Ajit Doval

SADAKHUSH

Senior Member
Joined
Sep 7, 2010
Messages
1,839
Likes
780
Country flag
I am creating this tread exclusively on speeches by Ajit Doval. If moderators think they need to move it in different section than do so. Let us discuss the our internal security related matters and how we can meet the challenges by two neighbours till one of them does not exist in few years time.

 

Tshering22

Sikkimese Saber
Senior Member
Joined
Aug 20, 2010
Messages
7,869
Likes
23,259
Country flag
Now is the time for him to start working on Baloch independence movement.

He said that if we had a major terrorist attack, Balochistan will be made a separate country.

Time to do it now.
 

indiatester

Senior Member
Joined
Jul 4, 2013
Messages
5,856
Likes
20,249
Country flag
Now is the time for him to start working on Baloch independence movement.

He said that if we had a major terrorist attack, Balochistan will be made a separate country.

Time to do it now.
If they are going to start now, it would a shame indeed.
It is time to start testing the tools now.
 

Screambowl

Ghanta Senior Member?
Senior Member
Joined
Jan 1, 2015
Messages
7,950
Likes
7,908
Country flag
the most heard and followed.
where he says about balochistan

 

LondonParisTokyo

Senior Member
Joined
Oct 15, 2015
Messages
2,963
Likes
8,227
Country flag
Why does India want to grant freedom to Baluchistan and not absorb it back into India? This is the most confusing thing. I'm sure there are Indians who can trace their ancestry to this place.
 

airtel

Senior Member
Joined
Dec 25, 2015
Messages
3,430
Likes
7,814
Country flag
How National Security Advisor Ajit Doval’s son Shaurya reinvented himself into a key policy player
By Rahul Tripathi, ET Bureau | Aug 03, 2015, 08.08 AM IST
READ MORE ON » Shaurya Doval | National Security Advisor | Narendra Modi | Morgan Stanley | investment banking | India Inc | Funding | Ajit Doval

The media barely knows Shaurya Doval. But those who know how things work in Delhi’s establishment say Junior Doval practices Track 1.5 diplomacy.
He's an alumnus of London School of Business and Chicago University, has worked as investment banker for GE Capital and Morgan Stanley and heads the India unit of an investment fund, Zeus Caps, backed by a super wealthy Saudi Sheikh - but that's not what makes Shaurya Doval (40) special. Neither it is that Shaurya's father happens to be India's National Security Advisor, Ajit Doval.

There are plenty of foreign-educated, foreign-trained, well-to-do progenies of senior, powerful babus. But Shaurya is something others in that privileged group are not - he's an increasingly influential player in shaping Modi Sarkar's policy thinking.

Junior Doval's rise since Modi Sarkar came to power has been a quiet affair. The media barely knows him. But those who know how things work in Delhi's establishment say Junior Doval practices Track 1.5 diplomacy.

That means Shaurya, a director in the principal driving force behind the BJP/RSS- heavyweights-dominated think-tank, India Foundation, is far closer to actual policymakers than your usual Track II enthusiasts are. ET spoke to over a dozen people for this profile. Shaurya Doval met ET. Ajit Doval, did not respond to ET's questions. Many people ET spoke to participated on the condition they not be identified.

NDA'S THINKTANK

India Foundation, set up five years back, calls itself an 'independent research centre'. Its current offices are in a tony apartment in New Delhi's ultra-posh Hailey Road. The apartment was used by Nirmala Sitharaman, minister for corporate affairs, before NDA came to power. When Sitharaman moved out to her ministerial bungalow, India Foundation shifted offices to the apartment. Its earlier offices were in Jangpura, a nice South Delhi locality, but nowhere as plush as Hailey Road.

Sitharaman, along with ministers Suresh Prabhu and Jayant Sinha, are directors of the Foundation. Influential RSS leader Ram Madhav, who's now a BJP general secretary, is also a director. As is ex-editor and current BJP spokesperson MJ Akbar. Madhav and Doval Junior set up the India Foundation. Doval Junior left his plum investment banking job and got back to India in 2009.

Like the Viveknanda Foundation, with which Senior Doval was closely associated, the India Foundation is a forum for the political right. But the son's think-tank has a reach the father's never had.

Senior government officials say India Foundation is beginning to have the same influence on Modi government's policy thinking that the National Advisory Council had on UPA-1's. "It's Modi Sarkar's quasi-NAC", one bureaucrat said. NAC-like formal recognition may or may not come to the Foundation, but NAC-like access to the highest offices is evident.

CONSIDER THE FOLLOWING:

.. Shaurya Doval and Ram Madhav are deeply involved in planning Indian diaspora events that are such a crucial part of Prime Minister's foreign visits.

.. The Madison Square event during Modi's US trip, a PM speech during his France trip that was broadcasted to French-controlled islands that have substantial Indian-origin population, many of the PM's public functions during his visit to Indian Ocean island countries - Doval was a planner for all these high profile and crucial events.

.. And Ajit Doval's son is also playing a key part in planning the big diaspora event in San Francisco in September, where the PM will interact with Silicon Valley's Indian elite.

The venue is Ram Madhav's South Avenue residence in New Delhi. Attendees include senior bureaucrats, senior members of New Delhi's diplomatic establishment, strategic affairs and internal security experts, Indian and foreign, and well-connected people who hang around every political establishment, that is, lobbyists.

Shaurya Doval's and Ram Madhav's Wednesday talk shops, a senior diplomat said, have become the meeting place in New Delhi now. Heavyweights of the Modi government - Defence Minister Manohar Parikkar, Shaurya's father NSA Ajit Doval, Foreign Secretary S Jaishankar - have spoken at these sessions, which are closed to the media.

And it's not just Wednesdays. When India Foundation organised a seminar on counterterrorism in Jaipur in March, seven NDA ministers and NSA Ajit Doval attended. That kind of star power comes only when the organisers are very well-connected with the powers that be.

Ram Madhav pretty much said it when he addressed a high-powered gathering under the aegis of the Foundation just before the PM visited Bangladesh in June. Speaking at New Delhi's India Habitat Centre - a sprawling complex of buildings in Lutyen's Delhi that's an elite club as well as a favourite site for corporate, think-tank and NGO talkathons - Madhav said, "do not think that this (India Foundation engagements) is back-channel or track II. These engagements are as important as official engagements and government takes it very seriously." In the audience were ministers from both India and Bangladesh. Incidentally, this was a two-day talk shop.

The Foundation hosted the second day at the Habitat. The Bangladesh High Commission sponsored the first day. The venue was Oberoi Hotel in New Delhi.

At that same seminar, Railway Minister Suresh Prabhu said "I am not here as union minister but as the director of India Foundation... This is the 'Foundation' on which you can build a superstructure."

That was a pithy description of the Foundation's influence. "This government listens to them (the Foundation)', a senior bureaucrat said. Others in the policy establishment say it now pays to track the talk shops being organised by Shaurya Doval's thinktank. "What they talking about and who is doing the talking...those are clues", is how another bureaucrat put it.

The Foundation's December 2014 India Ideas conclave in Goa was an elaborate affair. Writing about it in the Foundation's monthly journal, Doval Junior said the purpose is to make India reclaim her leadership role, by asking "nationalist thinkers from all over the world' to debate the idea of India.

A just-concluded August retreat in Madhya Pradesh with participation of young BJP MPs and a September economic policy conclave, expected to draw heavyweights from India Inc and NRI entrepreneurs, are other Foundation events that show its influence. The PM is likely to speak at that conclave. "It's the talk shop number 1 in Delhi right now" is how a veteran bureaucrat, familiar with the establishment's ways, described Shaurya Doval's think-tank.

WHAT SHAURYA SAYS

Doval Junior met ET. He said India Foundation doesn't make policies. "No thinktank makes policies. Governments make policies and think-tanks are one of the influences in policy formulation..." But he's also clear about the goal of increasing influence. "In coming days, the think-tank will play a major role in government policy formulation...it will evolve the way think-tanks have evolved in the US and China."

He elaborated further on his idea of an influential think-tank. . "I think every political party in this country needs to have their think-tank. India Foundation has been able to influence government decisions in many ways...but the influence changes from policy to policy. It will not be right for me to name the changes in policy which came because of us."

People who know the New Delhi establishment say Doval is right but that there's even more to India Foundation. "It's a question of how easily you can reach the ears that matter", one diplomat said, "the Foundation can reach all the ears that matter very quickly".

Shaurya Doval told ET he first conceptualised the role of India Foundation as a forum for economic agendas and religious studies. "I relocated myself to India in 2009," he said. The Foundation was set up the same year. "We are a think-tank with a nationalistic view," Doval said.

Asked about funding - the Foundation is registered as a trust - Doval said the monthly journal is a big revenue source. "We raise sponsorship and get endowments from various sources. It is all done around the work we do or seminars we organize. We get into partnership with various stakeholders and we do our share and they do theirs," he told ET.

Ram Madhav, the co-creator of the Foundation, told ET, India Foundation is different from other think-tanks. "We are different... India Foundation has intervened at political levels so that certain issues can be pushed. This is done by actively networking... we first get to understand issues...we bring out research papers only after that," Madhav said. He gives an example of networking - important visiting delegations meeting NDA MPs under the aegis of the India Foundation. Is NDA ministers' membership of the Foundation a proof of its power and influence? Madhav says ministerial involvement is a "coincidence". "These people were all public intellectuals before they became ministers... some of them were Foundation members before they became ministers", Madhav said, adding that the search is on for more directors.

ROLL OVER IIC

India International Centre, a club for the elite that's older than the Habitat, has for years been a venue where Delhi's powerful would gather for apparently informal but ultimately influential chats. Before Narendra Modi stormed into power in May 2014, one of IIC's notable chat sessions was the so called Saturday club. Ex-bureaucrat Nripendra Misra was the convener.

The Saturday club was recognized by the power cognoscenti as a place to be. Misra was picked by the PM to be his principal secretary. And Shaurya Doval's Wednesday closed door discussions have replaced the Saturday club as the Delhi establishment's prime talk shop.

That as ex-investment banker who used to strategise on leveraged buy outs now commands more influence than the grey eminences of IIC says much about the power shift in New Delhi - it encapsulates the rise of Shaurya Doval.

http://articles.economictimes.india.../65165615_1_ajit-doval-ram-madhav-modi-sarkar


why saudi sheikh is investing money in the company of Ajit doval's son??


@Abhijat @A chauhan @Alien @alphacentury @Ancient Indian @anupamsurey @Bharat Ek Khoj @blueblood @brational @Bangalorean @Blackwater @Bornubus @bose @cobra commando @DingDong @DFI_COAS @ersakthivel @fooLIam @gpawar @guru-dutt @hit&run @HariPrasad-1 @Indx TechStyle @jackprince @Kharavela @Illusive @I_PLAY_BAD @LETHALFORCE @Lions Of Punjab @maomao @Mad Indian @OneGrimPilgrim @Peter @piKacHHu @pmaitra @porky_kicker @Razor @raja696 @Rowdy @Sakal Gharelu Ustad @saty @sydsnyper @Srinivas_K @Screambowl @sorcerer @Simple_Guy @Sylex21 @wickedone @tarunraju @TrueSpirit2 @thethinker @vayuu1 @VIP @Vishwarupa @VIP @Varahamihira @roma @Navnit Kundu @rock171
@rashna
 

Dovah

Untermensch
Senior Member
Joined
May 23, 2011
Messages
5,614
Likes
6,793
Country flag
Classic hit-piece.

They couldn't find anything to disprove Doval's exploits and rely on the testimonies such as that of an anonymous member from a Paki forum and a journalist who was embedded with a sniper and couldn't see "the supercop" moving about inside the Golden Temple, while a ranking military officer said it was true.

While the people who confirm Doval's stories are high ranking military officials but then they discredit them because they are his "friends".

Expected from Caravan mag. The birds will gobble this up.

-----------------------------------------------------------

In exchange for the hostages, the hijackers demanded, among other things, the release of 36 Islamists held in Indian prisons and $200 million in cash
Not convicted terrorists, but Islamists. Yeah, I understand the purpose of this article.

------------------------------------------------------------

A gift that keeps on giving:

In a 2013 piece titled “Ishrat Jahan case: Intelligence won’t survive the investigation,” Praveen Swami recalled the story of Doval’s actions at the Golden Temple in 1988 and his subsequent decoration with the Kirti Chakra, India’s second-highest award for peacetime gallantry. Then he wrote, “He won that medal for unspeakable crimes. Like many former intelligence officials, Doval considers himself bound not to discuss past operations. I have his permission, though, to speculate that it may have involved the cold-blooded execution of a Pakistani intelligence officer, the illegal detention of terrorism suspects, torture, the smuggling of arms and explosives across India’s borders, and the use of false identities.”
Many of Doval’s public statements echo the draconian majoritarianism of the BJP and the RSS, often in euphemistic security jargon. “India’s internal vulnerabilities are much higher than its external vulnerabilities,” he said in an interview in 2006 where he identified “infiltration of Bangladeshis”—the disputed notion, fanned by the BJP and the wider Sangh Parivar, of an ongoing invasion of illegal Bangladeshi immigrants—as “the biggest internal security problem.” He continued,
--------------------------------------------------------------

Finally finished the article. Typical lefty yellow-journalism. All negative comments are from anonymous sources or the likes of Coupta, Ajay Shukla etc.

Good luck to anyone who decides to waste 40 minutes reading this propaganda piece like I did. :sad:
 
Last edited:

hit&run

United States of Hindu Empire
Mod
Joined
May 29, 2009
Messages
14,104
Likes
63,371
Thanks for tagging me.

I think @Dovah has already decoded the article for us and there is nothing much to add.

However one thing I must highlight that Leftist opinion makers have reduced themselves to defuse every social media discourse that somehow shows Right Wing in positive light. These so called intellectuals and analysts were never so exposed like they are now. Their method is to pick weak arguments, make trolls look like mainstream and thrive at their peril.

I actually hope their method has plenty of conviction because this keeps them away from ground realities and disconnected with silent majority who is far more capable in separating wheat for the chaff, I mean rhetoric and reality.

In this particular case any intelligent person, let say members of this forum would know the weaknesses and limitations of NSA Ajit Doval working in a particular capacity. Country as big as Indian the National Security and policy making and implementation is not one man's cup of tea.

Creating his caricature larger than life may have all the political rhetoric in it but his intentions and visible work is what all matters at the end of the day. So far he is doing good.
 

Kyubi

Regular Member
Joined
Oct 30, 2013
Messages
486
Likes
511
Country flag
Thanks for tagging me.

I think @Dovah has already decoded the article for us and there is nothing much to add.

However one thing I must highlight that Leftist opinion makers have reduced themselves to defuse every social media discourse that somehow shows Right Wing in positive light. These so called intellectuals and analysts were never so exposed like they are now. Their method is to pick weak arguments, make trolls look like mainstream and thrive at their peril.

I actually hope their method has plenty of conviction because this keeps them away from ground realities and disconnected with silent majority who is far more capable in separating wheat for the chaff, I mean rhetoric and reality.

In this particular case any intelligent person, let say members of this forum would know the weaknesses and limitations of NSA Ajit Doval working in a particular capacity. Country as big as Indian the National Security and policy making and implementation is not one man's cup of tea.

Creating his caricature larger than life may have all the political rhetoric in it but his intentions and visible work is what all matters at the end of the day. So far he is doing good.
True what @Dovah has explained in his earlier post, i for one had the same outlook, the fact that it was caravan , i fully accepted that this is gonna be a hit job.. but as i wade through the article i was simply shocked to see 8 pages dedicated to Doval.

What struck me is unlike other articles this one carefully managed to not discredit doval's history but set a narrative by tempering his antics and heroics. This was solely possible by bringing in information from "different sources" and excerpts from books etc.. Now so far they have had success is setting the tone of the article, moving on to his dilliances with External Affairs section of our polity.. His relationship with S jaishankar .. the article does try to draw a picture that both of them although having direct access to PMO do have had differrences in their approach, thus by using referrences to nicknames being peddelled aka ,NSA(pak) etc.. the article thus gives the impression to an neutral observer that NSA using his closer proximity to PMO has had a " Policing approach to deal with EAM exigencies" . Whereas S Jaishankar with his diplomatic approach has been far better at addressing issues.

Another small yet significant part is the involvement of think tanks for policy making.. here Doval with his right wing approach and S Jaishankar wanting for all types of think tanks to be a part .. if one were to look at this it is fair to assume that VIF and India Foundation has a significant influence in policy making. making it even more apparant is the Nondescript nature of India Foundation.

This whole arrangement of right wing think tanks draws parallels with NAC of the UPA era.

Now all this inferences would suggest a neutral reader of the article that NSA has a very close proximity to PMO and his coterie are meddling in the depts that are not under their purview.. and his larger than life antics and heroics are all part of a narrative/posturing to allow for far greater control over running the country.

I would say that that an unbiased reader would find this article hitting the bulls eye in terms projecting politics as an grey area where the fine line between truth and lie is often muddled in propaganda.

The Caravan has done its job to again difuse/ridicule anything which shows the present dispensation in gud light.



Sent from my SM-G935F using Tapatalk
 

cyclops

Senior Member
Joined
Apr 24, 2016
Messages
1,318
Likes
5,767
Country flag
Ajit Doval's views on the chini intelligence apparatus.


AJIT DOVAL'S PERSPECTIVES

Ajit Doval is India's National Security Adviser (NSA). He is a former Director of the Intelligence Bureau(IB)of India.He is a recipient of the Kirti Chakra, one of the highest military gallantry awards, the President's Police Medal for distinguished service, and the Indian Police Medal for meritorious service.He takes on national and global security issues ranging from counter- terrorism to India’s strategic challenges.
Friday, June 28, 2013

Chinese Intelligence: From a Party Outfit to Cyber Warriors


Chinese Intelligence: From a Party Outfit to Cyber Warriors
June 12, 201
Shri Ajit Doval*,​
Former Director of Intelligence Bureau


Whatever yardstick we choose to apply – size of the economy and its rate of growth, military hardware and pace of modernisation, stability of the polity and the government; size, population and geo-political setting – China qualifies for a major power status. If we decide to be more candid than correct in making a hard headed assessment, its rise is not an assured peaceful rise. Its military build up, maritime ambitions, territorial claims, assertions in the cyber world and space etc have definite security ramifications both for the region and the world at large. The direction, intensity and form of these assertions among other things will be determined by China’s self view of its interests, capacities and limitations on one hand and assessment of global response to its actions on the other. In making these policy choices, the intelligence capability of the Chinese state will play a seminal role.
No one has internalised, more than the Chinese, the fact that strategic strength of a nation is directly proportionate to its knowledge dominance. Three millennium back, they believed in Sun Tzu’s dictum, ‘Know thy self, know thy enemy - a thousand battles, a thousand victories’, and they continue to believe it till date. While advances made by China in its economy, military modernisation, defence production and technology acquisition have been intensely studied and analysed, not much is known or written about its intelligence apparatus, its capabilities and vulnerabilities, role in policy making, systems and structures etc. Though China, compared to the past, has opened up in certain fields, its intelligence apparatus, not much understood by intelligence experts and scholars, remains a dark area. It assumes special import in the wake of its acquiring major power status on one hand, and expanding scope of clausewitzian doctrine of “War through other means” like cyber war on the other. It becomes all the more relevant in the Chinese context, as espionage has been integral to its strategic tradition and state craft.
EVOLUTION:
The history of Chinese intelligence is as old as that of the early warring kingdoms of ancient China. In terms of its antiquity, it can be compared only with the history of Indian intelligence that dates back to about 700 BC, perfected by Chanakya during the Mauryan Empire (322 to 185 BC); the only difference being that while the Indians proclaimed ‘resorting to secret craft by the state’ as unethical and immoral after the Gupta period (320 AD to 600 AD), it remained an uninterrupted part of Chinese state craft. Intelligence played a seminal role in the efforts of successive Chinese dynasties to deal with their external enemies – primarily the warring nomadic tribes- as also tackling internal threats.
In recent history, Sun Yat-sen and Chiang Kai-shek extensively used their spy networks to gather information about the Manchus that led to fall of the Qing dynasty. Intelligence also played an important role during the Sino-Japanese war and later the Civil War that led to the victory of the Chinese Communist Party (CCP) over the Kuomintang. Mao, during this extended civil war, heavily relied on CCP’s secret apparatus and covert actions to subdue his political opponents. It is significant that one of the first resolutions adopted by the Politburo of the Chinese Communist Party (CCP), after the creation of People’s Republic of China (PRC) in 1949, pertained to the crucial role played by the intelligence.
Establishment of Communist Rule to Cultural Revolution:
On assuming power, three factors defined CCP’s approach towards national security and concurrently the intelligence build up. First was a strong belief that all those who were opposed to the Communist ideology were counter revolutionaries and thus enemies of the Chinese state and the people. Second was an inherent distrust of all foreigners and foreign powers, particularly the Western democracies, who were perceived to be conspiring to undo the socialist revolution. Taiwan and Hong Kong were considered to be bases of their covert activity. Third was a fierce undercurrent of Chinese nationalism that emphasised on avenging ‘wrongs of history’ and transforming China into a State with high Comprehensive National Power (CNP).
In terms of action points, at the intelligence front, this approach, inter alia, manifested into (i) Creation of a strong security state- policing its citizens, identifying ideological enemies and their neutralisation; (ii) denying access to suspected foreign agents; (iii) penetration into claimed areas of Chinese territory not fully under its control like Tibet, Taiwan, Hong Kong etc. (often referred as homeland territory by the Chinese); (iv) accessing scientific and technical information, mainly from Western sources, to build indigenous military and civilian capacities and (v) leveraging Chinese diasporas abroad for intelligence and counter-intelligence activities, including coverage of activities of anti-communist elements abroad. As the CCP was envisaged to play the central role in this secret activity, intelligence apparatus continued to be controlled by it, albeit with some structural changes. The erstwhile intelligence outfit, Public Security Department (PSD), was re-organised. Its internal security tasks were partly entrusted to the Central Ministry of Public Security (MPS) headed by Gen Luo Ruiqing, foreign intelligence was brought under Liaison Department headed by Li Kenong and some sections were transferred to People Liberation Army’s (PLA’s) Central General Office and the General Staff Department. Li Kenong was also designated by Mao as Secretary of the Central Committee’s Intelligence Commission, Director of the Central Military Commission, Intelligence Department, as also as the country’s Deputy Foreign Minister. Central Investigation Department, a field intelligence outfit, worked under Li Kenong.
At this stage, Chinese intelligence had limited exposure to the outside world, confronted problems of access and language and faced a generally hostile anti-communist environment internationally. These factors, abetted by ideological proximity to the USSR made the intelligence apparatus considerably dependent on the Soviets, particularly for external intelligence. KGB, in those days, worked closely with Gen Luo Ruiqing and helped him develop intelligence systems, doctrines, trade craft, training etc., whose footprints can be observed even today. Russians also helped the Chinese develop liaison arrangements with fraternal communist parties through ‘International Liaison of the Chinese Communist Party’. The intelligence bonhomie with Soviets, however, started cooling off in the mid fifties and by 1960 the operational cooperation almost ceased to exist.
During the 1950s, almost every Chinese embassy had an Investigation and Research Office – a cover name for intelligence staff belonging to the Central Investigation Department. These were the field units for intelligence collection which were low in trade craft, highly secretive in their functioning and comprised of ideologically committed members. One of their major pre-occupation was to keep close watch on other members of the mission. They often remained present during the meetings with their diplomatic counterparts. In the headquarters, the analytical task was carried out by Central Investigation Department’s Eighth Bureau, publicly known since 1978 as the "Institute of Contemporary International Relations."
In 1962, just before the Cultural Revolution, Li Kenong died and was succeeded by Luo Qingchang. The legendary Kang Sheng, a confidant of Mao who for long years had headed the Central Department of Social Affairs and in 60s was a member of the Politburo, was entrusted with the overarching responsibility of ‘guiding’ the country’s intelligence apparatus. The infamous Kang Sheng played a vital role during Cultural Revolution in suppressing and neutralising Mao’s political enemies. The political confusion that prevailed during Cultural Revolution created serious fissures with the intelligence community also. Reportedly, on the initiative of Lin Biao, the Central Investigation Department was abolished, most of its senior officers shunted to the countryside for re-education and its operators and human assets, both within and outside the country, deputed to the PLA General Staff Second Department. It is suspected that there was an internal conspiracy, in which some intelligence operators of the dissolved Central Investigation Department were used, that led to mysterious death of Lin Biao in 1971 in a plane crash in Mongolia. Following his death, the department was re-established and its representatives sent to missions abroad.

Cultural Revolution:
The role of intelligence in the internal polity of China during the Cultural Revolution (1966-1976), that witnessed millions of killings, deserves a special mention. The revolution created conditions of anarchy and uncertainty, and saw sharp degradation of civil society and violation of human rights. There was extensive abuse of secret police and intelligence services that were responsible for large number of killings of political opponents. The secret apparatus became not only the perpetrator of atrocities but also a victim of it. In April 1967, Secretary General of the Central Investigation Department, Zou Dapeng, committed suicide along with his wife, who herself was a senior intelligence officer. A large number of intelligence operatives were dubbed as renegades or traitors and punished - often for their suspected pre 1949 roles or proclivities. Ironically, these persecutions were spearheaded by none other than the intelligence Tzar, Kang Sheng, who himself was head of the CCP’s Intelligence and secret apparatus from 1939-1946. In those turbulent years, Kang, the hatchet man of Mao Zedong, headed the Central Case Examination Group (CCEG) that dealt exclusively in secret coercive practices and dirty tricks to bring about ‘cultural’ cleansing. At one point of time, at his behest, 88 members/alternate members of the party Central Committee were under investigation for suspected ‘treachery’, ‘spying’ or ‘collusion with the enemy’. Kang Sheng used his infamous apparatus to crush Mao’s ideological opponents dubbing them as enemies of the revolution. The powerful role of Kang and his security services in China’s internal power play can be gauged by the fact that Kang Sheng was directed by Mao to supervise drafting of the new Party Constitution, which was adopted at the Ninth Congress in April 1969. He was also ‘elected’ as one of the five members of the Politburo Standing Committee, along with Mao, Lin Biao, Zhou Enlai and Chen Boda.
Ministry of Social Security (MSS):
The political developments in China consequent to the death of Mao Zedong (1976), fall of the Gang of Four (1976) and rise of Den Xiaoping heralded a new era in Chinese politics. Following the Third Plenum of the 11th Central Committee Congress, Deng Xiaoping emerged as the most powerful leader and gave a new fillip to the pace of modernisation and structural reforms. Himself a victim of political misuse of intelligence during Cultural Revolution, he wanted to re-structure the intelligence apparatus making it less susceptible to political vagaries. He resurrected the Chinese traditional concepts of Shishi Qiushi (seeking truth from facts), ‘Xianzhi’ (foreknowledge) and ‘Hide Your Strength, Bide Your Time’ as some of the guiding doctrines to reform the country’s intelligence set-up. He wanted Chinese intelligence to be transformed into a modern professional outfit – in tandem with China’s four modernisation programmes - having high technical capabilities and insulated from day to day party control. Deng Xiaoping was also not in favour of intelligence officers using legal cover as diplomats and wanted them to operate under illegal covers like media persons, representatives of business firms, scientists and researchers in universities etc.
Many piecemeal reforms were brought about during 1976 to 1982 that eventually culminated in the formation of the Ministry of Social Security (MSS) in 1983. It was envisaged to be the country’s apex intelligence outfit, a position that it continues to hold till today. A formal proposal was initiated by Liu Fuzhi, who at that time headed the Ministry of Public Security (MPS) and was approved by the Political Bureau of the CCP Central Committee. The new outfit that defined its charter as “the security of the state through effective measures against enemy agents, spies and counter-revolutionary activities designed to sabotage or overthrow China’s socialist system”[1] was made answerable to the Premier and the State Council. The above charter defined by Liu Fuzhi, however, hid more than it revealed. Unstated, the primary functions of the MSS included collection of foreign intelligence and undertaking covert intelligence operations both within and outside the country. It had a major internal intelligence charter as well. Ling Yun was appointed its first Chief, who on assuming office proclaimed that intelligence would no longer be used to settle ideological differences or allow party barons to use the service to settle factional fights. It was, however, nothing more than a pious wish and propaganda ploy.
Major segments of the intelligence and counter-intelligence activities of the Ministry of Public Security (MPS) and remnants of the Chinese Communist Party’s Investigation Division under Central Department of Social Affairs (CDSA) were merged into the new outfit. For the first time, foreign intelligence was collected, collated and analysed in a systematic manner on modern lines. As MSS did not have a body of experienced analysts to interpret the data, China Institute of Contemporary International Relations (CICIR), which had existed since 1980 and had a professional research staff, was brought under its control. The organisation, though has an open profile, is a feeder outfit that provides MSS with intelligence assessments based on inputs received from all sources including open sources and interaction with foreign think-tanks. It is a conglomerate of eleven institutes and two research divisions specialising in diverse areas of international interest to China. According to some press reports, “the CICIR has provided intelligence collection support to the MSS and the Foreign Affairs Leading Group (FALG), the Communist Party of China’s top foreign-policy body.[2]”
The MSS over the years has emerged as China’s largest and most effective intelligence organisation, working under the state council with its headquarters in Beijing. Under Article 4 of the Chinese Criminal Procedure Law, it enjoys police powers to arrest and initiate prosecution in cases involving national security. It has different wings covering foreign intelligence, internal intelligence, counter-espionage and counter-intelligence. There is a certain degree of overlap with the Second Department of the People’s Liberation Army (PLA) in respect of foreign intelligence and Ministry of Public Security (MPS) in the field of domestic intelligence.
Ministry of Public Security (MPS):
Though essentially a national security agency, the Ministry of Public Security (MPS) has a wide intelligence network. Enjoying overriding powers over the police and law enforcing agencies, huge resources and proximity to the CCP makes it a powerful security cum intelligence outfit.
In its intelligence gathering and operational role, it keeps a close watch on internal political developments and concurrently reports to the State Council (executive component of the state) and Central Political and Legislative Affairs Committee (party apparatus). Besides collection of intelligence through police organisation at provincial and local levels, MPS performs its intelligence functions using ‘working units’ of the ‘Chinese citizens’. MPS is empowered to draft any citizen to spy over fellow citizens or foreigners living in their area. Surveillance over visiting foreigners is an important function of the MPS which it performs through local law enforcement units besides its dedicated intelligence units. However, deficient in skills, experience and equipment, its trade craft is primitive and crude and easily detectable.
While the intricate network of MPS informers allows the system to keep a close watch on its citizenry, it often leads to erroneous or disproportionate police actions on account of perfunctory reporting, informers settling personal scores through false reporting and intervention by party bosses. Some of the problems encountered by MPS include managing the unwieldy data generated by diverse working groups spread throughout the country, validation and analysis of data, delayed real time flow of information among the provinces and from provinces to the MPS headquarters in Beijing and lack of coordinated decision making process due to two parallel masters - the state executive and the party apparatus. Intervention by the Central Political and Legislative Affairs Committee, that is supposed to deal with coordination problems, often proves to be delayed and non-workable.
As custodian of ideological security, the MPS also performs an important political role of monitoring political opinions of the people, logging people’s grievances and collecting information about rivalries among the party cadres/leaders. To assist its political role, it maintains a massive national database covering personal information from national to local levels. The inputs are derived from police reports, inputs of working groups, local level party sources, interception of e-mails and telephonic communications, employment records, data available with banks and industrial concerns, prosecution and immigration records etc. This data is integrated and aggregated to identify ‘persons of interest’ which in turn are sent to police stations for stipulated action.
Internally, China has created intelligence capacities for a panoptic state where it can identify, monitor, control, intervene and, when required, coerce citizens to submission for furthering perceived national interests. This trend got further strengthened after the Tiananmen Square massacre in 1989, that badly shook China and whose after effects continue to haunt it. Growing unrest in Tibet and Xianjiang and the spate of suicides in Tibet have further unnerved China. The declining face of economic growth, unemployment and exponential rise in agitations and protests have further compounded the internal security landscape.
In 2011, Zhou Yongkang, China’s senior party leader in charge of security and stability, emphasised the need of integrating MPS intelligence system for “social management” that would include monitoring political views, moulding public opinion and propaganda to shape people’s decision. In furtherance of this policy in December 2011, MPS directed units under it to visit villages and houses to win over their hearts and minds on the one hand and monitor their opinions on the other. This is illustrative of the Chinese management of state affairs intricately intertwining security, development, political and civil society controls. Though it has not drawn the attention of strategic analysts abroad, in last one decade, both the size and influence of MPS has increased substantially. However, to what degree the MPS influences political decision making process and policy formulation needs further investigation.
Military Intelligence - 2nd General Staff Department (2nd GSD):
The powerful Chinese military apparatus has dedicated intelligence apparatus of its own under the General Staff Department (GSD) of the PLA. Second Intelligence Department (2nd GSD) is one of the most important departments of the military intelligence setup. It is headed by a Director who is assisted by two Deputy Directors and a Political Commissioner. The Director and Political Commissar are equivalent to a Group Army Commander. [3] As it works directly under the General Staff, political control over it is lesser than in the case of MPS and MSS. STRATFOR, a leading intelligence research organization, avers that border intelligence is one of the primary responsibilities of the MID in which it is assisted by the PLA’s reconnaissance units. [4] Specializing in tactical intelligence, it keeps tab of the order of battle (ORBAT) of foreign armies, their doctrines, strategies, location, identity of field formations and profiles of their commanders etc. Its responsibilities include terrain assessment of target areas of military interest, identification of military command and control centres, plotting vulnerable Areas/Points (VA/VPs), equipment profile, counter-intelligence tasks, etc. It also monitors the activities of foreign armies operating in the Asian continent.[5]
Some of the important wings of the 2nd GSD include (i) ‘Department 2’ collecting information through human assets (HUMINT) with seven bureaus working under it, (ii) ‘Department 3’ collecting intelligence through communication interceptions (SIGINT) located in seven of its military regions and (iii) Department 4 specializing in battle field Electronic Intelligence. Electronic intelligence is sourced through Electronic Warfare (EW) Regiment/Reconnaissance Units functioning at the Group Army (GA) level. Other departments deal with administration, logistics, training etc.
The 2nd GSD’s field formations have Military Reconnaissance Units (MRs) in border areas, Intelligence Analysis Centre at the Divisional level and Intelligence Peace Units at Company levels. During war time, the Intelligence Analysis Centers function at the Battalion Headquarter level also with a limited remit. It also monitors the activities of foreign armies operating in the Asian continent. Earlier the 2nd GSD primarily focused on human intelligence and traditional military intelligence activities but has recently expanded the range of its activities to cover scientific and technological information.[6] [7]
The 2nd Department is further sub-divided in functional bureaus such as Military Intelligence Bureau, Tactical Reconnaissance Bureau, Political Bureau, Confidential Bureau, Comprehensive Bureau and Confidential File Bureau. [8] Military Intelligence Bureau focuses mainly on Taiwan, Macau and Hong Kong; collects technical intelligence to improve and develop military hardware for the PLA and establishes contact with potential clients for weapons exports concealing PLA’s direct involvement in arms trade. The Tactical Reconnaissance Bureau streamlines the information flow from specialized units at the MR level. The 3rd Bureau (Military Attaché Bureau) screens and debriefs military attaches who are deputed to foreign missions abroad. The 4th Bureau’s responsibility is Intelligence analysis for Russia, former Soviet republics, and other East European countries. The 5thBureau is also known as the Foreign Affairs Bureau. Its responsibilities include organizing foreign visits of PLA officers, military exchanges and receiving foreign military visitors. It, at times, works under the cover name of “the Ministry of National Defence Foreign Affairs Office”. It has its work divided on territorial lines like America & Canada Bureau, Europe & Asia Bureau, etc. It is learnt that the Press Bureau, known as "Ministry of National Defence Press Affairs Office", also works in conjunction with 2nd GSD. Several PLA Universities and Command colleges are directly subordinate to the Foreign Affairs Bureau.[9] The 6th Bureau focuses on analysis of Intelligence pertaining to the neighbouring Asian countries. The 7th Bureau (Technology and Equipment Bureau) plans and carries out cyber espionage operations through six governmental research institutions and two computer centers. It also enlists the services of individual civilian hackers and uses companies that produce electronic equipment for carrying out its activities. In addition, the 2nd GSD oversees working of the Arms Control Bureau, Space Reconnaissance Bureau, Computer Institute, PLA College of International Relations.
3rd General Staff Department:
The 3rd GSD or the Technical Department primarily focuses on signal intelligence (SIGINT) operations of the PLA. In the American jargon, the quintessential SIGINT task is to carry out cyber surveillance or Computer Network Exploitation (CNE). Computer network operations (CNO) in China are often referred to as ― “Network Attack and Defense”, based on the premise that –“without understanding how to attack, one will not know how to defend”. The 3rd Department’s SIGINT targets are diplomatic missions, military activities, economic entities, public education institutions, and individuals of interest. There may also be bureaus operating at the Military Districts for conducting network defense and attack, technical reconnaissance, and psychological operations. Bureau Directors and Political Commissars are equivalent in rank to an Army Major-General.[10]
4th General Staff Department:
The Electronic Countermeasures (ECM) and Radar Department, also known as the 4th GSD Department, is responsible for developing equipments, doctrines, and tactics for electronic warfare and information. Established in 1990, it maintains a data base of electronic and radar signatures of foreign armies. The department is headed by a Director and two Deputy Directors and has at least, four bureaus, one brigade, and two regiments. It is widely believed that an ECM Brigade is headquartered at Langfang in Hebei Province with subordinate battalion-level entities located in Anhui, Jiangxi and Shandong. Two units, including one with operational or experimental satellite jamming responsibilities, are located at Hainan Islands with the purpose of jamming US satellites. All PLA, PLAAF and PLAN Military Regions have one ECM Regiment. The 3rd and 4th General Staff Departments also operate a joint centre dedicated for network attack/ defense training system.
General Political Department (GPD):
The GPD functions directly under the Central Military Commission (CMC). It oversees the discipline, political education and indoctrination of PLA personnel. It has an organisation called the China Association for International Friendly Contacts which infiltrates foreign armies in order to subvert loyalty of their personnel and propagate Chinese ideology among them to further their aim. The Political or the Liaison Department also conducts counter-espionage activities in foreign countries to keep a watch on its own intelligence operatives. The GPD maintains Liaison Departments at the Military Region (MR) level. The Department also oversees the Military Museum of the Chinese People's Revolution, Liberation Army Daily, the PLA Literature and Art Press (Kunlun Press), PLA Pictorial, and PLA Press.
Human Intelligence:
The modus operandi of the Chinese intelligence is uniquely Chinese in its application characterised by Chinese cultural traits. As only few cases of Chinese intelligence operations are available for detailed study and analysis, it is generally presumed that Chinese intelligence trade craft is primitive and low in its reach. The famous case of Larry Wu-Tai Chin is indicative that even before People’s Republic of China (PRC) came into existence, the CCP’s intelligence setup had started recruiting deep penetration sources in target areas. Chin passed on classified information to China while working for the US intelligence community for over 35 years. He supplied a stream of high grade intelligence till his retirement in 1981. He was detected only in 1985 when his cover was blown by a defector leading to his suicide before being brought to trial. The trade craft used for intelligence collection, contacts between the source and handling officers, communications, briefing and debriefing etc. show a high degree of sophistication. The fact that Chin was able to operate undetected for 35 years also indicates high level of secrecy standards in protecting source identity.
The technique and methodology adopted by the Chinese operatives in respect of raising and handling human assets (intelligence sources) is slightly different from those employed by other modern intelligence agencies. Even after the initial ‘ice breaking exercises’, the handler remains vague and circumspect in specifying his needs and considerations in return. Emphasis is more on personal and friendly relations. Quite often, even when a human asset starts passing on information, he is not consciously aware of working as an intelligence agent. The trade craft used is elementary and the relationship between the handler and the source is nebulous and ill-defined. It is only after considerable period of time that the handler discloses his real intentions, requirements and identity; asking the agent to follow more rigorous trade craft for collection of classified information, fixing of RVs, communications etc. Despite the fact that during its formative years the Chinese intelligence operatives were trained by the KGB, who make a fetish of traditional trade craft, their cultural trait of being circumspect and employing symbols to communicate is discernible in their intelligence practices. Nigel Inkstar, in his ‘Chinese Intelligence in the Cyber Age’ however, feels that “when the need arises, or when they are sure of their ground, Chinese intelligence officers can be very direct and explicit and capable of deploying sophisticated tradecraft”.
Chinese are also known to effectively provide cover identities to its human assets using forged documents. The case of Liu Kang-Sheng, a MSS operative, who was caught using forged Thai and Singaporean passports is illustrative. Though passports of these countries have high security features, it was found that the forged documents were almost perfect in incorporating these features. It is obvious that Chinese intelligence has well developed facilities for forging documents.
Among the Chinese intelligence officers, there is a marked preference for people of Chinese ethnicity and those seen as friends of China for cultivation as human assets. However, this phenomenon is gradually undergoing a change. Valentin Danilov, a Russian physicist who headed the Thermo-Physics Centre at Krasnoyarsk State Technical University (KTSU) and had researched on effects of solar activity on space satellites is a case in point. In 2004, he was sentenced to 14 years imprisonment for passing on classified information to the Chinese. Similarly, Swedes uncovered diplomats in the Chinese embassy in Stockholm who recruited a Uyghur émigré to monitor the activities of Uyghurs in Europe. The case of US nationals Noshir Gowadia and Glenn Duffy Shriver are also illustrative of Chinese intelligence recruiting foreign nationals for espionage. Shriver was arrested for spying in June 2010 while flying to China. He pleaded guilty of unlawful communication of national defence information after a polygraph test and was imprisoned for four years. He had met his Chinese handlers about 20 times and received $70,000 for the services rendered. Gertz Bill reported in Washington Times on March 25, 2013 that “Shriver is not the first spy for the Chinese to target the CIA. U.S. intelligence sources have said at least three CIA officers who reported to Director George J. Tenet in 1999 as having spied for China, but were never caught. One of the agents was paid $60,000 by Beijing”.
Chinese intelligence pursues its defined operational missions, once defined and approved, most doggedly unmindful of its cost-benefit ratio. Chinese efforts to go for outright purchase of a Stealth aircraft parts manufacturing company for obtaining the in-flight refuelling capability for its Air Force is a case in point. The attempt was foiled at the last moment. It resorts to all means, including most unethical practices to achieve its operational missions. The case of Da Chuang Zheng, a Chinese intelligence agent, who was caught while attempting to steal advanced radar and electronic surveillance technology to China is one among many such cases of heist.
The Chinese have mastered the technique of amalgamating disparate micro intelligence accessed from incongruous sources with no comparable gradations in respect of their authenticity and reliability. This technique of ‘Thousand Grains’ entails collecting small bits of information and then piecing them together to make intelligence sense. This has particularly been used for acquiring mid level technologies using inputs both from human and technical sources. Widely spread Chinese diasporas working in research and academic establishments, high technology using manufacturing concerns, business houses etc. are often utilised for the purpose. Potential targets are, at times, recruited during their visits to China. Another variation is collecting micro intelligence bits during participation in scientific cooperation programmes, seminars and conferences in foreign countries and visits of scientists under scholar overseas exchange programmes. FBI investigations in 1988 had revealed that the technology for neutron bomb detonated by China was not indigenously developed but acquired from Lawrence Livermore National Laboratories in California. Various Chinese delegations comprising ostensibly of scientists, but actually MSS intelligence operatives, visited the facility and were able to collect the required information in bits and pieces over a prolonged period of time.
Chinese intelligence closely monitors activities of political dissidents and groups both within and outside China, suspected foreign agents, visitors and scholars visiting China and members of diplomatic missions. Human assets are often placed in vantage positions to cover their activities. In June 1989, Shou Huaqiang, a delegate to the Chinese Alliance for Democracy Convention in California, an anti-China dissident group, publically declared that he was an MSS agent sent to spy on the activities of the Alliance. He alleged that he was forced for the job by MSS officers who made him sign an agreement with instructions to disrupt its work.
Cyber Intelligence:
When the rest of the world was busy celebrating the great strides in Information and Communication Technology (ICT) in the late eighties, the Chinese Strategic Community was busy evaluating its security implications. They realised that they could not allow the revolution in ICT bypass it, lest their modernisation programme come to a naught. At the same time, if allowed free access, it could not escape its concomitant adverse fallouts. The American military successes during the Gulf War during 1990s shook them and made them realise formidable capabilities of war machine supported by the informatics. Internally, in the wake of people’s uprising culminating in Tiananmen Square massacre in 1989, there were apprehensions about internal security if people were allowed unchecked access to the outside world through internet. By 1996, the number of internet users in China had touched the figure of 2 million, which was fraught with danger. The ‘bourgeoisie’ influence through the internet posed a threat to the Chinese Communist Party’s ongoing Patriotic Education Campaign launched in early nineties. These developments led China to embark on an ambitious programme of acquiring cyber dominance, both in offensive and defensive modes. It became evident by 2008 that Chinese intelligence had made remarkable strides in this direction on both fronts.
While there is no direct evidence to prove culpability of Chinese intelligence undertaking covert cyber intelligence operations abroad, there is ample circumstantial evidence to infer that. Besides reliable intelligence inputs, tracing large number of cyber attacks to servers in China, technological sophistication of cyber attacks, resources required to carry out the operations at global scale, selection of targets, type of information accessed and long history of Chinese intelligence for science and technology thefts strongly point towards state involvement.[11] Many instances of cyber attacks on countries like the US, Canada, Japan and India have been tracked to China. There are strong pointers to infer that China is indulging in large scale cyber espionage using an army of hackers, drawn from military, intelligence, cyber professionals etc. As an intelligence activity, it has enabled China to penetrate classified domains of target countries to extract technological and systems information and collect military and security related information about programmes and activities of the countries on its intelligence radar. On the internal security front, it is being used to contain and counter liberal and democratic ideas of political dissidents. However, there is little information to assess China’s ability to validate and analyse the colossal data collected by it both internally and externally.
The Gulf War, in addition to highlighting the potential of information and communication technology (ICT), also made the Chinese aware of the heavy dependence of Western military systems on these state of the art technologies and attendant vulnerabilities. They saw in it an opportunity of developing asymmetric capabilities which could defeat advanced technical capabilities through counter-electronic systems.
Col Ling Qiu and Col Wang Xiangusi in 1998 in their book ‘Unrestricted Warfare’ conceptualised how huge US combat superiority emanating from its IT edge could be transformed into their vulnerability. It was a doctrinal shift for preparing People’s Liberation Army (PLA) to fight under informationised conditions. According to Nigel Inkster, “the PLA is pursuing a highly ambitious cyber-warfare agenda that aims to link all service branches via a common ICT platform capable of being accessed at multiple levels of command and has created three new departments of Informatisation, Strategic Planning and Training to bring this agenda into being.”[12]
Though late to enter the internet domain, China took giant strides, both in development of hardware and software on one hand and training people on the other, that made up for the lost time. The first indications of Chinese capabilities started trickling in the early years of the last decade when hackers broke into US official networks to steal sensitive information which US investigators code-named as ‘Titan Rain’. Nathan Thornburgh writing in the Time Magazine said that the targets included US military establishments, NASA, the World Bank, etc Similar attempts were reported from United Kingdom, Germany and New Zealand during 2006-07 detailing cyber attacks that had emanated from China. Mandiant, an American firm dealing with information security, reported that PLA Unit 61398, one amongst many such units, was responsible for the cyber attacks on more than 140 companies the world over since 2006. In 2009, University of Toronto’s Information Warfare Monitor Citizen came out with its so-called ‘Ghost Net” report detailing intrusion by Chinese hackers into the network system of Indian security establishment and offices of Dalai Lama’s secretariat.[13] Though rejected by the Chinese, it was a well researched and accessed professional report which concluded that the cyber operations were being conducted by the “2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department”.[14]
The Chinese have been systematically recruiting and training a pool of cyber professionals to undertake these tasks. In 2005, hacker competitions were held at the regional and provincial levels in China for hiring computer network operators. In 2007-08, the Ministry of Public Security (MPS), internal intelligence cum security outfit advertised job vacancies for hackers under the cover name of computer operators. According to a report in Asia Times of Feb 9, 2010, Chinese embassies were contacting Chinese IT graduates in different foreign universities purportedly for jobs in public security departments but essentially for computer network operations.[15]
China’s cyber capabilities are not only confined to military combat needs, espionage and internal security. Economic and Technical intelligence, that have figured high in its national priorities, are also being served through cyber warfare. In target countries, computer networks containing classified data pertaining to trade secrets or denied technologies are being accessed. According to a report of the Office of National Counter Intelligence Executive submitted to US Congress in 2011, US networks were facing Chinese onslaught for trade information, communication technology, data pertaining to scarce natural resources and civilian technologies in energy and health sectors.[16] Accessing critical defence technologies is more alarming. A recent report published in the Washington Post points out that Chinese hackers have broken into several defence production firms involved in the manufacturing of critical military hardware including the Patriot missile system, the Terminal High Altitude Area Defense, or THAAD, as also vital combat aircraft and ships like the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship. The report submitted to the Pentagon by the Defense Science Board underlines the enormity of the Chinese cyber-espionage activities and investment of effort to overcome the US military advantage.[17] One illustrative case is of US company AMSC, specializing in wind turbine manufacturing, having lost its centre software code to the Chinese hackers. This theft led to the company losing 80 % of its revenues. Similar was the experience of Nortel, Canadian Telecommunication giant that went into bankruptcy. Brian, its former security adviser in an interview to CBC on October 11, 2012 said that, “Huawei spent years hacking into Nortel’s system and stealing information so it could compete with Nortel on world markets and added that, “These kind of things are not done just by average hackers. I believe these are nation state activities”.[18] A disclosure was made by Daily Mail in March 2012 that Chinese hackers were able to find “full access” to NASA computers containing information about 13 spacecrafts. It is believed by experts that it helped the Chinese in their quest for outer space utilization programme. Similar evidence of Chinese efforts to beef up its cyber warfare capabilities came to light in 2011 when McAfee, an American cyber security company brought out its White Paper, code named ‘Operation Shady Rat’. McAfee reported about the attacks, some of them raging for as long as five years targeting 70 government and private agencies in different parts of the world. Forty nine of these were US based networks while others were located in Taiwan, India, UK, South Korea, etc. Through these digital storms, the Chinese have also been undertaking ‘Spear-Phishing’ operations that involves sending innocuous e mails to targeted individuals, websites etc and to extract stored data from the computers. Through a detailed and carefully researched trade craft, high potential targets are selected, artificial identities created, and malware messages routed through multiple destinations that are often difficult to trace. A report brought out by the Northrop Grumman in 2009 geographically detailed the modus operandi used first to breach and then to ‘exploit’ [19]
Information about what is the cyber intelligence infrastructure, who controls it, how the key intelligence needs are identified, what is the co-ordination mechanism, how the data is validated and integrated to convert information into usable intelligence are still grey, if not black, areas. Going by the scale of activity and swathe of their operational targets, it presents a highly confusing picture. It is believed that 3/PLA has the highest technological capabilities at least to gain covert entry into targeted domains and access the data. However, except for information of military value, its capability to process other inputs are seriously doubted. The co-ordination mechanism available with the MSS also appears to be inadequate and while the relationship between MSS and MPS, uncomfortable though, is known to some extent, the working mechanism of 3/PLA with other intelligence outfits is a matter of speculation.
Intelligence in Internal Security:
To make a holistic assessment of what the Chinese call Comprehensive National Power (CNP), it is essential to evaluate its internal stability and political dynamics and the role intelligence services play in this arena. It assumes special import as with the opening of China and its modernisation programme, the Chinese are finding it increasingly difficult to keep a lid over internal dissidence. Murray Scot Tanner in his ‘Cracks in the Wall: China’s Eroding Coercive State’ as back as 2001, observed that, “Beijing’s control over the coercive system, as well as that system’s capacity to maintain social control appears to be slipping”. Since then, the internal security landscape has further deteriorated. There have been well over one hundred thousand incidents of mass protests and agitations in 2012. Large scale visits of Chinese, particularly the students abroad, access to internet and mobile phones, activities of pro-democracy groups and economic affluence have raised the threshold of political awareness. The situation in Tibet has become precarious, particularly after the Olympic Games in 2008. Besides, a large number of protests and agitations, there have been over a hundred cases of self immolation by Tibetans since the Olympics. The rise of Islamic radicalism and violence in Xinjiang is another cause of serious concern. The Tiananmen Square massacre still looms large on the psyche of the people and have accentuated Chinese fears of internal destabilisation which they attribute to conspiratorial counter-revolutionary forces propped up by external enemies. The anxiety was discernible when in the year 2011, the then Chinese Premier Wen Jiabao, in a public address, stated that “We have not yet fundamentally solved a number of issues that the masses feel strongly about”. The Jasmine Revolution in 2011 further shook the Chinese administration and they hiked their budget for internal security, reportedly, to $95 billion in 2011 and $111 billion in 2012. It is significant that notwithstanding China’s massive military modernisation programme, the internal security budget ranks above the defence budget.
China’s internal intelligence apparatus is much more complex and multilayered; with both the party and state having overlapping roles. Department one of MSS, the premier national intelligence agency, handles ‘homeland security’ while its department six and nine deal with ‘counter espionage’ and ‘counter defection and counter surveillance’ respectively.
The Indian Experience:
The Indian experience of Chinese intelligence dates back to early fifties when its intelligence apparatus started operating in Tibet. It assisted both the CCP and the PLA in degrading Dalai Lama’s regime and consolidating its position in Tibet, politically and militarily. Dalai Lama was eventually coerced to sign the 1951 agreement. Extensive reconnaissance of the areas bordering India was done and construction of national highway 219 was undertaken through Aksai Chin connecting Lhasa in Tibet to Xinjiang. The Indian intelligence, though reporting about Chinese activities in Tibet for quite many years to a government that was not listening, had physical confrontation with the Chinese, when on November 21, 1959, Karam Singh, a Deputy Central Intelligence Officer (DCIO) of the Intelligence Bureau was killed at Kongka La (Hot Springs) in Ladakh.[20] The years that followed saw intensified Chinese intelligence activities mainly undertaken by the PLA and party apparatus in Tibet.
Following the exodus of over 80,000 Tibetans, led by the Dalai Lama, in 1959 to India and a deep sense of fear that, his influence over the Tibetans created in Chinese minds, coverage of Dalai Lama and Tibetan refugees in India became a high priority item for Chinese intelligence. Ethnic Tibetans are regularly recruited and infiltrated into India, mostly through Nepal, to cover the activities of the Dalai Lama. Arrest of Pema Tsering, a former PLA combatant, on May 23, 2013 from Dharamshala in Himachal Pradesh for spying is one of the recently reported cases. He infiltrated into India a few years back, acquired an Indian voter ID card in 2011 and was masquerading as a Tibetan refugee.[21]
Intelligence coverage through diplomatic staff has remained in vogue all through and got intensified particularly after 1959. Even during Den Xiaoping’s regime when this practice was discouraged, use of legal cover for intelligence operations in India remained unabated. In some instances, Chinese nationals from mainland China with illegal cover are sent to India for coverage of political intelligence, establishing contact with the insurgent and extremist groups and collecting defence related intelligence. One of the illustrative case is of Wang Qing, a young Chinese lady who operated in India using different covers before she was arrested in Dimapur (Nagaland) on January 18, 2011. She flew to Kolkata from Kunming on a tourist visa as an executive of a Chinese timber company, and visited Nagaland where she held a four hour long secret meeting with Naga insurgent leader T Muivah. She was deported and a protest note was sent by the Indian government to the Chinese embassy.
Chinese intelligence has also been active in supporting North-eastern insurgent groups and providing them with weapons, training and financial support. Coinciding with the Cultural Revolution at home, the first group of Naga insurgents, comprising 300 strong Naga rebels, led by Muivah and Isak Swu were imparted military and ideological training in Yunan in 1966 and sent to India with a consignment of arms. This trend continues till today with Chinese assisting the Assamese, Manipuri and other rebels besides Left-Wing extremists.[22] One of the recent cases of Chinese support to Indian insurgents was revealed during questioning of Anthony Shimray, who after his return from China in 2010 was arrested in Nepal. He was assured supply of 1,800 pieces of arms that included AK series rifles, M 16 rifles, machine guns, sniper rifles, and rocket launchers. The shipment was to be loaded from a port in Beihei in China and sent to Cox’s Bazar in Bangladesh via a shipping agent based in Bangkok.[23]
One of the marked features of China’s intelligence activity in India is its close relationship with Pakistan’s ISI. Besides, their close strategic relationship, the advantages enjoyed by Pakistanis in respect of language, appearance, well entrenched local networks account for the special relationship. This cooperation started way back in mid sixties with Dhaka as the operational hub where Chinese and Pakistani intelligence officers first established contacts with the North Eastern insurgents together. With the deepening of this relationship, it got extended to other areas of common interest. Daily Mail (UK) in its report dated September 30, 2012 observed that, “Chinese agencies are financing and providing assistance to Pakistan’s ISI to keep insurgent groups active in the North East.[24] However, with Chinese intelligence coming of age, there are indications that it is now launching independent operations.
Conclusion:
In last six decades, starting from a primitive party apparatus, Chinese intelligence has attained new heights and capabilities. Its intelligence apparatus is highly complex and intricately intertwined between party and the government, internal and external, civilian and military et al with parallel roots of command, control and reporting etc. All this has led to large degrees of duplication and redundancy. Though over the years, governmental machinery has taken control of large segments of intelligence activity, the party apparatus continues to reign supreme. Deeply concerned about internal security, all its intelligence agencies have a marked internal intelligence or counter-intelligence role. The PLA, over the years, has upgraded its intelligence capabilities at tactical, technological and strategic levels, particularly in Asia Pacific Region, South Asia and Central Asia. It has built an extensive technical and signal intelligence infrastructure, and its electronic intelligence capabilities have been considerably augmented by cyberspace and space based platforms. The MSS has evolved itself as the premier foreign intelligence agency and besides diplomatic intelligence, it has been aggressively hunting for technological data and systems information to augment national economic and military capabilities. It continues to bank heavily on Chinese global diaspora that provides it a vast catchment area for human assets for intelligence gathering and espionage. To widen its catchment area, it is expanding its illegal cover for intelligence gathering by using commercial companies and business houses, media agencies, Chinese banks etc. Establishment of nearly 380 Confucius Institutes in 180 countries, Chinese language institutes etc. also are part of its foreign intelligence activities. China envisions for itself a big power role and, silently but steadily, is building up its intelligence capabilities commensurate to that vision.



[1] Ministry of State Security, Intelligence Resource Program, Federation of American Scientists, accessed online at http://www.fas.org/irp/world/china/mss/history.htm

[2] Bill Gertz, Inside the Ring: Terrorists’ Antics, The Washington Times, May 16, 2012, accesed at http://www.washingtontimes.com/news/2012/may/16/inside-the-ring-terrorists-antics/?page=all
[3] Ibid (3) above
[4] sinodefence.com, accessed at http://www.sinodefence.com/overview/organisation/gsd.asp
[5] sinodefence.com, accessed at http://www.sinodefence.com/overview/organisation/gsd.asp
[6] Ibid (5) above
[7] Nicholas Eftimiade, Chinese Intelligence Operations, 1994.
[8] ibid (8) above
[9] Ibid (8) above
[10] Mark A. Stokes, Jenny Lin and L.C. Russell Hsiao, The Chinese People’s
Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure, Project 2049 Institute, November 11, 2011
[11] Many instances of cyber attacks on countries like the US, Canada, Japan and India have been tracked to China. On the internal security front it is being used to contain and counter liberal and democratic ideas of political dissidents.
[12] Nigel Inkster (2010): China in Cyberspace, Survival: Global Politics and Strategy, 52:4, 55-56, IISS
[13] Tracking Ghost net: Investigating a cyber espionage network, Information Warfare Monitor, March 29, 2009. accessed at http://www.infowar.monitor.net/ghostnet
[14] Mandiant report, accessed at http://intelreport.mandiant.com/
[15] Willy Lamb, “Beijing beefs up Cyber Warfare capacity”, Asia Times, Feb 9, 2010
[16] Foreign spies stealing US economic secrets in cyberspace – Report submitted to Office of the National Counterintelligence Executive, accessed at http:// www.ncix.gov/publication/reports/fecie_all/

[17] Ellen Nakashima, ‘Confidential report lists US weapons system designs compromised by Chinese cyberspies. The Washington Post, May 28, 2013, accessed at
http://articles.washingtonpost.com/..._u-s-missile-defenses-weapons-combat-aircraft

[18] CBC News, Oct 11, 2012, ‘Former Nortel executive warms against working with Huawei’, accessed at
http://www.cbc.ca/news/business/story/2012/10/11/pol-huawei-nortel-experience.html
[19] Ibid (13) above.
[20] Ram Pradhan, Debacle to revival: Y.B. Chavan as Defence Minister, 1962-65.
[21] The Indian Express, May 24, 2013, accessed at http://www.indianexpress.com/news/suspected-chinese-spy-arrested-from-dharamsala/1119797/
[22] N Manoharan, China’s Involvement in India’s Internal Security Threats: An Analytical Appraisal, Vivekanda International Foundation, 2012, accessed at
[23] Is China backing Indian Insurgents, The Diplomat, January 22, 2011, accessed at http://thediplomat.com/2011/03/22/is-china-backing-indian-insurgents/
[24] Abhishek Bhalla, Daily Mail (UK), September 30, 2012, accessed at http://www.dailymail.co.uk/indiahom...s-intelligence-touch-RAW-nerve-Northeast.html
 

ezsasa

Designated Cynic
Mod
Joined
Jul 12, 2014
Messages
31,926
Likes
148,105
Country flag
Civil society, the new frontiers of war, can be manipulated to hurt a nation’s interests: Ajit Doval

“The new frontiers of war, what you call the fourth-generation warfare, is the civil society.”

“But it is the civil society that can be subverted, subsumed, divided, manipulated to hurt the interests of a nation. You are there to see they stand fully protected,”

“You are for India and India is for you. Every other identity gets subsumed to this Indian identity,”

“Quintessence of democracy does not lie in the ballot box. It lies in the laws which are made by the people who are elected through these ballot boxes. You are the ones who are the enforcers of the law… Laws are only as good as they are executed and implemented and the service that people can get out of it,”

“No nation can be built where the rule of law has failed.”

“Without your success, the nation cannot succeed. If internal security fails, no country can be great. If the people are not safe and secure, they cannot rise to their potential, and probably, the country can never grow,” he underlined.

 

Latest Replies

Global Defence

New threads

Articles

Top