Matthew J Brazil - Academia.edu (original) (raw)

Uploads

Videos by Matthew J Brazil

BBC's Karin Giannone interviews Matthew Brazil, co-author of the book Chinese Communist Espionage... more BBC's Karin Giannone interviews Matthew Brazil, co-author of the book Chinese Communist Espionage, An Intelligence Primer (Annapolis: Naval Institute Press, 2019). They discuss the pending Hong Kong National Security Law being written by the National People's Congress in Beijing and the implications of the Chinese security services operating openly there in the near future. 20 June 2020

Papers by Matthew J Brazil

Research paper thumbnail of The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party 1926-1945

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Darker Corners: Less Familiar Aspects of Spying

Intelligence and national security, Jun 1, 2010

Other than James Bond or Jason Bourne style fantasies, we are mostly accustomed to spy novels and... more Other than James Bond or Jason Bourne style fantasies, we are mostly accustomed to spy novels and non-fiction exposés that follow established patterns. In fiction, perhaps a beleaguered headquarters with a 'mole', diplomats in embassy jobs with covert ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party 1926-1945

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Detective in China: A Memoir of Sleuthing Out Technology Cheating

SpyTalk.co, 2021

A former US Commerce diplomat in China recalls cat-and-mouse games with Chinese firms

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Chinas Deep Strike SpyTalk 14 March

SpyTalk.co, 2021

Beijing’s latest hack is an unprecedented, broad assault on the West’s computers - but threads fr... more Beijing’s latest hack is an unprecedented, broad assault on the West’s computers - but threads from history are evident.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Stable Door and Chollima: Chinese Computers and North Korean IT

Advanced laptops and desktops with American-made CPUs are now common in North Korea. How did the... more Advanced laptops and desktops with American-made CPUs are now common in North Korea. How did they get there, and what can be done? This paper summarizes the latest evidence and makes policy recommendations that could further US-China cooperation to curb North Korean nuclear and missile technology development.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Addressing Rising Business Risk in China

As China celebrated its first-ever National Security Day, anti-foreigner sentiment appears to hav... more As China celebrated its first-ever National Security Day, anti-foreigner sentiment appears to have been made an official part of the Chinese state’s increased vigilance. The risks associated with doing business in the PRC have risen due to Chinese suspicion of foreign business people and assets in China and escalating tensions with its major trading partners. In the meantime, foreign investment appears to be cooling off, though the PRC remains a compelling foreign business priority. However, stricter regulations and a seemingly desperate anti-espionage campaign may have led to detentions of foreigners, including the recent beating by State Security agents of an American diplomat. A review of how Chinese governments have dealt with foreigners on its soil in the past and a survey of recent developments indicate that a sea-change in how China treats foreigners may be underway.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Origins of the CCP's Security Services (expanded)

The Chinese Communist Party's security services were formed under the difficult conditions of rev... more The Chinese Communist Party's security services were formed under the difficult conditions of revolution and suffered several nearly fatal defeats. They grew when provided the respite of the Yan'an sanctuary (1936-1945) and emerged from World War II in a stronger position than their Nationalist Chinese enemy services. This briefing traces their growth and organizational development from 1927 to 1955, recommends readings, and points to areas that require further research.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Human Factor 101: the missing element of cyber security

Cyber Security "walls" are growing ever higher and stronger as hacking attacks multiply. However... more Cyber Security "walls" are growing ever higher and stronger as hacking attacks multiply. However, the "insider threat" of the rogue employee is commonly cited as a major problem. People can easily become the unknown gap in your IP protection plan. This presentation outlines ways to coordinate commonsense human measures with cyber security to strengthen your people - as well as your systems - against compromise.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HIGH SPEED. LOW DRAG: TAIA GLOBAL REPORT BY JEFFREY CARR, WITH CONTRIBUTIONS BY MATT BRAZIL...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cultivate Employee Loyalty in China & Protect Your IP

Bookmarks Related papers MentionsView impact

Research paper thumbnail of PRC Intelligence Apparatus: Implications for Foreign Firms in China

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Foreign Businesses in China: Out on a Limb?

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party...

Chinese Communist Party (CCP) intelligence organs played a crucial role in the revolution and 194... more Chinese Communist Party (CCP) intelligence organs played a crucial role in the revolution and 1949 victory. However, their activities have been obscured to benefit secrecy, or distorted to advance propaganda goals. Looking beyond the "Party line," this examination of original sources on both sides of "secret war" shows how intelligence operations contributed to sensitive CCP decision making, and how mistakes by their operatives caused major setbacks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Chinese Intelligence Work, an Abbreviated History

The Chinese Communist Party’s (CCP’s) intelligence system is focused on technology acquisition, p... more The Chinese Communist Party’s (CCP’s) intelligence system is focused on technology acquisition, political and military intelligence, and counter-subversion, using some techniques familiar in the West but others that are less so. Chinese historical models, Soviet techniques, Western practices, and the recent evolution of work under the CCP have all shaped today’s intelligence and counterintelligence (CI) community, including the Ministry of State Security (MSS, Guojia Anquanbu), the smaller CI effort under the Ministry of Public Security (MPS, Gonganbu), and the specialized collection efforts of the People’s Liberation Army (PLA) and other government bodies. A striking characteristic of the Chinese system since 1979 is the broad “actuarial” tasking employed for technology acquisition.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Darker Corners: Less Familiar Aspects of Spying

Intelligence & National Security, Jan 1, 2010

Bookmarks Related papers MentionsView impact

Drafts by Matthew J Brazil

Research paper thumbnail of What the Heroes of Chinese Communist Intelligence History Tell Us About Today.docx

These cases from Chinese intelligence history tells us about the hazards businesses and others fa... more These cases from Chinese intelligence history tells us about the hazards businesses and others face today as they try to protect their intellectual property

Bookmarks Related papers MentionsView impact

BBC's Karin Giannone interviews Matthew Brazil, co-author of the book Chinese Communist Espionage... more BBC's Karin Giannone interviews Matthew Brazil, co-author of the book Chinese Communist Espionage, An Intelligence Primer (Annapolis: Naval Institute Press, 2019). They discuss the pending Hong Kong National Security Law being written by the National People's Congress in Beijing and the implications of the Chinese security services operating openly there in the near future. 20 June 2020

Research paper thumbnail of The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party 1926-1945

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Darker Corners: Less Familiar Aspects of Spying

Intelligence and national security, Jun 1, 2010

Other than James Bond or Jason Bourne style fantasies, we are mostly accustomed to spy novels and... more Other than James Bond or Jason Bourne style fantasies, we are mostly accustomed to spy novels and non-fiction exposés that follow established patterns. In fiction, perhaps a beleaguered headquarters with a 'mole', diplomats in embassy jobs with covert ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party 1926-1945

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Detective in China: A Memoir of Sleuthing Out Technology Cheating

SpyTalk.co, 2021

A former US Commerce diplomat in China recalls cat-and-mouse games with Chinese firms

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Chinas Deep Strike SpyTalk 14 March

SpyTalk.co, 2021

Beijing’s latest hack is an unprecedented, broad assault on the West’s computers - but threads fr... more Beijing’s latest hack is an unprecedented, broad assault on the West’s computers - but threads from history are evident.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Stable Door and Chollima: Chinese Computers and North Korean IT

Advanced laptops and desktops with American-made CPUs are now common in North Korea. How did the... more Advanced laptops and desktops with American-made CPUs are now common in North Korea. How did they get there, and what can be done? This paper summarizes the latest evidence and makes policy recommendations that could further US-China cooperation to curb North Korean nuclear and missile technology development.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Addressing Rising Business Risk in China

As China celebrated its first-ever National Security Day, anti-foreigner sentiment appears to hav... more As China celebrated its first-ever National Security Day, anti-foreigner sentiment appears to have been made an official part of the Chinese state’s increased vigilance. The risks associated with doing business in the PRC have risen due to Chinese suspicion of foreign business people and assets in China and escalating tensions with its major trading partners. In the meantime, foreign investment appears to be cooling off, though the PRC remains a compelling foreign business priority. However, stricter regulations and a seemingly desperate anti-espionage campaign may have led to detentions of foreigners, including the recent beating by State Security agents of an American diplomat. A review of how Chinese governments have dealt with foreigners on its soil in the past and a survey of recent developments indicate that a sea-change in how China treats foreigners may be underway.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Origins of the CCP's Security Services (expanded)

The Chinese Communist Party's security services were formed under the difficult conditions of rev... more The Chinese Communist Party's security services were formed under the difficult conditions of revolution and suffered several nearly fatal defeats. They grew when provided the respite of the Yan'an sanctuary (1936-1945) and emerged from World War II in a stronger position than their Nationalist Chinese enemy services. This briefing traces their growth and organizational development from 1927 to 1955, recommends readings, and points to areas that require further research.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Human Factor 101: the missing element of cyber security

Cyber Security "walls" are growing ever higher and stronger as hacking attacks multiply. However... more Cyber Security "walls" are growing ever higher and stronger as hacking attacks multiply. However, the "insider threat" of the rogue employee is commonly cited as a major problem. People can easily become the unknown gap in your IP protection plan. This presentation outlines ways to coordinate commonsense human measures with cyber security to strengthen your people - as well as your systems - against compromise.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of HIGH SPEED. LOW DRAG: TAIA GLOBAL REPORT BY JEFFREY CARR, WITH CONTRIBUTIONS BY MATT BRAZIL...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cultivate Employee Loyalty in China & Protect Your IP

Bookmarks Related papers MentionsView impact

Research paper thumbnail of PRC Intelligence Apparatus: Implications for Foreign Firms in China

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Foreign Businesses in China: Out on a Limb?

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party...

Chinese Communist Party (CCP) intelligence organs played a crucial role in the revolution and 194... more Chinese Communist Party (CCP) intelligence organs played a crucial role in the revolution and 1949 victory. However, their activities have been obscured to benefit secrecy, or distorted to advance propaganda goals. Looking beyond the "Party line," this examination of original sources on both sides of "secret war" shows how intelligence operations contributed to sensitive CCP decision making, and how mistakes by their operatives caused major setbacks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Chinese Intelligence Work, an Abbreviated History

The Chinese Communist Party’s (CCP’s) intelligence system is focused on technology acquisition, p... more The Chinese Communist Party’s (CCP’s) intelligence system is focused on technology acquisition, political and military intelligence, and counter-subversion, using some techniques familiar in the West but others that are less so. Chinese historical models, Soviet techniques, Western practices, and the recent evolution of work under the CCP have all shaped today’s intelligence and counterintelligence (CI) community, including the Ministry of State Security (MSS, Guojia Anquanbu), the smaller CI effort under the Ministry of Public Security (MPS, Gonganbu), and the specialized collection efforts of the People’s Liberation Army (PLA) and other government bodies. A striking characteristic of the Chinese system since 1979 is the broad “actuarial” tasking employed for technology acquisition.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Darker Corners: Less Familiar Aspects of Spying

Intelligence & National Security, Jan 1, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of What the Heroes of Chinese Communist Intelligence History Tell Us About Today.docx

These cases from Chinese intelligence history tells us about the hazards businesses and others fa... more These cases from Chinese intelligence history tells us about the hazards businesses and others face today as they try to protect their intellectual property

Bookmarks Related papers MentionsView impact