Szady said.
“In the military area, the rapid development of their ‘blue-water’ navy — like the Aegis weapons systems — in no small part is probably due to some of the research and development they were able to get from the United States,” he said.
The danger of Chinese technology acquisition is that if the United States were called on to fight a war with China over the Republic of China (Taiwan), U.S. forces could find themselves battling a U.S.-equipped enemy.
“I would hate for my grandson to be killed with U.S. technology” in a war over Taiwan, senior FBI counterintelligence official Tim Bereznay told a conference earlier this year.
The Chinese intelligence services use a variety of methods to spy, including traditional intelligence operations targeting U.S. government agencies and defense contractors.
Additionally, the Chinese use hundreds of thousands of Chinese visitors, students and other nonprofessional spies to gather valuable data, most of it considered “open source,” or unclassified information.
“What keeps us up late at night is the asymmetrical, unofficial presence,” Mr. Szady said. “The official presence, too. I don’t want to minimize that at all in what they are doing.”
China’s spies use as many as 3,200 front companies — many run by groups linked to the Chinese military — that are set up to covertly obtain information, equipment and technology, U.S. officials say.
- 'Hunger Games' delivers Obama's message on income inequality: liberal group
- CARSON: Getting to the top by starting at the bottom
- Hack attack: 2 million Facebook, Twitter passwords stolen
- Obama returns to class warfare as poll numbers plunge
- Russian diplomats busted bilking $1.5 million from Medicaid
- NAPOLITANO: Pope Francis should be saving souls, not pocketbooks
- CURL: 'Mission Accomplished' for Obamacare
- Democratic infighting erupts over 'we can have it all' fantasy on entitlements
- Inside China: Nuclear submarines capable of widespread attack on U.S.
- President Obama acknowledges living with illegal immigrant uncle: report
Independent voices from the The Washington Times Communities
NFL junkie Eric Golub reports on his favorite obsession. There is no football offseason. Every February he pretends to care about other sports while sobbing uncontrollably each Sunday until September.
All of the world’s problems, solved on your back porch
Brazen, leading-edge, “call it like it is” columns and reporting from Ohio native, radio host and writer, Sara Marie Brenner.
Entertainment News and Reviews from Washington, D.C. and beyond.
White House pets gone wild!