© 2013 – Routledge
This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology.
Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history."
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.
This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
‘In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times
'This book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications.' -- Foreign Affairs
Introduction 1. China’s History of Relying on Western Technology 2. China’s Use of Open Sources 3. Trade for Technology 4. PRC-based Technology Transfer Organizations 5. US-based Technology Transfer Organizations 6. China’s Foreign Students in the United States 7. Bringing Technology ‘Back’ to China 8. Traditional Chinese Espionage 9. Chinese Cyber Espionage 10. Chinese Industrial Espionage in Context Conclusion Appendices
Few regions of the world are fraught with as many security questions as Asia. Within this region it is possible to study great power rivalries, irredentist conflicts, nuclear and ballistic missile proliferation, secessionist movements, ethnoreligious conflicts and inter-state wars. This series publishes the best possible scholarship on the security issues affecting the region, and includes detailed empirical studies, theoretically oriented case studies and policy-relevant analyses as well as more general works.