#1 Best Seller
Japan foreign book category
a book by Jason Ho & Moet Fukada
Discover the untold stories of China's covert operations and how they affect global business, security, and innovation.
“
Reveals deep mysteries of the intelligence services of China and its allies.
“
Kwon, Young – Hae,
Former Director of National Security and Minister of Defense of the Republic of Korea
This book could be a golden guide to anyone conducting business or investing in many areas of Asia. The sections on gangs, secret organizations and political interconnections are extremely researched and explained. Anyone who has asked how Mao could have come to assume the power and influence he did needs to read this — it was not an overnight event, but deeply rooted in the traditions and culture of China. The same goes for anyone who tries to predict tomorrow’s headlines in the area, especially regional conflicts between China and Taiwan, or conflicts in the South China Seas.
You can get a thorough understanding of the extent and background of China’s intelligence operations in the US and major Western and Asian nations on China, Taiwan, and Japan. Incredibly well researched by experts in the field, the volume offers up a wealth of knowledge that international intelligence agencies work hard to conceal. It goes into great detail of how massive theft of classified and corporate intellectual property is stolen, including the deliberate planting and support of Asian students and engineers in government contractors, and the manipulation of legal systems with investments in law firms.
Jason Ho & Moe Fukada
Author of the Book
Espionage and IP Theft
The Role of the Chinese Communist Party (CCP)
Historical Context of Chinese Intelligence Operations
Implications for U.S. National Security
The book covers the little-known intelligence operations and IP theft of China and the Chinese Communist Party. It covers material of interest to U.S. and Western intelligence and national security agencies. It is also vital for businessmen and anyone planning on investing in China, or in using its low-cost manufacturing facilities.
The cover of the book shows Chinese troops parading in Washington, D.C. This may seem outrageous, but is really meant to graphically illustrate the huge threat that China poses to the U.S., largely unseen. A trip to a local American hardware or electronics store should be a hint—almost nothing there is made in the U.S. Popular internet apps such as TikTok and Zoom are controlled by China, as are many of the components, software applications and connectors of Internet computing systems. The U.S. is proud of its military, and spends nearly $1 trillion (including classified programs) on it each year, yet key equipment of that military, including F35 and F22 fighter planes, UAVs such as the RQ-1 Predator, and major components of the Strategic Nuclear Force such as the B2 Spirit bomber have all been copied by China, which managed to steal the designs for them and avoid paying the hundreds of billions of dollars in development costs. The book contains a more complete list of these, along with names and photos of their Chinese copies.
Soviet era spying was well covered in the West, with stories and TV programs about the success of Russian agents including Allan May of the Manhattan Project and journalist Richard Sorge, as well as double agents such as Robert Hanssen of the FBI and Kim Philby of MI6. However, very little has been revealed about Chinese spies. If they are as numerous as the Russian agents of the Soviet era, there may be some 20,000 of them in the U.S., stealing not only military secrets, but also technology from major American corporations controlling computers, software, electric power networks and other areas that will determine which countries rule the future.
In addition to stealing technology designs, these spies are also busy conducting cyber warfare to influence U.S. politics and laws. Companies that admitted they were infiltrated by Chinese spies include Google, Northrop Grumman, Dow Chemical, Adobe, Symantec, Yahoo and Microsoft, which suffered its Exchange Server data breach which allowed China to access the servers of some 30,000 companies in the U.S., as well as those of the European Banking Authority and the Norwegian Parliament.
Join industry leaders, business strategists, and security professionals who are gaining invaluable insights and staying ahead in a rapidly evolving landscape.