Report: China's Military Is Growing Super Powerful by Stealing America's Defense Secrets (Like the F-35)
China has gained military benefits in recent years from stealing defense secrets through industrial and cyber espionage carried out by its intelligence services, according to a US congressional report.
“In recent years, Chinese agents have extracted data on some of the most advanced weapons and weapons systems in the US arsenal, such as jet fighters and unmanned submersible vehicles,” states the annual report of the US-China Economic and Security Review Commission, released on November 16.
“The loss of these and other sensitive defense technologies undermines US military superiority by accelerating China’s military modernization and giving China insight into the capabilities and operation of US weapons and weapons systems,” the report adds.
The espionage operations are not limited to direct spying activities against the United States and include intelligence collection against US allies and friends in Asia, including Taiwan, Japan, the Philippines and Thailand.
“The United States shares weapons, weapons systems, and operational plans with its allies and partners, many of whom China has targeted with espionage operations,” the report says. “These infiltrations also threaten US alliance stability.”
US intelligence agencies determined that China stole secrets relating to the F-35 jet fighter from a US contractor. The design secrets were detected in China’s new J-20 stealth fighter.
The stolen secrets included details of the F-35’s electro-optical targeting system, radar-absorbing coatings and engine nozzles.
Taiwan remains a major spying target of China and, since 2002, 56 Chinese agents have been arrested there after being caught obtaining sensitive information, including about US technology shared with Taipei.
The United States is committed to defending Taiwan from a Chinese military takeover and as a result shares sensitive defense information.
“Taiwan’s strategic position in the Western Pacific makes its defensibility an important aspect of the US alliance system and strategy for the region,” the report says.
Recent Chinese cyber intelligence operations include the July 2016 infiltration by China of networks at the Philippines Department of Justice which were involved in organizing the Asia Pacific Economic Cooperation summit. Chinese hackers also broke into a law firm involved with the Permanent Court of Arbitration at The Hague, the court that ruled against China’s expansive maritime claims in the South China Sea.
In Australia, Chinese cyber spies were behind a massive intrusion into networks of the Australian Bureau of Meteorology, which provides data to the Australian Defense Department, an American treaty ally.
“China-based actors have conducted extensive cyber operations targeting Japan,” the report says.
Japan’s National Institute of Information and Communications Technology reported that China was behind 40 percent of approximately 26 billion attempts to compromise Japanese information systems in 2014.
Chinese intelligence services have also recruited agents in Thailand and the Philippines, prompting the commission to warn that “China’s apparent shift toward more overseas recruitment and handling operations could create a greater espionage threat environment in these and other US partner countries.”
The spying activities could undermine US support for allies. For example, if Washington believes sharing information and equipment with its Asian partners comes with significant risk, the nation could hesitate to provide support in a future crisis or conflict.
The commission report for the first time devoted an entire chapter to Chinese intelligence services, which were outlined as including the Ministry of State Security — the country’s civilian spy agency — and several military intelligence services.
The report concludes that the Chinese intelligence threat is increasing as China reforms and centralizes its intelligence apparatus and gains experience conducting spying operations.
In particular, Chinese human spying, or HUMINT, activities, “already appear to be growing more aggressive and extensive,” the commission says.
“China’s intelligence processing and communication to decision makers is likely to become more effective and efficient as the moves toward joint, integrated intelligence operations,” the report says.
The military spy agencies were the subject of a major reform effort in late 2015 that moved them from the General Staff Department of the People’s Liberation Army to a new military service-level group called the Strategic Support Force.
The units believed to be placed under the new force are 2PLA, the military’s espionage branch; the 3PLA — the group responsible for electronic spying and cyber attacks; and 4PLA, which is responsible for electronic warfare.
Chinese military technical intelligence capabilities also are growing. They include beefed up intelligence, surveillance and reconnaissance equipment and platforms that will bolster China’s ability to fight regional conflicts and to monitor and target US military forces.
Regarding cyber attacks, Chinese intelligence have repeatedly gained access to email accounts of senior US government officials — infiltrations that provide Beijing with insights into highly sensitive US national security decision making, the report says.
The commission recommends that Congress direct the US State Department to develop educational material to alert people living and traveling abroad to Chinese intelligence activities.
The Pentagon is also directed to set up special counter-intelligence education to help US students studying in China under a Defense Department National Security Education Program to avoid Chinese intelligence recruitment efforts.