The way in which the Chinese intelligence services operate


Regular Member
Jan 11, 2018
Country flag
SOURCE : defenceview


Since the time of Empress Wu Chao, who created the first Chinese intelligence service in 625 A.D., much has changed, but we could also say that some traits have not completely changed, as we might believe at first sight.

Later there was China’s extraordinary adventure in the modern world, which began with the fall of the last Emperor Pu Yi, who was also guilty of collaborationism with the Japanese in Manchukuo and ended his days artistically drawing the phrase “today the people are sovereign” at the court of Mao Zedong. However, as early as 1934, the British intelligence Services deciphered MASK, the code used by the Komintern to encode information from Moscow to Shanghai which, at that time, was the CPC’s pole.

However, it was in 1957 that the United States began to fly its U-2s over China, starting from Peshawar.

In 1966, two years after the beginning of the Great Cultural and Proletarian Revolution, there was the great purge of the intelligence services in China carried out by the very powerful Kang Sheng. He was the mover of the fall of Liu Shaoqi, Deng Xiaoping and Lin Biao, but then he was associated with the “Gang of Four” and hence suffered the usual damnatio memoriae. A man of Mao Zedong who knew too much, but died in his bed.

Then, as is well-known, in 1971 Li Biao was killed while fleeing to the USSR with his plane.

Not surprisingly, again in 1971, Kissinger began to deal secretly with China. Lin Biao’s death was the seal on the definitive strategic separation between China and the Soviet Union – which was what the United States was interested in.

In 1973 the first CIA “station” was created at the U.S. liaison office in Beijing, while China took the Paracel Islands and CIA left its main station in Taiwan.

In 1975 the first Chinese Electronic Intelligence satellite (ELINT) was launched, but the following year saw the death of Zhou Enlai, the true master of Chinese foreign policy and Kissinger’s friend who protected Mao from his mistakes.

The Armed Forces returned to power: with the support of all the military, Deng Xiaoping quickly put Hua Guofeng aside and became the CPC Secretary, but reforms were still being studied. Initially Deng was not as reformist as currently believed in the West.

Hence in Deng’s reformist phase, the U.S. diplomatic recognition was shifted from Taiwan to the People’s Republic of China – and that was China’s real goal at the time.

Shortly afterwards, China also opened diplomatic offices in the United States.

In 1981, however, the Americans developed programmes for controlling the Chinese agents operating in the USA, while Deng Xiaoping himself started China’s nuclear rearmament.

The China National Nuclear Corporation was established in 1988.

Ten years later, in 1999, the Chinese Armed Forces built a base for intercepting military signals in Cuba but, in 2002, the Chinese cyber attacks on some U.S. networks – known as TITAN RAIN – began, while the FBI even opened a liaison office in Beijing, with assignments also extended to Mongolia.

In 2004, China put the Nanosatellite I into orbit, but there was also a further cyber attack – probably of Chinese origin – on the U.S. Army Information Systems Engineering Command, as well as on the Naval Ocean Systems Center, and finally on the space and strategic installation in Huntsville, Alabama.

In 2010, Google suffered an AURORA cyber attack. A long, powerful and initially uncontrollable attack.

Probably also Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical were hit by AURORA cyber attacks – albeit this fact is not confirmed.

Hence data collection, mainly economic and technological intelligence for China, but also a complex relationship with the United States to be penetrated informally, but not to be damaged too much.

In any case, the reins of the Chinese Service (or rather, the intelligence services) were held by the State Security Ministry.

A legal difference should be underlined: while, legally speaking, the KGB was a Central Committee’s Department, the Communist China’s intelligence Service was a real Ministry.

The Interior Ministry was represented by the Public Security Ministry but, in general terms, it should be said that – unlike the old Soviet ones – the Chinese intelligence Services are less obsessive in their relationship with possible “sources”, anyway preferring ethnically Chinese people.

Furthermore, the Chinese Foreign Service seems to prefer sources that – unlike what happened with the Soviet KGB – have no money or personal crisis problems, which become dangerous or ambiguous.

Again unlike the old Soviet ones, the Chinese intelligence Services do not willingly pay for news and information. They do not blackmail and they do not extort. Quite the reverse. They do not pay at all. If anything, they help Chinese abroad for relatives or other matters.

Hence rarely do the Chinese intelligence Services pay for the data they receive.

The Chinese intelligence Agencies are therefore interested in people who, only rarely, come within the range of attention of the enemy intelligence Services. Operationally speaking, this is an excellent choice.

Again unlike the old Soviet ones, China’s intelligence Services do not organize rezidenture abroad. They also rarely hold clandestine meetings and almost never use covert communications.

“The floating bird is existence, if it dives it is non-existence”. The mind is like the moon: it is reflected in the water at a speed that man does not perceive. The mind should not be stopped, but left free to grasp the void, the invisible, the Nothing.

The Chinese intelligence Services, however, organize closed areas where a “source” finds itself – with its pace and needs – providing the materials needed by the Chinese government.

The width of the network, however, is such that the slow and non-invasive pace of Chinese operatives is capable of reaching the same – or even larger – quantity of sensitive material collected by a Service that does not follow the Tao, i.e. the natural flow of events and people.

Moreover, the Chinese intelligence Service often operates with real academics, real students, real journalists and very real businessmen.

The cover is often irrelevant, but also very true. Indeed, it is considered a cover attracting excessive interest – like jealousy which, as Karl Kraus used to say, “is a dog’s bark which attracts thieves”.

Obviously, in this respect, the Chinese intelligence Services have a significant advantage, since they can legally use real journalists and real academics, while in the West – including in Italy – it is forbidden to use “journalists, clergymen, parliamentarians and town councillors” as agents. Stupidity has been tormenting the intelligence Services with a ferocity worthy of a better cause.

Hence no one who can really be useful. This leads the Western intelligence services to fabricate useless complicated “stories” that are often easily discovered by the adversaries.

Not to mention the forty-year defamation of the intelligence Service – as is the case in Italy – which causes other damage.

For the intelligence Services, the Chinese technological companies operating in the West must be economically self-sufficient and, indeed, make profit, without weighing on the Service’s or State’s coffers.

An often predatory “Western-style” profit is also allowed, at least as long as this does not negatively affect intelligence operations.

Therefore, the Chinese companies using up technology and data – which are the primary material of current Chinese intelligence – must be the most obvious and natural enterprises, without hidden compartments or ambiguous operatives that the host country’s intelligence Services can discover – albeit possibly not so easily.

Another problem in the control of Chinese operations in the West is the difficulty – and, indeed, we could say the reluctance – with which our companies, including SMEs, report the often harshly blackmailing cyber attacks, or even the crises resulting from fraud and scams often carried out by managers and employees.

The obsession of being always listed on the Stock Exchange makes companies, including the small and medium-sized ones, excessively afraid of disclosing such adverse operations.

According to Leonardo-Finmeccanica, during the Covid-19 phase, there have been 230,000 malspam operations worldwide, 6% of which in Italy.

This year 51% of all Italian companies have suffered one or more significant cyber attacks, with a 125% average expansion for the domains called “Covid”.

In China, however, there has recently been a change of the State system.

While in the past, before globalization, also thanks to an “imperial” psychology, the Service had above all to defend borders and, to some respects, also the “purity” of the Chinese ethnic balance, today – considering the global economic role played by China – the Service has to deal with 1) the security of raw materials supplies from abroad and 2) the stability of the productive system in a phase of great social transformations.

Hence the necessary current complexity of the Chinese Party’s and State’s decision-making system: the top level is the National Security Leading Small Group (NSLSG), which also has many informal strategic decision-making mechanisms within the Chinese ruling class. An elite that has always been more informal than we might think.

Certainly, at institutional level, there is also the Politburo Standing Committee, but there is still Hu Jintao, a man still essential to the power architecture of Xi Jinping, who listens to him carefully.

There is also the Foreign Affairs Leading Small Group, which is less involved in relations with the United States – of which the aforementioned National Security Leading Small Group is in charge – but mainly controls the work of the Agencies and connects them.

In addition to the intelligence Services’ role, a fundamental role is also played by the various and often excellent academic and non-academic think tanks.

Also the results of these structures are assessed by the Small Groups.

But how is foreign policy decided in China?

First of all, there is the CPC but, more precisely, the “Politburo Central Committee”, in addition to the aforementioned Politburo Standing Committee (PBSC).

With its 204 members and 167 “alternate” members, the Central Committee meets once a year.

The “Politburo Central Committee” is composed of 25 members, elected by the Central Committee. It meets once a month and five of its members do not usually live in Beijing.

The PBSC, the Central Committee Standing Group for Foreign Affairs, meets once a week and has nine members.

The Meeting is often coordinated by the Central Committee’s Foreign Affairs Office.
Last edited:

Hari Sud

Senior Member
Mar 31, 2012
Country flag
Will somebody give synopsis of Indian intelligence gathering and analysis for this forum’s knowledge?

Hari Sud

Senior Member
Mar 31, 2012
Country flag
I do not see anybody in the defence forum interested in the subject. I will do it myself with Google and Bing as aid……. Cheers.

Hari Sud

Senior Member
Mar 31, 2012
Country flag
Indian Civil & military intelligence

In Russia-Ukraine war, it has been amply proven that information is a weapon, but India was caught napping many times in the last 75 years short on information resulting in loss of territory or national prestige or both.

Indian intelligence still dominated by British masters in 1948 was not aware that the Pakistani army led by British General Messervy had planned the invasion of Kashmir in 1948. Not only was the Intelligence Bureau (IB) caught blind, but resulted in significant portion of Kashmir under Pakistani occupation. Other such examples are:

1. The IB in 1962 gave Nehru an erroneous appraisal of China's invasion of the Himalayas.

2. In 1965, Indian intelligence failed to locate the Pakistani armoured division, hidden so near the Indian border in Khemkaran. It is the good fortune and bravery of the Indian soldiers that the Pakistani did not succeed.

3. In 1971, it was incorrectly assessed that there are no Pakistani preparations to cross & capture Longewala and march on to Jodhpur.

4. In 1999, the Pakistani troops who captured the vacant Kargil Heights were incorrectly assessed to be a few hundred raiders.

5. In 2020, a shrewd Chinese exercise was misinterpreted and the Chinese were allowed to enter much of Indian territory in Ladakh.

These were blatant internal and external surprises that occurred because the enemy knew the weaknesses in Indian intelligence and was exploiting them.

Why are so many intelligence failures?

Honestly, there is no formal response. Basically, until 1967, both the internal & external intelligence system reported to the Intelligence Bureau and they were found largely wanting in their work. It was in 1967 that the external intelligence was separated from internal and a new agency - RAW (Research and Analysis Wing) was created to safeguard national interests. It operated well for 25 years under the leadership of R N Kao and his successors, but in 1996; it’s mandate of eye for an eye was taken away and was rendered powerless to retaliate. It was a major political mistake that resulted in multiple attacks in India by the enemy with immunity. This political error has been corrected in last 10 years.

Just to summarize, Indian intelligence has three major operational wings. These are:

A). Intelligence Bureau - Internal Intelligence
B). RAW - External Intelligence
C). Military intelligence - Armed forces run this operation

Today, Indian intelligence is better organized and co-ordinated. Many new nodal agencies (need of the hour) were created to gather, co-ordinate and politically assess the intelligence gathered. These include:

Joint Intelligence Committee (JIC)
Research and Analysis Wing [RAW]&
Intelligence Bureau (IB)
Ministry of External Affairs
National Technical Facilities Organisation

The Defense Ministry has a separate organization:
Joint Cipher Bureau
Directorate of Military Intelligence
Defence Security Corps
Special Frontier Force
National Security Guards (NSG)
Special Security Bureau
Air Force
Directorate of Air Intelligence
Directorate of Naval Intelligence
Coast Guard
Minister of State for Home Affairs

We don't know how they collect and coordinate information. To our knowledge, with each unpleasant episode, enhancements and new measures are in place. For example the Chinese on December 9, 2022 did not have any idea that the Indian Army is waiting to thwart their design to capture Tawang heights. It was more of a surprise to the Chinese and an improvement on our intelligence gathering.

(Google has been extensibly used to write this paper)


Senior Member
Aug 19, 2009
Good effort. Keep it up but don’t reveal secrets. Only to the past but not current ones.

Latest Replies

Global Defence

New threads