作者:理查德‧費希爾(Richard D. Fisher) 2012年12月3日Aviation Week & Space Technology
中國是最難攻克的間諜目標,但其長期的保密文化並不意味著在其國家安全法保護下的一切秘密都無法獲取。只要小心從事,可以從許多公開渠道獲得相對有用的情報。
單純的語言和戰略文化為中國的機密架起了一堵高高的圍墻。被派往中國的美國軍方人員接受的教導是“中國的第一道戰略防禦是中文”。通曉中文需要約十年時間,而且還基本上是無用功,最重要的是,許多中國人承認,軍事和科學領域使用的是一些不為外人所知的獨特詞匯。
英國和美國的情報機構曾利用臺灣和英國控制的香港存在的漏洞取得過勝利。發生在毛澤東和臺灣國民黨政府之間一度十分激烈的戰鬥就包括了不遺余力地進行間諜活動。臺灣利用許多中國人的貧困,成功地獲得了一些情報。
不過,今天這一招已經不太管用。美中情報戰的一名前美國觀察家對本刊說,中國轉變成一個經濟強國這一點已經使得一度十分管用的利誘手段所帶來的回報降低。中國政府為國內外的中國人提供了無法抗拒的物質刺激,使他們致力于滿足政府而不是外國列強的意願。
至于臺灣,它與中國大陸爭奪海外華人忠誠的努力已于上世紀90年代末結束。因為臺灣的經濟精英們已經清楚地把他們的未來押在了去中國做生意上。一些渠道發現,臺灣的間諜成功率下降了。報紙頭條更常見的是某位臺灣高級軍方將領為中國從事間諜活動。
財富使得中國得以跟上信息時代對保密的要求。
除了攻擊外國情報網絡的大量黑客外,中國還擁有一支網際網路大軍。2010年底,這些人員幫助加強了中國的影響力,他們在美國國防部長訪華前夕,允許有關殲20隱形戰機的模糊照片出現在軍事網站上,預告了該戰機的首次“正式”飛行。
不過,這種舉動表明了中國對其未來力量日益增長的自信,從而使得通過公開渠道挖掘該國目前和未來戰鬥能力的努力更為容易和更富成果。例如,軍事項目的擴大意味著必須提供更多信息以進行武器銷售。
有關殲-10戰機首次試飛的基礎數據直到14年後才在2012年的珠海航展上披露,但有關更現代、作戰能力更強的戰機的類似數據在其月31日的首次試飛後兩周就被披露了。增長的自信,以及希望去除疑慮,還導致中國公開其太空計劃的願望增強。
遠程核導彈、反衛星武器、能量武器等雖然未在武器展上展出,但(通過細致閱讀、將作者及單位結合起來等)可以從像“中國知網”這樣的海量中國電子數據庫中通過中國工程類雜志獲得有關這些項目的情報。
在得知外國研究人員更多地通過公開數據來獲取情報後,中國有意制造混淆。曾在中國工作過的美國軍事人員伍爾澤8月份在《外交學者》上撰文說,中國最近公開的一本有關核戰略的高度敏感的書籍可能是一種反間諜行為。
長期來看,對敏感信息流的平衡還需要考慮像教育這樣的“雙向”領域。2010至2011學年,在美國大學學習的中國學生超過15.7萬人,其中主要集中在航天工程這樣的自然科學專業,而當年有1.4萬美國人在中國大學學習,其中主要是學習語言。也許應該讓中國人進入像麻省理工學院這樣的美國重要航天研究中心,與增加美國人進入像哈爾濱工業大學這樣的中國頂尖航天研究中心相關聯。
China’s Defense Secrecy Still Robust
By Richard D. Fisher, Jr. Washington
Source: Aviation Week & Space Technology
China is one of the most difficult espionage targets to crack. However, its long-standing culture of secrecy—modernized and codified under decades of Chinese Communist Party rule—does not mean everything that is hidden by pervasive state secrecy laws is inaccessible. With due care, many open sources can be exploited to gain relatively useful insights.
Language and strategic culture alone create a high wall surrounding China's secrets. American military attaches assigned to the country are taught that “China's first line of strategic defense is the Chinese language.” It takes about a decade to become reasonably proficient in Chinese—all too often an impractical quest—but on top of that, many Chinese will admit that the vocabularies of the military and related sciences approach a separate language, unknown to most.
To make its language more accessible, the country sponsors more than 100 Confucius Institutes worldwide, mainly on university campuses, to provide subsidized language instruction. But the expectation is that their hosts will practice self-censorship regarding sensitive topics, such as Taiwan and Tibet, while the Chinese instructors gain an opportunity to become better acquainted with the students, should they pursue a career in the government or military.
China's development of a strategic culture that nearly worships secrecy and deception, exemplified by the works of Sun Tzu (596-544 BC)—which are venerated in China today much like the writings of the U.S. founding fathers—predates the harsh realist counsel of Niccolo Machiavelli by almost 2,000 years. Historian and translator Ralph Sawyer has noted that for Sun Tzu and his contemporaries, secrecy offered a “force multiplier,” recalling Sun Tzu's often quoted lines: “The pinnacle of military employment approaches the formless . . . . If I determine the enemy's disposition while I have no perceptible form, I can concentrate my forces while the enemy is fragmented.”
Sun Tzu maintained that the ability of a leader to keep and enforce secrecy formed a key aspect of his “virtue,” or his moral strength to rally followers. Secrecy as a virtue pervades former “paramount leader” Deng Xiaoping's 24-character strategy that guided China's 1980s foreign policy: “Observe calmly; secure our position; cope with affairs calmly; hide our capacities and bide our time; be good at maintaining a low profile; and never claim leadership.”
China's historic cultivation of secrecy was reinforced by Mao Zedong's victory in 1949 in two distinct ways. First, the Leninist heritage and structure of the Communist Party demanded pervasive secrecy regarding itself, the military, state and economy, while the party secured absolute control over information and the media and started campaigns of indoctrination.
Today, depending on the sector, information transparency in China is controlled, very limited or non-existent. There are no public dates for meetings of the top governing politburo standing committee or top central military commission, much less minutes or transcripts. There has been no demand for them in the state-controlled media, so it is not surprising that it would not occur to most Chinese that the meetings and their proceedings should be public knowledge. Chinese government numbers for gross domestic product or defense budgets are not “real,” but the world accepts them largely out of habit.
The handlers provide a near-immediate warning mechanism for government officials, who can then restrict or deny access to researchers or others who prove problematic, a method long applied to encourage self-censorship in foreign academic, business and even government circles. The result is that many foreign researchers are effectively co-opted by China's secrecy culture.
Mao's second contribution to modern Chinese information security was to impose nearly three decades of strict isolation on the Chinese people. Vital military information was difficult to obtain, and major catastrophes, such as the Mao-induced Great Famine of 1959-62 that took more than 40 million lives, were largely unknown beyond the Chinese who were affected. Rare foreign visitors were handpicked friends of China, or (as seen during the late 1960s and early 1970s) great efforts were made to deceive early academic delegations, up to and including the construction of “Potemkin Villages.” Anti-foreign paranoia was pervasive. A former Chinese official, who was part of one of the early Mao-era foreign missions to Europe in the mid-1950s, recounted to this analyst that upon his return, his unauthorized purchase of foreign cigarettes would be used to justify a decade-long sentence to a farm labor camp.
The desperation of this period provided opportunities for the British and U.S. intelligence communities to score victories through the keyholes of Taiwan and British-controlled Hong Kong. A sometimes hot war between Mao and Taiwan's Nationalist government included energetic espionage campaigns that yielded some results, with Taipei successfully exploiting the poverty of many Chinese and appeals to anger with the Communist Party. A formal Taiwan-U.S. military alliance from 1954 to 1980 involved extensive intelligence cooperation, including electronic and signals intelligence gathering and “Black Cat” overflights by U-2s supplied by the CIA and supported by the U.S. Air Force, but with Taiwanese pilots and insignia. Some intelligence cooperation continues under the quasi-diplomatic U.S.-Taiwan relationship.
Today, however, the tide of incentives is against the West. One former U.S. observer of the U.S.-China intelligence battle tells Aviation Week that China's transformation into an economic superpower has reduced the once-myriad rewards for exploitation. By controlling access to China's phenomenal economic rise, the government has created almost irresistible inducements for Chinese at home and abroad to conform to its desires and appeals rather than cooperate with foreign powers.
As for Taiwan, its titanic struggle with China for the loyalties of overseas Chinese ended by the late 1990s, as it became clearer that Taiwan's economic elite had bet their future on access to business in China. Some sources note that Taiwan's espionage successes have declined. The more frequent headline is the exposure of a senior Taiwanese military officer spying for China, or the use of a Taiwan national or false-flag operation by China to pursue intelligence goals in the U.S. Should Taiwanese increasingly perceive a shift of power to China away from the U.S., the challenge of maintaining loyalties to the government in Taipei (much less to its U.S. defense relationship) will only increase.
Wealth has enabled China to keep pace with new information age requirements to maintain secrecy. In the early 1990s, new startup companies with strong ties to military and intelligence sectors, such as Huawei and ZTE, built a self-contained, national, fiber-optic “Great Wall” network that was inherently secure because it had only a few access points and did not use more accessible legacy transmission systems.
In addition to a multitude of hackers exploiting foreign information networks, China maintains an army of Internet censors, numbering in the tens of thousands, to squash dissent, eliminate sensitive postings and manage information revelations. In late 2010, these censors helped project Chinese power as they allowed distant and indistinct images of the Chengdu J-20 stealth fighter to appear on military web pages, previewing its “official” first flight on the eve of a visit by a U.S. defense secretary.
Such assertiveness, however, also betrays China's gradually rising confidence in its future power, which has made it easier and more productive to exploit open sources to gain insights into the country's current and future capabilities. For example, the expansion in military programs means that more information has to be offered to promote desired foreign sales. It took 14 years from first flight for basic data about the Chengdu J-10 fighter to be revealed at the 2012 Zhuhai air show, whereas similar data for the more modern and capable Shenyang J-31 were revealed two weeks after its Oct. 31 first flight—because Shenyang seriously wants to sell this fighter. Growing confidence, as well as a desire to quell suspicions, has led to increasing Chinese willingness to reveal more about its space program, too.
Long-range nuclear missiles, anti-satellite weapons, military space planes and energy weapons are not being previewed at arms shows, but (with careful reading and correlation of authors and institutes) it is possible to gain insights into these programs from Chinese engineering journals available from huge Chinese electronic databases, such as the China National Knowledge Infrastructure.
Writing for these journals is very popular, as it provides Chinese academics a rare opportunity to profit personally from their research. But these databases also feature a vast collection of U.S. and other foreign academic products that give Chinese researchers insights into weapons programs, whereas strict Chinese censorship ensures their academic products do not identify military programs or weapons.
Knowing that foreign researchers are relying more on open data, China is not beyond poisoning this well to sow confusion. Writing in The Diplomat in August, a former two-term U.S. Army attache to China, Larry Wortzel, suggests that China's recent release of a very sensitive book about its nuclear strategy—that also happened to affirm its “defensive” nuclear strategy in the face of troubling indications otherwise—may be an operation in perception management.
In the long term, a balance of sensitive information flows will require consideration of “reciprocity” in sectors such as education. In 2010, more than 157,000 Chinese studied at U.S. universities, with a majority concentrated in hard sciences, such as aerospace engineering, whereas 14,000 Americans studied at Chinese universities that year, most of them learning the language. Perhaps China's access to key U.S. aerospace centers, such as the Massachusetts Institute of Technology, should be made contingent on increasing U.S. access to China's top aerospace centers, such as the Harbin Institute of Technology.