Chinese industrial espionage : technology acquisition and military modernization
Author(s)
Bibliographic Information
Chinese industrial espionage : technology acquisition and military modernization
(Asian security studies)
Routledge, 2013
- : hbk
- : pbk
Available at 6 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
-
Library, Institute of Developing Economies, Japan External Trade Organization図
: pbkAECC||351.74||C618318634
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This new book is the first full account, inside or outside government, of China's efforts to acquire foreign technology.
Based on primary sources and meticulously researched, the book lays bare China's efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods-without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history."
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People's Republic of China's policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.
This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
Table of Contents
Introduction 1. China's History of Relying on Western Technology 2. China's Use of Open Sources 3. Trade for Technology 4. PRC-based Technology Transfer Organizations 5. US-based Technology Transfer Organizations 6. China's Foreign Students in the United States 7. Bringing Technology 'Back' to China 8. Traditional Chinese Espionage 9. Chinese Cyber Espionage 10. Chinese Industrial Espionage in Context Conclusion Appendices
by "Nielsen BookData"