Chinese intelligence operations:
With this timely study, a seasoned sinologist publicly examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts to collect state and technological secrets, he says, have been going on mostly uninterrupted for decades while Western intellige...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English Chinese |
Veröffentlicht: |
Annapolis, Md.
Naval Inst. Press
1994
|
Ausgabe: | 1. print. |
Schlagworte: | |
Zusammenfassung: | With this timely study, a seasoned sinologist publicly examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts to collect state and technological secrets, he says, have been going on mostly uninterrupted for decades while Western intelligence services focused on the Soviet Union. Now, with the end of the cold war and the collapse of the USSR, attention must turn to these invasive operations Unstinting in his research, the author has made full use of Chinese sources and his own longtime study of China. In addition, he draws on his expertise as a counterintelligence analyst to examine the structure, objectives, and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreign affairs in China The author's interviews with a number of Chinese diplomats, military and civilian intelligence officers, and secret agents reveal the cloak-and-dagger activities common to Chinese operatives in the United States. These astonishing descriptions read like a gripping espionage novel. Yet the book is uncompromising in its studious documentation. The monograph from which this work sprung was honored in 1992 as the best scholarly article on the subject of intelligence by the National Intelligence Study Center - a think tank founded by former top CIA officials |
Beschreibung: | XV, 169 S. Kt. |
ISBN: | 1557502145 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV009633622 | ||
003 | DE-604 | ||
005 | 20080826 | ||
007 | t | ||
008 | 940608s1994 b||| |||| 00||| engod | ||
020 | |a 1557502145 |9 1-55750-214-5 | ||
035 | |a (OCoLC)29256127 | ||
035 | |a (DE-599)BVBBV009633622 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 1 | |a eng |h chi | |
049 | |a DE-12 |a DE-M481 |a DE-N2 |a DE-739 | ||
050 | 0 | |a JQ1519.5.I6 | |
082 | 0 | |a 327.1/251 |2 20 | |
100 | 1 | |a Eftimiades, Nicholas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Chinese intelligence operations |c Nicholas Eftimiades |
250 | |a 1. print. | ||
264 | 1 | |a Annapolis, Md. |b Naval Inst. Press |c 1994 | |
300 | |a XV, 169 S. |b Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a With this timely study, a seasoned sinologist publicly examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts to collect state and technological secrets, he says, have been going on mostly uninterrupted for decades while Western intelligence services focused on the Soviet Union. Now, with the end of the cold war and the collapse of the USSR, attention must turn to these invasive operations | |
520 | |a Unstinting in his research, the author has made full use of Chinese sources and his own longtime study of China. In addition, he draws on his expertise as a counterintelligence analyst to examine the structure, objectives, and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreign affairs in China | ||
520 | |a The author's interviews with a number of Chinese diplomats, military and civilian intelligence officers, and secret agents reveal the cloak-and-dagger activities common to Chinese operatives in the United States. These astonishing descriptions read like a gripping espionage novel. Yet the book is uncompromising in its studious documentation. The monograph from which this work sprung was honored in 1992 as the best scholarly article on the subject of intelligence by the National Intelligence Study Center - a think tank founded by former top CIA officials | ||
650 | 7 | |a Espionnage - Chine |2 ram | |
650 | 7 | |a Services de renseignements - Chine |2 ram | |
650 | 7 | |a Sécurité nationale - Chine |2 ram | |
650 | 4 | |a Intelligence service |z China | |
650 | 4 | |a Military intelligence |z China | |
650 | 4 | |a National security |z China | |
650 | 0 | 7 | |a Geheimdienst |0 (DE-588)4019737-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Arbeitsweise |0 (DE-588)4124564-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaftsspionage |0 (DE-588)4139137-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spionage |0 (DE-588)4056287-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Organisation |0 (DE-588)4043774-7 |2 gnd |9 rswk-swf |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
651 | 7 | |a Westliche Welt |0 (DE-588)4079237-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 1 | |a Geheimdienst |0 (DE-588)4019737-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 1 | 1 | |a Wirtschaftsspionage |0 (DE-588)4139137-8 |D s |
689 | 1 | 2 | |a Westliche Welt |0 (DE-588)4079237-7 |D g |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Organisation |0 (DE-588)4043774-7 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
689 | 3 | 0 | |a Arbeitsweise |0 (DE-588)4124564-7 |D s |
689 | 3 | |8 2\p |5 DE-604 | |
689 | 4 | 0 | |a Spionage |0 (DE-588)4056287-6 |D s |
689 | 4 | |8 3\p |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-006366301 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804123973153193984 |
---|---|
any_adam_object | |
author | Eftimiades, Nicholas |
author_facet | Eftimiades, Nicholas |
author_role | aut |
author_sort | Eftimiades, Nicholas |
author_variant | n e ne |
building | Verbundindex |
bvnumber | BV009633622 |
callnumber-first | J - Political Science |
callnumber-label | JQ1519 |
callnumber-raw | JQ1519.5.I6 |
callnumber-search | JQ1519.5.I6 |
callnumber-sort | JQ 41519.5 I6 |
callnumber-subject | JQ - Europe |
ctrlnum | (OCoLC)29256127 (DE-599)BVBBV009633622 |
dewey-full | 327.1/251 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.1/251 |
dewey-search | 327.1/251 |
dewey-sort | 3327.1 3251 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03867nam a2200673 c 4500</leader><controlfield tag="001">BV009633622</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080826 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">940608s1994 b||| |||| 00||| engod</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1557502145</subfield><subfield code="9">1-55750-214-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)29256127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV009633622</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="1" ind2=" "><subfield code="a">eng</subfield><subfield code="h">chi</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-M481</subfield><subfield code="a">DE-N2</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">JQ1519.5.I6</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.1/251</subfield><subfield code="2">20</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Eftimiades, Nicholas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Chinese intelligence operations</subfield><subfield code="c">Nicholas Eftimiades</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Annapolis, Md.</subfield><subfield code="b">Naval Inst. Press</subfield><subfield code="c">1994</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 169 S.</subfield><subfield code="b">Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">With this timely study, a seasoned sinologist publicly examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts to collect state and technological secrets, he says, have been going on mostly uninterrupted for decades while Western intelligence services focused on the Soviet Union. Now, with the end of the cold war and the collapse of the USSR, attention must turn to these invasive operations</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Unstinting in his research, the author has made full use of Chinese sources and his own longtime study of China. In addition, he draws on his expertise as a counterintelligence analyst to examine the structure, objectives, and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreign affairs in China</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The author's interviews with a number of Chinese diplomats, military and civilian intelligence officers, and secret agents reveal the cloak-and-dagger activities common to Chinese operatives in the United States. These astonishing descriptions read like a gripping espionage novel. Yet the book is uncompromising in its studious documentation. The monograph from which this work sprung was honored in 1992 as the best scholarly article on the subject of intelligence by the National Intelligence Study Center - a think tank founded by former top CIA officials</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Espionnage - Chine</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Services de renseignements - Chine</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité nationale - Chine</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence service</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military intelligence</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Arbeitsweise</subfield><subfield code="0">(DE-588)4124564-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftsspionage</subfield><subfield code="0">(DE-588)4139137-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spionage</subfield><subfield code="0">(DE-588)4056287-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Organisation</subfield><subfield code="0">(DE-588)4043774-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Westliche Welt</subfield><subfield code="0">(DE-588)4079237-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Wirtschaftsspionage</subfield><subfield code="0">(DE-588)4139137-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Westliche Welt</subfield><subfield code="0">(DE-588)4079237-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Organisation</subfield><subfield code="0">(DE-588)4043774-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Arbeitsweise</subfield><subfield code="0">(DE-588)4124564-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Spionage</subfield><subfield code="0">(DE-588)4056287-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-006366301</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | China (DE-588)4009937-4 gnd Westliche Welt (DE-588)4079237-7 gnd |
geographic_facet | China Westliche Welt |
id | DE-604.BV009633622 |
illustrated | Illustrated |
indexdate | 2024-07-09T17:38:16Z |
institution | BVB |
isbn | 1557502145 |
language | English Chinese |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-006366301 |
oclc_num | 29256127 |
open_access_boolean | |
owner | DE-12 DE-M481 DE-N2 DE-739 |
owner_facet | DE-12 DE-M481 DE-N2 DE-739 |
physical | XV, 169 S. Kt. |
publishDate | 1994 |
publishDateSearch | 1994 |
publishDateSort | 1994 |
publisher | Naval Inst. Press |
record_format | marc |
spelling | Eftimiades, Nicholas Verfasser aut Chinese intelligence operations Nicholas Eftimiades 1. print. Annapolis, Md. Naval Inst. Press 1994 XV, 169 S. Kt. txt rdacontent n rdamedia nc rdacarrier With this timely study, a seasoned sinologist publicly examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts to collect state and technological secrets, he says, have been going on mostly uninterrupted for decades while Western intelligence services focused on the Soviet Union. Now, with the end of the cold war and the collapse of the USSR, attention must turn to these invasive operations Unstinting in his research, the author has made full use of Chinese sources and his own longtime study of China. In addition, he draws on his expertise as a counterintelligence analyst to examine the structure, objectives, and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreign affairs in China The author's interviews with a number of Chinese diplomats, military and civilian intelligence officers, and secret agents reveal the cloak-and-dagger activities common to Chinese operatives in the United States. These astonishing descriptions read like a gripping espionage novel. Yet the book is uncompromising in its studious documentation. The monograph from which this work sprung was honored in 1992 as the best scholarly article on the subject of intelligence by the National Intelligence Study Center - a think tank founded by former top CIA officials Espionnage - Chine ram Services de renseignements - Chine ram Sécurité nationale - Chine ram Intelligence service China Military intelligence China National security China Geheimdienst (DE-588)4019737-2 gnd rswk-swf Arbeitsweise (DE-588)4124564-7 gnd rswk-swf Wirtschaftsspionage (DE-588)4139137-8 gnd rswk-swf Spionage (DE-588)4056287-6 gnd rswk-swf Organisation (DE-588)4043774-7 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf Westliche Welt (DE-588)4079237-7 gnd rswk-swf China (DE-588)4009937-4 g Geheimdienst (DE-588)4019737-2 s DE-604 Wirtschaftsspionage (DE-588)4139137-8 s Westliche Welt (DE-588)4079237-7 g Organisation (DE-588)4043774-7 s 1\p DE-604 Arbeitsweise (DE-588)4124564-7 s 2\p DE-604 Spionage (DE-588)4056287-6 s 3\p DE-604 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Eftimiades, Nicholas Chinese intelligence operations Espionnage - Chine ram Services de renseignements - Chine ram Sécurité nationale - Chine ram Intelligence service China Military intelligence China National security China Geheimdienst (DE-588)4019737-2 gnd Arbeitsweise (DE-588)4124564-7 gnd Wirtschaftsspionage (DE-588)4139137-8 gnd Spionage (DE-588)4056287-6 gnd Organisation (DE-588)4043774-7 gnd |
subject_GND | (DE-588)4019737-2 (DE-588)4124564-7 (DE-588)4139137-8 (DE-588)4056287-6 (DE-588)4043774-7 (DE-588)4009937-4 (DE-588)4079237-7 |
title | Chinese intelligence operations |
title_auth | Chinese intelligence operations |
title_exact_search | Chinese intelligence operations |
title_full | Chinese intelligence operations Nicholas Eftimiades |
title_fullStr | Chinese intelligence operations Nicholas Eftimiades |
title_full_unstemmed | Chinese intelligence operations Nicholas Eftimiades |
title_short | Chinese intelligence operations |
title_sort | chinese intelligence operations |
topic | Espionnage - Chine ram Services de renseignements - Chine ram Sécurité nationale - Chine ram Intelligence service China Military intelligence China National security China Geheimdienst (DE-588)4019737-2 gnd Arbeitsweise (DE-588)4124564-7 gnd Wirtschaftsspionage (DE-588)4139137-8 gnd Spionage (DE-588)4056287-6 gnd Organisation (DE-588)4043774-7 gnd |
topic_facet | Espionnage - Chine Services de renseignements - Chine Sécurité nationale - Chine Intelligence service China Military intelligence China National security China Geheimdienst Arbeitsweise Wirtschaftsspionage Spionage Organisation China Westliche Welt |
work_keys_str_mv | AT eftimiadesnicholas chineseintelligenceoperations |