China’s economic espionage prowess

A rag-and-bone man sleeps near apartment blocks under construction in Beijing November 4, 2010. China on Wednesday raised down payments and mortgage rates for home buyers whose acquisitions are supported by the government's housing fund, marking Beijing's latest step in a campaign to tame the property market. -Reuters

by Dr Sheo Nandan Pandey

Introduction

(November 14, New Delhi, Sri Lanka Guardian) Over the past couple of decades, there is growing body of scholarly works, including electronic and print media reports that speak of China’s growing prowess in economic espionage. Andrew Jones, Head of security Technology Research, BT Security Centre, Adjunct, Edith Cowan University, has called China’s economic espionage operations as an affair of ‘hi-tech world’. i James Mulvenon, Director of DGI’s Centre for Intelligence Research and Analysis, has found the ‘innovation firms’ around the world as most vulnerable targets to Chinese economic espionage operations.ii

The Chinese spy defectors both diplomats and full time students, including Chen Yonglin, Han Guangshen, Li Fengzhi have turned over the names of several spies and their espionage activities in several industrialized countries in Europe, the US, Australia and Japan. In a similar vein, the arrest of Chinese national Huang Kexue on July 13, 2010 by the Federal Bureau of Investigation (FBI) in Westborough, Massachusetts, United States of America (USA) and subsequent interrogation leaves no body in doubt about the penchant of the Chinese nation and its people in this direction.

Roger Faligot, credited with dozens of espionage-related books, including The Chinese Secret Services from Mao to the Olympic Games, has gone on record to put the number of Chinese secret agents, operating worldwide to over two millions. Belgium intelligence expert says the Chinese industrial espionage network happens to be not just only by scale, but also very penetrating. Besides, investigative studies in the filed, including Ralph D. Sawyer’s The Tao of Spycraft: Intelligence Theory and Practice in Traditional China, Nicholas Eftimiades’s Chinese Intelligence Operations, Tod Hoffman’s The Spy Within: Lary Chin and China’s Penetration of the CIA, and John Byron’s The Claws of the Dragon: Kang Sheng- The Evil Genius behind Mao and His Legacy of Terror in People’s China, largely testify how, what and where of espionage activities and practices in vogue.

Economic espionage per se is not the exclusive domain of China. While being an illegal act, and more often than not outright unethical in form as well as substance, it draws on and thrives as a staple of human history. Nonetheless, it is rooted in the objective reality of competitive modern life, where comparative edge over ones rival constitutes both a shield and promise for future.

As long as individual firm and/ or groups of them get to commit the act, it can be left to nature for self corrections. What is worrisome is the involvement of a nation state. The ‘default fallout’ is a system disorder, in which ‘quest for power’ rather than ‘cooperative co-existence’ comes to rule the roost. There is bound to be no stopping until either the ‘world order’, built around the United Nations (UN) system, including the apparatus of World Trade Organization (WTO) get to develop zero tolerance for such an enterprise and/ or the socio-economic cost of ‘economic espionage led growth and development’ turn counter productive.

Threat perception against various shades of the aftermath of China’s economic espionage activities and practices, including snow balling effects of the phenomenon in developed as much developing world vary just in quantum while the concern about the net impact in over all perspectives remain almost identical. The Australian Security Intelligence Organization (ASIO), the British Security Service (MI5), the German Bundesnachrichtendienst (Federal Intelligence Service), the Japanese Naikaku Joho Chosasitu (Cabinet Intelligence and Research Office), the US Bureau of Intelligence and Research (INR) and quite a few others have since cautioned stakeholders, including industries and firms and dug out China’s broad and specific intent, purpose and modus operandi in its operations.

In its perspective, this academic endeavour is aimed at getting to discover the long and short of the Chinese economic espionage mechanism. In the run up, the paper peeps into the dynamics and viability of China’s endeavours. Schematically, the paper is thus, organized to focus on: Incursions and the Pulsating Force; Strategy and the Modus Operandi; Dynamic of Preponderance; and, the Sky of China’s Endgame.

The assumptions of the study include: China is hitherto in the forefront of the countries that subscribe to nation-state-sponsored unsavoury espionage of business and industrial secrets, including intellectual property rights (IPR) for gaining competitive national advantage; while numerous governments around the world have struck alarm bells, and set up new or improved counterintelligence or counterespionage entity as antidote to protect their country's interests in the public and private sectors, China’s enterprise in the field in different forms and shape, including condoning, encouraging, and creating a mandate for its outfits continues; and, the Chinese bid of the kind could verily endanger level playing pursuits, and stand in the way of individuals, corporate world and nations getting to compete creatively the ideas and capabilities of each others in the larger interests of world at large.

Incursions and the Pulsating Force

While historically the first victim of economic espionage in the recorded history of the world at the hands of French Jesuit priest Francois Xavier d’ Entrecolles (Chinese name: Yin Hongxu) during the reign of Kangxi Emperor in late 17th century, China’s ongoing stride to gain access to the guarded economic secrets of its existing and potential rivals through stealth means dates back to late 1970s when it shelved its self-imposed alienation of Mao epoch and got connected with the global economic system.iii It exists along the outfits of what is called ‘competitive intelligence’ (CI) in the legal official channel, located in different industrial hubs in all the three Chinese economic zones. iv

Where as normal charter of CI operation in China as elsewhere constitute gathering, piecing together, systematically analyzing and last but not the least, managing business information on existing and potential rivals on the strength of business data culled through rigorous process of perusals of electronic and print media materials, the Chinese CI operatives use the auspices of assiduously planned and held international trade fairs in the country and outside both overtly and covertly to supplement, complement and corroborate them to the body of information and knowledge obtained in the course of state-sponsored economic espionage. The targets of all such Chinese adventures right now relates to ‘technology heavy industries, including computer software and hardware, biotechnology, aerospace, telecommunications, transportation and engine technology, automobiles, machine tools, energy, materials and coating etc.

Both in form and spirit, China’s economic espionage operations resemble military campaigns, where business entities of different denominations resonate the operational nuances of military formations on the lines of division, brigade, regiment and so forth. Their tangible and intangible assets, such as proprietary information, are perceived as modern arsenals which need protection and further improvement. The driving force at work behind all Chinese economic espionage v adventures is the long standing state policy of ‘catching up fast and surpassing’ the world powers. It has been further fuelled by the resolution of the 4th Plenum of the 16th Central Committee of the Communist Party of China (CPC) in November 2004, later adopted by the 3rd Session of the 10th National People’s Congress in March 2005 to build China a ‘relatively affluent society in an all round way’.

Strategy and the Modus Operandi

Over the period, China has increasingly used economic espionage as a complement, if not a parallel track to its ‘Three Step Development Strategy’ to get to a commanding economic position in the world : Step One—to double the 1980 GNP and ensure that the people have enough food and clothing, literally attained by the end of the 1980s; Step Two—to quadruple the 1980 GNP by the end of the 20th century that got achieved ahead of schedule right in 1995; Step Three—to increase per-capita GNP to the level of the medium-developed countries by 2050—at which point, the Chinese people will be fairly well-off and modernization will be basically realized. Unprecedented increase in the size of the Chinese economy to the world’s top second notch, overtaking United Kingdom (UK) and France in 2005, Germany in 2007, and now Japan, both in terms of nominal gross domestic product (GDP) and purchasing power parity, is discernibly attributable to this queer mix of growth and development strategy.

The sweep of the Chinese economic espionage missions, in its perspective, encompasses a large terrain of human cyber incursions. Following the arrest Huang Kexue in Westborough, Massachusetts, US on July 13, 2010, it is an open secret that China's sprawling intelligence agencies work hand in hand with the Chinese academic institutions and industry to steal industrial secrets and intellectual property of non-Chinese companies the world over. Nevertheless, the Chinese academic such as Huang Kexue could be a sleeper any where and inflict huge damage as it happened in the case of Dow AgroSciences, LLC (Dow) in the guise a researcher.

There have of late been exposures, arrests and prosecutions of a sizeable number of Chinese economic espionage operatives around the world. The prominent cases such as Jin Hanjuan, a Chinese software engineer with Motorola, Michigan based Chinese couple Du Shashan and her husband Yu Qin with General Motors, Yu Xiangdong of Ford, Hong Meng with DuPont, and Chung Dongfan with Boeing in America literally stand to testify the assertion of Walter Opfermann that China has been using an array of ‘polished methods’ from old time spies to phone tapping, and increasingly the internet, to steal industrial and corporate secrets.vi

A wide range of Chinese and other media reports simultaneously bear out that China does as well use insiders, called ‘pasty’ in intelligence lingo, diversely, both willing and under duress, to gather sensitive information. Going by a 14-page document, released by MI5 in UK to hundreds of British banks, businesses, and financial institutions, titled "The Threat from Chinese Espionage," the Chinese economic espionage outfits even lay ‘honey trap’ to blackmail Western businesspeople over sexual relationships.vii

The Chinese operatives are believed to have left little untouched in the economic espionage game, including ‘dumpster diving’, innocuous market survey and the likes for the purpose. Dawn of the age of internet and other sets of technological development has gone into making the Chinese task easier. The areas most under attack include car manufacturing, renewable energies, chemistry, communication, optics, x-ray technology, machinery, materials research and armaments. Information being gathered was not just related to research and development but also management techniques and marketing strategies.

Dynamics of Preponderance

To be fair, China is neither alone nor a pioneer in the field of economic espionage. It has, indeed, taken a leaf from others, including France, Germany, Israel, Japan, Russia and South Korea. Much of the kind is taking place because of what Ben N. Venzke attributes to the philosophy ‘why spend 10 years and US$ 10 billion on research and development when you can bribe a competitor’s engineer for US$ 1 million and get the same, if not better results.viii

The fact that an organization usually does not realize that they have been infiltrated until it has suffered the financial consequences allows the perpetrators to get away undetected relatively easily. Nonetheless, where it is even detected, the reluctance of the targeted organizations to report the crime forthwith for fear of getting their trade secrets further dragged into the wider public arena, serves as catalyst of perpetration by default. This vulnerability has been compounded and the prospect of the perpetrators going scot-free has increased with the mode of movement of documents largely having been changed from ‘physical’ to ‘electronic’. But for the limits of cyber warfare, the espionage outfits normally sneak stealthily and get hold of the documents that could be stored, filed and dispersed on line, including email, electronic files, audio & video recordings, scribbled notes and both electronic and paper drafts.

Sky of China’s Endgame

China’s endgame is simple and straight. It has climbed the ladder as a reckonable world economic power and, according to Gene Huang, Chief Economist, Federal Express, China has dreams to come to contribute 30 percent of the global GDP in 2020, the stage when the top performer of the time, the US will estimably contribute just 20 percent of the global GDP. ix Harnessing the best of its two pronged strategy, discussed at length in the previous section of this paper, China has got the sweet test of lifting 50 million people to middle income category each year. Going by the optimism of Robert Fogel, in 2040, the Chinese economy will thus, reach US$ 123 trillion from nearly US$ 5 trillion now in 2010.x

In China’s economic stride as such, the shadowy contribution of economic espionage is immense. As per conservative estimates, though yet uncorroborated, in a short run perspective, it could run to as much as the contribution of undervalued Chinese currency renminbi (Rmb) to China’s over all trade surplus against different trading partners, and ultimately much of its foreign exchange reserves, now reaching a staggering US$ 2.6 trillion. xi This is besides the gains, both now and in times to come through in several business contracts so won in various fields, including award of oil and other strategic metal rights the world over. In a long term perspective, Chinese economic espionage, along with other illegal measures taken to acquire foreign business technology, includes theft of new industrial designs, processes, products and software that can be copied or reverse-engineered, would yield yet another all time abiding competitive edge over the old and new rivals such as India.

However, in the new conditions, when the global economy is bound to be far more and better connected than ever, this Chinese development strategy is bound to face a ‘diminishing return’ in not a too distant future. Aware of the harsh truth, the Chinese political and economic leadership is of late making a clarion call to turn to ‘innovations’. As a first step, it has since summoned top Chinese minds in technology and auxiliary fields to synergistically engineer the future growth and development mode of China, including promoting the ‘knowledge economy of China kind’. The question that haunts most is whether China’s economic miracle built largely through dubious strategy will last for long and, in its generality, whether China would continue to hold the centre stage in the world scene as it does?

China is irrefutably a rich nation right now. In the debate as to whether and / or when China will overtake the US in terms of nominal GDP criterion, I find Joel Kotkin to be nearer the truth. xii Demographic factor must not be wished away. Beyond all what Robert Fogel, Thomaes Friedman and the ilk say, China has miles to go before it could shed the ‘developing economy’ status. xiii With home of 400 millions young populace in 2050, the US is well set to disprove all the prophecies of ‘declinism’. xiv I look at the world no different than what it turned out in 1970s and 1980s that proved the studied predictions of George Lodge, Lester Thurow and Robert Reich literally misplaced. Neither Japan nor Europe could come any near to the US economic muscle.

The Chinese economic strategy, built on unsustainable twin pillars of economic espionage and skewed monetary and fiscal policies, has since outlived its utility. Anti-espionage Acts, put in place in quite a few countries stand to constrict the moving space for the Chinese outfits. Reengineering can seldom be a substitute for original innovations.

However, the lesson for other countries including India is - there is no time to lower the guard even in the short term.



End Notes and References

1. Andrew Jones, Industrial Espionage in a Hi-tech World, Computer Fraud and Security, Volume 2008, Issue 1, January 208, pp 7-13.


2. John Markoff and Baboza quoted James Mulvenon in his article in The New York Times, Feb 18, 2010: http://www.nytimes.com/2010/02/19/technology/19china.htm


3. French Jesuit priest Francois Xavier d’ Entrecolles is considered pioneer in the world of economic espionage. After entering China in 1698 and subsequently joining Jesuit China Mission, he collected information secretly with the help of Chinese Catholic converts on Chinese technique of manufacturing hard-paste porcelain. He had passed on the information to Father Orry, S.J Proctor of the Jesuit Mission of China through a letter. Besides, he is believed to have used direct observation method and consulting printed technical sources.


4. Tao Qingjiu and John E. prescot, “China: Competitive Intelligence Practices in an Emerging Market Environment”, Competitive Intelligence Review, Volume II, Issue 4, pp 65-78, 4th Quarter 2000.


5. M. E Kabay, Industrial Espionage. http://www.makabay.com/overview/industrial_esponage.htm


6. Quoted Kate Connolly, “Germany Accuses China of Industrial Espionage” Guardian, July 22, 2009;Also Quoted: Letters From Taiwan http://lettersfromtaiwan.blogspot.com/2009_07_09_archive.htm


7. Quoted Phillip Knightley, The History of Honey Trap, Foreign Policy, March 12, 2010 http://www.foreignpolicy.com/articles/2010/03/12/the_history_of_honey_trap?page=full


8. http://www.stealth-iss.com/pdf/Economic.pdf


9. Julie Quek, China to Overtake US Global GDP Contribution by 2020, Channel NewsAsia, Sep 23, 2010 http://www.chennelnewsasia.com/stories/afp_world_business/view/1083010/1/.html


10. Robert Fogel, “China’s Estimated Economy by 2040”, Foreign Policy, January/ February, 2010 http://www.foreignpolicy.com/articles/2010/01/04/123,000,000,000,000


11. Estimates of Rmb undervaluation varies. It is put at 15-50 percent.


12. Kotkin, Joel (2010), The Next Hundred Million: America in 2050, The Penguin Press, New York, USA.


13. There is not yet universally accepted convention of putting a country on ‘developed’ and/ or ‘developing’ country pedestal.


14. By the end of the first half of the 21st century, the economically active cohort in the US in the age group of 15 to 64 is projected to grow by 42% while it will shrink by 10% in China. Tell a Friend