- Obama military downsizing leaves U.S. too weak to counter global threats, panel finds
- Sen. Tom Coburn vows to slow down budget-busting bills ahead of recess
- Obama fantasizes about more executive power, signs new order on federal contractors
- Clintons call Klein, Halper, Kessler ‘a Hat Trick of despicable actors’: report
- Boehner accuses Obama of ‘legacy of lawlessness’
- Pro-marijuana group claims responsibility for Brooklyn Bridge flag swap
- Young adults shun Obamacare mostly due to cost: survey
- Stabbing attack on transgender girl, 15, was ‘bias motivated,’ police say
- LGBT adults still lean overwhelmingly toward Democratic Party
- Lawmakers rattled by Syria genocide horrors, call on Obama to act
Thefts of U.S. technology boost China’s weaponry
Question of the Day
Part I:Chinese dragon awakens
Second of two parts.
China is stepping up its overt and covert efforts to gather intelligence and technology in the United States, and the activities have boosted Beijing’s plans to rapidly produce advanced-weapons systems.
“I think you see it where something that would normally take 10 years to develop takes them two or three,” said David Szady, chief of FBI counterintelligence operations.
He said the Chinese are prolific collectors of secrets and military-related information.
“What we’re finding is that [the spying is] much more focused in certain areas than we ever thought, such as command and control and things of that sort,” Mr. Szady said.
“In the military area, the rapid development of their ‘blue-water’ navy — like the Aegis weapons systems — in no small part is probably due to some of the research and development they were able to get from the United States,” he said.
The danger of Chinese technology acquisition is that if the United States were called on to fight a war with China over the Republic of China (Taiwan), U.S. forces could find themselves battling a U.S.-equipped enemy.
“I would hate for my grandson to be killed with U.S. technology” in a war over Taiwan, senior FBI counterintelligence official Tim Bereznay told a conference earlier this year.
The Chinese intelligence services use a variety of methods to spy, including traditional intelligence operations targeting U.S. government agencies and defense contractors.
Additionally, the Chinese use hundreds of thousands of Chinese visitors, students and other nonprofessional spies to gather valuable data, most of it considered “open source,” or unclassified information.
“What keeps us up late at night is the asymmetrical, unofficial presence,” Mr. Szady said. “The official presence, too. I don’t want to minimize that at all in what they are doing.”
China’s spies use as many as 3,200 front companies — many run by groups linked to the Chinese military — that are set up to covertly obtain information, equipment and technology, U.S. officials say.
Both parties recognize the Democrats' scam
- Inside the Ring: Israel surprised by Hamas tunnel network
- CRUZ: A tale of two hospitals: One in Israel, one in Gaza
- Chicken pox outbreak puts illegal immigrant facility on lockdown
- Sarah Palin's online channel hits snag as Stephen Colbert buys similar URL
- Obama military strategy too weak for future security, panel reports
- CIA admits improperly hacking Senate computers in search of Bush-era information
- 3 African leaders cancel trip to U.S. over Ebola outbreak; Obama still plans summit
- Colorado poll shows women tuning out Democrats' 'war on women' strategy
- Report: 40% of weapons sent to Afghanistan are unaccounted for
- House votes to sue President Obama over claims of presidential power
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world