1,673
Views
2
CrossRef citations to date
0
Altmetric
ARTICLES

Li Kenong and the Practice of Chinese Intelligence

REFERENCES

  • John Ehrman “Toward a Theory of CI: What Are We Talking About When We Talk About Counterintelligence,” Central Intelligence Agency, Studies in Intelligence, Vol. 53, No. 2, June 2009.
  • Kai Cheng Li Kenong: Zhonggong yinbi zhanxian de zhuoyue lingdaoren [Li Kenong: The Remarkable Leader of the CCP Covert Battlefront] (Beijing: Zhongguo Youyi Chuban Gongsi [China Friendship Publishing Company], 2012), p. 412.
  • Ibid., p. 3.
  • Xuezhi Guo China's Security State: Philosophy, Evolution and Politics (Cambridge, UK: Cambridge University Press, 2012).
  • “Li Kenong,” Xinhua, 17 January 2003, available at http://news.xinhuanet.com/ziliao/2003-01/17/content_694139.htm (accessed 7 March 2014).
  • “Shenke renshi Mao Zedong ‘gu jin wei yong, yang wei xi yong’ sixiang de zhongyao yiyi [Deeply Recognize the Important Meaning of Mao Zedong's Thinking on ‘Making the Past Serve the Present, the Western Serve China’]” Guangming Daily, 12 December 2013, available at http://www.qstheory.cn/tbzt/tbzt_2013/mzd120/yjpl/201312/t20131222_304992.htm (accessed 7 March 2014).
  • Peter Vladimirov The Vladimirov Diaries: Yenan, China: 1942–1945 (New York: Doubleday, 1976), p. 100.
  • For a thorough accounting of Chinese intelligence historiography, see, Matthew Brazil, “The Darkest Red Corner: Chinese Communist Intelligence and Its Place in the Party, 1926–1945,” Ph.D. Dissertation, University of Sydney, Australia, 2012, pp. 1–8, 17–26.
  • Li Li, Huainian jiafu Li Kenong: cong mimi zhanxian zouchu de kaiguo shangjiang [Remembering Our Father Li Kenong: From the Secret Front to General of the New Country] (Beijing: Renmin Chubanshe, 2008), pp. 3–7.
  • In rural areas, like Mao Zedong's Jiangxi Soviet, some local security forces were organized, but they did not report to the CCP Central Committee and pursued local rather than central objectives.
  • Li Li, Huainian jiafu Li Kenong, p. 17.
  • Kai Cheng, Li Kenong, p. 5.
  • Xuezhi Guo, China's Security State, p. 326.
  • Ibid., p. 324.
  • Ibid., pp. 334–335.
  • Mu Xin, Yinbi zhanxian tongshuai: Zhou Enlai [Captain of the Covert Front: Zhou Enlai] (Beijing: Zhongguo qingnian chubanshe, 2002), p. 79.
  • Mu Xin, Yinbi zhanxian tongshuai, p. 79; Matthew Brazil, “The Darkest Red Corner,” pp. 57–61; Xuezhi Guo, China's Security State, pp. 309–310.
  • Frederic Wakeman, Policing Shanghai 1927–1937 (Oakland: University of California Press, 1996), pp. 138–142; Xu Linxiang, “Long tan san jie de shouci xiangju” and “Qiequ qingbao” in Li Kenong Zhuan [The Biography of Li Kenong] (Hefei: Anhui People's Press, 1997); Kai Cheng, Li Kenong, pp. 8–15.
  • Maochun Yu, OSS in China: Prelude to Cold War (New Haven, CT: Yale University Press, 1997), p. 34; Mu Xin, Yinbi zhanxian tongshuai, pp. 16–17.
  • Wu Xing, “Junwei erju he yi bei yu wei changzheng zhong de ‘zou yelu de denglong’ [How the Central Military Committee's Second Department Became the ‘Lantern that Lights the Way’ during the Long March],” Beijing Daily, 4 July 2011.
  • “Jinian Li Kenong 110 zhounian danchen [Remembering Li Kenong's 110th Birthday],” Dangshi zonglan [Party History Overview], No. 9, 2009, p. 6; Zuo Yuhe, “Juemi: Li Kenong yu xi'an shijian [Top Secret: Li Kenong and the Xi'an Incident],” Tongzhou gongjin [In The Same Boat], No. 8, 2011, pp. 33–34.
  • Ibid.
  • Michael Dutton Policing Chinese Politics: A History (Durham, NC: Duke University Press, 2005), p. 113
  • David Wise Tiger Trap: America's Secret Spy War with China (New York: Houghton Mifflin Harcourt, 2011), pp. 5–19; Dan Verton, “The Evolution of Espionage: Beijing's Red Spider Web,” Jamestown Foundation China Brief, Vol. 8, No. 15, 17 July 2008; Doron Zimmermann, “Chinese Industrial Espionage and the Consequences for the Private Sector in the West,” Conference Paper, International Studies Association Annual Conference, San Diego, CA, 4 April 2012; Richard J. Aldrich and John Kasuku, “Escaping from American Intelligence: Culture, Ethnocentrism, and the Anglosphere,” International Affairs, Vol. 88, No. 5, September 2012, pp. 1019–1022; I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Lanham, MD: The Scarecrow Press, 2012),
  • David Wise Tiger Trap, pp. 10–11.
  • I. C. Smith and Nigel West Historical Dictionary of Chinese Intelligence, p. 220; Richard J. Aldrich and John Kasuku, “Escaping from American Intelligence,” p. 1020.
  • Bill Gertz “Chinese Espionage Handbook Details Ease of Swiping Secrets,” The Washington Times, 26 December 2000.
  • For a more detailed critique of the logic and evidence of this perspective, see, Peter Mattis, “Assessing Western Perspectives on Chinese Intelligence,” International Journal of Intelligence and CounterIntelligence, Vol. 25, No. 4, Winter 2012–2013, pp. 678–699.
  • William C. Hannas, James Mulvenon, and Anna B. Puglisi Chinese Industrial Espionage: Technology Acquisition and Military Modernization (New York: Routledge, 2013).
  • Li Li, Huainian jiafu Li Kenong, p. 17.
  • Xiong Xianghui Wode qingbao yu waijiao shengya [My Intelligence and Diplomatic Careers] (Beijing: Zhonggong danggshi chubanshe, 2006), pp. 8–10.
  • Nicholas Eftimiades Chinese Intelligence Operations (Annapolis, MD: Naval Institute Press, 1994), p. 34.
  • Warren Kuo Analytic History of Chinese Communist Party, Vol. 2 (Taipei: Institute for International Relations of the Republic of China, 1966), pp. 289–291.
  • Henry Flooks “Chinese Defections Overseas,” Central Intelligence Agency, Studies in Intelligence, Fall 1965, declassified 18 September 1995.
  • Warren Kuo Analytic History of Chinese Communist Party, Vol. 4, pp. 385–386, 388.
  • Ibid., p. 388; Warren Kuo, Analytic History of Chinese Communist Party, Vol. 2, p. 291.
  • Peter Mattis “Five Ways China Spies,” The National Interest, 6 March 2014; Peter Mattis, “Taiwan Espionage Cases Highlight Changes in Chinese Intelligence Operations,” Jamestown Foundation China Brief, Vol. 11, No. 12, 1 July 2011, available at http://www.jamestown.org/single/?.tx_ttnews%5Btt_news%5D=38130&no_cache=1#.UySXNvnV_0c.
  • Warren Kuo Analytic History of Chinese Communist Party, Vol. 2, pp. 296–307.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.