You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Nicholas Eftimiades examines the infiltration of Chinese espionage agents into foreign governments and private businesses. He specifically addresses the human source in intelligence operations, and how these tactics fit into the conduct of internal and foreigh affairs in China.
A critical analysis of China's intelligence activities to include espionage, economic espionage, covert action, and export violations. This work is the most detailed work ever published in the unclassified world on China's intelligence tradecraft. It includes analysis of 595 cases of espionage, economic espionage, covert action, theft of technology and trade secrets. The study identifies and analyzes the specific espionage tradecraft used by China's intelligence services, State Owned Enterprises, private companies, and individuals. This is the first in a series of monographs on 'Chinese Intelligence Operations'. Each (5k - 10k) will focus on a specific aspects of China's espionage.
This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book d...
Newly revised and updated for 2016. A unique, insightful, and sometimes comical look into the behavior of the average American. Have you ever wondered who these Americans are? Why do they behave the way they do? What motivates them? How about their foreign policy? Perhaps you've overheard some Americans talking, or have business dealings with Americans. You may have even heard about America's social welfare policies, jobless rate, political elections, street crime, or the latest sex scandal and wondered just what these people are all about. Find your answers here. This book describes the behavior of Americans and explains the reasons for it. It is essential for business, travel, or just to know why the most powerful nation on Earth behaves in its own unique way.
First account to take us right through recent events, from the Beijing Olympics into Xi Jinping's absolute rule.
This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China's espionage organs, and links to an extensive online glossary of Chinese language intelligence and security terms. Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad.
China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and operation by providing new evidence and offering alternative interpretations of major events throughout Chinese Communist Party history. This analysis promotes a better understanding of the CCP's mechanisms for control over both Party members and the general population. This study specifies some of the broader implications for theory and research that can help clarify the nature of Chinese politics and potential future developments in the country's security and intelligence services.
Designed to be a high-level, approachable resource for engineers who need further insight into spatial temporal information systems from an ontological perspective, Spatial Temporal Information Systems: An Ontological Approach using STK® explains the dynamics of objects interaction from signal analysis to trajectory design, spatial modeling, and other spatial analytics by using STK®, which is a general-purpose modeling and analysis application for any type of space, defense, or intelligence system. Building a foundation to begin the study of spatial temporal information systems, the book details a form of analysis that is a powerful tool for modeling, engineering, and operations of space, ...
Conventional wisdom portrays the People's Republic of China (PRC) People's Liberation Army (PLA) as a backward continental force that will not pose a military challenge to its neighbors or to the United States well into the 21st century. PLA writings that demonstrate interest in exploiting the revolution in military affairs (RMA) are dismissed by a large segment of the PLA- watching community as wistful fantasies. The author offers an alternative perspective by outlining emerging PLA operational concepts and a range of research and development projects that appear to have been heavily influenced by U.S. and Russian writings on the RMA. Fulfillment of the PLA's vision for the 21st century could have significant repercussions for U.S. interests in the Asia-Pacific region.