Printer Friendly

Chinese Intelligence Operations.

Chinese Intelligence Operations. By Nicholas Eftimiades; published by Newcomb Publishers, Inc.; available at; pages; $15.99.

Nicholas Eftimiades, a member of the U.S. intelligence community and an officer in the Naval Reserve, has written a credible academic work on the methodologies used by Chinese intelligence and how they differ from those used by Western and Eastern European intelligence services.

Eftimiades notes Chinese successes, such as the theft of information on the neutron bomb from the Lawrence Livermore National Laboratory. He details some of China's aid operations, such as guerrilla training and the provision of scientists to countries hostile to the United States to help them develop missile and nuclear programs. The author even goes as far as listing specific Chinese hotels with rooms that are equipped with electronic surveillance devices to monitor foreign visitors.

Also discussed is China's use of Hong Kong as a base for receiving restricted technology equipment long before it rejoined the People's Republic of China. Eftimiades goes on to describe Chinese methods for recruiting students, scientists, and other Chinese nationals who will cooperate with, or be coerced into cooperating with, their intelligence services.

Weaknesses in Chinese intelligence are probed as well. For example, its intelligence services are inextricably bound up in red tape and its agents are unable to keep secrets secret. U.S. counterintelligence has its own weaknesses, Eftimiades shows, such as its limited knowledge of Chinese language, culture, and history.

Eftimiades wraps up with his prediction that Chinese intelligence will become more sophisticated, competent, and powerful, and will continue to focus its efforts on the West, the United States in particular. Overall this book is must reading for anyone whose responsibilities encompass the protection of classified information particularly those involved in training.

G. Ernest Govea, CPP, is the corporate facility security officer for Fluor Corporation. He has been responsible for the protection of classified information for 24 years in the military and in private industry. He is a member of ASIS.
COPYRIGHT 2000 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2000 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Review
Author:Govea, G. Ernest
Publication:Security Management
Article Type:Book Review
Date:Sep 1, 2000
Previous Article:Security Investigations: A Professional's Guide.
Next Article:Laptop security system.

Related Articles
One bugle, no drums: the marines at Chosin Reservoir.
FIXING THE SPY MACHINE Preparing American Intelligence for the Twenty-First Century.
CIA, Inc.: Espionage and the Craft of Business Intelligence.
The spies who came into the cold: the collapse of the Soviet empire may have ended the Cold War, but the result has been a cold peace.
The dragon's war; allied operations and the fate of China, 1937-1947.
Panel calls for currency reform: the bipartisan Currency Reform for Fair Trade Act could ensure countervailing duty laws apply to non-market...

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters