2013
DOI: 10.4324/9780203630174
|View full text |Cite
|
Sign up to set email alerts
|

Chinese Industrial Espionage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(10 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…27 The first of these insights-the need to treat counterintelligence as part of S&T threat awareness and mitigation-applies to China especially, whose technology depends heavily on foreign access and whose own collection posture reflects this dependency. 28 The commission's findings cited the U.S. government's less-than-stellar record addressing the issue of technology transfer: "Finding 1: The Commission found a limited effort by the IC to discern and exploit the strategic R&D-especially non-military R&D-intentions and capabilities of our adversaries, and to counter our adversaries' theft or purchase of U.S. technology."…”
Section: A 2013 Us Senate Commission On Intelligence Defined It Thimentioning
confidence: 99%
“…27 The first of these insights-the need to treat counterintelligence as part of S&T threat awareness and mitigation-applies to China especially, whose technology depends heavily on foreign access and whose own collection posture reflects this dependency. 28 The commission's findings cited the U.S. government's less-than-stellar record addressing the issue of technology transfer: "Finding 1: The Commission found a limited effort by the IC to discern and exploit the strategic R&D-especially non-military R&D-intentions and capabilities of our adversaries, and to counter our adversaries' theft or purchase of U.S. technology."…”
Section: A 2013 Us Senate Commission On Intelligence Defined It Thimentioning
confidence: 99%
“…Instead, counter-transfer efforts should focus on more targeted programs such as investment screening, enhanced information security, and the prosecution of industrial espionage. 76 These programs should involve extensive partnerships with private sector actors, who possess much of the most sensitive AI technology and knowledge. They should also emphasize efforts aimed at prevention in addition to response 77 and be implemented with due attention to the risks of discriminatory impacts or perceptions.…”
Section: Priority 1: Target Immigration and Count-er-transfer Reformsmentioning
confidence: 99%
“…While Hannas, Mulvenon and Puglisi focus on the period after 1978 in the USA, there are several similarities to the situation in the 1950s and 1960s in Europe, for example the fact that most Chinese students abroad studied engineering and sciences, and the fact that the Chinese government actively encouraged them to return to China. 44 However, the Chinese officials in Switzerland not only targeted Chinese students in Europe but also ethnic Chinese students like Taiwanese and Chinese Indonesians. The main reason for this was probably that there were simply not enough Chinese students in Europe.…”
Section: Expat Networkmentioning
confidence: 99%
“…According to Hannas, Mulvenon and Puglisi, the Chinese government relied both on open sources like foreign scientific literature and overseas scholars, as well as on espionage in its efforts to modernize China. 72 China's industrial espionage in Cold War Europe can be put into two categories: firstly, technological information that could be used to copy Western production processes and products, and secondly, attempts to obtain embargo goods as well as scientific knowledge and know-how related to China's nuclear weapons program.…”
Section: Industrial Espionage and Intelligencementioning
confidence: 99%
See 1 more Smart Citation