Free Essay

Counterintelligence and Chinese Wave of Spies

In:

Submitted By alexanderpushkin
Words 1767
Pages 8
Counterintelligence and Chinese wave of spies

INTL 408 B001 SPR 15 Professor John Dolan June 29, 2015

Introduction China has set a goal for itself to become a global power; having full dominance in the Pacific region. (Secretary’s International Security Advisory Board ISAB) It wants to dominate the region and the United States with its economy growth, military domination, and technological advancement. To achieve their strategic goal, Chinese leadership is trying to modernize every aspect of their economy and military. On the economic arena this means accelerated growth through technological development. (ISAB) On the military side, it means modernizing its military from a manpower-based land army to a technology advanced and proficient army on a world scale. (ISAB) In order to achieve this level of modernization and growth, China uses every effort and means possible. That means buying new technologies from the West, but it also means using espionage to acquire secret corporate and military intelligence. China utilizes its intelligence security services in these efforts, but also has called upon Chinese immigrants/expats with ties to Chinese heritage that hold key access at important industries such as naval and aviation. This creates an insider threat for United States’ security. Secret data on U.S. military technology is being stolen by a long-term Chinese insider threat that is being addressed by US counter intelligence operations. This paper will discuss one case of an American Chinese insider threat that was exposed and possibly saved American military servicemen’s lives. This paper will look and examine the case of Chi Mak and how CI agents conducted their operation. Factual Background information
Chi Mak was a senior engineer for Power Paragon, Inc., a defense contractor in Anaheim, California, that designs and manufactures electrical systems for U.S. Navy combat ships and submarines. (United States v. Mak 2012, 7377) On October 28, 2005, Chi Mak’s brother and his sister-in-law were arrested by the Federal Agents at the Los Angeles International Airport prior to boarding a flight to China. (United States v. Mak 2012, 7377) When they were arrested, the Federal Agents found an encrypted CD with classified files was in their baggage, which was given to them by Chi Mak. It contained export-controlled naval technology, including documents regarding the Quiet Electric Drive project; a project intended to decrease the signature noise data emitted by U.S. Navy submarines and warships. (United States v. Mak 2012, 7377) The encrypted CD also contained information regarding the operations of solid-state power switches. (United States v. Mak 2012, 7377) The U.S. Navy utilizes both of these technologies. Chi Mak was also arrested. After the arrest, FBI agents conducted a detailed search of his home where they discovered numerous other documents containing protected military technology currently used by US military forces. (United States v. Mak 2012, 7377) Mak was indicted and ultimately charged with five counts: one count of conspiracy to violate the AECA, two counts of attempting to violate the AECA, one count of operating as an agent of a foreign government in the United States, and one count of lying to a federal agent. (United States v. Mak 2012, 7381) On May 7, 2007, a jury found Mak guilty on all counts and was sentenced to 293 months in federal prison (United States v. Mak 2012, 7381) Others convicted in the Mak’s ring included his brother, their wives, and Chi Mak’s son. They served time in federal prison and then were deported to China. Another engineer, Greg Chung, was also arrested and was sentenced to 15 years in custody.

Assessing the threat
Chi Mak’s involvement as a long-term intelligence officer for the Chinese military began in the 1970’s when Mak was monitoring the movement of U.S. Navy ships entering and leaving the Hong Kong harbor during the Vietnam War. (Bhattacharjee, 2014)
At the time of his arrest, he had worked for more than 20 years in the U.S. defense industry and brought very little concern to his employers. (Roche 2008, 2) He was a naturalized citizen of the United States and had worked to obtain high levels of access to information, gaining access to highly sensitive military technology. (Roche 2008, 2) He became a high-level insider security threat providing the People’s Republic of China with highly technical military technology. He was involved in running a spy network assisting another engineer in conducting espionage that provided PRC with thousands of pages of manuals regarding space, aviation, and the latest naval technology. The technological information Chi Mak provided to the PRC contained details on U.S. ships and submarines’ critical gaps and vulnerabilities as well as information on maneuverability that China could exploit thus putting thousands of US military personnel at risk. Those manuals also provide information on offensive weapons and technology that PRC could reversely engineer, thus gaining more powerful and lethal military weapons. In Roche’s words, “Those national security secrets in some future time would enable the People’s Liberation Army to more effectively kill Americans.” (pg1)
Indicators
Chi Mak and his spy ring were brought to the FBI’s attention by an unknown source that reported possible conduct of espionage. Chi Mak and Greg Chung both displayed outstanding models at work and their interest in engineering. They spent their adult lives in America working for the same companies, thus becoming “fixtures.” (Roche 2008, 1) That was an advantage for Chi Mak as a long-term mole for the PRC. (Roche 2008, 1) However, neither Mak nor Chung had assimilated into American life outside their jobs. Both were indicators of being a inside threat and should have raised flags of espionage to their employers. Another indicator of suspicion was their frequent travel to China and frequent correspondence with Chinese colleagues such as Chen QiNan. Such correspondence provided opportunities for technological exchanges. (Bhattacharjee 2014) Another indicator of a high-level threat was that they continually mentioned and talked about Chinese government and policies in social settings. Chi Mak often made remarks about Mao and his influence and how his views were misunderstood. (Bhattacharjee 2014) Lastly, both Mak and Chung conducted research outside their specific specialty rather than follow their task list. Chi Mak was ordered by PRC handlers to collect information on a variety of technologies such as: torpedo design, aircraft carrier electronics, and a space-launched magnetic levitational platform. (Roche 2008, 13) In order to collect that information Mak and Chung had to work odd hours, or would stay late after work in order to gain access to classified information outside of their scope. All such indicators are consistent with a high level of inside threat espionage and provided a framework that such individuals must be more thoroughly screened. Operation details After the FBI received a tip regarding Chi Mak, agents collected his trash and analyzed it for any documents that were related to passing classified materials to PRC and any dealings with Chinese agents. (Roche 2008, 2) FBI agents also positioned constant surveillance of his house, both visually and electronically, with cameras monitoring his computer room. Audio listening devices were placed in his phones, house, and his car. (Bhattacharjee 2014) Also, the FBI team made surreptitious entrees into his house to collect evidence of his activities. (Roche 2008, 3) Such FBI tactics are common practice in counter-espionage investigations to conduct those types of clandestine entrees into a suspect’s house to conduct searches while leaving no visible evidence that an entrée was made. (Roche 2008, 7) During these searches several technical manuals were found. Agents also discovered information regarding contacts with other members of the Mak spy ring such as Chung and connections to Chinese government officials who had provided task lists and instructions on how to send secret information. Those finds lead FBI to conduct the same actions on Chung’s and Mak’s brothers house. These searches led to greater finds of military espionage and connections to PRC intelligence services. Those finds contained thousands of documents, including many design manuals related to U.S. military aircraft such as the B-1 bomber, the C-17 military cargo plane, the F-15 fighter jet, and the Chinook 47 and 48 helicopters. (Bhattacharjee 2014) In the words of one of the FBI agents “It was like walking into King Solomon’s mine.” (Bhattacharjee 2014) The role counterintelligence agents played The main role of counterintelligence agents in this case was to utilized and focus resources in order to collect enough evidence to prosecute spies conducting espionage. In this case the lead counterintelligence agent was agent Gaylord. Gaylord put his surveillance team on Chi Mak, following his every move as well as monitoring his communications. Gaylord conducted physical surveillance in order to obtain Mak’s pattern of life in the area surrounding the house where he lived. (Bhattacharjee 2014) While establishing Mak’s pattern of life, Gaylord also collected Mak’s garbage, in which his colleagues found shredded task lists for a future U.S. destroyer that was written in Mandarin. (Bhattacharjee 2014) Then agent Gaylord directed his team to surreptitiously enter Mak’s house where they discovered classified documents and contacts of other Chinese engineers that lived in California. (Bhattacharjee 2014) Agent Gaylord subsequently investigated other contacts related to Chi Mak, thus exposing the entire espionage ring. Results and assessment of the operation’s success This counter-intelligence operation was a great success and key to the security of U.S. military technology. Chi Mak was convicted and sentenced to 24 years in federal prison. Chung was convicted and sentenced to 14 years. (Bhattacharjee 2014) Mak’s brother was convicted as well as their wives, and was deported to China. The assessment of the damage regarding how much technical information has transferred to the PRC military industry and how much can of it the Chinese can use is unknown. However, disabling Mak’s spy ring has protected many classified secrets. The end result is that in case of military conflict between U.S. and China, U.S. military servicemen’s lives are less in danger due to the successful operation of FBI’s counterintelligence team. (Bhattacharjee 2014)

Bibliography

Bhattacharjee, Yudhijit. "How the F.B.I. Cracked a Chinese Spy Ring - The New Yorker." The New Yorker. May 12, 2014. Accessed June 30, 2015. Bhattacharjee, Yudhijit. "A New Kind of Spy - The New Yorker." The New Yorker. Accessed June 30, 2015.

"China's Strategic Modernization; International Security Advisory Board." Accessed June 30, 2015. Roche, Edward. "Surveillance." In Snake Fish: The Chi Mak Spy Ring, 2-7. New York: Barraclough, 2008. "United States v. Mak." UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT. June 12, 2012. Accessed June 30, 2015.

Similar Documents

Free Essay

Mr Edgy

...WikiLeaks This article is about the website and organisation. For the Australian political party, see The Wikileaks Party. Note that WikiLeaks has no connection whatsoever to Wikipedia or its parent, the Wikimedia Foundation, which operates the encyclopedia. WikiLeaks The logo of WikiLeaks, an hourglass with one globe leaking to the second | | Web address | WikiLeaks.org [1] a | Slogan | We open governments. | Commercial? | No | Type of site | Document archive and disclosure | Registration | None | Available in | English, but the documents are written in various languages | Owner | Sunshine Press | Created by | Julian Assange | Launched | 4 October 2006 | Alexa rank | 14,957 (April 2014[2]) | Current status | Online | WikiLeaks is an international, online, non-profit, journalistic organisation which publishes secret information, news leaks, and classified media from anonymous sources. Its website, initiated in 2006 in Iceland by the organization Sunshine Press, claimed a database of more than 1.2 million documents within a year of its launch. Julian Assange, an Australian Internet activist, is generally described as its founder, editor-in-chief, and director. Kristinn Hrafnsson, Joseph Farrell, and Sarah Harrison are the only other publicly known and acknowledged associates of Julian Assange. Hrafnsson is also a member of Sunshine Press Productions along with Assange, Ingi Ragnar Ingason, and Gavin MacFadyen.[3][4] The group has released...

Words: 12383 - Pages: 50

Premium Essay

Scanning Applications

...U.S. Department of Justice Federal Bureau of Investigation 2012 The Strategic Information and Operations Center at FBI Headquarters is the 24/7 command post that monitors FBI operations and law enforcement activities around the globe. An FBI agent examines a potentially contaminated letter during a white powder training exercise. 2012 The FBI Story I A Message from FBI Director Robert S. Mueller, III For the FBI and its partners, 2012 was a year that reminded us once again of the seriousness of the security threats facing our nation. During the year, extremists plotted to attack—unsuccessfully, thanks to the work of our Joint Terrorism Task Forces—the U.S. Capitol, the New York Federal Reserve Bank, and other landmarks on U.S. soil. Tragically, on the 11th anniversary of 9/11, a hateful attack in Benghazi took the lives of the U.S. Ambassador to Libya and three other Americans. In the cyber realm, a rising tide of hackers took electronic aim at global cyber infrastructure, causing untold damages. High-dollar white-collar crimes of all kinds also continued to siphon significant sums from the pocketbooks of consumers. And in Newtown, Connecticut, 20 young children and six adults lost their lives in one of the worst mass shootings in American history, ending a year of violence that saw similar tragedies around the country. Working with its colleagues around the globe, the FBI is committed to taking a leadership role in protecting the nation. As you can see from...

Words: 67387 - Pages: 270

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a decade...

Words: 249168 - Pages: 997

Free Essay

Mentalist- What Every Body Is Saying

...What Every Body is Saying An Ex-FBI Agent’s Guide to Speed-Reading People Joe Navarro FBI Special Agent (Ret.) with Marvin Karlins, Ph.D. To my grandmother, Adelina, whose withered hands lovingly molded a child into a man. —JOE NAVARRO To my wife, Edyth, who has blessed me with her love and taught me what it means to be a caring human being. —MARVIN KARLINS Contents Foreword: I See What Y ou’re Thinking Acknowledgments One Two Three Four Five Six Seven Eight Nine Mastering the Secrets of Nonverbal Communication Living Our Limbic Legacy Getting a Leg Up on Body Language: Nonverbals of the Feet and Legs Torso Tips: Nonverbals of the Torso, Hips, Chest, and Shoulders Knowledge Within Reach: Nonverbals of the Arms Getting a Grip: Nonverbals of the Hands and Fingers The Mind’s Canvas: Nonverbals of the Face Detecting Deception: Proceed with Caution! Some Final Thoughts Bibliography Searchable Terms About the Authors Other Books by Joe Navarro with Marvin Karlins Credits Copyright About the Publisher FOREWORD I See What Y ou’re Thinking Marvin Karlins, Ph.D. The man sat stoically at one end of the table, carefully crafting his replies to the FBI agent’s inquiries. He wasn’t considered a major suspect in the murder case. His alibi was believable and he sounded sincere, but the agent pressed on nevertheless. With the suspect’s consent, he was asked a series of questions about the murder weapon: “If you had committed this...

Words: 70938 - Pages: 284

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455

Free Essay

Living History

...___________________________ LIVING HISTORY Hillary Rodham Clinton Simon & Schuster New York • London • Toronto • Sydney • Singapore To my parents, my husband, my daughter and all the good souls around the world whose inspiration, prayers, support and love blessed my heart and sustained me in the years of living history. AUTHOR’S NOTE In 1959, I wrote my autobiography for an assignment in sixth grade. In twenty-nine pages, most half-filled with earnest scrawl, I described my parents, brothers, pets, house, hobbies, school, sports and plans for the future. Forty-two years later, I began writing another memoir, this one about the eight years I spent in the White House living history with Bill Clinton. I quickly realized that I couldn’t explain my life as First Lady without going back to the beginning―how I became the woman I was that first day I walked into the White House on January 20, 1993, to take on a new role and experiences that would test and transform me in unexpected ways. By the time I crossed the threshold of the White House, I had been shaped by my family upbringing, education, religious faith and all that I had learned before―as the daughter of a staunch conservative father and a more liberal mother, a student activist, an advocate for children, a lawyer, Bill’s wife and Chelsea’s mom. For each chapter, there were more ideas I wanted to discuss than space allowed; more people to include than could be named; more places visited than could be described...

Words: 217937 - Pages: 872

Free Essay

Abbriviations

...Аббревиатура в словообразовательной системе английского языка Оглавление Введение Глава 1. Сокращение и его место в системе английского языка 1.1 Понятие сокращения в современной лексикологии 1.2 Типы аббревиатур Глава 2. Аббревиатура в словообразовательной системе английского языка 2.1 Структурно-семантические классификации английских сокращений и их место в словообразовательной системе английского языка 2.2 Аббревиация как один из способов категоризации специальных понятий Глава 3. Основные способы перевода и переноса аббревиатур с английского языка на русский 3.1 Перевод аббревиатурой и перевод развернутой формой 3.2 Транскрипция сокращений Заключение Библиография Введение В наше время в языке научной, технической, экономической литературы, как английской, так и русской, встречается большое количество разного рода сокращений. Рост числа сокращений, находящих применение в современном английском языке, совершенно закономерен. Следствием развития науки и техники, международных интеграционных процессов в области экономики и народного хозяйства является появление все новых и новых понятий, которые нуждаются в терминировании. Большинство новых понятий и в русском, и в английском языках выражается при помощи словосочетаний или сложных слов, так как именно эти виды терминов дают возможность отразить необходимые и достаточные признаки того или иного понятия с наибольшей полнотой и точностью. Но термины - сложные слова и словосочетания - громоздки. Поэтому и появляется...

Words: 45938 - Pages: 184

Free Essay

Code

...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...

Words: 190498 - Pages: 762

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742