Posted on July 24, 2007

Law Enforcement Struggles To Combat Chinese Spying

David J. Lynch, USA Today, July 22, 2007


The government, which detailed its surveillance of the Mak family in court documents, would eventually claim the material he disclosed would enable an enemy to track and kill American sailors.

The Oct. 28, 2005, arrests capped a 20-month probe that illuminated the difficulty of combating what government officials say is an aggressive Chinese espionage campaign that vacuums up advanced U.S. technology secrets from defense and civilian companies alike.

“The Chinese are putting on a full-court press in this area.… They are trying to flatten out the world as fast as possible,” says Joel Brenner, national counterintelligence executive. “One of the ways they accelerate that process is economic espionage. If you can steal something rather than figure it out yourself, you save years. You gain an advantage.”

Brenner, who directs the United States’ counterspy efforts in the office of the director of national intelligence, says China’s technology thieving is “the norm” among industrial nations. But if China is not unique, it does stand out — along with Russia, Cuba and Iran — as among the most active nations, Brenner says.

Beijing’s goals aren’t limited to traditional national security interests. The world’s fastest-growing economy operates a shadowy technology bazaar where individuals offering trade secrets find a ready buyer. About one-third of all economic espionage investigations are linked to Chinese government agencies, research institutes or businesses, according to Bruce Carlson of the FBI’s counterintelligence division, who leads the bureau’s efforts to combat Chinese spying. Since 2001, the number of FBI investigations of suspected Chinese economic espionage cases increased 12%. “The basis for the whole program is money. People (in the USA) are looking to make a buck. China has money to spend,” says Carlson.

China’s technology-targeting differs from classic Cold War-era spying, which pitted American intelligence agents against their KGB counterparts. Along with using intelligence professionals, China seeks to capitalize on some of the thousands of Chinese and Chinese-American engineers, researchers, scientists and students who fill key positions in U.S. industry and academia, say current and former U.S. counterintelligence officials.

“This is not some ‘yellow peril’ witch hunt.… The counterintelligence environment in terms of China right now is just white-hot,” says James Mulvenon, director of the Center for Intelligence Research and Analysis, a Washington, D.C., think tank that advises U.S. intelligence agencies.

Long-running spy plot

In some cases, individuals stealing trade secrets execute Beijing’s orders. That’s what the Justice Department says occurred with Chi Mak, 66, who was born in Guangzhou, was educated in Shanghai and became a naturalized U.S. citizen in 1985. He obtained a “secret”-level security clearance in 1996.

FBI agents found four Chinese-language “tasking lists” in Mak’s trash, which they say itemized specific technologies that China covets, such as “aircraft carrier electronic systems” and “submarine propulsion technology.” One of the lists also directed Mak, a senior engineer working on power systems for Navy submarines, to join professional associations and attend advanced research seminars.

The Justice Department presented other evidence that alleged Chinese government involvement. An FBI wiretap, for example, heard Tai Mak, 57, nine days before he was arrested, call a man in Guangzhou and identify himself as being from “Red Flower of North America.”

On the other end of the line was Pu Pei Liang, a researcher at Zhongshan University’s Chinese Center for Asia Pacific Studies, which the prosecution said performs “operational research” for China’s People’s Liberation Army. Chinese intelligence operations routinely use the names of flowers, such as “winter chrysanthemum” and “autumn orchid,” prosecutors said.

Especially damaging to Mak were four letters from another Chinese official, Gu Weihao, a relative of his wife’s and a senior engineer at the Ministry of Aviation Industry. Written in the late 1980s, three of the letters were discovered in Mak’s home; the fourth was found in the home of Greg Chung, an engineer for Boeing (BA).

In a May 2, 1987, letter, Gu introduces Mak to Chung and discusses the latter’s upcoming trip to China: “You can discuss the time and route of your trip to China with Mr. Mak in person.… You may use ‘traveling to Hong Kong’ or ‘visiting relatives in China’ as reasons for traveling abroad. … Normally, if you have any information, you can also pass it on to me through Mr. Mak. This channel is much safer than the others.”


Some driven by greed

Beijing often capitalizes on what might be called espionage entrepreneurs: engineers or executives who exploit their positions in U.S. companies to pilfer corporate data they know will be welcomed in a China that is eager to catch up with the West. “In the vast majority of cases, it’s the almighty dollar,” says Mulvenon. “It’s just pure greed.”

Next month in San Jose, Calif., two men who pleaded guilty in December to two counts each of economic espionage for stealing trade secrets from Sun Microsystems (SUNW) and semiconductor maker Transmeta (TMTA) are scheduled to be sentenced in U.S. District Court. They each face up to 30 years in jail.

Fei Ye and Ming Zhong, former co-workers at Transmeta, based in Santa Clara, Calif., admitted to stealing secrets to produce computer chips for a firm they had established in Hangzhou, about 100 miles southwest of Shanghai. Theirs were the first convictions under the 1996 Economic Espionage Act, which made the theft of trade secrets a federal crime.

Their new company, called Supervision, expected funding from the Hangzhou municipal government and the provincial government of Zhejiang province, renowned as China’s capitalist heartland. The men were working with a professor at Zhejiang University who planned to help them secure additional funding from a national technology research program, according to their plea agreements.

Supervision would “raise China’s ability to develop superintegrated circuit design and form a powerful capability to compete with worldwide leaders’ core development technology and products in the field of integrated circuit design,” according to a corporate charter found at Ye’s home.

Documents discovered after the men were arrested at San Francisco International Airport on Nov. 23, 2001, demonstrate that the Supervision project was highly regarded by Chinese officials. “The project will be extremely useful to the development of China’s integrated circuit industry,” said a Chinese panel of experts, which recommended that “every level of government offer their support toward the implementation of this project.”


Intensive surveillance


Post-arrest searches of Mak’s home turned up more than 900 documents relating to various military programs, including proprietary material from General Dynamics’ (GD) Electric Boat, Raytheon (RTN) and Northrop Grumman’s (NOC) Ingalls shipbuilding division. But none of it was classified, beyond the “NOFORN” designation barring distribution to foreigners.

To the FBI, the lack of classified material was evidence of cunning. “He went right up to that line of classified information, and he stopped there,” says the FBI’s Carlson. “He took everything else he could get his hands on. They don’t need secret documents (to) get a very good picture of our advanced military hardware.”


Mak’s work centered on the Quiet Electric Drive, a Navy program intended to outfit submarines with propulsion systems that would be quieter and thus harder to detect. His disclosures, a Navy official testified, would save the Chinese “years of wasted research.”

But the absence of classified material meant that the case turned on complex questions of export control law. The U.S. Attorney initially argued that even material in the public domain could not be transferred to China because of the U.S. arms embargo imposed after the 1989 shootings of pro-democracy protestors in Tiananmen Square.

That claim drew harsh criticism from some trade lawyers, who said it implied that even universities providing Chinese students basic engineering educations or Boeing’s airplane sales to Chinese airlines would breach export law, according to Clif Burns, a partner at Powell Goldstein in Washington, D.C., and an adjunct professor of law at the Georgetown University Law Center.


The jury sided with prosecutors and found that Mak, acting as a foreign agent, had engaged in a conspiracy to funnel technical information to the Chinese.

Kaye says the jury was “frightened” by Navy testimony about China’s naval buildup. On June 11, arguing that prosecutors had wildly overstated the evidence and intimidated a key defense witness from testifying, Kaye sought a new trial.

Where they are now

Meanwhile, Mak, once a respected engineer, now is prisoner 29252-112 in Los Angeles’ Metropolitan Detention Center. His wife, Rebecca, 63, who pleaded guilty last month to failing to register as a foreign agent, is back at the couple’s Downey, Calif., home, wearing a monitoring device on her ankle and practicing the Chinese tai chi exercise routine in her yard. She is expected to be sentenced to three years in federal prison on Oct. 29.

Tai Mak, who pleaded guilty to conspiring to export defense articles, faces a maximum jail term of 10 years when he is sentenced Oct. 1.

His wife, Fuk Li, 49, is expected to receive probation for aiding and abetting the illegal exports.

Their son, Yui Mak, 27, who helped encrypt the disks his parents were carrying in their luggage, pleaded guilty to aiding and abetting and is expected to be placed on probation.