During this episode, Dr. James Mulvenon of SOSI compares and contrasts Russian and Chinese information operations. After describing his robust team of linguists, James discusses collections efforts, sovereignty and the Chinese diaspora, and sharing of tactics, techniques, and procedures between Russia and China.
Books Discussed and Relevant Links:
Bio: Dr. James Mulvenon is Director of Intelligence Integration for SOSi’s Defense and Intelligence Group, where he has recruited and trained a team of more than forty-five Chinese, Russian, Korean, and Farsi linguist-analysts and ten cleared software developers performing collection, analysis, and operations support for US Government and corporate customers. A Chinese linguist by training, he is a leading international expert on Chinese cyber, technology transfer, espionage, and military issues. Dr. Mulvenon received his B.A. in China Studies from the University of Michigan, studied Communist Party History at Fudan University in Shanghai, and received his Ph.D. in political science from the University of California, Los Angeles. Dr. Mulvenon contributed multiple chapters to China’s Quest for Foreign Technology: Beyond Espionage, which was published in September 2020. He is regularly invited to address senior government and commercial audiences on Chinese technology espionage and cyber topics, and his comments have appeared in the Washington Post, New York Times, Wall Street Journal, and other international media outlets.
IPA is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain.
For more information, please contact us at email@example.com.
Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.