Guo, Xuezhi. China's Security State: Philosophy, Evolution, and Politics. Cambridge: Cambridge University Press, 2012.
Peake, Studies 59.1 (Mar. 2015), says that this "dense" narrative tells "the story of multiple organizations whose names change frequently and whose missions overlap as they compete to collect the intelligence used to control citizens and officials and identify spies and dissidents, who often spy on one another while protecting CCP leaders." This work "provides a necessary foundation toward th[e] goal" of understanding China's security and intelligence services."
Hannas, William C., James Mulvenon, and Anna B. Puglisi. Chinese Industrial Espionage: Technology Acquisition and Military Modernization. London: Routledge, 2013.
According to Nathan, FA 93.2 (Mar.-Apr. 2014), "[t]his book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications. They claim that the U.S. government (for which two of the authors work) has underestimated the severity of the threat from China, prompting them to go public with a brief based entirely on open sources." Mattis, IJI&C 28.2 (Summer 2015), says this "densely-packed book will not win any literary awards," but it is "rigorously researched" and "deserves a place on the professional security/counterintelligence officer's bookshelf."
Smith, I.C., and Nigel West. Historical Dictionary of Chinese Intelligence. Lanham, MD: Scarecrow Press, 2012.
To Peake, Studies 56.3 (Sep. 2012) and Intelligencer 19.3 (Winter-Spring 2013), this work provides "a valuable mix of case studies, institutional descriptions, organizational relationships, and commentary on key personnel." The book "documents the extent of Chinese global reach in espionage, including cyberespionage, and is the best reference work on the subject to date." Mattis, Studies 56.4 (Dec. 2012), is less than enthusiastic about this work, calling it "incomplete, often misleading, and ultimately" providing "a shaky foundation for building understanding of the challenge" represented by the PRC. Nevertheless, "on its technical merits, the book makes a lot of material readily accessible."
Wise, David. Tiger Trap: America's Secret Spy War with China. Boston, MA: Houghton Mifflin Harcourt, 2011.
Goulden, Washington Times, 7 Jun. 2011, finds that "[b]ased on extensive interviews with FBI counterintelligence officers," the author "offers a fascinating primer on how MSS [Chinese Ministry of State Security] tradecraft differs from that of the old KGB." Wise has produced "a groundbreaking and highly readable account" of Chinese espionage activities. Peake, Studies 55.3 (Sep. 2011), sees Tiger Trap as "a good account of contemporary Chinese espionage involving American targets," which also "explains Chinese modus operandi and tradecraft, reveals connections between operations, and identifies principal players."
For Mattis, IJI&C 25.1 (Spring 2012), this is a "compelling and engaging" book. However, it "largely fails ... to update the American experience with Chinese intelligence, instead relying on worn-out analysis of the Chinese." Nonetheless, it "helps fill in the gaps left by the Cox Committee report and the book by former Department of Energy intelligence chief, Notra Trulock" [Code Name Kindred Spirit (2002)].
Return to China Table of Contents