- No mas: Principal bans Spanish language in intercom announcement
- Hacking software could put ‘zombie drone army’ in user’s hands
- Support for stricter gun laws drops: poll
- 10 whales dead, 41 others stranded in Everglades
- John Boehner faces bipartisan pressure to allow gay-rights vote
- Martin Bashir resigns from MSNBC over ‘ill-judged’ comments about Sarah Palin
- Rep. Duncan Hunter: While Obama prays for Iranian change, U.S. should ready its nukes
- Best company ever? Veteran Beer Co. exists to employ vets, provide quality beer
- Iran official: Sanctions ‘utterly failed’ to stop nuclear program
- ‘Black Santa’ display at IU sparks student outrage
Thefts of U.S. technology boost China’s weaponry
Part I:Chinese dragon awakens
Second of two parts.
China is stepping up its overt and covert efforts to gather intelligence and technology in the United States, and the activities have boosted Beijing’s plans to rapidly produce advanced-weapons systems.
“I think you see it where something that would normally take 10 years to develop takes them two or three,” said David Szady, chief of FBI counterintelligence operations.
He said the Chinese are prolific collectors of secrets and military-related information.
“What we’re finding is that [the spying is] much more focused in certain areas than we ever thought, such as command and control and things of that sort,” Mr. Szady said.
“In the military area, the rapid development of their ‘blue-water’ navy — like the Aegis weapons systems — in no small part is probably due to some of the research and development they were able to get from the United States,” he said.
The danger of Chinese technology acquisition is that if the United States were called on to fight a war with China over the Republic of China (Taiwan), U.S. forces could find themselves battling a U.S.-equipped enemy.
“I would hate for my grandson to be killed with U.S. technology” in a war over Taiwan, senior FBI counterintelligence official Tim Bereznay told a conference earlier this year.
The Chinese intelligence services use a variety of methods to spy, including traditional intelligence operations targeting U.S. government agencies and defense contractors.
Additionally, the Chinese use hundreds of thousands of Chinese visitors, students and other nonprofessional spies to gather valuable data, most of it considered “open source,” or unclassified information.
“What keeps us up late at night is the asymmetrical, unofficial presence,” Mr. Szady said. “The official presence, too. I don’t want to minimize that at all in what they are doing.”
China’s spies use as many as 3,200 front companies — many run by groups linked to the Chinese military — that are set up to covertly obtain information, equipment and technology, U.S. officials say.
- Hola: Boehner prepares to push amnesty bill through House
- Apple wins facial recognition patent for iPhone 6
- Inside China: Nuclear submarines capable of widespread attack on U.S.
- Puerto Rico caravan honoring Paul Walker ends in 6 drunken-driving arrests, 72 speeding tickets
- Kill team: Obama war chiefs widen drone death zones
- Xbox One, Playstation 4 games penalize users for cursing in their own homes
- MILLER: Obamas EPA closing smelter will not affect ammunition supply
- Pentagon may give recruits 'a shot to start over' after shameful social media posts
- Tipsforjesus mystery diner leaves huge tips across America
- U.S. drops 2,000 mice on Guam by parachute to kill snakes
Independent voices from the The Washington Times Communities
Playing Through covers the world of PGA golf, as well as tips your the average golfer to play better.
The only thing broken about our immigration policy has been our collective cowardice as a nation to enforce our current immigration laws
Al Maurer provides a common sense, conservatarian, Constitutional conservative perspective from the battleground state of Colorado
Criticism may not be agreeable, but it is necessary. It fulfills the same function as pain in the human body. It calls attention to an unhealthy state of things.