{"id":12490,"date":"2015-08-27T14:00:37","date_gmt":"2015-08-27T17:00:37","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=12490"},"modified":"2015-08-27T10:30:39","modified_gmt":"2015-08-27T13:30:39","slug":"chinese-industrial-espionage-technology-acquisition-and-military-modernisation","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/chinese-industrial-espionage-technology-acquisition-and-military-modernisation\/","title":{"rendered":"Chinese Industrial Espionage: Technology Acquisition and Military Modernisation"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12491\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/08\/chinese-industrial-espionage-technology-acquisition-and-military-modernisation.jpg\" alt=\"Chinese Industrial Espionage: Technology Acquisition and Military Modernisation\" width=\"145\" height=\"230\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/08\/chinese-industrial-espionage-technology-acquisition-and-military-modernisation.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/08\/chinese-industrial-espionage-technology-acquisition-and-military-modernisation-95x150.jpg 95w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>William C. Hannas, James Mulvenon, Anna B. Puglisi<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition\u00a0Routledge<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> This new book is the first full account, inside or outside government, of China\u2019s efforts to acquire foreign technology.<\/p>\n<p>Based on primary sources and meticulously researched, the book lays bare China\u2019s efforts to prosper technologically through others&#8217; achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods\u2014without compensating the owners. The director of the US National Security Agency recently called it &#8220;the greatest transfer of wealth in history.&#8221;<\/p>\n<p>Written by two of America&#8217;s leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People\u2019s Republic of China\u2019s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.<\/p>\n<p>This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>William C. Hannas, James Mulvenon, Anna B. Puglisi Maison d&#8217;\u00e9dition\u00a0Routledge R\u00e9sum\u00e9: This new book is the first full account, inside or outside government, of China\u2019s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China\u2019s efforts to prosper technologically through others&#8217; achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them&hellip; <\/p>\n","protected":false},"author":3,"featured_media":12491,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,30,6],"tags":[],"class_list":["post-12490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-espionagem-e-inteligencia-competitiva","category-livros"],"views":323,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=12490"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12490\/revisions"}],"predecessor-version":[{"id":12492,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12490\/revisions\/12492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/12491"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=12490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=12490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=12490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}