text
stringlengths
4
429
PAP internal security units can act as light infantry supporting the PLA in local defence
missions. Similarly, the PLA can fill in for the PAP and has done so during the Cultural
Revolution, the Tiananmen Square incident, and flooding of the Yellow River (People's
Armed Police Force Organisation 2007; China's National Defense in 2006; People
s Armed
Police 2005).
Military Intelligence
The General Staff Department carries out staff and operational functions for the PLA and is
responsible for implementing military modernization plans. It serves as the headquarters for
the PLAGF and contains directorates for the PLAN, PLAAF, and SAC, as well as a
department for electronic warfare. The General Staff Department also includes subdepartments for artillery, armoured units, communications, engineering, mobilization,
operations, politics, training, and surveying. Direct control over the four military branches is
sub-divided among the General Staff Department and regional commanders; however the
General Staff Department can assume direct operation control at any time. The General Staff
Department is under the control of the Central Military Commission (General Staff
Department 1997).
The Second Department of the General Staff Headquarters is responsible for collecting
military intelligence. This includes military attach
s at Chinese embassies abroad,
clandestine agents to conduct espionage, and the analysis of publicly available data published
by foreign countries. The Second Department oversees military human intelligence
(HUMINT), open source intelligence (OSINT), and satellite and aerial imagery intelligence
(IMINT) which it disseminates to the Central Military Commission and various branches.
The Second Department has increased its focus on scientific and technological military
intelligence gathering. The Third Department of the General Staff Headquarters is
responsible for monitoring the telecommunications of foreign militaries and producing
reports based on the military information gathered. China operates the most extensive signals
intelligence (SIGINT) network of all the countries in the Asia-Pacific region. Since the
1950s, the Second and Third Departments have maintained a number of secondary and higher
learning institutions for producing recruits, particularly in foreign languages. The Third
Department not only intercepts communication of foreign militaries, but also those of the
PLA, thereby maintaining control and supervision over the different branches and
commanders within all of the military regions (Second Intelligence Department 2005,
General Staff Department 1997).
Other branches of the General Staff Department include the Fourth Department and the
General Political Department (GPD). The Fourth Department (ECM and Radar) is
responsible for electronic intelligence (ELINT) including electronic countermeasures and
maintaining databases on electronic signals. The GPD is responsible for overseeing the
political education required for advancement within the PLA and controls the PLA
s internal
prison system. The International Liaison Department, a branch within the GPD, conducts
propaganda, psychological operations (PSYOPS), and counter-espionage against foreign
intelligence. As with the PAP, many of the departments within the General Staff Department
appear to have significant overlap. The structural details are beyond the scope of this study;
however, they are worth noting, as they pertain to the discussion below of cyber warfare.
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
Technology Transfer
China continues to pursue the acquisition of foreign military technology. Beijing is in
ongoing negotiations with Moscow to obtain multiple weapons systems, and in 2007 signed
arms agreements worth $150 million. Israel has previously supplied advanced military
technology to China. However, under pressure from the US, Israel began to implement strict
military export regulations. China is attempting to remove an embargo placed on lethal
military export from the EU. This embargo was a response to the Tiananmen Square
incident. Opinion on removing the embargo remains divided among EU member states.
According to the 2008 Annual Report to Congress on China
s Military:
China continues a systematic effort to obtain dual-use and military technologies from abroad
through legal and illegal commercial transactions. Many dual-use technologies, such as
software, integrated circuits, computers, electronics, semiconductors, telecommunications,
and information security systems, are vital for the PLA
s transformation into an informationbased, network-enabled force.
Between 1995 and 2008, several high profile cases of Chinese espionage against the US
surfaced. These attempts targeted aerospace programs, space shuttle design, F-16 design,
submarine propulsion, C4ISR data, high-performance computers, nuclear weapons design,
cruise missile data, semiconductors, integrated circuit design, and details of US arms sales to
Taiwan.
Targeted organisations include Northrop Grumman, NASA, Los Alamos
Laboratories, Boeing, Lockheed Martin, Sun Microsystems, and various defence installations.
The Chinese do not limit themselves to high value targets or an elite group of agents. They
obtain any data which may be of value, including legally obtained documents or OSINT,
which may help them piece together the larger picture. China utilizes a decentralized
network of students, business people, scientists, diplomats, and engineers from within the
Chinese Diaspora. The majority of these individuals have legitimate purposes within the host
state; however they are recruited at a later date, or asked for small pieces of information or
favours which can seem harmless in scope to the individual. Attempts are also made to
purchase interests within high technology companies, as well as win political favour with
government officials. For example, there have been repeated allegations that President Bill
Clinton
s decision to sell sophisticated computer and satellite technology to China was
influenced by campaign contributions (Appel 2004; Cooper 2006; Grier 2005; Jordan 2008;
Warrick and Johnson 2008; Lynch 2007; Cox Report 1999; McLaughlin 1999; PRC
Acquisitions of US Technology 1998).
China
s use of espionage to obtain foreign military technology is not restricted to the US. In
2007, the head of a Russian rocket and space technology company was sentenced to 11 years
for passing sensitive information to China. An alleged agent who defected in Belgium
claimed hundreds of Chinese spies were working within Europe
s industries. These
allegations coincided with an arrest in France for illegal database intrusion of the automotive
components manufacturer Valeo, and a guest researcher in Sweden arrested for stealing
unpublished and unpatented research. Further, Chinese diplomat Chen Yonglin defected to
Australia in 2005, claiming there were over 1,000 Chinese secret agents and informants
within Australia (Luard 2005; Isachenkov 2007). Espionage and technology transfer prosper
in cyber warfare, where being physically present is not required, and attribution becomes
increasingly difficult. It also falls in line with China
s strategy of leapfrogging. By acquiring
foreign military knowledge, China can quickly catch up and begin working at a comparable
level, rather than investing the large amounts of time and effort it would take to acquire this