Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Chinese Industrial Espionage: Technology Acquisition and Military Modernisation (Asian Security Studies) 1st Edition

3.9 out of 5 stars 9 customer reviews
ISBN-13: 978-0415821421
ISBN-10: 0415821428
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Trade in your item
Get a $15.37
Gift Card.
Have one to sell? Sell on Amazon
Buy new
$38.29
In Stock.
Ships from and sold by Amazon.com. Gift-wrap available.
List Price: $44.95 Save: $6.66 (15%)
48 New from $33.35
Qty:1
Chinese Industrial Espion... has been added to your Cart
More Buying Choices
48 New from $33.35 37 Used from $31.48
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


The Secret War: Spies, Ciphers, and Guerrillas, 1939-1945 by Max Hastings
The Secret War
The popular new release from Max Hastings. Learn more | See author page
click to open popover

Frequently Bought Together

  • Chinese Industrial Espionage: Technology Acquisition and Military Modernisation (Asian Security Studies)
  • +
  • China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
Total price: $73.24
Buy the selected items together

Editorial Reviews

Review

‘In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times

 

'This book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications.' -- Foreign Affairs

About the Author

William C. Hannas has an MA from the University of Chicago in Chinese and a PhD from the University of Pennsylvania in Asian languages. He served with the US Navy and Joint Special Operations Command, taught at Georgetown University, and holds a senior executive position in a component of the US federal government. Hannas is author of Asia’s Orthographic Dilemma (1997) and The Writing on the Wall: How Asian Orthography Curbs Creativity (2003).

James Mulvenon is Vice-President of Defense Group, Inc.’s Intelligence Division and Director of DGI’s Center for Intelligence Research and Analysis. Trained as a Chinese linguist, he is a leading expert on Chinese cyber issues, and has published widely on Chinese military affairs, party-army relations, C4ISR, and nuclear weapons doctrine and organizations. He has a PhD in political science from the University of California, Los Angeles, and is author of Soldiers of Fortune (2000).

Anna B. Puglisi has an MPA and MS in environmental science from Indiana University, has worked in research and technical infrastructure, and now holds a senior analyst position in a component of the US federal government. Ms. Puglisi studied at the Princeton in Beijing Chinese language school and was a visiting scholar in Nankai University’s Department of Economics, where she studied China’s S&T policies, infrastructure development, and university reforms.

NO_CONTENT_IN_FEATURE

Product Details

  • Series: Asian Security Studies
  • Paperback: 320 pages
  • Publisher: Routledge; 1 edition (May 22, 2013)
  • Language: English
  • ISBN-10: 0415821428
  • ISBN-13: 978-0415821421
  • Product Dimensions: 6.1 x 0.7 x 9.2 inches
  • Shipping Weight: 15.2 ounces (View shipping rates and policies)
  • Average Customer Review: 3.9 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #356,287 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

Format: Paperback Verified Purchase
The book, Chinese Industrial Espionage, is unique because it gives a comprehensive index to hundreds of the Chinese organizations involved with acquiring technology from the West. The book explains the push and pull in their organizational pecking orders, and it carefully unties the Chinese Gordian knot of interrelated local, academic, military, and national organizations. These groups are all extracting engineering and intellectual capital from the West and the USA, for their own Chinese uses. And those extractions are without regard to US patents, copyrights, restricted export, or national security law. This is a detailed description of the leading Western technologies gained by China at little cost to them. Because of the extensive amount of translated Chinese data in the book, the book is a must for the shelf of the serious analyst.

The chapter about Traditional Chinese Espionage opened and clarified several subjects. The author explains that Chinese intelligence collection tradecraft is comparable with that of other advanced nations. Computer intrusion capabilities also are very sophisticated but they are treated in their own chapter. The Chinese are not just thousands of people picking up what they can, one grain of sand at a time, the “vacuum-cleaner” approach. No, there are organizational processes, collection priorities, targeting, and then a variety of modern technical and traditional initiatives to acquire specific data. The Chinese always carefully weigh stealing secrets versus inducing people to give secrets away. Not to be scorned, the Chinese are good, very good at what they do to get what they want. This book provides excellent examples and intimately describes how their collection process is professionally organized.
Read more ›
Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book is a comprehensive review of one of the most significant issues facing international policy makers today. It covers everything from China's indigenous innovations policies, to its cyber espionage practices. Unlike the other reviewer, who didn't read the book, I just finished it. And as someone who has read most of the seminal reports on the subject, this book is one of the best surveys of the issue I have seen. Additionally, it discusses many of these other landmark studies and builds upon them, including the Cox report. For anyone interested in China's tech acquisition policies, this book is detailed and engaging, without presuming a certain level of prior knowledge. A terrific read.
1 Comment 11 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
For anyone doubting whether or not China has purloined information from the US, this book certainly provides a definitive answer. It traces the history of China's more than five decades of information gathering using virtually every tool imaginable, both legal and illegal, in order to amass the required information to kick-start various technologies within the country. In one sense, this is actually understandable as after the utter failure of Chairman Mao's plan, the country was left with virtually nothing of substance as it concerns technology.

In order to rapidly gain even something approaching parity with the West would have been virtually impossible indigenously within a reasonable time frame. The answer was thus to build on what was already available elsewhere. Probably the most incredible facts in the book are how the country has systematically and continuously ingested truly astonishing amounts of information via public, open-source methods such as subscribing to every technical journal on Earth, symposium papers, trade journal articles -- everything.

They simultaneously, if the authors are to believed (and they probably should be since every single statement in this book has an accompanying reference), pore through each and every document to glean snippets of information that can be woven together like a quilt to build a story around a particular technology. Little or none of this was illegal, as it's available to anyone who could download either for free or for a fee. Tens of thousands of people in a bewildering array of agencies and sub-agencies are employed to perform these tasks. The take away from this is obviously that the West is basically willingly giving the information to the Chinese, the reality of an open society.
Read more ›
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
one of the best accounts of non-traditional collection by the PRC. This book is the gospel, and is a necessary read.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Insightful and informative.
Provides an in-depth insight into how China works.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Chinese Industrial Espionage: Technology Acquisition and Military Modernisation (Asian Security Studies)
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
This item: Chinese Industrial Espionage: Technology Acquisition and Military Modernisation (Asian Security Studies)