CHINA

Post-1949

General

A - K

Barron, John. "The Spy Who Would Be Free." Reader's Digest, Jun. 1988, 115-120, 215-238.

Barron, John. "Tracking China's Master Spy." Reader's Digest, Dec. 1989, 97-99.

Bergin, Bob. "The Growth of China's Air Defenses: Responding to Covert Overflights, 1949–1974." Studies in Intelligence 57, no. 2 (Jun. 2013): 19-28.

Despite political and economic turmoil from the late-1950s into the 1970s, "one con- stant kept air force leadership focused: intrusions into PRC airspace by US and ROC reconnaissance aircraft.... The flights, which did not end until 1974, were recurring reminders of China's vulnerability and spurred PLAAF efforts to counter the threat. The air defenses that emerged contributed to the end of the incursions and became the foundation of the sophisticated air defense system that protects the PRC today."

Byron, John, and Robert Pack. The Claws of the Dragon: Kang Sheng, The Evil Genius Behind Mao -- and His Legacy of Terror. New York: Simon & Schuster, 1992.

Chang, Jung. and Jon Halliday. Mao: The Unknown Story. London: Jonathan Cape, 2005.

Peake, Studies 50.2 (2006), finds that "the dominant theme" of this book is "Mao's self-centered lifelong pursuit of power, the steps he was willing to take to achieve and keep it, and his distaste for the peasant.... An essential element in both acquiring power and keeping it was a reliable security service. The authors blend Mao's actions toward this end throughout the book, and they describe his mercurial relationship with Kang Sheng."

Deacon, Richard [Donald McCormick]. The Chinese Secret Service. New York: Taplinger, 1974. Revised and updated. London: Grafton Books, 1989. [pb]

Dimitrakis, Panagiotis. "US Intelligence and Chinese Spies in the Civil War." Journal of Intelligence History 13, no. 1 (2014): 62-75.

"The ... Strategic Services Unit (SSU), the X-2 Branch..., Army and Naval Intelligence, the Central Intelligence Group (CIG) and ultimately, the Central Intelligence Agency (CIA) were the key agencies handling secret human sources, witnessing the rapid decay of the KMT regime, the performance of its security apparatus, and the PLA's secret activities.... US intelligence also noted the extensive recruitment of Japanese intelligence networks and operators to serve the Soviets, the KMT regime and the Communist Party of China (CPC)."

Devore, Howard O. China's Intelligence and Internal Security Forces: Jane's Special Report. Alexandria, VA: Jane's Information Group, 1999.

Douglass, Joseph D., Jr. Red Cocaine: The Drugging of America. Atlanta, GA: Clarion House, 1990.

Surveillant 1.1: The author sees a "war-by-drugs against the U.S. by both China and the USSR and its surrogates.... [His] research is supported by abundant documents and notes.... [Douglass points to] links to the intelligence services of the USSR, China, and Cuba."

Eftimiades, Nicholas.

See separate file for material by Nicolas Eftimiades on the Chinese intelligence organizations.

Faligot, Roger, and Remi Kauffer. Tr., Christine Donougher. The Chinese Secret Service: Kang Sheng and the Shadow Government in Red China. New York: Morrow, 1989. London: Headline Books, 1990. [pb] Kang Sheng et les services secrets Chinoise. Paris: Editions Robert Lafont, 1987.

Gertz, Bill. "China Recruits Spies for Science." Washington Times, 11 Oct. 1999. [http:// www.washtimes.com]

According to the quarterly report of the National Counterintelligence Center (NCIC), "China is recruiting scientists around the world in its efforts to acquire weapons technology from other countries."

Gilley, Bruce. "China's Spy Guide: A Chinese Espionage Manual Details the Means by Which Beijing Gathers Technology and Weapons Secrets from the United States." Far Eastern Economic Review, 23 Dec. 1999, 14. [http://www.feer.com]

A 361-page book, published in China in 1991 and written by "two of China's top military intelligence specialists," is "believed to be the first comprehensive manual on China's overseas military espionage to have been seen outside the country." The book, entitled Sources and Methods of Obtaining National Defence Science and Technology Intelligence, "outlines strategies for gathering both open and secret military technologies from abroad, and provides information on how to gather such intelligence in the United States."

Goncharov, Sergei N., John W. Lewis, and Xue Litai. Uncertain Partners: Stalin, Mao, and the Korean War. Stanford, CA: Stanford University Press, 1993.

Return to China Table of Contents