How the People’s Republic of China uses intelligence nonprofessionals to conduct espionage

 

In 2010, the FBI arrested Glenn Shriver for conspiring to provide People’s Republic of China (PRC) intelligence officers with US national security information.1 Shriver’s case provides an example of China’s use of nonprofessionals to gather intelligence. According to a Stratfor source, more than 70 percent of PRC intelligence operations are not directed by PRC intel services but by Chinese institutes, scientific agencies, and media outlets.2 China seems to use a “mosaic” form of intelligence collection. Mosaic, also known as “human-wave” collection, “involves assigning or dispatching thousands of assets to gather a massive amount of available information.”2 China’s demographic advantages contribute to its adoption of the mosaic method. Although many of these assets are unprofessional and therefore easily caught, the sheer number of available collectors can overload counterintelligence capabilities.3, 2 To counter the PRC nonprofessional intelligence threat, the United States needs to create a counterintelligence awareness amongst the various targets of PRC intelligence, including students and corporations.

Risk from Chinese Nonprofessional Economic Espionage

PRC focuses its nonprofessional intelligence assets on exploiting the US’s corporate, academic, and media spheres.3 The motives of the nonprofessional agents seem to vary between profit, patriotism, and various other factors, though the intelligence gathering seems to be more personally motivated, such as corporate ambitions, than directly linked with the PRC intelligence services.4 Business espionage can include such incidents as when a Chinese corporation buys a US business. For example, China National Aero-Technology Import & Export Company, with direct ties with the PLA, bought the US defense technology firm Mamco Manufacturing. China’s business espionage emphasis is quite important to the Chinese government, which provides market incentives for economic espionage.3 The Chinese program State High-Tech Development Plan (863 Program) allocates funding to research.5 However, the program is not specific regarding how researchers use the money.5 When coupled with the rather loose regulatory situation in China, the result is – intended or not – the funding or encouragement of economic espionage.5 For example, two software engineers from Silicon Valley worked to transfer ill-obtained intellectual information to a company in China to help it start an 863 Program sponsored company.5 Adding to the risk are US-based corporations – with Department of Defense or other federal connections – doing or seeking business in China.6

Risk from PRC Intelligence Officers Targeting Students to Conduct Nonprofessional Intelligence

Scholarly exchange programs have been very successful in PRC intelligence gathering.2 The PRC sometimes forces Chinese students to the US to spy, and other times the students volunteer.6 Glenn Shiver’s recruitment experience is an example of how PRC intelligence officers have been able to exploit foreign students. Glenn Shriver began his experience studying abroad in China. Students who study abroad present tempting and vulnerable recruitment targets to the PRC.1 The FBI created a short docudrama entitled Game of Pawns to illustrate how Shriver was approached by the PRC.7 The PRC carefully pampered Shriver with luxury, friendship, and gifts as they played on his desire to live and work in China.7 While Shriver did not provide them with any classified material, he did aid them by writing papers and even applied to the CIA at their request.7 Shriver partly attributes his actions to his naivety.7

Risk from Journalists Conducting Nonprofessional Intelligence

Journalists are able to provide information that might be unclassified, but not publicly accessible.8 The Chinese state news service Xinhua does more than journalism. Xinhua provides internal reports to the Chinese Central Committee or appropriate policy systems when topics are considered too sensitive to publish.3 Mark Bourrie, a long-time member of Canada’s Parliament Hill Press Gallery, worked for Xinhua for two years when he received an assignment to gather information about Chinese dissident activities, including information from a private meeting between the Dalai Lama and Prime Minister Stephen Harper.9 His previous reports on dissident activities disappeared from sight after he filed them, and he knew that the time had come to draw the line. He resigned from Xinhua and warned the Parliament Hill Press Gallery of Xinhua’s focus on intelligence gathering.9

Discussion Regarding the Description of PRC Intelligence as “Mosaic”

However, zeroing in on the mosaic concept can muddy the differentiation between Chinese collectors, their motivations, and their signatures and risks to the US.10 While the US needs to work to create an understanding of mosaic collection, it also needs to understand all aspects of PRC intelligence gathering. Stratfor’s breakdown of the PRC intelligence strategy helps put together a more complete picture. The strategy includes mosaic collection, the recruitment and debriefing of Chinese-born residents of other countries, and the patient cultivation of foreign assets for long-term purposes.2 As the PRC intelligence threat matures, continued study of the PRC intelligence apparatus itself, both professional and nonprofessional, is essential.10

Conclusion

The threat of PRC intelligence goes beyond what might be considered normal espionage. Such a large and varied collection assault against the US demands a broad counterintelligence response that is able to adjust as nuance requires. This response needs to include more organizations than just the FBI. Efforts from other groups, such as the Department of Commerce’s Bureau of Industry and Security, are needed to help apply focused pressure to potential dangers. US students abroad need to understand the environment they will be entering, how to report suspicious activity, and how to stay safe. The FBI has begun working to educate students, and it would be wise to continue expanding its efforts. US corporations must generate counterintelligence awareness, both in hiring and in the general workplace. Coordinated effort between government agencies and between the government and private industry, coupled with a careful analysis of the PRC intelligence apparatus, is necessary to defending the homeland from the PRC nonprofessional threat. ■

  1. FBI, “Advice for U.S. College Students Abroad,” 14 April 2014, https://www.fbi.gov/news/stories/2014/april/students-abroad-warned-of%20foreign-intelligence-threat/students-abroad-warned-of%20foreign-intelligence-threat.
  2. Stratfor, “Special Series: Espionage with Chinese Characteristics,” 24 March 2010, https://www.stratfor.com/analysis/special-series-espionage-chinese-characteristics.
  3. Peter Mattis, “A Guide to Chinese Intelligence Operations,” 18 August 2015, http://warontherocks.com/2015/08/a-guide-to-chinese-intelligence-operations/.
  4. William Pentland, “Entrepreneurial Espionage – Made in China,” 22 January 2011, http://www.forbes.com/sites/williampentland/2011/01/22/entrepreneurial-espionage-made-in-china/.
  5. Peter Mattis, “China’s Amateur Spying Program,” 11 December 2011, http://thediplomat.com/2011/12/chinas-amateur-spying-problem/1/.
  6. Dan Golden, “American Universities Infected by Foreign Spies Detected by FBI, 8 April 2012, http://www.bloomberg.com/news/articles/2012-04-08/american-universities-infected-by-foreign-spies-detected-by-fbi.
  7. FBI, VIDEO Game of Pawns, 14 April 2014, https://www.youtube.com/watch?v=R8xlUNK4JHQ .
  8. Jeremy Bender, “Here’s the tactic that makes China’s espionage activities so effective,” 18 August 2015, http://www.businessinsider.com/heres-the-tactic-that-makes-chinas-espionage-activities-are-so-effective-2015-8.
  9. Matthew Little, “Canadian Reporter Used as Spy for China,” 23 August 2012, http://www.theepochtimes.com/n3/1482430-canadian-reporter-used-as-spy-for-china/.
  10. Peter Mattis, “The Analytic Challenge of Understanding Chinese Intelligence Services,” September 2012, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-56-no.-3/pdfs/Mattis-Understanding%20Chinese%20Intel.pdf.