Thursday, July 28, 2005

Keupayaan Perisikan Negara China

Abstract

China’s top leadership in 1992 ordered its intelligence force to increased espionage and counterespionage efforts, apparently targeting the United States for economic, science and technology information which could directly help build China’s economy…[i]

“Every once in awhile, theirs is an espionage coup in which (they) will obtain something from inside the U.S.”
- Congressman Chris Cox [ii]

In June, a warning from Britain’s National Infrastructure Security Coordination Center claimed a series of Trojan – laden emails were targeting UK government and companies in a attempt to swipe information. The Advisory from NISCC indicated the attacks were generated in the Far East (China).[iii]

“I believe firmly that the China is using tools like Myfip to conduct industrial espionage on the US and other industrial countries that have mature data networks.”
- Marcus Sachs, SRI International [iv]

Cyberspace is becoming a new battleground for the United States and China, amid growing concerns about Chinese industrial espionage through various types of computer worms… at least one Trojan horse program used to steal files from infected computers has been traced to servers in China…[v]

Taiwan’s military intelligence chief said … Chinese communications satellite launched earlier in the day “poses no immediate threat” to national security. [vi]

Ho Lee was indicted for allegedly transferring data on the nation’s newest nuclear weapons to unsecured computers. The physicist, who has pleaded not guilty, is accused of being a spy for China. [vii]

pihak China juga giat menjalankan operasi pengintipannya ke atas AS. Salah seorang perisiknya yang dikenalpasti ialah John Huang, berjawatan tinggi di Jabatan Perdagangan AS. [viii]

tiga juruteknik yang berkhidmat di CIST Institute milik tentera Taiwan didapati bersalah kerana merisik bagi pihak China. [ix]

Cox Commission uncovered a much broader espionage campaign. The commission’s report concludes that China has mounted widespread effort to obtain US technology by any means—legal or illegal. Chinese spies working in US nuclear weapon laboratories have obtained information on all current US nuclear missile warheads, neutron bomb, and advanced military technology like radio – frequency weapons and radar satellites. China also has obtained information to improved its missile force from US satellite manufacturers and systematically tries to obtain military useful technology from civilian business ventures – involving more than 3,000 front companies inside the United States…[x]
The Communist Party Central Committee controls the main Ministry of State Security (MSS), a Ministry of Public Security, the People’s Liberation Army’s Central Security Regiment (8341 Unit), a Second Military Department (military intelligence), and a Third Military Department (counterintelligence). The Chinese News Agency (Xinhua) is an intelligence agency, and so is the China Association for International Friendly Contacts. [xi]

According to (Taiwan) National Security Council (NSC) official, …an increasing number of Chinese spies … have entered Taiwan to develop their organizations and activities on the island… [xii]

Australian has granted a permanent protection visa to former Chinese diplomat (Chen Yonglin) who sought asylum with claim that China has vast network of spies in Australia. [xiii]

End Note
[i] China’s leaders ordered stepped – up espionage in 1992. Asian Political News. May 31, 1999 http://www.findarticles.com/p/articles/mi_m0WDQ/is_1999_May_31/ai_54889114
[ii] Ibid
[iii] Utter, David. Espionage Not Just for Spies Anymore. Webpronews. 25 July 2005. 27 July 2005 http://www.webpronews.com/news/ebusinessnews/wpn-45-20050725EspionageNotJustForSpiesAnymore.html
[iv] Ibid
[v] Experts warn of Chinese cyberattack used for industrial secrets. Yahoo News. 24 July 2005. http://news.yahoo.com/
[vi] Taiwan spy chief says China satellite launch no threat. Asians Political News. Jan 31, 2000. http://www.findarticles.com/p/articles/mi_m0WDQ/is_2000_Jan_31/ai_59332209
[vii] Vilar, Miguel. Spy Tech. Science World. March 20, 2000. http://www.findarticles.com/p/articles/mi_m1590/is_12_56/ai_61291777 Aso, see; Wahab, Zaharin Abd. Perisik – Pelengkap Sesuatu Operasi (Part 3) July 20, 2005. http://www.rainman2.blogspot.com/
[viii] Wahab, Zaharin Abd. Perisik – Pelengkap Sesuatu Operasi (Part 2). July 18, 2005. http://www.rainman2.blogspot.com/
[ix] Wahab, Zaharin Abd. Perisik – Pelengkap Sesuatu Operasi (Part 3). July 20, 2005. http://www.rainman2.blogspot.com/
[x] Fisher, Jr., Richard D. Time to heed the Cox Commission’s Wake – Up Call. The Heritages Foundation. June 3, 1999. http://www.heritage.org/Research/AsiaandthePacific/EM602.cfm
[xi] Intelligence Collection. Internet source. http://www.mkzine.com/Essays/Ref-Intelligence%20Collection.html
[xii] Wang, Flor. Coordination Needs to Crack Down on Chinese Spies: Official. ROC Central News Agency. July 23, 2005. http://www.globalsecurity.org/intell/library/news/2005/intell-050723-cna01.htm
[xiii] Mercer, Phil. Australian Grants Protection Visa to Chinese Diplomat. Voice of America. July 8, 2005. http://www.globalsecurity.org/wmd/library/news/china/2005/china-050708-2bbcf10a.htm

No comments:

Mark Pissone of Cassaholm Confidential FC Diary (Part 5)

 October 22, 2013 - The Goalless Tango, Oldkamps Outlaw Standoff, and Dr. Cassa's Cryptic Satisfaction! Dear Diary, In the ever-unpredic...