- Secret base U.S. special forces used to train Libyans now under terrorist control: report
- 9th suspect in N.C. kidnapping turns self in to FBI
- L.A. sheriff admits to testing flyover spy program without notifying residents
- Foreign minister vows response if Russians are attacked in Ukraine
- Robert Griffin III to drive pace car before Richmond NASCAR race
- Material on Australian shore examined in jet hunt
- Bomb, shooting in Egypt kills 2 police officers
- Tenn. woman receives two-year sentence for stealing $364K meant for homeless veterans
- School bus driver gets probation after kicking autistic girl, 8
- Ex-Army Ranger petitions to keep tan beret off certain soldiers’ heads
Thefts of U.S. technology boost China’s weaponry
Part I:Chinese dragon awakens
Second of two parts.
China is stepping up its overt and covert efforts to gather intelligence and technology in the United States, and the activities have boosted Beijing’s plans to rapidly produce advanced-weapons systems.
“I think you see it where something that would normally take 10 years to develop takes them two or three,” said David Szady, chief of FBI counterintelligence operations.
He said the Chinese are prolific collectors of secrets and military-related information.
“What we’re finding is that [the spying is] much more focused in certain areas than we ever thought, such as command and control and things of that sort,” Mr. Szady said.
“In the military area, the rapid development of their ‘blue-water’ navy — like the Aegis weapons systems — in no small part is probably due to some of the research and development they were able to get from the United States,” he said.
The danger of Chinese technology acquisition is that if the United States were called on to fight a war with China over the Republic of China (Taiwan), U.S. forces could find themselves battling a U.S.-equipped enemy.
“I would hate for my grandson to be killed with U.S. technology” in a war over Taiwan, senior FBI counterintelligence official Tim Bereznay told a conference earlier this year.
The Chinese intelligence services use a variety of methods to spy, including traditional intelligence operations targeting U.S. government agencies and defense contractors.
Additionally, the Chinese use hundreds of thousands of Chinese visitors, students and other nonprofessional spies to gather valuable data, most of it considered “open source,” or unclassified information.
“What keeps us up late at night is the asymmetrical, unofficial presence,” Mr. Szady said. “The official presence, too. I don’t want to minimize that at all in what they are doing.”
China’s spies use as many as 3,200 front companies — many run by groups linked to the Chinese military — that are set up to covertly obtain information, equipment and technology, U.S. officials say.
Feds who send arms against ranch families betray American values
- Nevada rancher Cliven Bundy hailed as patriot, ripped as lawless deadbeat
- CARSON: When government looks more like foe than friend
- Pentagon plans to replace flight crews with 'full-time' robots
- America is an oligarchy, not a democracy or republic, university study finds
- Texas is next! AG warns BLM wants 90,000 acres after Bundy ranch standoff
- IRS revokes conservative group's tax-exempt status over anti-Clinton statements: report
- Tactical advantage: Russian military shows off impressive new gear
- Justice Dept.'s new clemency guidelines: Crack offenders most obvious candidates
- Ukraine claims torture by pro-Russian forces on the heels of Biden's stern warning to Moscow
- EDITORIAL: Voting with one's feet shows folly of liberal economic policies
Top 10 handguns in the U.S.
Celebrity deaths in 2014