Chinese Industrial Espionage

Chinese Industrial Espionage : Technology Acquisition and Military Modernisation

3.63 (19 ratings by Goodreads)
By (author)  , By (author)  , By (author) 
Free delivery worldwide Expected delivery to the United States in 9-14 business days.
Not ordering to the United States? Click here.
Order now for expected delivery to the United States by Christmas Order now for expected delivery to the United States by Christmas

Description

This new book is the first full account, inside or outside government, of China's efforts to acquire foreign technology.


Based on primary sources and meticulously researched, the book lays bare China's efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods-without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history."


Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People's Republic of China's policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.


This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
show more

Product details

  • Hardback | 302 pages
  • 156 x 234 x 20.32mm | 680g
  • Routledge
  • London, United Kingdom
  • English
  • 1 Line drawings, black and white; 7 Tables, black and white
  • 041582141X
  • 9780415821414
  • 2,329,334

Table of contents

Introduction 1. China's History of Relying on Western Technology 2. China's Use of Open Sources 3. Trade for Technology 4. PRC-based Technology Transfer Organizations 5. US-based Technology Transfer Organizations 6. China's Foreign Students in the United States 7. Bringing Technology 'Back' to China 8. Traditional Chinese Espionage 9. Chinese Cyber Espionage 10. Chinese Industrial Espionage in Context Conclusion Appendices
show more

Review Text

‘In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times


'This book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications.' -- Foreign Affairs
show more

Review quote

'In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times


'This book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications.' -- Foreign Affairs
show more

About William C. Hannas

William C. Hannas has an MA from the University of Chicago in Chinese and a PhD from the University of Pennsylvania in Asian languages. He served with the US Navy and Joint Special Operations Command, taught at Georgetown University, and holds a senior executive position in a component of the US federal government. Hannas is author of Asia's Orthographic Dilemma (1997) and The Writing on the Wall: How Asian Orthography Curbs Creativity (2003).





James Mulvenon is Vice-President of Defense Group, Inc.'s Intelligence Division and Director of DGI's Center for Intelligence Research and Analysis. Trained as a Chinese linguist, he is a leading expert on Chinese cyber issues, and has published widely on Chinese military affairs, party-army relations, C4ISR, and nuclear weapons doctrine and organizations. He has a PhD in political science from the University of California, Los Angeles, and is author of Soldiers of Fortune (2000).





Anna B. Puglisi has an MPA and MS in environmental science from Indiana University, has worked in research and technical infrastructure, and now holds a senior analyst position in a component of the US federal government. Ms. Puglisi studied at the Princeton in Beijing Chinese language school and was a visiting scholar in Nankai University's Department of Economics, where she studied China's S&T policies, infrastructure development, and university reforms.
show more

Rating details

19 ratings
3.63 out of 5 stars
5 32% (6)
4 21% (4)
3 32% (6)
2 11% (2)
1 5% (1)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X