SlideShare a Scribd company logo
1 of 23
Download to read offline
Cyber and Beyond
The Inner Workings of Chinese Espionage
Overt Structure & Operations
Joshua Philipp
National Security Reporter
Epoch Times
joshua.philipp@epochtimes.com
A Surface Look
“China has had a long reach into the
Chinese community in the United States for
quite some time, and frequently uses this
community for espionage, both within the
community itself and against American
companies, the military and the technology
and political spheres.”
● Chinese Consulate involvement
● Local businesses
● Social organizations
● Chinese student groups
● Chinese media
● Highly organized
● Participants paid cash
Central Committee of the
Chinese Communist Party
United Front
Department (UFD)
State Council
Overseas Chinese
Affairs Office (OCAO)
Consulates &
Embassies
Tongs & Hometown
Associations
Chinese Student and
Scholar Associations (CSSA)
Triads & Street Gangs
Overt Espionage Structure
Overall Goals
● Create “united front” of Chinese in foreign countries
● Gain governance of overseas Chinese communities
● Push CCP narrative, while suppressing others
● Alter perceptions and allegiances
● Using indirect systems to pressure or influence government and
media, in order to affect US policy on China
● Mobilize front groups for political purposes, create pressure or
support where needed, use this for propaganda inside and outside
China
● Recruit or plant foreign agents and insiders
Overseas Governance
"Control of the Chinese community is the
CCP's consistent foreign policy. It has been
a 'painstaking effort' over the past decades,
and has a certain scale. It is a pyramid-like
structure and system. They manipulate
Chinese people in the name of 'unite
overseas Chinese.' "
- Chen Yonglin
● Used Chinese students as special agents
● Control overseas Chinese media, provide
financial support using advertisements from
Chinese companies
● Pressure western politicians if they help
Chinese dissidents, keep records of
politicians which can impact ability to travel
to China
Leaked documents from the Chinese Consulate
in Sydney, provided to Epoch Times in 2007 by
former Chinese diplomat Chen Yonglin.
Overseas Chinese Affairs Office
● Helps manage systems of overseas
governance, with Consulates / Embassies
functioning like city governments
● Helps build strategies and narrative
●
Target Chinese immigrants, 2nd
and 3rd
generation Chinese, and Chinese
immigrants with wealth or specialized skills
● Monitor and build databases on Chinese
immigrants
● Assist embassies and consulates with PR
efforts to Chinese community
● Build relations with Chinese immigrants
running media, cultural organizations, and
Chinese schools; and support their work.
“The target of overseas
Chinese Affairs is Chinese
who are living overseas
and those who were
nationalized as foreign
nationals.”
- Jiang Zemin
United Front Department
(formerly called the “United Front Work Department”)
● Expand the governance of the
Chinese Communist Party into
overseas Chinese communities
● Approach Tongs / hometown
associations and sway allegiances,
offer incentives
● Offer incentives to change
allegiances
● Target community leaders, business
elite, people with power
“The united front, the armed
struggle, and party building are
the three magic weapons of the
Chinese Communist Party to
defeat enemies in the Chinese
revolution.
- Mao Zedong, October 4, 1939,
first edition of “The Communists”
“Party committees at every
level should include the united
front in their agenda.”
- Deng Xiaoping, August 15, 1979,
14th national conference on united
front work
Political Influence
Rose Pak
● “De facto head” of San Francisco's
Chinese Chamber of Commerce
● An overseas director of the China
Overseas Exchange Association
(COEA), which is directly under the
Overseas Chinese Affairs Office
● Allegations she controls local elections
on behalf of moneyed mainland
Chinese interests.
“COEA’s leadership is composed
entirely of Chinese Communist Party
officials representing various foreign
affairs and 'overseas propaganda'
agencies of the Chinese government.”
Harassment & Surveillance
“Chinese operatives
and consular officials
are actively engaged
in the surveillance
and harassment of
Chinese dissident
groups on U.S. soil.”
Pressuring to Spy
Mr. Qurban said Chinese agents detained
him in China, pressured him to send reports
on Uyghurs in Canada to Chinese
operatives living there.
“They said, ‘People like you are our
enemies. We will wipe you out for sure.’”
“They said, ‘We have special people there.
All you have to do is give the information to
them.’”
Source: http://www.rfa.org/english/news/uyghur/canadian-04242015121248.html
Silencing Unwanted Voices
“They said they can make me disappear ...
It’s very common knowledge. If you speak
about the Chinese Communist Party, even
among co-workers, they’ll tell you to watch
what you say.”
- Judy Chen, 55, Taiwanese immigrant living
in Flushing, Queens
“All the Chinese people know it.”
(Paraphrasing) On the local level, the
Chinese regime often uses its influence
over Chinese community organizations and
student groups to carry out its work.
- Tang Baiqiao, founder of Democracy
Academy of China
“Each of these programs looks to
foreign collaboration and technologies
to cover key gaps.”
They encourage Western-trained
experts to help the CCP's technological
development by returning to China or
by “serving in place.”
- “China’s Industrial Espionage: Technology
Acquisition and Military Modernization”
(Book), by William C. Hannas, James
Mulvenon, and Anna B. Puglisi
Programs for Economic Theft
Official Programs Include:
● Project 863
● Torch Program
● 973 Program
● 211 Program
Economic Theft
“China's National Technology Transfer Centers”
aka “National Demonstration Centers”
“ We are talking here of an elaborate,
comprehensive system for spotting
foreign technologies, acquiring them by
every means imaginable, and
converting them into weapons and
competitive goods.”
- “China’s Industrial Espionage: Technology
Acquisition and Military Modernization”
(Book), by William C. Hannas, James
Mulvenon, and Anna B. Puglisi
● 202 centers work as “models for
emulation by other transfer facilities.”
These Include:
● Science and Technology Office under
the Overseas Chinese Affairs Office
● State Administration of Foreign Experts
Affairs under the State Council
● National Technology Transfer Center
under the East China University of
Science and Technology
The Tongs
● Not all bad
● Varying allegiances
● Many with very large memberships
(some claim hundreds of thousands)
● Some associated with Triads and street
gangs, with varying allegiances
● The United Front Department targets
them for their influence in Chinese
● After targeted, they act on behalf of the
Chinese Communist Party
● Mobilized along with members for
political or ideological purposes
● Use influence to control Chinese
communities
● Use influence to affect foreign politics,
law enforcement, and news coverage
● Highly useful for finding insiders in
targeted industries
Tongs Working With Overseas
Chinese Affairs Office
Case found guilty, and sentenced Xing Wu
(Oliver) Pan & Jenny Hou for crimes
including attempted wire fraud in John Liu's
(former NYC comptroller) campaign.
● Xing Wu (Oliver) Pan, executive vice
director of the Fukien American Association,
and the United Fujianese American
Association
● Jenny Hou's father is Hou Jianli, president
of the Beijing Township Association
● Met with then-vice president of the
Overseas Chinese Affairs Office, Xu
Yousheng, during 2007 trip to China,
escorted by tong leaders including Hou
Jianli.
Triads & Street Gangs
“Once that organization, the Fukien
American Association, became one of the
leading [China]-supported organizations,
they became the host of almost all these
Chinese officials who are visiting New York.”
- Ko-lin Chin, Professor, Rutgers School of
Criminal Justice, interview with Epoch Times
“The Fuk Ching, for example, are affiliated
with the Fukien American Association ...
They allow the gang to operate on their (the
tong’s) territory, thus legitimizing them with
the community.”
- “Chinese Transnational Organized Crime: The
Fuk Ching,” by James O. Finckenauer, Ph.D.,
International Center, National Institute of Justice
● Used for strong-arm tactics
● Used when violence is needed
● Valuable for smuggling channels
● Drug warfare, culture warfare, etc
The Triads in Action
“The Chinese Communist Party ...
has teamed up with a notorious
triad figure to help press its claims
in Taiwan.”
● Chang An-lo aka “White Wolf”
● Convicted kidnapper, extortionist,
and heroin trafficker
● Mobilizes aggressive protests to
intimidate pro-democracy activists
in Taiwan
The Triads in Action
“This is one of the tactics used by the
communists in mainland China from
time to time. They use triads or pro-
government mobs to try to attack you
so the government will not have to
assume responsibility.”
- Albert Ho, pro-democracy lawmaker
● Attacks on pro-democracy protesters
● Triads involved
● Rumors of Chinese Communist Party
orchestrating
Chinese Student and Scholar
Associations (CSSA)
“The Consulate provides funding and
resources to each CSSA, which
amounts to tremendous assistance, for
this resolves all financial worries the
student organization might otherwise
have.”
– Blog by Chinese student in Canada, “Current
situation and development of Chinese Student
Association in Canadian Universities”, study in
Canada blog (Accessed July 19, 2007)
“The vast majority of CSSAs receive
funding from the Chinese government
or have an active liaison via the
consulate back to the CCP.”
– ICIT report
● Students mobilized for political or
ideological purposes
● Act on behalf of the CCP within their
universities
● Students groomed as spies in targeted
positions, such as specific industries,
government jobs, or government
internships
The System at Work ...
“China is building large covert spy
networks inside Australia's leading
universities, prompting Australia to
strengthen its counter-intelligence
capabilities.”
● CCP building covert spy networks
in Australia's leading universities
● Spying on ethnic Chinese
● Censoring information unfavorable
to the Chinese Communist Party
Key Takeaways
● The CCP is taking advantage of the open system of the United
States
● The CCP views overseas Chinese and their communities as
part of China. This includes 2nd
and 3rd
generation immigrants
● Active intimidation in Chinese communities, which creates
perception Chinese communities of being monitored and at risk
– don't feel protection of US government
● Use of controlled overseas groups for political or ideological
mobilization – protests appear spontaneous, but being
orchestrated
● Efforts to influence US politics
Select Sources
– https://www.stratfor.com/weekly/terrorism_weekly_april_16
– http://www.japantimes.co.jp/news/2014/10/15/asia-pacific/politics-diploAmacy-asia-pacific/masked-thugs-hong-kong-rallies-revive-citys-triad-reputation/
– http://www.smh.com.au/national/chinese-spies-keep-eye-on-leading-universities-20140420-36yww.htm
– http://www.upholdjustice.org/node/181
– http://www.edu.cn/xiang_guan_lian_jie/zheng_fu/gwy_qiao_wu_ban.htm
– http://xcb.cumt.edu.cn/kddj/tzgz/ql/ldzs/_index.htm
– http://www.zytzb.org.cn/zytzbwz/theory/lilun/80200212170099.htm
– http://xcb.cumt.edu.cn/kddj/tzgz/ql/ldzs/_index.htm
– http://www.ynzxb.cn/2006/11-21/09331683794.htm
– http://www.tongxin.org/j-sys-news/page/2003/618/1674_552.shtml
– http://icitech.org/icit-brief-chinas-espionage-dynasty-economic-death-by-a-thousand-cuts/
– http://chinascope.org/main/content/view/4838/104/
– http://www.zytzb.cn/publicfiles/business/htmlfiles/tzb2010/S1815/201209/731224.html
– http://chinascope.org/main/content/view/2754/104/
– http://www.chinanews.com.cn/zgqj/2010/06-29/2370881.shtml
– http://www.upholdjustice.org/node/252#report252_4
– https://www.amazon.com/Chinese-Industrial-Espionage-Acquisition-Modernisation/dp/0415821428
– http://www.theepochtimes.com/n3/1737917-investigative-report-china-theft-incorporated/
– http://www.theepochtimes.com/n3/790894-chinese-expats-monitored-harassed-in-nyc/
– https://www.usnwc.edu/Departments---Colleges/Center-for-Naval-Warfare-Studies/Warfare-Analysis-and-Research/Readings-and-Refences/U-S--China-Economic-and-Security-
Review-Commision.aspx
– https://www.ncjrs.gov/pdffiles1/nij/218463.pdf
– http://www.theepochtimes.com/n3/254901-in-backing-disgraced-treasurer-john-liu-sticks-close-to-beijing/
– http://dailysignal.com/2015/04/13/columbia-shut-down-student-group-known-to-be-beijing-front-group-what-does-that-mean/
– http://www.upholdjustice.org/node/172
– http://www.smh.com.au/world/chinas-rulers-team-up-with-notorious-white-wolf-of-taiwan-20140711-zt488.html
– http://foreignpolicyblogs.com/2016/06/09/beijing-hidden-influence-san-francisco/
The Inner Workings of Chinese Espionage
Overt Structure & Operations
Questions / Feedback
Joshua Philipp
joshua.philipp@epochtimes.com
Cyber and Beyond

More Related Content

What's hot

Wisp Assignment 2 China T46
Wisp Assignment 2   China T46Wisp Assignment 2   China T46
Wisp Assignment 2 China T46
Yuan Shenghai
 
Nepal’s Foreign Policy 2
Nepal’s Foreign Policy 2Nepal’s Foreign Policy 2
Nepal’s Foreign Policy 2
Keshab Giri
 
Chinese Peacekeeping in Africa
Chinese Peacekeeping in AfricaChinese Peacekeeping in Africa
Chinese Peacekeeping in Africa
George Kleuser
 
Security challenges of pakistan
Security challenges of pakistanSecurity challenges of pakistan
Security challenges of pakistan
Ujala Shaikh
 
Insurgency in north east
Insurgency in north eastInsurgency in north east
Insurgency in north east
Dusmant Parida
 
China after mao MYP 5.
China after mao MYP 5.China after mao MYP 5.
China after mao MYP 5.
Ryan Maxwell
 

What's hot (19)

Cyberwar
CyberwarCyberwar
Cyberwar
 
Challenges Facing Sending Countries (China, India, the Philippines, and Thail...
Challenges Facing Sending Countries (China, India, the Philippines, and Thail...Challenges Facing Sending Countries (China, India, the Philippines, and Thail...
Challenges Facing Sending Countries (China, India, the Philippines, and Thail...
 
China and the Communist Party
China and the Communist PartyChina and the Communist Party
China and the Communist Party
 
Wisp Assignment 2 China T46
Wisp Assignment 2   China T46Wisp Assignment 2   China T46
Wisp Assignment 2 China T46
 
Nepal’s Foreign Policy 2
Nepal’s Foreign Policy 2Nepal’s Foreign Policy 2
Nepal’s Foreign Policy 2
 
Crj 117 global war of terror.b
Crj 117 global war of terror.bCrj 117 global war of terror.b
Crj 117 global war of terror.b
 
Chinese Peacekeeping in Africa
Chinese Peacekeeping in AfricaChinese Peacekeeping in Africa
Chinese Peacekeeping in Africa
 
Pakistan – the problems and solutions regarding terrorism and 4thGW
Pakistan – the problems and solutions regarding terrorism and 4thGWPakistan – the problems and solutions regarding terrorism and 4thGW
Pakistan – the problems and solutions regarding terrorism and 4thGW
 
External challenges to pakistan
External challenges to pakistanExternal challenges to pakistan
External challenges to pakistan
 
Country report on semi-structured interviews with temporary migrants - Ukraine
Country report on semi-structured interviews with temporary migrants - UkraineCountry report on semi-structured interviews with temporary migrants - Ukraine
Country report on semi-structured interviews with temporary migrants - Ukraine
 
China's Public Diplomacy
China's Public DiplomacyChina's Public Diplomacy
China's Public Diplomacy
 
Security challenges of pakistan
Security challenges of pakistanSecurity challenges of pakistan
Security challenges of pakistan
 
Insurgency in north east
Insurgency in north eastInsurgency in north east
Insurgency in north east
 
Deng Xiaoping Reforms: Changes and Challenges
Deng Xiaoping Reforms: Changes and ChallengesDeng Xiaoping Reforms: Changes and Challenges
Deng Xiaoping Reforms: Changes and Challenges
 
ZIA ERA .pptx
ZIA ERA .pptxZIA ERA .pptx
ZIA ERA .pptx
 
THE MOBILIZATION OF WOMEN IN POLITICS
THE MOBILIZATION OF WOMEN IN POLITICSTHE MOBILIZATION OF WOMEN IN POLITICS
THE MOBILIZATION OF WOMEN IN POLITICS
 
FATA and Pakistan
FATA and  PakistanFATA and  Pakistan
FATA and Pakistan
 
China after mao MYP 5.
China after mao MYP 5.China after mao MYP 5.
China after mao MYP 5.
 
The Arab Spring
The Arab Spring The Arab Spring
The Arab Spring
 

Viewers also liked

Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
Bill Hagestad II
 
Space Syntax
Space SyntaxSpace Syntax
Space Syntax
victorabe
 
Practical application of cyber methodology - Lior Pollack v3.5
Practical application of cyber methodology - Lior Pollack v3.5Practical application of cyber methodology - Lior Pollack v3.5
Practical application of cyber methodology - Lior Pollack v3.5
Lior Pollack
 
Stuxnet - the worm and you
Stuxnet - the worm and youStuxnet - the worm and you
Stuxnet - the worm and you
Iftach Ian Amit
 
מצגת אילנית
מצגת אילניתמצגת אילנית
מצגת אילנית
pisga
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
Nicholas Poole
 

Viewers also liked (18)

Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
CRS CHINA MILITARY REPORT
CRS CHINA MILITARY REPORT CRS CHINA MILITARY REPORT
CRS CHINA MILITARY REPORT
 
Space Syntax
Space SyntaxSpace Syntax
Space Syntax
 
Infographic country risk map q4 15
Infographic country risk map q4 15Infographic country risk map q4 15
Infographic country risk map q4 15
 
5580
55805580
5580
 
Practical application of cyber methodology - Lior Pollack v3.5
Practical application of cyber methodology - Lior Pollack v3.5Practical application of cyber methodology - Lior Pollack v3.5
Practical application of cyber methodology - Lior Pollack v3.5
 
Stuxnet - the worm and you
Stuxnet - the worm and youStuxnet - the worm and you
Stuxnet - the worm and you
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
מצגת אילנית
מצגת אילניתמצגת אילנית
מצגת אילנית
 
אלכוהול
אלכוהולאלכוהול
אלכוהול
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 

Similar to Cyber and Beyond: The Inner Workings of Chinese Espionage

China - Media A2 - Georgina Rees & Kirby Sztanko
China  - Media A2 - Georgina Rees & Kirby SztankoChina  - Media A2 - Georgina Rees & Kirby Sztanko
China - Media A2 - Georgina Rees & Kirby Sztanko
georginarees96
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 
Are NGOs and the UN natural allies?
Are NGOs and the UN natural allies?Are NGOs and the UN natural allies?
Are NGOs and the UN natural allies?
fm288
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
randima Dulanjani
 
Interpersonal Paper Assignment After watching a film .docx
Interpersonal Paper Assignment  After watching a film .docxInterpersonal Paper Assignment  After watching a film .docx
Interpersonal Paper Assignment After watching a film .docx
vrickens
 

Similar to Cyber and Beyond: The Inner Workings of Chinese Espionage (20)

Short History of U.S. Public Diplomacy
Short History of U.S. Public DiplomacyShort History of U.S. Public Diplomacy
Short History of U.S. Public Diplomacy
 
China - Media A2 - Georgina Rees & Kirby Sztanko
China  - Media A2 - Georgina Rees & Kirby SztankoChina  - Media A2 - Georgina Rees & Kirby Sztanko
China - Media A2 - Georgina Rees & Kirby Sztanko
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
2019 Ambassador Leaders Community Action Plan - TAKIN
2019 Ambassador Leaders Community Action Plan - TAKIN2019 Ambassador Leaders Community Action Plan - TAKIN
2019 Ambassador Leaders Community Action Plan - TAKIN
 
History of american pd v2
History of american pd v2History of american pd v2
History of american pd v2
 
Punching Nazis: History, Tactics & Philosophy of Antifascism
Punching Nazis: History, Tactics & Philosophy of AntifascismPunching Nazis: History, Tactics & Philosophy of Antifascism
Punching Nazis: History, Tactics & Philosophy of Antifascism
 
Are NGOs and the UN natural allies?
Are NGOs and the UN natural allies?Are NGOs and the UN natural allies?
Are NGOs and the UN natural allies?
 
History of American PD - version 3
History of American PD - version 3History of American PD - version 3
History of American PD - version 3
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
Interest Meeting PowerPoint
Interest Meeting PowerPointInterest Meeting PowerPoint
Interest Meeting PowerPoint
 
History of American Public Diplomacy v4 (Belgrade)
History of American Public Diplomacy v4 (Belgrade)History of American Public Diplomacy v4 (Belgrade)
History of American Public Diplomacy v4 (Belgrade)
 
Short History of U.S. Public Diplomacy
Short History of U.S. Public DiplomacyShort History of U.S. Public Diplomacy
Short History of U.S. Public Diplomacy
 
Understanding China
Understanding ChinaUnderstanding China
Understanding China
 
DRAFT - History of U.S. Public Diplomacy
DRAFT - History of U.S. Public Diplomacy DRAFT - History of U.S. Public Diplomacy
DRAFT - History of U.S. Public Diplomacy
 
Investigation agenda 2
Investigation agenda 2Investigation agenda 2
Investigation agenda 2
 
Five paradoxes of soft power in a post globalization era
Five paradoxes of soft power in a post globalization eraFive paradoxes of soft power in a post globalization era
Five paradoxes of soft power in a post globalization era
 
V2
V2V2
V2
 
Killing Journalists in Philippines
Killing Journalists in PhilippinesKilling Journalists in Philippines
Killing Journalists in Philippines
 
Citizenship Essay. global citizen essay edgar c Citizenship Metacognition
Citizenship Essay. global citizen essay edgar c  Citizenship  MetacognitionCitizenship Essay. global citizen essay edgar c  Citizenship  Metacognition
Citizenship Essay. global citizen essay edgar c Citizenship Metacognition
 
Interpersonal Paper Assignment After watching a film .docx
Interpersonal Paper Assignment  After watching a film .docxInterpersonal Paper Assignment  After watching a film .docx
Interpersonal Paper Assignment After watching a film .docx
 

Recently uploaded

{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
 

Recently uploaded (20)

{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 

Cyber and Beyond: The Inner Workings of Chinese Espionage

  • 1. Cyber and Beyond The Inner Workings of Chinese Espionage Overt Structure & Operations Joshua Philipp National Security Reporter Epoch Times joshua.philipp@epochtimes.com
  • 2. A Surface Look “China has had a long reach into the Chinese community in the United States for quite some time, and frequently uses this community for espionage, both within the community itself and against American companies, the military and the technology and political spheres.” ● Chinese Consulate involvement ● Local businesses ● Social organizations ● Chinese student groups ● Chinese media ● Highly organized ● Participants paid cash
  • 3. Central Committee of the Chinese Communist Party United Front Department (UFD) State Council Overseas Chinese Affairs Office (OCAO) Consulates & Embassies Tongs & Hometown Associations Chinese Student and Scholar Associations (CSSA) Triads & Street Gangs Overt Espionage Structure
  • 4. Overall Goals ● Create “united front” of Chinese in foreign countries ● Gain governance of overseas Chinese communities ● Push CCP narrative, while suppressing others ● Alter perceptions and allegiances ● Using indirect systems to pressure or influence government and media, in order to affect US policy on China ● Mobilize front groups for political purposes, create pressure or support where needed, use this for propaganda inside and outside China ● Recruit or plant foreign agents and insiders
  • 5. Overseas Governance "Control of the Chinese community is the CCP's consistent foreign policy. It has been a 'painstaking effort' over the past decades, and has a certain scale. It is a pyramid-like structure and system. They manipulate Chinese people in the name of 'unite overseas Chinese.' " - Chen Yonglin ● Used Chinese students as special agents ● Control overseas Chinese media, provide financial support using advertisements from Chinese companies ● Pressure western politicians if they help Chinese dissidents, keep records of politicians which can impact ability to travel to China Leaked documents from the Chinese Consulate in Sydney, provided to Epoch Times in 2007 by former Chinese diplomat Chen Yonglin.
  • 6. Overseas Chinese Affairs Office ● Helps manage systems of overseas governance, with Consulates / Embassies functioning like city governments ● Helps build strategies and narrative ● Target Chinese immigrants, 2nd and 3rd generation Chinese, and Chinese immigrants with wealth or specialized skills ● Monitor and build databases on Chinese immigrants ● Assist embassies and consulates with PR efforts to Chinese community ● Build relations with Chinese immigrants running media, cultural organizations, and Chinese schools; and support their work. “The target of overseas Chinese Affairs is Chinese who are living overseas and those who were nationalized as foreign nationals.” - Jiang Zemin
  • 7. United Front Department (formerly called the “United Front Work Department”) ● Expand the governance of the Chinese Communist Party into overseas Chinese communities ● Approach Tongs / hometown associations and sway allegiances, offer incentives ● Offer incentives to change allegiances ● Target community leaders, business elite, people with power “The united front, the armed struggle, and party building are the three magic weapons of the Chinese Communist Party to defeat enemies in the Chinese revolution. - Mao Zedong, October 4, 1939, first edition of “The Communists” “Party committees at every level should include the united front in their agenda.” - Deng Xiaoping, August 15, 1979, 14th national conference on united front work
  • 8. Political Influence Rose Pak ● “De facto head” of San Francisco's Chinese Chamber of Commerce ● An overseas director of the China Overseas Exchange Association (COEA), which is directly under the Overseas Chinese Affairs Office ● Allegations she controls local elections on behalf of moneyed mainland Chinese interests. “COEA’s leadership is composed entirely of Chinese Communist Party officials representing various foreign affairs and 'overseas propaganda' agencies of the Chinese government.”
  • 9. Harassment & Surveillance “Chinese operatives and consular officials are actively engaged in the surveillance and harassment of Chinese dissident groups on U.S. soil.”
  • 10. Pressuring to Spy Mr. Qurban said Chinese agents detained him in China, pressured him to send reports on Uyghurs in Canada to Chinese operatives living there. “They said, ‘People like you are our enemies. We will wipe you out for sure.’” “They said, ‘We have special people there. All you have to do is give the information to them.’” Source: http://www.rfa.org/english/news/uyghur/canadian-04242015121248.html
  • 11. Silencing Unwanted Voices “They said they can make me disappear ... It’s very common knowledge. If you speak about the Chinese Communist Party, even among co-workers, they’ll tell you to watch what you say.” - Judy Chen, 55, Taiwanese immigrant living in Flushing, Queens “All the Chinese people know it.” (Paraphrasing) On the local level, the Chinese regime often uses its influence over Chinese community organizations and student groups to carry out its work. - Tang Baiqiao, founder of Democracy Academy of China
  • 12. “Each of these programs looks to foreign collaboration and technologies to cover key gaps.” They encourage Western-trained experts to help the CCP's technological development by returning to China or by “serving in place.” - “China’s Industrial Espionage: Technology Acquisition and Military Modernization” (Book), by William C. Hannas, James Mulvenon, and Anna B. Puglisi Programs for Economic Theft Official Programs Include: ● Project 863 ● Torch Program ● 973 Program ● 211 Program
  • 13. Economic Theft “China's National Technology Transfer Centers” aka “National Demonstration Centers” “ We are talking here of an elaborate, comprehensive system for spotting foreign technologies, acquiring them by every means imaginable, and converting them into weapons and competitive goods.” - “China’s Industrial Espionage: Technology Acquisition and Military Modernization” (Book), by William C. Hannas, James Mulvenon, and Anna B. Puglisi ● 202 centers work as “models for emulation by other transfer facilities.” These Include: ● Science and Technology Office under the Overseas Chinese Affairs Office ● State Administration of Foreign Experts Affairs under the State Council ● National Technology Transfer Center under the East China University of Science and Technology
  • 14. The Tongs ● Not all bad ● Varying allegiances ● Many with very large memberships (some claim hundreds of thousands) ● Some associated with Triads and street gangs, with varying allegiances ● The United Front Department targets them for their influence in Chinese ● After targeted, they act on behalf of the Chinese Communist Party ● Mobilized along with members for political or ideological purposes ● Use influence to control Chinese communities ● Use influence to affect foreign politics, law enforcement, and news coverage ● Highly useful for finding insiders in targeted industries
  • 15. Tongs Working With Overseas Chinese Affairs Office Case found guilty, and sentenced Xing Wu (Oliver) Pan & Jenny Hou for crimes including attempted wire fraud in John Liu's (former NYC comptroller) campaign. ● Xing Wu (Oliver) Pan, executive vice director of the Fukien American Association, and the United Fujianese American Association ● Jenny Hou's father is Hou Jianli, president of the Beijing Township Association ● Met with then-vice president of the Overseas Chinese Affairs Office, Xu Yousheng, during 2007 trip to China, escorted by tong leaders including Hou Jianli.
  • 16. Triads & Street Gangs “Once that organization, the Fukien American Association, became one of the leading [China]-supported organizations, they became the host of almost all these Chinese officials who are visiting New York.” - Ko-lin Chin, Professor, Rutgers School of Criminal Justice, interview with Epoch Times “The Fuk Ching, for example, are affiliated with the Fukien American Association ... They allow the gang to operate on their (the tong’s) territory, thus legitimizing them with the community.” - “Chinese Transnational Organized Crime: The Fuk Ching,” by James O. Finckenauer, Ph.D., International Center, National Institute of Justice ● Used for strong-arm tactics ● Used when violence is needed ● Valuable for smuggling channels ● Drug warfare, culture warfare, etc
  • 17. The Triads in Action “The Chinese Communist Party ... has teamed up with a notorious triad figure to help press its claims in Taiwan.” ● Chang An-lo aka “White Wolf” ● Convicted kidnapper, extortionist, and heroin trafficker ● Mobilizes aggressive protests to intimidate pro-democracy activists in Taiwan
  • 18. The Triads in Action “This is one of the tactics used by the communists in mainland China from time to time. They use triads or pro- government mobs to try to attack you so the government will not have to assume responsibility.” - Albert Ho, pro-democracy lawmaker ● Attacks on pro-democracy protesters ● Triads involved ● Rumors of Chinese Communist Party orchestrating
  • 19. Chinese Student and Scholar Associations (CSSA) “The Consulate provides funding and resources to each CSSA, which amounts to tremendous assistance, for this resolves all financial worries the student organization might otherwise have.” – Blog by Chinese student in Canada, “Current situation and development of Chinese Student Association in Canadian Universities”, study in Canada blog (Accessed July 19, 2007) “The vast majority of CSSAs receive funding from the Chinese government or have an active liaison via the consulate back to the CCP.” – ICIT report ● Students mobilized for political or ideological purposes ● Act on behalf of the CCP within their universities ● Students groomed as spies in targeted positions, such as specific industries, government jobs, or government internships
  • 20. The System at Work ... “China is building large covert spy networks inside Australia's leading universities, prompting Australia to strengthen its counter-intelligence capabilities.” ● CCP building covert spy networks in Australia's leading universities ● Spying on ethnic Chinese ● Censoring information unfavorable to the Chinese Communist Party
  • 21. Key Takeaways ● The CCP is taking advantage of the open system of the United States ● The CCP views overseas Chinese and their communities as part of China. This includes 2nd and 3rd generation immigrants ● Active intimidation in Chinese communities, which creates perception Chinese communities of being monitored and at risk – don't feel protection of US government ● Use of controlled overseas groups for political or ideological mobilization – protests appear spontaneous, but being orchestrated ● Efforts to influence US politics
  • 22. Select Sources – https://www.stratfor.com/weekly/terrorism_weekly_april_16 – http://www.japantimes.co.jp/news/2014/10/15/asia-pacific/politics-diploAmacy-asia-pacific/masked-thugs-hong-kong-rallies-revive-citys-triad-reputation/ – http://www.smh.com.au/national/chinese-spies-keep-eye-on-leading-universities-20140420-36yww.htm – http://www.upholdjustice.org/node/181 – http://www.edu.cn/xiang_guan_lian_jie/zheng_fu/gwy_qiao_wu_ban.htm – http://xcb.cumt.edu.cn/kddj/tzgz/ql/ldzs/_index.htm – http://www.zytzb.org.cn/zytzbwz/theory/lilun/80200212170099.htm – http://xcb.cumt.edu.cn/kddj/tzgz/ql/ldzs/_index.htm – http://www.ynzxb.cn/2006/11-21/09331683794.htm – http://www.tongxin.org/j-sys-news/page/2003/618/1674_552.shtml – http://icitech.org/icit-brief-chinas-espionage-dynasty-economic-death-by-a-thousand-cuts/ – http://chinascope.org/main/content/view/4838/104/ – http://www.zytzb.cn/publicfiles/business/htmlfiles/tzb2010/S1815/201209/731224.html – http://chinascope.org/main/content/view/2754/104/ – http://www.chinanews.com.cn/zgqj/2010/06-29/2370881.shtml – http://www.upholdjustice.org/node/252#report252_4 – https://www.amazon.com/Chinese-Industrial-Espionage-Acquisition-Modernisation/dp/0415821428 – http://www.theepochtimes.com/n3/1737917-investigative-report-china-theft-incorporated/ – http://www.theepochtimes.com/n3/790894-chinese-expats-monitored-harassed-in-nyc/ – https://www.usnwc.edu/Departments---Colleges/Center-for-Naval-Warfare-Studies/Warfare-Analysis-and-Research/Readings-and-Refences/U-S--China-Economic-and-Security- Review-Commision.aspx – https://www.ncjrs.gov/pdffiles1/nij/218463.pdf – http://www.theepochtimes.com/n3/254901-in-backing-disgraced-treasurer-john-liu-sticks-close-to-beijing/ – http://dailysignal.com/2015/04/13/columbia-shut-down-student-group-known-to-be-beijing-front-group-what-does-that-mean/ – http://www.upholdjustice.org/node/172 – http://www.smh.com.au/world/chinas-rulers-team-up-with-notorious-white-wolf-of-taiwan-20140711-zt488.html – http://foreignpolicyblogs.com/2016/06/09/beijing-hidden-influence-san-francisco/
  • 23. The Inner Workings of Chinese Espionage Overt Structure & Operations Questions / Feedback Joshua Philipp joshua.philipp@epochtimes.com Cyber and Beyond