1st Edition

China's Quest for Foreign Technology
Beyond Espionage





ISBN 9780367473570
Published September 23, 2020 by Routledge
372 Pages 5 B/W Illustrations

USD $44.95

Prices & shipping based on shipping country


Preview

Book Description

This book analyzes China’s foreign technology acquisition activity and how this has helped its rapid rise to superpower status.

Since 1949, China has operated a vast and unique system of foreign technology spotting and transfer aimed at accelerating civilian and military development, reducing the cost of basic research, and shoring up its power domestically and abroad—without running the political risks borne by liberal societies as a basis for their creative developments. While discounted in some circles as derivative and consigned to perpetual catch-up mode, China’s "hybrid" system of legal, illegal, and extralegal import of foreign technology, combined with its indigenous efforts, is, the authors believe, enormously effective and must be taken seriously. Accordingly, in this volume, 17 international specialists combine their scholarship to portray the system’s structure and functioning in heretofore unseen detail, using primary Chinese sources to demonstrate the perniciousness of the problem in a manner not likely to be controverted. The book concludes with a series of recommendations culled from the authors’ interactions with experts worldwide.

This book will be of much interest to students of Chinese politics, US foreign policy, intelligence studies, science and technology studies, and International Relations in general.

Table of Contents

Preface

Section I: China’s transfer venues

1. Chinese technology transfer—an introduction

William C. Hannas and Huey-Meei Chang

2. Serve the motherland while working overseas

Andrew Spear

3. China’s talent programs

Jeffrey Stoff

Section II: The system in operation

4. Foreign technology through commerce

Karen Sutter

5. The myth of the stateless global society

Anna B. Puglisi

6. Targeting defense technologies

James Mulvenon and Chenny Zhang

Section III: China’s worldwide transfer networks

7. Europe: a technology transfer mosaic

Didi Kirsten Tatlow, Hinnerk Feldwisch-Drentrup and Ryan Fedasiuk

8. Technology transfer from Germany

Didi Kirsten Tatlow, Hinnerk Feldwisch-Drentrup and Ryan Fedasiuk

9. Japan and South Korea

William C. Hannas and Huey-Meei Chang

Section IV: Case studies

10. Sino-foreign research collaboration

Jeffrey Stoff

11. China’s access to foreign AI technology

William C. Hannas and Huey-Meei Chang

12. The Impact of China’s policies

Didi Kirsten Tatlow, Greg Walton and Anna B. Puglisi

Section V: Technology in the shadows

13. The People’s Liberation Army and foreign technology

Elsa Kania and Peter Wood

14. Foreign technology and the surveillance state

Dahlia Peterson

15. The United Front and technology transfer

Alex Joske and Jeffrey Stoff

Section VI: Managing the transfer problem

16. Chinese students, scholarship and US innovation

Anna B. Puglisi

17. Economic espionage and trade secret theft cases in the US

James Mulvenon

18. Mitigation efforts to date

James Mulvenon, Didi Kirsten Tatlow and Alex Joske

Conclusion

William C. Hannas and Didi Kirsten Tatlow

...
View More

Editor(s)

Biography

William C. Hannas is Professor and Lead Analyst at the Center for Security and Emerging Technology (CSET), Georgetown University, Washington, DC, USA. Prior to this he was a member of the Central Intelligence Agency’s leadership cadre and a three-time recipient of its McCone Award.

Didi Kirsten Tatlow is Senior Fellow at the German Council on Foreign Relations in Berlin, Germany, and Senior Non-Resident Fellow at Project Sinopsis in Prague, Czech Republic.

Reviews

"In today's contested world, it is vitally important for decision makers and researchers to have access to unfettered, apolitical analyses of otherwise highly politicized subjects. This book does that. It provides an insightful description of the nexus between technology and sovereignty, and undistorted analytical advice on issues that will reshape the global order in years to come."-- Daniel P. Bagge is Cyber Attaché of the Czech Republic to the United States.

"China is engaged in the most systematic, well-funded and comprehensive technology transfer strategy in history. There is no more important topic with implications for U.S. national security. This collection of expert perspectives is a must-read to place the current technology race with China in context."--Michael Brown is Co-Author of the DIUx Report and former Presidential Innovation Fellow.

“This volume is an essential handbook for everyone from the lay reader to public leaders.  It brings together an incredible group of talent to break down this highly complex and misunderstood area. This is precisely the type of thoughtful engagement and research needed right now on this critical topic”--Kathleen Claussen is Associate Professor at the University of Miami School of Law, USA.

“Seventeen experts of the mechanisms and political motives behind the Chinese Communist Party's legal, illegal and grayzone technology transfer efforts present a profound analysis of the system's structure, mode of operation, scale, and its consequences for liberal open societies worldwide. Forcefully and convincingly, the book makes a strong argument that confronted with this particular challenge for global leadership, ignorance is harmful and remedying the situation is urgent.”-- Volker Stanzel is a scholar at the German Institute for International and Security Affairs, and former German ambassador to China and Japan.

“The intentions and practices of the Chinese Communist Party are perhaps the most important things for policymakers and the general public to understand in today's world.  [This book] provides excellent insight into these issues and should be required reading for anyone involved with technology policy, economic policy or national security.”-- Mathew Turpin is former Director for China, U.S. National Security Council

"In today's contested world, it is vitally important for decision makers and researchers to have access to unfettered, apolitical analyses of otherwise highly politicized subjects. This book does that. It provides an insightful description of the nexus between technology and sovereignty, and undistorted analytical advice on issues that will reshape the global order in years to come."-- Daniel P. Bagge is Cyber Attaché of the Czech Republic to the United States

"China is engaged in the most systematic, well-funded and comprehensive technology transfer strategy in history. There is no more important topic with implications for U.S. national security. This collection of expert perspectives is a must-read to place the current technology race with China in context."--Michael Brown is Co-Author of the DIUx Report and former Presidential Innovation Fellow

"With meticulous research Bill and his fellow authors have made a sobering case for us to deal with the reality of China’s technology practices instead of seeing the kind of partner we wished or wish it to be. Whatever path we take forward from here, our chances of finding a reasonable outcome will be greatly improved if we ground our policies in the clear eyed view and understanding this work provides."--Stephanie O'Sullivan, former head of CIA's Directorate of Science and Technology, Associate Deputy Director of CIA, and Principle Deputy Director of National Intelligence, ODNI

'This book, while academic in style, is invaluable in that it documents just how that technology acquisition has aided China’s rise to power over the last decades. The collection of essays takes in hotbutton topics from overseas students and workers who spy for the motherland, to China’s obsession with AI, and the grey area of corporate technology transfer (helpful charts outline “legal”, “illegal” and “extralegal” transfers). Together, they form a mosaic that shows how China’s military and economic strength rests not insignificantly on the shoulders of others’ creative work.--The Wire (China)  

'This book constitutes a must read not only for anyone involved in the security community but also for any interested reader looking for an answer to the following question: How does the CCP plan and successfully implement licit, illicit and gray zone transfer of technology?’ - Nathalie Vogel, UpNorth

'deeply researched and sophisticated volume'--Andrew J. Nathan, Foreign Affairs, May-June 2021