Jiangsu State Security Department
{{Short description|Provincial department of China's Ministry of State Security}}
{{Infobox government agency
| name = Jiangsu State Security Department
| native_name_a = {{lang|zh-cn|江苏省国家安全厅}}
| native_name_r =
| type = Department
| logo = China Ministry of State Security insignia.png
| logo_size = 140px
| logo_caption = Insignia of the MSS
| formed = {{start date and age|September 1983}}{{Cite journal |last=Joske |first=Alex |author-link=Alex Joske |date=September 2023 |title=State Security Departments: The Birth of China's Nationwide State Security System |url=https://deserepi.org/0/joske_ssd.pdf |journal=Deserepi |language=en |pages=11–12 |access-date=2023-10-01 |archive-date=2023-09-27 |archive-url=https://web.archive.org/web/20230927234455/https://deserepi.org/0/joske_ssd.pdf |url-status=live }}
| jurisdiction = Jiangsu, China
| headquarters = 1 Yangzhou Road
Gulou, Nanjing, Jiangsu, China
{{Coord|32.05944|118.76139|display=inline,title}}
| parent_department = Ministry of State Security
}}
The Jiangsu State Security Department ({{Lang-zh|s=江苏省国家安全厅|labels=no}}) is the provincial bureau of the Chinese Ministry of State Security in Jiangsu which serves as the coastal province's intelligence service and secret police.
They are involved extensively in espionage against the United States, and aviation-related industrial espionage, operating the advanced persistent threat TURBINE PANDA, also known as APT26.{{Cite web |title=Turbine Panda, APT 26, Shell Crew, WebMasters, KungFu Kittens - Threat Group Cards: A Threat Actor Encyclopedia |url=https://apt.etda.or.th/cgi-bin/showcard.cgi?g=Turbine%20Panda,%20APT%2026,%20Shell%20Crew,%20WebMasters,%20KungFu%20Kittens&n=1 |access-date=2023-05-16 |website=apt.etda.or.th |archive-date=2023-05-16 |archive-url=https://web.archive.org/web/20230516175034/https://apt.etda.or.th/cgi-bin/showcard.cgi?g=Turbine%20Panda,%20APT%2026,%20Shell%20Crew,%20WebMasters,%20KungFu%20Kittens&n=1 |url-status=live }} They are most well known for their alleged responsibility for the high-profile 2015 hack of the United States Office of Personnel Management, stealing the personal details of over 20 million U.S. federal civil servants.
The department is headquartered in Gulou, Nanjing, west of the Jiming Temple, though it maintains locations throughout the province.{{Cite web |date=October 2019 |title=Huge Fan of Your Work: How TURBINE PANDA and China's Top Spies Enabled Beijing to Cut Corners on the C919 Passenger Jet |url=https://passle-net.s3.amazonaws.com/Passle/5c752afb989b6e0f5cda12f4/MediaLibrary/Document/2019-10-18-10-42-26-646-huge-fan-of-your-work-intelligence-report.pdf |website=Crowdstrike |access-date=2023-05-25 |archive-date=2023-03-21 |archive-url=https://web.archive.org/web/20230321112312/https://passle-net.s3.amazonaws.com/Passle/5c752afb989b6e0f5cda12f4/MediaLibrary/Document/2019-10-18-10-42-26-646-huge-fan-of-your-work-intelligence-report.pdf |url-status=live }}
History
The Jiangsu SSD was established from the Jiangsu Investigation Department in September 1983. Only in January 1984 were public security personnel transferred into the SSD. The first Jiangsu SSD head, Qiu Lu (邱路), had been a deputy head of the provincial public security department. At least two of the original Jiangsu SSD deputy heads, Zhou Xiaoliang 周效良 and Hua Hengshuan 花恒栓, came from the Jiangsu Investigation Department.{{Cite journal |last=Joske |first=Alex |author-link=Alex Joske |date=2023 |title=State security departments: The birth of China's nationwide state security system |url=https://deserepi.org/0/joske_ssd.pdf |journal=Deserepi |pages=11–12 |access-date=2023-10-01 |archive-date=2023-09-27 |archive-url=https://web.archive.org/web/20230927234455/https://deserepi.org/0/joske_ssd.pdf |url-status=live }}
An official history states that the Jiangsu Public Security Department, ‘in accordance with the Central Committee’s relevant regulations’, transferred the entirety of its Technology Division (技术处) and Science and Technology division (科技处), and three sections of its Political Protection Division (政保处) to the Jiangsu SSD in January 1984. The Public Security Department's Science and Technology Division was established in April 1979 with a staff of 75, and was outwardly known as the Jiangsu Province Public Security Science and Technology Research Institute (江苏省公安科学技术研究所). This institute is now known as the Nanjing Institute of Information Technology (南京信息技术研究院) or the Nanjing 841 Research Institute (南京841 研究所), and may be directly subordinate to the MSS rather than the Jiangsu SSD.
Operations
= Hack of the US Office of Personnel Management =
{{Main|Office of Personnel Management data breach}}{{Further|Cyberwarfare and China}}
In 2015, hackers working on behalf of the Jiangsu SSD obtained access to 22.1 million SF-86 records of US federal employees, contractors, and their friends and family.{{Cite news |last1=Zengerle |first1=Patricia |last2=Cassella |first2=Megan |date=2015-07-09 |title=Estimate of Americans hit by government personnel data hack skyrockets |url=https://www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 |access-date=2015-07-09 |work=Reuters |archive-date=2017-02-28 |archive-url=https://web.archive.org/web/20170228005352/http://www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709 |url-status=live }}{{cite news |last1=Nakashima |first1=Ellen |date=9 July 2015 |title=Hacks of OPM databases compromised 22.1 million people, federal authorities say |newspaper=The Washington Post |url=https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/ |access-date=19 July 2020 |archive-date=26 July 2018 |archive-url=https://web.archive.org/web/20180726051157/https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/ |url-status=live }} Representing one of the largest breaches of government data in U.S. history,{{Cite news |author=Barrett, Devlin |date=5 June 2015 |title=U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say |work=The Wall Street Journal |url=https://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 |url-access=subscription |access-date=5 June 2015 |archive-date=4 June 2015 |archive-url=https://web.archive.org/web/20150604215718/http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 |url-status=live }} information that was obtained and exfiltrated in the breach{{Cite news |last=Fruhlinger |first=Josh |date=2020-02-12 |title=The OPM hack explained: Bad security practices meet China's Captain America |url=https://www.csoonline.com/article/3318238/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html |access-date=2023-05-29 |website=CSO Online |language=en |archive-date=2023-05-24 |archive-url=https://web.archive.org/web/20230524090310/https://www.csoonline.com/article/3318238/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html |url-status=live }} included personally identifiable information such as Social Security numbers,{{Cite news |author=Risen, Tom |date=5 June 2015 |title=China Suspected in Theft of Federal Employee Records |work=U.S. News & World Report |url=https://www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records |access-date=5 June 2015 |archive-date=6 June 2015 |archive-url=https://web.archive.org/web/20150606064331/http://www.usnews.com/news/articles/2015/06/05/china-suspected-in-theft-of-federal-employee-records |url-status=live }} as well as names, dates and places of birth, and addresses.{{Cite news |author=Sanders |first=Sam |date=4 June 2015 |title=Massive Data Breach Puts 4 Million Federal Employees' Records At Risk |work=NPR |url=https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk |access-date=5 June 2015 |archive-date=5 June 2015 |archive-url=https://web.archive.org/web/20150605041629/http://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk |url-status=live }}
= Espionage against the United States military =
{{See also|United States v. Ji Chaoqun}}
In 2013, Jì Chāoqún ({{Zh|s=季超群|p=|labels=no}}), a Chinese graduate student studying in the United States, was recruited by officials from the JSSD and agreed to "dedicate the rest of his life to [China's] national security." He graduated from Illinois Institute of Technology in 2015 and enlisted as an E-4 in the United States Army Reserve through the Military Accessions Vital to the National Interest (MAVNI) program the following year. In response to a security clearance investigation at the time of his enlistment, Ji falsely claimed to have had no close contact with officials of any foreign government in the prior seven years. In 2018, Ji met with individuals he believed were with the MSS, but were in fact undercover agents of the US Federal Bureau of Investigation (FBI). During these meetings, Ji said he could leverage his military credentials to take photos on board the destroyer USS Roosevelt, and that he would seek work in cybersecurity at the CIA, FBI or NASA, in order to gain greater access to databases of classified information. He was arrested later in 2018. Following a trial in 2022, Ji was convicted on one count each of acting as an agent of China without registering under the Foreign Agents Registration Act as required (18 USC § 951), conspiracy to wit, and making false statements (18 USC § 1001) to the US Army. In early 2023, Ji was sentenced to eight years in prison by a federal court in Chicago.{{Cite news |date=2023-01-26 |title=一名中国公民因非法充当中国政府代理人而被判处八年监禁 |trans-title=A Chinese citizen was sentenced to eight years in prison for illegally acting as an agent of the Chinese government |url=https://www.voachinese.com/a/chinese-national-sentenced-to-eight-years-for-acting-within-the-united-states-as-an-unregistered-agent-ofchina-20230125/6934535.html |access-date=2023-05-17 |website=Voice of America |language=zh-CHN |archive-date=2023-05-17 |archive-url=https://web.archive.org/web/20230517144033/https://www.voachinese.com/a/chinese-national-sentenced-to-eight-years-for-acting-within-the-united-states-as-an-unregistered-agent-ofchina-20230125/6934535.html |url-status=live }} Ji appealed his conviction and sentence and his appeal was denied in July 2024.{{Cite news |last=Barker |first=Holly |date=July 11, 2024 |title=Chinese Spy Can't Shake Criminal Conviction, Eight-Year Sentence |url=https://news.bloomberglaw.com/litigation/chinese-spy-cant-shake-criminal-conviction-eight-year-sentence |access-date=October 27, 2024 |work=Bloomberg News}}
= Industrial espionage in the aviation sector =
In 2017, an engineer at GE Aviation in Cincinnati was contacted by officials from the Jiangsu SSD through LinkedIn, and convinced to give a presentation to officials ostensibly from Nanjing University of Aeronautics and Astronautics. After being identified by the FBI and GE security, he was forced to take part in an offensive counterintelligence operation run by the FBI. After the engineer reengaged his Chinese acquaintance at the behest of the FBI, search warrants of the email address the man used revealed him to be Xu Yanjun, a deputy division director of the Sixth Bureau of the JSSD with nearly 20 years experience. Soon after, Xu asked the engineer to obtain details on the composite materials used in the structure of the Lockheed Martin F-22 Raptor.
Xu was ultimately arrested in a sting operation in Belgium arranged by the FBI. After examining his devices, an iCloud account revealed the JSSD was engaged in cyberespionage against global aerospace conglomerates Honeywell and Safran, and California-based gas turbine manufacturer Capstone Turbine. The companies were contractors for the first indigenous Chinese commercial aircraft, the COMAC C919, and the information revealed that China was working to steal the data necessary to cut the vendors out of the supply chain.{{Cite news |last=Bhattacharjee |first=Yudhijit |date=2023-03-07 |title=The Daring Ruse That Exposed China's Campaign to Steal American Secrets |language=en-US |work=The New York Times |url=https://www.nytimes.com/2023/03/07/magazine/china-spying-intellectual-property.html |access-date=2023-05-11 |issn=0362-4331 |archive-date=2023-05-11 |archive-url=https://web.archive.org/web/20230511002416/https://www.nytimes.com/2023/03/07/magazine/china-spying-intellectual-property.html |url-status=live }} At a discussion at the Center for Strategic and International Studies (CSIS), Sinologist Peter Mattis said Nanjing Institute of Information Technology was the eventual customer for the stolen technology, and played a key role in setting the intelligence requirements for the JSSD's collection efforts.{{Cite web |date=December 5, 2019 |title=Chinese Communist Espionage: An Intelligence Primer Book Discussion |url=https://www.csis.org/events/chinese-communist-espionage-intelligence-primer-book-discussion |access-date=2023-05-10 |website=Center for Strategic and International Studies |language=en |archive-date=2023-02-01 |archive-url=https://web.archive.org/web/20230201092917/https://www.csis.org/events/chinese-communist-espionage-intelligence-primer-book-discussion |url-status=live }}
List of directors
class="wikitable"
!Name !Entered office !Left office !Time in office !ref. |
Qiu Lu (邱路)
|September 1983 |unknown |unknown |
Yang Zhaoliang (杨兆亮)
|unknown |March 30, 2007 |unknown |{{Cite web |title=江蘇省國家安全廳 - 怪猫的图书资源库 |trans-title=State Security Department of Jiangsu Province |url=http://biographicdb.fudan.edu.cn/bookstore/Units/Details/a6cbebd6-6325-473a-96cf-e62c578eda16 |access-date=2023-08-10 |website=Fudan University |language=zh-CHN |archive-date=2023-08-10 |archive-url=https://web.archive.org/web/20230810230637/http://biographicdb.fudan.edu.cn/bookstore/Units/Details/a6cbebd6-6325-473a-96cf-e62c578eda16 |url-status=live }} |
Wang Jinling (王金陵)
|March 30, 2007 |July 2014 |7 years, 4 months |
{{Ill|Liu Yang (MSS)|lt=Liu Yang|zh|刘旸 (政治人物)}} (刘旸)
|July 2014 |August 22, 2017 |3 years, 2 months |
Chen Deying (陈德鹰)
|September 2017 |unknown |unknown |
References
{{MSS|state=expanded}}
{{authority control}}
Category:Provincial organs of the Ministry of State Security (China)