Pages

7 January 2015

The Spies From Beijing: More on Chinese Theft of U.S. Defense Secrets

January 5, 2015

In December 2014 a Chinese citizen, who had worked for an American jet engine manufacturer was accused of trying to steal technology relating to the use of titanium in jet engines. The accused had worked on the engine used in the new F-35 and this is the second Chinese spy caught in 2014 who was stealing F-35 manufacturing technology. The accused faces ten years in prison if convicted. China is apparently going after American tech that would enable China to develop its own versions of the F-22 and F-35.

You didn’t have to catch spies to see this coming. In late 2011 photos of a new Chinese jet fighter, that looked a lot like the American F-35, began appearing on Chinese web sites. Although work began on this new (J-20) aircraft in the late 1990s, when the prototypes were first spotted, it was always obvious that there were similarities to the U.S. F-35. This made sense, given Chinese efforts to obtain details (via Internet espionage, and more conventional spying) about the F-35. The 2011 pictures showed the J-20 undergoing taxiing tests, which usually precedes flight tests by weeks or months.

The F-35A is a 31 ton, single engine fighter that is 15.7 meters (51.4 feet) long and with a 10.7 meter (35 foot) wingspan. The engine generates 12.7 tons (28,000 pounds) of thrust, or 19.5 (43,000) with afterburner. In contrast, the J-20 has two engines and appears to be 24 meters (75 feet) long and with a wingspan of 15 meters (46 feet). The engine for the J-20, the WS-15 is still in development. The prototype had afterburner thrust of 16.5 tons, although this was expected to hit 18.3 tons when development was complete. It is believed that the J-20 prototypes are powered by Russia AL31FU/117S engines, each with 14.5 tons of afterburner thrust. Two of these engines would give the 36-40 ton J-20 more power per ton than the F-35A. China has been having problems with locally made jet engine performance and reliability and while the Russians have sold some tech, the best stuff comes from the United States.

China is also developing other F-35 technologies, like the AESA radar, highly efficient cockpit design, stealth and software to tie everything together. Developing, or even copying, this tech is not easy. But the Chinese already know that because they have, for decades been adapting stolen technology to their needs. Thus it appears that China is planning on having the J-20 ready for service by the end of the decade. The key factor is their ability to develop or steal and implement the needed technology by then. The J-20 appears to be less than an F-35 clone, and more of an F-35 type aircraft with pretensions to being an F-22. In any event, the J-20 is an attempt to develop some kind of 5th generation aircraft, complete with stealth.

The key to Chinese success in developing the most modern military technology is their ability to steal the details of that tech. No one, not even the Russians, is willing to sell it to them. Since 2012 the United States has learned a lot more details about the extensive Chinese espionage effort in the United States. The U.S. discovered, for example, that Chinese smugglers often have contacts in Chinese intelligence and are offered big cash rewards for technical details on American UAVs and military aircraft (especially stealth designs like the F-35 and F-22). American intelligence and counter-intelligence agencies have long known about the extensive Chinese intelligence efforts to steal American technology, and the revelations about the use of criminals was not a big surprise.

China sees this kind of broad-spectrum intelligence gathering as a major operation and one they intend to keep going as long as possible. Thus, starting in 2008 China has established eight National Intelligence Colleges in major universities. In effect, each of these is an “Espionage Department” at these universities, where, each year, about 300 carefully selected applicants are accepted, to be trained as spies and intelligence operatives. The college trained operatives expect to make a career out of stealing Western technology. China has found that espionage is an enormously profitable way to steal military and commercial secrets. While Chinese Cyber War operations in this area get a lot of publicity, the more conventional spying brings in a lot of stuff that is not reachable on the Internet.

One indicator of this effort is the fact that American counter-intelligence efforts are snagging more Chinese spies. But this is largely due to increased spying efforts by China, rather than more success by the FBI and CIA. This use of industrial espionage has played a large part in turning China into the mightiest industrial and military power on the planet.

Since the 1990s China has been attempting to do what the Soviet Union never accomplished: steal Western technology, then use it to move ahead of the West. The Soviets lacked the many essential supporting industries found in the West (most founded and run by entrepreneurs) and was never able to get all the many pieces needed to match Western technical accomplishments. Soviet copies of American computers, for example, were crude, less reliable, and less powerful. It was the same with their jet fighters, tanks, and warships. At best the Russians could prevent the tech gap from becoming too large.

China gets around this by making it profitable for Western firms to set up factories in China, where Chinese managers and workers can be taught how to make things right. At the same time China allows thousands of their best students to go to the United States to study. While most of these students will stay in America, where there are better jobs and more opportunities, some will come back to China and bring American business and technical skills with them. Finally, China energetically uses the “thousand grains of sand” approach to espionage. This involves China trying to get all Chinese going overseas, and those of Chinese ancestry living outside the motherland, to spy for China, if only a tiny bit.

This approach to espionage is nothing new. Other nations have used similar systems for centuries. What is unusual is the scale of the Chinese effort. Backing it all up is a Chinese intelligence bureaucracy back home that is huge, with nearly 100,000 people working just to keep track of the many Chinese overseas, and what they could or should, be trying to grab for the motherland. This is where many of the graduates of the National Intelligence College program will work.

It begins when Chinese intelligence officials examine who is going overseas and for what purpose. Chinese citizens cannot leave the country legally without the state security organizations being notified. The intel people are not being asked to give permission. They are being alerted in case they want to have a talk with students, tourists, or business people before they leave the country. Interviews are often held when these people come back as well.

Those who might be coming in contact with useful information are asked to remember what they saw or bring back souvenirs. Over 100,000 Chinese students go off to foreign universities each year. Even more go abroad as tourists or on business. Most of these people were not asked to actually act as spies but simply to share, with Chinese government officials (who are not always identified as intelligence personnel) whatever information they obtained. The more ambitious of these people are getting caught and prosecuted. But the majority are quite casual and, individually, bring back relatively little but are almost impossible to catch.

Like the Russians, the Chinese are also employing the traditional methods, using people with diplomatic immunity to recruit spies, and offering cash, or whatever, to get people to sell them information. This is still effective and when combined with the “thousand grains of sand” methods, brings in lots of secrets. The final ingredient is a shadowy venture capital operation, sometimes called Project 863 that offers money for Chinese entrepreneurs who will turn the stolen technology into something real. No questions asked. If you can get back to China with the secrets you are home free and potentially very rich.

But there are some legal problems. When the Chinese steal some technology, and produce something that the Western victims can prove was stolen (via patents and prior use of the technology), legal action can make it impossible, or very difficult, to sell anything using the stolen tech outside of China. For that reason the Chinese like to steal military technology. This kind of stuff rarely leaves China. And in some cases, like manufacturing technology, there’s an advantage to not selling it outside of China. Because China is still a communist dictatorship the courts do as they are told and they are rarely told to honor foreign patent claims.

No comments:

Post a Comment