WASHINGTON — Gregg W. Bergersen was a Navy veteran who liked to gamble on occasion but spent far more time worrying about how to earn some serious money after he left his career as an analyst at the Defense Department.
At 51 and supporting a wife and a child in the Virginia suburbs, he wondered how he could get himself cast in that distinctly Washington role many Pentagon types dream of: a rewarding post-retirement perch at one of the hundreds of military-related companies that surround the capital and flourish off lucrative government contracts and contacts.
Mr. Bergersen believed he had found what he was seeking when he was introduced to Tai Shen Kuo, a native of Taiwan, who had lived in New Orleans for more than 30 years. Mr. Kuo, an entrepreneur who imported furniture from China, was active enough in civic affairs to have been named to a state advisory board on international trade. He told Mr. Bergersen that he was developing a defense consulting company.
Now, Mr. Bergersen and Mr. Kuo, along with a third accomplice, are awaiting sentencing in a federal court for their involvement in one of many cases brought in the last year involving the illegal transfer of information to China.
The cases have intensified the evaluation in intelligence and law enforcement circles about the breadth of the threat from Beijing. Many have been similar to the one involving Mr. Bergersen, in that prosecutors describe them as carefully planned intelligence operations run by the Chinese government intended to steal national security secrets. Other cases, however, are less clear in their nature; some seem to be closer to violations of commercial export laws, with the transferred information intended to provide Chinese companies a technological benefit.
According to court papers and interviews, Mr. Kuo and his Chinese handlers ran what intelligence professionals call a “false flag” operation on Mr. Bergersen, a weapons systems analyst, making him believe that the information he was providing was going to Taiwan, an American ally, not Beijing.
Nonetheless, surveillance tapes made by the Federal Bureau of Investigation showed that Mr. Bergersen understood he was engaged in a serious crime.
While sitting in a rental car on July 10, 2007, Mr. Bergersen pleaded with Mr. Kuo not to tell anyone that he was the source of the information he was providing, which included anticipated American arms sales to Taiwan. “I’d get fired for sure on that,” he said. “Well, not even get fired, go to [expletive] jail.”
While Mr. Bergersen may have convinced himself that the offense was attenuated because the information was going to Taiwan, the recordings show he took the risk mainly because Mr. Kuo regularly dangled a promise that he would eventually take him in as a partner in a defense consulting firm after he retired from the Pentagon and pay him $300,000 to $400,000 a year. In the meanwhile, Mr. Kuo gave him small gifts and took him to Las Vegas, where he treated him to expensive shows and paid for his wagering, all of which were observed by F.B.I. agents.
Beyond the case of Mr. Bergersen, prosecutors in the last year have brought about a dozen cases involving China’s efforts to obtain military-grade accelerometers (used to make smart bombs), defense information about Taiwan, American warship technology, night-vision technology and refinements to make missiles more difficult to detect.
In interviews, current and former intelligence and law enforcement officials demonstrated uncertainty as to the precise scope of the problem of Chinese espionage. But many officials offered a similar description of the pattern of the cases: Chinese government and state-sponsored industries have relied on the Chinese diaspora — using immigrants, students and people of second- and third-generation Chinese heritage — and regular commercial relations to operate a system in which some people wittingly or unwittingly participate.
One senior law enforcement official involved in prosecuting such cases said the Chinese had “a game plan of sending out lots of tiny feelers in hopes of getting back small bits of seemingly unrelated information in hopes of creating a larger picture.”
David W. Szady, who as an assistant director of the F.B.I. ran its counterintelligence division until retiring in 2006, said the Chinese had “mastered the use of multiple redundant collection platforms” by looking for students, delegates to conferences, relatives and researchers to gather information.
Federal investigators have come to believe, Mr. Szady said in an interview, that while the collection system may appear haphazard, even random, the Chinese “have become very focused on what they want.”
Officials said that several other nations, notably Iran and Russia, had aggressively engaged in espionage aimed at the United States. But Joel F. Brenner, the intelligence community’s top counterintelligence official, said China was by far the leading practitioner.
In an interview, Mr. Brenner described China’s information-gathering efforts as “a full-court press and relentless.” As a result, he said, few professional analysts “really think that what’s going on is anything other than an orchestrated, deeply thought-out, strategic campaign.”
But, Mr. Brenner said, not all the information-transfer cases involving China are part of that suspected government-led espionage effort. “Some instances are purely commercial and just involve greed,” he said.
On the military side, Mr. Brenner said, China is especially interested in improving its naval capability against any threat from the United States and obtaining intelligence that might be important in a military confrontation in the Taiwan Strait.
In one case, he noted, China was trying to obtain technology to help its submarines run quieter and avoid detection.
One clue as to the degree of coordination of some of the operations is buried in court papers in the Bergersen case. According to one F.B.I. document, the mastermind was an unnamed Chinese government official based in both Hong Kong and Guangzhou, an industrial center formerly known as Canton. The official, identified only as “PRC official A,” is described by people familiar with the case as a senior Chinese intelligence official who had been a central figure in two other recent Chinese espionage operations.
PRC official A, these people said, had also helped coordinate the activities of Chi Mak, a Chinese-born engineer who was sentenced in March to more than 24 years in prison for selling naval secrets to China. The information was not classified, Mr. Mak’s lawyers argued at trial, although it was illegal to provide it to China.
Mr. Brenner noted testimony showing that Mr. Mak was a “sleeper agent” who worked his way up in the military contracting industry, an ascent he said “bespeaks a patience that the Chinese are especially good at.”
At the trial, prosecutors presented a “tasking list” from Chinese government handlers that set forth a catalog of naval information Mr. Mak was to obtain. “You can get to know the dragon by its claw, and the list was a clear picture of the dragon’s claw,” Mr. Brenner said.
Mr. Mak and PRC official A also figure in a third major case, the one involving Dongfan Chung. Mr. Chung, a former Boeing engineer known as Greg, was convicted on economic espionage charges for providing China with company trade secrets related to several aerospace programs, including the space shuttle.
The documents say Mr. Chung decided to spy for China partly out of patriotic sentiment. A letter from a Chinese official to Mr. Chung read in part, “It is your honor and China’s fortune that you are able to realize your wish of dedicating yourself to the service of your country.”
The appeal to ethnic loyalty raises the sensitive issue of whether the authorities have reason to be more suspicious of Chinese researchers and students. Wen Ho Lee, a former scientist at Los Alamos National Laboratory was arrested in 1999 on 59 counts involving espionage and China. All but one of the charges was dropped after a judge found significant problems with the government’s case.
Dr. Lee and many supporters contended that he had been unfairly singled out because of his Chinese heritage. He eventually received a settlement from the government and from several news outlets, including The New York Times, that had reported the early suspicions.
Steven W. Pelak, the export enforcement coordinator in the counterespionage section of the Justice Department, said there was an inherent protection against resorting to profiling or stereotyping. Almost all of the department’s cases involving suspected Chinese espionage, Mr. Pelak said, come from companies that report a commercial inquiry or request that seems suspicious and not through surveillance because someone has Chinese heritage or connections.
It is also impracticable to keep close track of Chinese visitors to the United States, since they number about 600,000 a year, in addition to 60,000 students here at any one time. Chinese intelligence officials apparently believed that the Kuo-Bergersen channel had enough potential to assign a professional intelligence officer to live in New Orleans to act as a “cut-out,” or intermediary, between Mr. Kuo and PRC official A. That person was Yu Xin Kang, a 33-year-old woman who was the third accomplice charged in the case.
Mr. Kuo was provided $50,000 by his Chinese handlers, which he used largely to get close to Mr. Bergersen by paying for trips, restaurant meetings and small gifts. At one point, according to F.B.I. surveillance tapes, Mr. Bergersen recounted how his wife discovered a large wad of cash he had received from Mr. Kuo. Thinking quickly, Mr. Bergersen told her it was gambling winnings from a European trip. To his dismay, she said she was entitled to half and took it. After Mr. Bergersen related this bit of ill fortune, Mr. Kuo offered to compensate him for the difference, but Mr. Bergersen declined.
Mr. Bergersen faces up to 10 years in prison at his scheduled sentencing Friday in Alexandria, Va. Mr. Kuo and Ms. Kang, scheduled for sentencing later this summer, face life in prison.
Link to article: http://www.nytimes.com/2008/07/10/washington/10spy.html
Post a Comment