Chinese intelligence activity abroad#Modes of operation

{{Short description|none}}

{{Use dmy dates|date=March 2022}}

The government of the People's Republic of China is engaged in espionage overseas, directed through diverse methods via the Ministry of State Security (MSS), the Ministry of Public Security (MPS), the United Front Work Department (UFWD), People's Liberation Army (PLA) via its Intelligence Bureau of the Joint Staff Department, and numerous front organizations and state-owned enterprises. It employs a variety of tactics including cyber espionage to gain access to sensitive information remotely, signals intelligence, human intelligence as well as influence operations through united front activity targeting overseas Chinese communities and associations.{{cite web |last=Bowe |first=Alexander |date=August 24, 2018 |title=China's Overseas United Front Work: Background and Implications for the United States |url=https://www.uscc.gov/sites/default/files/Research/China%27s%20Overseas%20United%20Front%20Work%20-%20Background%20and%20Implications%20for%20US_final_0.pdf |url-status=live |archive-url=https://web.archive.org/web/20180909101348/https://www.uscc.gov/sites/default/files/Research/China's%20Overseas%20United%20Front%20Work%20-%20Background%20and%20Implications%20for%20US_final_0.pdf |archive-date=September 9, 2018 |access-date=May 12, 2019 |publisher=United States-China Economic and Security Review Commission}} The Chinese government is also engaged in industrial espionage aimed at gathering information and technology to bolster its economy, as well as transnational repression of dissidents abroad such as supporters of the Tibetan independence movement and Uyghurs as well as the Taiwan independence movement, the Hong Kong independence movement, Falun Gong, pro-democracy activists, and other critics of the Chinese Communist Party (CCP).{{cite web|url=http://www.asianwarrior.com/2016/09/decoding-mss-ministry-of-state-security-china.html|title=Decoding MSS: Ministry of State Security – China|work=Asian Warrior |date=5 September 2016|access-date=2 April 2017|url-status=bot: unknown|archive-url=https://web.archive.org/web/20160913035411/http://www.asianwarrior.com/2016/09/decoding-mss-ministry-of-state-security-china.html|archive-date=13 September 2016}}{{cite news |last1=Drohan |first1=Dr. Thomas A. |title=China's All-Effects All-Domain Strategy in an All-Encompassing Information Environment |url=https://smallwarsjournal.com/index.php/jrnl/art/chinas-all-effects-all-domain-strategy-all-encompassing-information-environment |access-date=22 October 2019 |publisher=Small Wars Journal |date=14 October 2019 |archive-url=https://web.archive.org/web/20191022221232/https://smallwarsjournal.com/index.php/jrnl/art/chinas-all-effects-all-domain-strategy-all-encompassing-information-environment |archive-date=22 October 2019 |url-status=live }}{{cite news |last1=Perlroth |first1=Nicole |last2=Conger |first2=Kate |last3=Mozur |first3=Paul |title=China Sharpens Hacking to Hound Its Minorities, Far and Wide |url=https://www.nytimes.com/2019/10/22/technology/china-hackers-ethnic-minorities.html |access-date=22 October 2019 |work=The New York Times |date=22 October 2019 |archive-url=https://web.archive.org/web/20191022091003/https://www.nytimes.com/2019/10/22/technology/china-hackers-ethnic-minorities.html |archive-date=22 October 2019 |url-status=live }} The United States alleges that the degree of intelligence activity is unprecedented in its assertiveness and engagement in multiple host countries, particularly the United States, with economic damages estimated to run into the hundreds of billions according to the Center for Strategic and International Studies.

Modes of operation

{{Further|Cyberwarfare and China}}File:China Ministry of State Security insignia.png]]

It is believed that Chinese espionage is aimed at preserving China's national security through gaining commercial, technological, and military secrets.

{{cite news|author=McElroy, Damien|url=https://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/07/03/wchin03.xml&sSheet=/news/2005/07/03/ixnewstop.html|title=China aims spy network at trade secrets in Europe|work=The Daily Telegraph|date=3 July 2005|access-date=8 April 2008|location=London|archive-url=https://web.archive.org/web/20080409144006/http://www.telegraph.co.uk/news/main.jhtml?xml=%2Fnews%2F2005%2F07%2F03%2Fwchin03.xml&sSheet=%2Fnews%2F2005%2F07%2F03%2Fixnewstop.html|archive-date=9 April 2008|url-status=dead}}

{{cite news|url=http://www.cnn.com/2007/TECH/11/15/us.china.tech.ap/ |title=Report: China spies threaten U.S. technology|publisher=CNN |date=15 November 2007|access-date=8 April 2008 |archive-url = https://web.archive.org/web/20080120120103/http://www.cnn.com/2007/TECH/11/15/us.china.tech.ap/ |archive-date = 20 January 2008}}{{Cite news|url=http://english.aljazeera.net/NR/exeres/F1D09CD9-C268-4C73-ACE3-F32C6FD4AD83.htm|title=US man jailed in China 'spy' case|publisher=Al Jazeera|date=24 March 2008|access-date=8 April 2008|archive-url=https://web.archive.org/web/20120404224638/http://www.aljazeera.com/|archive-date=4 April 2012|url-status=live}}{{cite news|author=Ward, Olivia|url=https://www.thestar.com/news/2007/06/06/exenvoy_warns_of_chinese_spies.html|title=Ex-envoy warns of Chinese spies|work=Toronto Star|date=6 June 2007|access-date=8 April 2008|archive-url=https://web.archive.org/web/20111122070342/http://www.thestar.com/News/article/222118|archive-date=22 November 2011|url-status=live}}

{{cite news|author=Geis, Sonya|url=https://www.washingtonpost.com/wp-dyn/content/article/2006/05/24/AR2006052402386_pf.html|title=FBI Officials Are Faulted in Chinese Spying Case|newspaper=The Washington Post|date=25 May 2006|access-date=7 April 2008|archive-url=https://web.archive.org/web/20180429145913/http://www.washingtonpost.com/wp-dyn/content/article/2006/05/24/AR2006052402386_pf.html|archive-date=29 April 2018|url-status=live}}{{cite news |last1=Racino |first1=Brad |last2=Castellano |first2=Jill |title=UCSD doctor resigns amid questions about undisclosed Chinese businesses |url=https://inewsource.org/2019/07/06/thousand-talents-program-china-fbi-kang-zhang-ucsd/ |access-date=4 November 2019 |publisher=Investigative Newsource, d.b.a. inewsource |date=6 July 2019 |archive-url=https://web.archive.org/web/20191105021010/https://inewsource.org/2019/07/06/thousand-talents-program-china-fbi-kang-zhang-ucsd/ |archive-date=5 November 2019 |url-status=live }}{{cite news |last1=Redden |first1=Elizabeth |title=Professor Indicted for Alleged Undisclosed Chinese Links |url=https://www.insidehighered.com/news/2019/08/23/kansas-professor-indicted-allegedly-failing-disclose-appointment-chinese-university |access-date=4 November 2019 |publisher=Inside Higher Ed |date=23 August 2019 |archive-url=https://web.archive.org/web/20191105021019/https://www.insidehighered.com/news/2019/08/23/kansas-professor-indicted-allegedly-failing-disclose-appointment-chinese-university |archive-date=5 November 2019 |url-status=live }}{{cite news |last1=Kolata |first1=Gina |title=Scientists With Links to China May Be Stealing Biomedical Research, U.S. Says |url=https://www.nytimes.com/2019/11/04/health/china-nih-scientists.html |access-date=4 November 2019 |work=The New York Times |date=4 November 2019 |archive-url=https://web.archive.org/web/20191104074002/https://www.nytimes.com/2019/11/04/health/china-nih-scientists.html |archive-date=4 November 2019 |url-status=live }} The carriers of China's intelligence activities are diverse.{{cite news|author=Johnston, David|url=https://query.nytimes.com/gst/fullpage.html?res=9D07E2DE1731F930A15756C0A96F958260|title=The Nation; Finding Spies Is the Easy Part|work=The New York Times|date=23 May 1999|access-date=7 April 2008|archive-url=https://web.archive.org/web/20121109022519/http://www.nytimes.com/1999/05/23/weekinreview/the-nation-finding-spies-is-the-easy-part.html|archive-date=9 November 2012|url-status=live}}

{{Cite news|author1=Shulsky, Abram N.|author2=Schmitt, Gary J.|url=https://www.pbs.org/wgbh/pages/frontline/shows/khadr/readings/humint.html|title=Son of Al Qaeda: Human Intelligence Collection|work=PBS|date=22 April 2004|access-date=7 April 2008|archive-url=https://web.archive.org/web/20120126072418/http://www.pbs.org/wgbh/pages/frontline/shows/khadr/readings/humint.html|archive-date=26 January 2012|url-status=live}}{{cite news|author1=Warrick, Joby|author2=Johnson, Carrie|url=https://www.washingtonpost.com/wp-dyn/content/story/2008/04/02/ST2008040204050.html|title=Chinese Spy 'Slept' In U.S. for 2 Decades|newspaper=The Washington Post|date=3 April 2008|access-date=7 April 2008|archive-url=https://web.archive.org/web/20121107022616/http://www.washingtonpost.com/wp-dyn/content/story/2008/04/02/ST2008040204050.html|archive-date=7 November 2012|url-status=live}}

The use of non-traditional intelligence assets is codified in Chinese law. Article 14 of China's 2017 National Intelligence Law mandates that Chinese intelligence agencies "may ask relevant institutions, organizations and citizens to provide necessary support, assistance and cooperation."{{Cite book|title=Stealth war: how China took over while America's elite slept|last=Spalding|first=Robert|publisher=Penguin Random House|others=Kaufman, Seth|year=2019|isbn=978-0-593-08434-2|pages=148|oclc=1102323878}} Honey trapping and kompromat are also common tools of Chinese intelligence services.{{Cite news|last=Gardner|first=Frank|date=7 July 2020|title=The spying game: China's global network|language=en-GB|work=BBC News |url=https://www.bbc.com/news/uk-53329005|access-date=8 July 2020|archive-url=https://web.archive.org/web/20200709152059/https://www.bbc.com/news/uk-53329005|archive-date=9 July 2020|url-status=live}}

Much of the information available to the public about the Chinese intelligence services comes from defectors, whom the PRC accuses of lying to promote an anti-PRC agenda.

{{Cite news|url=http://www.abc.net.au/news/newsitems/200506/s1385007.htm|title=Downer can grant defector political asylum: lawyer|publisher=4=ABC News|date=6 June 2005|access-date=7 April 2008|archive-url=https://web.archive.org/web/20050912164451/http://www.abc.net.au/news/newsitems/200506/s1385007.htm|archive-date=12 September 2005|url-status=dead}}

{{cite news|url=https://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085 |title=Defectors say China running 1,000 spies in Canada |work=CBC News |date=15 June 2005 |access-date=7 April 2008 |url-status=live |archive-url=https://web.archive.org/web/20080206133759/http://www.cbc.ca/canada/story/2005/06/15/spies050615.html |archive-date=6 February 2008 }}

{{Cite news|author=Jeldres, Julio A.|url=http://www.atimes.com/atimes/China/GF17Ad06.html|title=Canberra wakes up to China 'spies'|work=Asia Times|date=17 June 2005|access-date=7 April 2008|archive-url=https://web.archive.org/web/20120419032018/http://www.atimes.com/atimes/China/GF17Ad06.html|archive-date=19 April 2012|url-status=unfit}}

{{Cite news|url=http://www.voanews.com/english/2008-04-01-voa34.cfm |title=Beijing Denies Involvement in China Spy Case|work=VOA|date=1 April 2008|access-date=7 April 2008 |archive-url = https://web.archive.org/web/20080406010708/http://www.voanews.com/english/2008-04-01-voa34.cfm |archive-date = 6 April 2008}} One known exception to this rule is the case of Katrina Leung, who was accused of starting an affair with an FBI agent to gain sensitive documents from him. A U.S. judge dismissed all charges against her due to prosecutorial misconduct.

{{Cite news|work=Frontline|url=https://www.pbs.org/wgbh/pages/frontline/shows/spy/etc/synopsis.html|title=From China With Love|publisher=PBS|date=15 January 2004|access-date=7 April 2008|archive-url=https://web.archive.org/web/20170813014334/http://www.pbs.org/wgbh/pages/frontline/shows/spy/etc/synopsis.html|archive-date=13 August 2017|url-status=live}}

The United States believes the Chinese military has been developing network technology in recent years{{When|date=September 2024|reason=recent years relative to when?}} to perform espionage on other nations. Several cases of computer intrusions suspected of Chinese involvement have been found in various countries, including Australia, New Zealand, Canada, France, Germany, the Netherlands, the United Kingdom, India and the United States.

{{cite news|author=Macartney, Jane|url=http://www.timesonline.co.uk/tol/news/world/asia/article3000697.ece|title=China hits back at 'slanderous and prejudiced' alert over cyber spies|work=The Times|date=5 December 2007|access-date=7 April 2008|location=London|archive-url=https://web.archive.org/web/20080830035055/http://www.timesonline.co.uk/tol/news/world/asia/article3000697.ece|archive-date=30 August 2008|url-status=dead}}{{cite news|author=Barnes, Julian E.|url=https://www.latimes.com/news/nationworld/world/la-fg-uschina4mar04,1,3559963.story|title=China's computer hacking worries Pentagon|work=Los Angeles Times|date=4 March 2008|access-date=4 March 2008|archive-url=https://web.archive.org/web/20080310042216/http://www.latimes.com/news/nationworld/world/la-fg-uschina4mar04%2C1%2C3559963.story|archive-date=10 March 2008|url-status=dead}}{{cite web|author=Brookes, Peter|url=http://www.familysecuritymatters.org/homeland.php?id=1386912|title=Flashpoint: The Cyber Challenge: Cyber attacks are growing in number and sophistication|work=Family Security Matters|date=13 March 2008|access-date=7 April 2008|url-status=dead|archive-url=https://web.archive.org/web/20080329074454/http://www.familysecuritymatters.org/homeland.php?id=1386912|archive-date=29 March 2008}}

In the aftermath of the Shadow Network computer espionage operation, security experts claimed "targeting Tibetan activists is a strong indicator of official Chinese government involvement" since private Chinese hackers pursue economic information only.{{cite news |last1=Perlroth |first1=Nicole |title=Case Based in China Puts a Face on Persistent Hacking |url=https://www.nytimes.com/2012/03/30/technology/hacking-in-asia-is-linked-to-chinese-ex-graduate-student.html |access-date=23 October 2019 |work=The New York Times |date=29 March 2012 |archive-url=https://web.archive.org/web/20191023055645/https://www.nytimes.com/2012/03/30/technology/hacking-in-asia-is-linked-to-chinese-ex-graduate-student.html |archive-date=23 October 2019 |url-status=live }} In 2009, Canadian researchers at the Munk Center for International Studies at the University of Toronto examined the computers at the personal office of the Dalai Lama. Evidence led to the discovery of GhostNet, a large cyber-spy network. Chinese hackers had gained access to computers possessed by government and private organizations in 103 countries, although researchers say there is no conclusive evidence China's government was behind it. Computers penetrated include those of the Dalai Lama, Tibetan exiles, organizations affiliated with the Dalai Lama in India, Brussels, London and New York, embassies, foreign ministries and other government offices, and focus was believed to be on the governments of South Asian and Southeast Asian countries.{{cite news |last1=Markoff |first1=John |title=Vast Spy System Loots Computers in 103 Countries |url=https://www.nytimes.com/2009/03/29/technology/29spy.html |access-date=22 October 2019 |work=The New York Times |date=28 March 2009 |archive-url=https://web.archive.org/web/20090401224950/http://www.nytimes.com/2009/03/29/technology/29spy.html |archive-date=1 April 2009 |url-status=live }}{{cite news |last1=Markoff |first1=John |title=Tracking Cyberspies Through the Web Wilderness |url=https://www.nytimes.com/2009/05/12/science/12cyber.html |access-date=22 October 2019 |work=The New York Times |date=11 May 2009 |archive-url=https://web.archive.org/web/20191022234433/https://www.nytimes.com/2009/05/12/science/12cyber.html |archive-date=22 October 2019 |url-status=live }}{{cite news|url=http://news.bbc.co.uk/2/hi/americas/7970471.stm|title=Major cyber spy network uncovered|work=BBC News |date=29 March 2009|access-date=29 March 2009|archive-url=https://web.archive.org/web/20120315213515/http://news.bbc.co.uk/2/hi/americas/7970471.stm|archive-date=15 March 2012|url-status=live}} The same researchers discovered a second cyberspy network in 2010. They were able to see some of the stolen documents that included classified material about Indian missile systems, security in several Indian states, confidential embassy documents about India's relationships in West Africa, Russia and the Middle East, NATO forces travel in Afghanistan, and a years worth of the Dalai Lama's personal email. The "sophisticated" hackers were linked to universities in China. Beijing again denied involvement.{{cite news |last1=Branigan |first1=Tania |title=Cyber-spies based in China target Indian government and Dalai Lama |url=https://www.theguardian.com/technology/2010/apr/06/cyber-spies-china-target-india |access-date=23 October 2019 |work=The Guardian |date=6 April 2010 |archive-url=https://web.archive.org/web/20191023055646/https://www.theguardian.com/technology/2010/apr/06/cyber-spies-china-target-india |archive-date=23 October 2019 |url-status=live }}{{cite news |last1=Markoff |first1=John |last2=Barboza |first2=David |title=Researchers Trace Data Theft to Intruders in China |url=https://www.nytimes.com/2010/04/06/science/06cyber.html?pagewanted=all |access-date=23 October 2019 |work=The New York Times |date=5 April 2010 |archive-url=https://web.archive.org/web/20191023055654/https://www.nytimes.com/2010/04/06/science/06cyber.html?pagewanted=all |archive-date=23 October 2019 |url-status=live }} In 2019, Chinese hackers posing as The New York Times, Amnesty International and other organization's reporters targeted the private office of the Dalai Lama, Tibetan Parliament members, and Tibetan nongovernmental organizations, among others. Facebook and Twitter took down a large network of Chinese bots that was spreading disinformation about the 2019–20 Hong Kong protests and a months long attack on Hong Kong media companies was traced to Chinese hackers.{{cite news |last1=McMillan |first1=Robert |last2=Armental |first2=Maria |title=Twitter, Facebook Target Accounts Spreading Misinformation on Hong Kong Protests |url=https://www.wsj.com/articles/twitter-facebook-target-accounts-spreading-misinformation-on-hong-kong-protests-11566242944 |access-date=23 October 2019 |work=The Wall Street Journal |date=19 August 2019 |archive-url=https://web.archive.org/web/20191013073309/https://www.wsj.com/articles/twitter-facebook-target-accounts-spreading-misinformation-on-hong-kong-protests-11566242944 |archive-date=13 October 2019 |url-status=live }}

Facial recognition and surveillance artificial intelligence (AI) technology developed inside China to identify Uyghurs, a Muslim minority,{{cite news |last1=Mozur |first1=Paul |title=One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority |url=https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html?action=click&module=RelatedCoverage&pgtype=Article®ion=Footer |access-date=23 October 2019 |work=The New York Times |date=14 April 2019 |archive-url=https://web.archive.org/web/20190926025045/https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html?action=click&module=RelatedCoverage&pgtype=Article®ion=Footer |archive-date=26 September 2019 |url-status=live }} is now used throughout China, and despite security concerns over Chinese involvement in 5G wireless networks, is manufactured and exported worldwide by state owned China National Electronics Import & Export and Huawei to many countries, including Ecuador, Zimbabwe, Uzbekistan, Pakistan, Kenya, the United Arab Emirates, Venezuela, Bolivia, Angola and Germany.{{cite news |last1=Mozur |first1=Paul |last2=Kessel |first2=Jonah M. |last3=Chan |first3=Melissa |title=Made in China, Exported to the World: The Surveillance State |url=https://www.nytimes.com/2019/04/24/technology/ecuador-surveillance-cameras-police-government.html?action=click&module=RelatedCoverage&pgtype=Article®ion=Footer |access-date=23 October 2019 |work=The New York Times |date=24 April 2019 |archive-url=https://web.archive.org/web/20190429225641/https://www.nytimes.com/2019/04/24/technology/ecuador-surveillance-cameras-police-government.html?action=click&module=RelatedCoverage&pgtype=Article®ion=Footer |archive-date=29 April 2019 |url-status=live }} American companies and universities such as MIT are partnering with, and Princeton, the Rockefeller Foundation and the California Public Employees' Retirement System are backing, Chinese surveillance and AI start-ups such as Hikvision, SenseTime and Megvii, which sell less expensive versions of Chinese state developed artificial intelligence surveillance systems, although this is being curtailed somewhat due to the companies being declared national security threats and human rights violators by the US, and US-China trade concerns.{{cite news |last1=Shepardson |first1=David |last2=Horwitz |first2=Josh |title=U.S. expands blacklist to include China's top AI startups ahead of trade talks |url=https://www.reuters.com/article/us-usa-trade-china-exclusive/u-s-widens-blacklist-to-include-chinas-top-ai-startups-ahead-of-trade-talks-idUSKBN1WM25M |access-date=23 October 2019 |publisher=Reuters |date=7 October 2019 |archive-url=https://web.archive.org/web/20191026124340/https://www.reuters.com/article/us-usa-trade-china-exclusive/u-s-widens-blacklist-to-include-chinas-top-ai-startups-ahead-of-trade-talks-idUSKBN1WM25M |archive-date=26 October 2019 |url-status=live }}{{cite news |last1=Mac |first1=Ryan |last2=Adams |first2=Rosalind |last3=Rajagopalan |first3=Megha |title=US Universities And Retirees Are Funding The Technology Behind China's Surveillance State |url=https://www.buzzfeednews.com/article/ryanmac/us-money-funding-facial-recognition-sensetime-megvii |access-date=23 October 2019 |publisher=Buzz Feed |date=5 June 2019 |archive-url=https://web.archive.org/web/20190902192706/https://www.buzzfeednews.com/article/ryanmac/us-money-funding-facial-recognition-sensetime-megvii |archive-date=2 September 2019 |url-status=live }}{{cite news |last1=Mac |first1=Ryan |title=The US Just Blacklisted China's Most Valuable Facial Recognition Startups Over Human Rights Abuses |url=https://www.buzzfeednews.com/article/ryanmac/trump-us-blacklist-megvii-sensetime-yitu-xinjiang |access-date=23 October 2019 |publisher=Buzz Feed |date=8 October 2019 |archive-url=https://web.archive.org/web/20191020194657/https://www.buzzfeednews.com/article/ryanmac/trump-us-blacklist-megvii-sensetime-yitu-xinjiang |archive-date=20 October 2019 |url-status=live }}{{cite news |last1=Cao |first1=Sissi |title=US Blacklists China's Most Valuable AI Startup, Puts MIT Research at Risk |url=https://observer.com/2019/10/us-blacklist-china-ai-sensetime-mit-research-partnership/ |access-date=23 October 2019 |publisher=Observer |date=10 October 2019 |archive-url=https://web.archive.org/web/20191023055646/https://observer.com/2019/10/us-blacklist-china-ai-sensetime-mit-research-partnership/ |archive-date=23 October 2019 |url-status=live }} China invests in American AI startups and is starting to overtake the US in AI investment.{{cite news |title=Research Brief: China Is Starting To Edge Out The US in AI Investment |url=https://www.cbinsights.com/research/china-artificial-intelligence-investment-startups-tech/ |access-date=23 October 2019 |publisher=CB Insights |date=12 February 2019 |archive-url=https://web.archive.org/web/20191023055648/https://www.cbinsights.com/research/china-artificial-intelligence-investment-startups-tech/ |archive-date=23 October 2019 |url-status=live }}

In July 2020, in its annual report, Germany's domestic intelligence agency, the Federal Office for the Protection of the Constitution, warned consumers that personal data they provide to Chinese payment companies or other tech firms such as Tencent, Alibaba and others, could end up in the hands of China's government.[https://wrex.com/2020/07/09/german-intel-warns-against-giving-data-to-chinese-tech-firms/#:~:text=BERLIN%20(AP)%20%E2%80%94%20Germany's%20domestic,the%20hands%20of%20China's%20government.&text=The%20head%20of%20the%20BfV,can%20only%20warn%20against%20this.%E2%80%9D German intel warns against giving data to Chinese tech firms] {{Webarchive|url=https://web.archive.org/web/20200711021357/https://wrex.com/2020/07/09/german-intel-warns-against-giving-data-to-chinese-tech-firms/#:~:text=BERLIN%20(AP)%20%E2%80%94%20Germany's%20domestic,the%20hands%20of%20China's%20government.&text=The%20head%20of%20the%20BfV,can%20only%20warn%20against%20this.%E2%80%9D |date=11 July 2020 }} . WREX. 9 July 2020. Retrieved 10 July 2020 In September 2020, a Chinese company, Shenzhen Zhenhua Data Technology came under the scanner worldwide for its big data and data mining and integration capacities and intentions related to its use.{{Cite news|last1=Hurst|first1=Daniel|last2=Kuo|first2=Lily|last3=Graham-McLay|first3=Charlotte|date=14 September 2020|title=Zhenhua Data leak: personal details of millions around world gathered by China tech company|url=http://www.theguardian.com/world/2020/sep/14/zhenhua-data-full-list-leak-database-personal-details-millions-china-tech-company|access-date=14 September 2020|website=The Guardian |language=en|archive-date=14 September 2020|archive-url=https://web.archive.org/web/20200914123421/https://www.theguardian.com/world/2020/sep/14/zhenhua-data-full-list-leak-database-personal-details-millions-china-tech-company|url-status=live}} According to the information from the National Enterprise Credit Information Publicity System, which is run by State Administration for Market Regulation in China, the shareholders of Zhenhua Data Information Technology Co., Ltd. are two natural persons and one general partnership enterprise whose partners are natural persons.{{cite web |last1= State Administration for Market Regulation | title= National Enterprise Credit Information Publicity System |url=http://www.gsxt.gov.cn/%7B76CEA3961EEF0244EDD864953C3380083D1A03AA5B7C734A27D65E6B4CAEEADF63444B721FEEF7B1E66E287F66DAC3323C8983264807FE733C369B1659189EE89E439E439EE89E438F528F528F528F6E8954B5C71A6C8BFD20FD20F620496AD93BB9D17877C4C874FC5549A849944911084E190027943D21C01DC01DC01D-1600314972669%7D |website=GSXT |access-date=16 September 2020 }}{{dead link|date=March 2021|bot=medic}}{{cbignore|bot=medic}} Wang Xuefeng, who is the chief executive and the shareholder of Zhenhua Data, has publicly boasted that he supports "hybrid warfare" through manipulation of public opinion and "psychological warfare".{{Cite news |last1= Graham |first1= Ben | title= Zhenhua Data: 35,000 Aussies being spied on by China as part of 'psychological war' |url=https://www.news.com.au/technology/online/security/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b |website=news.com.au |date= 13 September 2020 |access-date=16 September 2020 |archive-url=https://web.archive.org/web/20200917043528/https://www.news.com.au/technology/online/security/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b

|archive-date=17 September 2020}}

= Agencies =

The primary agencies involved in deploying operatives overseas are the Ministry of State Security and the Intelligence Bureau of the Joint Staff Department of the Central Military Commission, both utilizing state-owned enterprises and united front groups acting as front organizations for intelligence operatives disguised as legitimate employees.{{Cite news |last1=Eftimiades |first1=Nicholas |date=22 October 2020 |title=The 5 Faces Of Chinese Espionage: The World's First 'Digital Authoritarian State' |website=breakingdefense.com |publisher=Breaking Defense |url=https://breakingdefense.com/2020/10/the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state/?_ga=2.78177236.1723115598.1603239368-894082404.1602384852 |url-status=live |access-date=22 October 2020 |archive-url=https://web.archive.org/web/20201026204130/https://breakingdefense.com/2020/10/the-5-faces-of-chinese-espionage-the-worlds-first-digital-authoritarian-state/?_ga=2.78177236.1723115598.1603239368-894082404.1602384852 |archive-date=26 October 2020}} The Ministry of Public Security is also involved in domestic counter-intelligence and overseas capture of fugitives, dissidents and corruption suspects through activities such as Operation Fox Hunt. The United Front Work Department is responsible for conducting political influence operations leveraging overseas Chinese diaspora and local political and economic elites while providing cover for intelligence agents.{{Cite web |last=Joske |first=Alex |author-link=Alex Joske |date=9 June 2020 |title=The Party Speaks for You |url=https://www.aspi.org.au/report/party-speaks-you |access-date=25 August 2022 |website=Australian Strategic Policy Institute |archive-date=9 June 2020 |archive-url=https://web.archive.org/web/20200609000729/https://www.aspi.org.au/report/party-speaks-you |url-status=live }}{{Cite news |last1=Berg |first1=Kirsten |last2=Rotella |first2=Sebastian |author-link2=Sebastian Rotella |title=Operation Fox Hunt: How China Exports Repression Using a Network of Spies Hidden in Plain Sight |language=en |website=ProPublica |url=https://www.propublica.org/article/operation-fox-hunt-how-china-exports-repression-using-a-network-of-spies-hidden-in-plain-sight?token=uoYT3QQC93fqm0Bw2XM2uFPVTHBJBAML |access-date=2022-08-25 |archive-date=5 March 2022 |archive-url=https://web.archive.org/web/20220305173754/https://www.propublica.org/article/operation-fox-hunt-how-china-exports-repression-using-a-network-of-spies-hidden-in-plain-sight?token=uoYT3QQC93fqm0Bw2XM2uFPVTHBJBAML |url-status=live }}

Xinhua News Agency also collects and reports information on individuals and groups of interest for intelligence purposes.{{Cite news |last=Mattis |first=Peter |date=August 18, 2015 |title=A Guide to Chinese Intelligence Operations |work=War on the Rocks |url=https://warontherocks.com/2015/08/a-guide-to-chinese-intelligence-operations/ |access-date=December 23, 2023 |archive-date=25 December 2020 |archive-url=https://web.archive.org/web/20201225054932/https://warontherocks.com/2015/08/a-guide-to-chinese-intelligence-operations/ |url-status=live }} Xinhua reporters file certain internal reports (neican) to CCP leadership from secure rooms in some Chinese embassies and consulates.{{Cite journal |last=Wesley-Smith |first=Peter |date=Autumn 1998 |title=Chinese Consular Representation in British Hong Kong |journal=Pacific Affairs |volume=71 |issue=3 |pages=359–375 |doi=10.2307/2761415 |jstor=2761415}}

== Advanced persistent threats ==

{{Excerpt|Advanced persistent threat#China}}

= Relationship with the United Front =

{{See also|United Front (China)}}

In 1939, Zhou Enlai espoused "nestling intelligence within the united front" while also "using the united front to push forth intelligence."{{Cite book |last=Joske |first=Alex |title=Spies and Lies: How China's Greatest Covert Operations Fooled the World |date=2022 |publisher=Hardie Grant Books |isbn=978-1-74358-900-7 |pages=24–39 |chapter=Nestling spies in the united front |oclc=1347020692 |author-link=Alex Joske}} According to Australian analyst Alex Joske, "the united front system provides networks, cover and institutions that intelligence agencies use for their own purposes." Joske added that "united front networks are a golden opportunity for Party's spies because they represent groups of Party-aligned individuals who are relatively receptive to clandestine recruitment."

In 2023, Chen Wenqing of the CCP's Central Political and Legal Affairs Commission directed party cadres and committees at all levels to "attach great importance to, concern themselves with, and support covert front work."{{cite news |last= |date=2023-07-15 |title=习近平极限思维新发展 强化隐蔽战线 |language=zh-Hans |website=Radio France Internationale |url=https://www.rfi.fr/cn/%E4%B8%AD%E5%9B%BD/20230715-%E4%B9%A0%E8%BF%91%E5%B9%B3%E6%9E%81%E9%99%90%E6%80%9D%E7%BB%B4%E6%96%B0%E5%8F%91%E5%B1%95-%E5%BC%BA%E5%8C%96%E9%9A%90%E8%94%BD%E6%88%98%E7%BA%BF |access-date=2023-07-19 |archive-date=19 July 2023 |archive-url=https://web.archive.org/web/20230719003951/https://www.rfi.fr/cn/%E4%B8%AD%E5%9B%BD/20230715-%E4%B9%A0%E8%BF%91%E5%B9%B3%E6%9E%81%E9%99%90%E6%80%9D%E7%BB%B4%E6%96%B0%E5%8F%91%E5%B1%95-%E5%BC%BA%E5%8C%96%E9%9A%90%E8%94%BD%E6%88%98%E7%BA%BF |url-status=live }}

Activity worldwide

=Africa=

==Ethiopia==

{{See also|2018 China-African Union espionage allegations}}

In January 2018, Le Monde reported that the headquarters of the African Union, which had been constructed by the China State Construction Engineering Corporation, had had its computer systems compromised between 2012 and 2017, with data from AU servers being forwarded to Shanghai.

{{cite news |url=http://www.lemonde.fr/afrique/article/2018/01/26/a-addis-abeba-le-siege-de-l-union-africaine-espionne-par-les-chinois_5247521_3212.html |title=A Addis-Abeba, le siège de l'Union africaine espionné par Pékin |newspaper=Le Monde |language=fr |date=26 January 2018 |first1=oan |last1=Tilouine |first2=Ghalia |last2=Kadiri |access-date=5 February 2018 |archive-url=https://web.archive.org/web/20180204141153/http://www.lemonde.fr//afrique/article/2018/01/26/a-addis-abeba-le-siege-de-l-union-africaine-espionne-par-les-chinois_5247521_3212.html |archive-date=4 February 2018 |url-status=live }}

{{cite news |url=https://www.aspistrategist.org.au/the-african-union-headquarters-hack-and-australias-5g-network/ |publisher=Australian Strategic Policy Institute |title=The African Union headquarters hack and Australia's 5G network |date=13 July 2018 |first=Danielle |last=Cave |access-date=13 July 2018 |archive-url=https://web.archive.org/web/20180713043648/https://www.aspistrategist.org.au/the-african-union-headquarters-hack-and-australias-5g-network/ |archive-date=13 July 2018 |url-status=dead }}

{{cite news|title=African Union accuses China of hacking headquarters|url=https://www.ft.com/content/c26a9214-04f2-11e8-9650-9c0ad2d7c5b5|date=29 January 2018|access-date=31 January 2018|first1=John|last1=Aglionby|first2=Emily|last2=Feng|first3=Yuan|last3=Yang|newspaper=Financial Times|archive-url=https://web.archive.org/web/20180130082532/https://www.ft.com/content/c26a9214-04f2-11e8-9650-9c0ad2d7c5b5|archive-date=30 January 2018|url-status=live}}

The building's computer system was subsequently removed and the AU refused a Chinese offer to configure the replacement system. Le Monde alleged that the AU had then covered up the hack to protect Chinese interests in the continent.{{cite news |url=https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/whats-the-deal-with-huawei-and-this-african-union-headquarters-hack/ |archive-url=https://archive.today/20190529182036/https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/whats-the-deal-with-huawei-and-this-african-union-headquarters-hack/ |archive-date=29 May 2019 |publisher=New America |title=What's the Deal with Huawei and This African Union Headquarters Hack? |date=28 May 2019 |first=Justin |last=Sherman |access-date=29 May 2019 |url-status=live }}

China and the African Union have rejected the allegations.

{{cite news |url=https://www.theguardian.com/world/2018/jan/30/china-african-union-headquarters-bugging-spying |newspaper=The Guardian |title=China rejects claim it bugged headquarters it built for African Union |date=30 January 2018 |agency=Reuters |quote=China and the African Union dismissed on Monday a report that Beijing had bugged the regional bloc's headquarters, which it built and paid for in the Ethiopian capital. |access-date=5 February 2018 |archive-url=https://web.archive.org/web/20180201110447/https://www.theguardian.com/world/2018/jan/30/china-african-union-headquarters-bugging-spying |archive-date=1 February 2018 |url-status=live }}

Ethiopian Prime Minister Hailemariam Desalegn rejected the French media report, saying that he doesn't believe it.

{{Cite news|url=https://www.enca.com/africa/au-spying-report-absurd-china|title=AU spying report absurd: China|website=enca.com|language=en|access-date=21 March 2018|archive-url=https://web.archive.org/web/20180824065955/https://www.enca.com/africa/au-spying-report-absurd-china|archive-date=24 August 2018|url-status=live}}

Moussa Faki Mahamat, head of the African Union Commission, said the allegations in the Le Monde{{'s}} report were false. "These are totally false allegations and I believe that we are completely disregarding them."

{{Cite news|url=https://www.reuters.com/article/us-china-africanunion/african-union-says-has-no-secret-dossiers-after-china-spying-report-idUSKBN1FS19W|title=African Union says has no secret dossiers after China spying report|newspaper=Reuters|language=en|access-date=21 March 2018|archive-url=https://web.archive.org/web/20180910185151/https://www.reuters.com/article/us-china-africanunion/african-union-says-has-no-secret-dossiers-after-china-spying-report-idUSKBN1FS19W|archive-date=10 September 2018|url-status=live|date=8 February 2018}}

In 2020, Japan's Computer Emergency Response Team (CERT) reported that a suspected Chinese hacking organization, "Bronze President," had hacked and extracted footage from the AU Headquarters' security cameras.{{cite news |url=https://www.reuters.com/article/us-ethiopia-african-union-cyber-exclusiv-idUSKBN28Q1DB |publisher=Reuters |title=Exclusive-Suspected Chinese hackers stole camera footage from African Union - memo |first=Raphael |last=Satter |date=16 December 2020 |archive-url=https://web.archive.org/web/20201219130042/https://www.reuters.com/article/us-ethiopia-african-union-cyber-exclusiv-idUSKBN28Q1DB |archive-date=19 December 2020 |editor-first=Jonathan |editor-last=Weber |editor2-first=Edward |editor2-last=Tobin}}

=Asia=

==Cambodia==

Since at least April 2017, TEMP.Periscope, an advanced persistent threat based in China, has been hacking Cambodian organizations related to the 2018 general election.

{{cite news |url=https://www.fireeye.com/blog/threat-research/2018/07/chinese-espionage-group-targets-cambodia-ahead-of-elections.html |publisher=FireEye |title=Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead of July 2018 Elections and Reveals Broad Operations Globally |date=10 July 2018 |first1=Scott |last1=Henderson |first2=Steve |last2=Miller |first3=Dan |last3=Perez |first4=Marcin |last4=Siedlarz |first5=Ben |last5=Wilson |first6=Ben |last6=Read |access-date=11 July 2018 |archive-url=https://web.archive.org/web/20180711015942/https://www.fireeye.com/blog/threat-research/2018/07/chinese-espionage-group-targets-cambodia-ahead-of-elections.html |archive-date=11 July 2018 |url-status=live }}

Targets included the National Election Commission, the Ministry of Interior, the Ministry of Foreign Affairs and International Cooperation, the Senate of Cambodia, and the Ministry of Economy and Finance. The APT engaged in spear phishing against Monovithya Kem of the Cambodia National Rescue Party, sending messages which impersonated the Cambodian League for the Promotion and Defense of Human Rights.

==Hong Kong==

{{Further|United front in Hong Kong|Causeway Bay Books disappearances}}

According to Pan-democracy political groups,{{cite news |title=團體促查國安跨境執法 |publisher=Oriental Daily |date=22 January 2012 |access-date=25 January 2014 |url=http://orientaldaily.on.cc/cnt/news/20120122/00176_014.html |archive-url=https://web.archive.org/web/20140203222907/http://orientaldaily.on.cc/cnt/news/20120122/00176_014.html |archive-date=3 February 2014 |url-status=live }} China has been sending spies into Hong Kong harassing dissents and Falun Gong practitioners. In 2012, according to Oriental Daily News, a Chinese security ministry official has been arrested in Hong Kong for suspicion of acting as a double agent for the United States.

{{cite news |title=China 'arrests high-level US spy' in Hong Kong – reports |publisher=BBC |date=1 June 2012 |access-date=25 January 2014 |url=https://www.bbc.co.uk/news/world-asia-china-18299065 |archive-url=https://web.archive.org/web/20150114041329/http://www.bbc.co.uk/news/world-asia-china-18299065 |archive-date=14 January 2015 |url-status=live }}

In October and December 2015, five book sellers of Causeway Bay Books disappeared as part of the Causeway Bay Books disappearances. The five men: Gui Minhai, Lee Bo, Lui Bo, Cheung Jiping and Lam Wing-kee were allegedly kidnapped by Chinese public security bureau officials from mainland China extrajudicially in breach of Hong Kong judicial independence as a result of publishing and distributing books containing corruption and scandals related to the senior leadership of the Chinese Communist Party.{{Cite news |date=2018-01-22 |title=Swedish bookseller 'snatched by Chinese agents from train' |url=http://www.theguardian.com/world/2018/jan/22/swedish-bookseller-allegedly-snatched-by-chinese-agents-from-train-gui-minhai |access-date=2022-08-27 |website=The Guardian |language=en |archive-date=27 August 2022 |archive-url=https://web.archive.org/web/20220827083534/https://www.theguardian.com/world/2018/jan/22/swedish-bookseller-allegedly-snatched-by-chinese-agents-from-train-gui-minhai |url-status=live }}

==India==

The Research and Analysis Wing (R&AW) believes that China is using dozens of study centers it has set up in Nepal near the Indian border in part to spy on India.{{Cite news |url=http://www.upiasia.com/Security/2009/10/08/indias_telecom_agency_raises_china_spy_scare/1789/ |title=UPI Asia, Indias telecom agency raises china spy sm |date=22 July 2012 |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20091009235328/http://www.upiasia.com/Security/2009/10/08/indias_telecom_agency_raises_china_spy_scare/1789/ |archive-date=9 October 2009 |url-status=dead }}

{{Cite news |url=http://timesofindia.indiatimes.com/india/China-using-Nepal-study-centres-for-spying/articleshow/5074293.cms |title=Times of India, China using Nepal study centres for spying, 1 October 2009 |publisher=Timesofindia.indiatimes.com |date=1 October 2009 |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20091018073614/http://timesofindia.indiatimes.com/india/China-using-Nepal-study-centres-for-spying/articleshow/5074293.cms |archive-date=18 October 2009 |url-status=live }}

In August 2011 a Chinese research vessel disguised as a fishing trawler was detected off the coast of Little Andaman, collecting data in a geostrategically sensitive region.{{cite news |url=http://zeenews.india.com/news/world/chinese-ship-caught-spying-on-india_729165.html |title=Chinese ship caught spying on India |publisher=Zee News |date=31 August 2011 |access-date=22 August 2012 |archive-date=24 August 2020 |archive-url=https://web.archive.org/web/20200824001358/https://zeenews.india.com/news/nation/chinese-ship-caught-spying-on-india_729165.html |url-status=live }}{{cite news |url=http://www.newsfirst.lk/english-news/index.php?view=news_more&id=2733 |title=Chinese spy ship docked at Colombo Port, says Indian media |publisher=News First |date=31 August 2011 |access-date=22 August 2012 }}{{dead link|date=January 2018 |bot=InternetArchiveBot |fix-attempted=yes }}

The "Luckycat" hacking campaign that targeted Japan and Tibet also targeted India.

{{Cite news |url=https://www.google.com/hostednews/afp/article/ALeqM5g1d_hpHVoMeP9CAwP5y6lfv0qawg?docId=CNG.1a373e3c26419d71d6a65008c3cd7b33.1211 |title=Security firm links cyber spy campaign to Chinese hacker |agency=Agence France-Presse |date=30 March 2012 |access-date=22 August 2012 |archive-url=https://web.archive.org/web/20120620044444/http://www.google.com/hostednews/afp/article/ALeqM5g1d_hpHVoMeP9CAwP5y6lfv0qawg?docId=CNG.1a373e3c26419d71d6a65008c3cd7b33.1211 |archive-date=20 June 2012 |url-status=dead }}

A Trojan horse was inserted into a Microsoft Word file ostensibly about India's ballistic missile defense program, allowing for the command and control servers to connect and extract information. The attacks were subsequently traced back to a Chinese graduate student from Sichuan and the Chinese government is suspected of planning the attacks.

Chinese hackers linked to the Third Technical Department of the People's Liberation Army have launched extensive and sustained hacking campaigns against the Central Tibetan Administration, based in Dharamshala.{{cite magazine |title=When Chinese hackers declared war on the rest of us |magazine=MIT Technology Review |url=https://www.technologyreview.com/s/612638/when-chinese-hackers-declared-war-on-the-rest-of-us/ |date=10 January 2019 |first=James |last=Griffiths |access-date=12 January 2019 |archive-date=12 January 2019 |archive-url=https://web.archive.org/web/20190112133014/https://www.technologyreview.com/s/612638/when-chinese-hackers-declared-war-on-the-rest-of-us/ |url-status=live }}

In 2018, PLA Navy deployed a Type 815G ELINT ship in waters off Andaman and Nicobar islands for two weeks, according to a report by Indian intelligence agencies.{{cite news|url=https://www.dnaindia.com/india/report-dna-exclusive-chinese-ship-spied-off-andaman-2786743/amp|title=DNA EXCLUSIVE: Chinese ship spied off Andaman|publisher=DNA India|date=2 September 2019|access-date=26 September 2019|archive-url=https://web.archive.org/web/20190926232851/https://www.dnaindia.com/india/report-dna-exclusive-chinese-ship-spied-off-andaman-2786743/amp|archive-date=26 September 2019|url-status=live}}

In March 2019, Indian intelligence agencies told news services that China was trying to spy on Indian Navy bases located in southern India and Integrated Test Range missile testing facility located at Abdul Kalam Island. It was doing this by establishing Chinese business around these areas.{{cite news|url=https://www.india.com/news/world/china-trying-to-spy-on-indian-naval-bases-by-establishing-businesses-in-karnataka-odisha-coast-intelligence-3613051/|title=China Spying on Indian Military Establishments: Intelligence|publisher=India.com|date=26 March 2019|access-date=28 March 2019|archive-url=https://web.archive.org/web/20190327152914/https://www.india.com/news/world/china-trying-to-spy-on-indian-naval-bases-by-establishing-businesses-in-karnataka-odisha-coast-intelligence-3613051/amp/|archive-date=27 March 2019|url-status=live}}

In September 2020, Delhi Police arrested a journalist and accomplices under the Official Secrets Act for allegedly passing sensitive information to Chinese intelligence officers.{{Cite news|date=19 September 2020|title=Indian police arrest journalist Rajeev Sharma for allegedly passing sensitive information to China|url=https://www.dw.com/en/indian-police-arrest-journalist-rajeev-sharma-for-allegedly-passing-sensitive-information-to-china/a-54991458|access-date=3 March 2021|website=DW.COM|publisher=Deutsche Welle|language=en-GB|archive-date=20 September 2020|archive-url=https://web.archive.org/web/20200920210015/https://www.dw.com/en/indian-police-arrest-journalist-rajeev-sharma-for-allegedly-passing-sensitive-information-to-china/a-54991458|url-status=live}}

On 3 March 2021, the Chinese hackers attacked the Covaxin and Covishield units In India.{{Cite news|date=3 March 2021|title=Explained: China's cyber eye and India|url=https://indianexpress.com/article/explained/explained-chinas-cyber-eye-and-india-7211655/|access-date=3 March 2021|website=The Indian Express|language=en|archive-date=3 March 2021|archive-url=https://web.archive.org/web/20210303060133/https://indianexpress.com/article/explained/explained-chinas-cyber-eye-and-india-7211655/|url-status=live}} It is also being claimed that the hackers tried to create a national blackout in the country by breaching the electricity units.{{Cite news|date=1 March 2021|title=Chinese cyber attack foiled: Power Ministry|language=en-IN|work=The Hindu|url=https://www.thehindu.com/news/national/attacks-by-chinese-groups-thwarted-power-ministry/article33965683.ece|access-date=3 March 2021|issn=0971-751X|archive-date=3 March 2021|archive-url=https://web.archive.org/web/20210303122210/https://www.thehindu.com/news/national/attacks-by-chinese-groups-thwarted-power-ministry/article33965683.ece|url-status=live}}

On 21 October 2022, The Tribune, an Indian English newspaper, reported that Delhi Police apprehended a Chinese female citizen hailing from Hainan province in China, and she was accused of assuming a false identity as a monk and allegedly engaging in "anti-national activities."{{Cite web |date=October 21, 2022 |title=Arrested Chinese woman, living as Nepali monk in Delhi, may be a spy: Police |url=https://www.tribuneindia.com/news/world/chinese-woman-living-as-nepali-monk-in-delhi-may-be-a-spy-arrested-police-443292 |access-date=October 8, 2023 |website=The Tribune |archive-date=11 October 2023 |archive-url=https://web.archive.org/web/20231011024206/https://www.tribuneindia.com/news/world/chinese-woman-living-as-nepali-monk-in-delhi-may-be-a-spy-arrested-police-443292 |url-status=live }}

In February 2023, Indian police detained a Chinese national accused of spying against India under the Indian Penal Code (IPC) section 121 (waging war against the government of India) and other IPC sections, after the Chinese national visited “key installations” in Delhi, India.{{Cite news |date=2023-02-25 |title=Chinese spy who visited key Delhi 'installations' held during Nepal return |work=The Times of India |url=https://timesofindia.indiatimes.com/city/bareilly/chinese-spy-who-visited-key-delhi-installations-held-during-nepal-return/articleshow/98221175.cms?from=mdr |access-date=2023-10-09 |issn=0971-8257 |archive-date=11 October 2023 |archive-url=https://web.archive.org/web/20231011014155/https://timesofindia.indiatimes.com/city/bareilly/chinese-spy-who-visited-key-delhi-installations-held-during-nepal-return/articleshow/98221175.cms?from=mdr |url-status=live }}

==Indonesia==

In January 2021, Indonesian fishermen reported findings of underwater drones or gliders. This finding is thought to be related to a glider belonging to China that was previously found by fishermen around the waters of Selayar Island, South Sulawesi. Foreign media have highlighted these findings. Most of them call this incident a secret Chinese mission in Indonesian waters. The Guardian, in its Espionage rubric, details previously that a Chinese-made glider was also found by fishermen in Tanjung Pinang, Riau Islands in March 2019. Furthermore, the finding also occurred in Masalembo, East Java in January 2020.{{cite web | url=https://voi.id/en/bernas/24978 | title=So Far, It is About China's Suspicion of Spying on the Indonesian Sea Using Underwater Drones | date=2 January 2021 | access-date=16 December 2022 | archive-date=27 June 2023 | archive-url=https://web.archive.org/web/20230627231204/https://voi.id/en/amp/24978/sejauh-ini-soal-dugaan-china-mata-matai-laut-indonesia-pakai-drone-bawah-air | url-status=live }}

In September 2021, Chinese hackers have breached the internal networks of at least ten Indonesian government ministries and agencies, including computers from Indonesia's primary intelligence service, Indonesian State Intelligence Agency (BIN). The intrusion, discovered by Insikt Group, the threat research division of Recorded Future, has been linked to Mustang Panda, a Chinese threat actor known for its cyber-espionage campaigns targeting the Southeast Asian region. But a spokesman of the Indonesia intelligence agency denies China hackers hacked into their computers.{{Cite news |date=2021-09-10 |title=Indonesian intelligence agency compromised in suspected Chinese hack |url=https://therecord.media/indonesian-intelligence-agency-compromised-in-suspected-chinese-hack/ |access-date=2022-12-16 |website=The Record by Recorded Future |language=en-US |archive-date=16 December 2022 |archive-url=https://web.archive.org/web/20221216154008/https://therecord.media/indonesian-intelligence-agency-compromised-in-suspected-chinese-hack/ |url-status=live }}{{Cite news |date=2021-09-20 |title=Indonesia says no evidence of alleged Chinese intel hack |url=https://apnews.com/article/technology-indonesia-hacking-d82af1aff0153a3d230b85bb0238f60e |access-date=2022-12-16 |website=Associated Press |language=en |archive-date=16 December 2022 |archive-url=https://web.archive.org/web/20221216153953/https://apnews.com/article/technology-indonesia-hacking-d82af1aff0153a3d230b85bb0238f60e |url-status=live }}

In July 2022, the Indonesian Navy arrested six people, including three foreigners, two from Malaysia and one from China, on suspicion of being involved in espionage activities in North Sebatik, North Kalimantan after they were found in possession of sensitive naval base photos at the shared island, according to Indonesian media reports.{{Cite news |last= |first= |title=Indonesia Navy Arrests Foreigners Suspected of Spying |url=https://www.kompas.com/ |access-date=2022-12-16 |website=KOMPAS.com |language=id |archive-date=20 February 2021 |archive-url=https://web.archive.org/web/20210220205902/https://www.kompas.com/ |url-status=live }}{{Cite news |title=Two Malaysians nabbed by Indonesian navy on suspicion of spying |url=https://www.thestar.com.my/news/nation/2022/07/25/two-malaysians-nabbed-by-indonesian-navy-on-suspicion-of-spying |access-date=2022-12-16 |website=The Star |language=en |archive-date=16 December 2022 |archive-url=https://web.archive.org/web/20221216181015/https://www.thestar.com.my/news/nation/2022/07/25/two-malaysians-nabbed-by-indonesian-navy-on-suspicion-of-spying |url-status=live }}

==Japan==

According to a report by Trend Micro, the "Luckycat" hacker group is engaged in cyber-espionage on targets in Japan, India and Tibet. During the 2011 Tōhoku earthquake and tsunami and nuclear meltdowns at Fukushima, the hackers inserted a Trojan virus into PDF attachments to emails being circulated containing information about radiation dosage measurements.{{cite news |url=https://malwarelab.zendesk.com/attachments/token/9ka92cuff4jqaev/?name=wp_luckycat_redux-1.pdf |title=Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan |author=Trend Micro |year=2012 |publisher=MalwareLab |page=6 |author-link=Trend Micro }}{{Dead link|date=July 2021 |bot=InternetArchiveBot |fix-attempted=yes }}

{{cite news |url=http://www.crn.com/news/security/232800058/chinese-hackers-linked-to-cyber-espionage-in-japan-india-tibet.htm |title=Hackers Linked To Cyber-Espionage in Japan, India, Tibet |first=Antone |last=Gonsalves |date=30 March 2012 |access-date=21 August 2012 |publisher=CRN Magazine |archive-url=https://web.archive.org/web/20120627052036/http://www.crn.com/news/security/232800058/chinese-hackers-linked-to-cyber-espionage-in-japan-india-tibet.htm |archive-date=27 June 2012 |url-status=live }}

Investigation into ownership of the command and control servers by Trend Micro and The New York Times linked the malware to Gu Kaiyuan, through QQ numbers and the alias "scuhkr".

{{Cite news |url=https://arstechnica.com/business/2012/03/reports-identifies-chinese-grad-student-in-hacks-against-tibetans-others/ |title=Reports identify Chinese grad student in hacks against Tibetans, others |website=Ars Technica |date=30 March 2012 |access-date=21 August 2012 |first=Curt |last=Hopkins |archive-url=https://web.archive.org/web/20120704115956/http://arstechnica.com/business/2012/03/reports-identifies-chinese-grad-student-in-hacks-against-tibetans-others/ |archive-date=4 July 2012 |url-status=live }}

Mr. Gu was a graduate student of the Information Security Institute of Sichuan University in Chengdu and wrote his master's thesis on computer hacking.

{{cite news |url=https://www.wired.co.uk/news/archive/2012-03/30/luckycat |title=Global cyberattacks linked to Chinese LuckyCat hacker group |magazine=Wired |first=Mark |last=Brown |date=30 March 2012 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20120709061254/http://www.wired.co.uk/news/archive/2012-03/30/luckycat |archive-date=9 July 2012 |url-status=dead }}

James A. Lewis of the Center for Strategic and International Studies, believes the attacks were state-sponsored.

{{cite news |url=https://www.nytimes.com/2012/03/30/technology/hacking-in-asia-is-linked-to-chinese-ex-graduate-student.html?_r=3&scp=1&sq=luckycat&st=cse |title=Case Based in China Puts a Face on Persistent Hacking |work=The New York Times |date=29 March 2012 |access-date=21 August 2012 |first=Nicole |last=Perlroth |archive-url=https://web.archive.org/web/20131114155456/http://www.nytimes.com/2012/03/30/technology/hacking-in-asia-is-linked-to-chinese-ex-graduate-student.html?_r=3&scp=1&sq=luckycat&st=cse |archive-date=14 November 2013 |url-status=live }}

==Kazakhstan==

On 19 February 2019, Kazakh counterintelligence officers arrested Konstantin Syroyezhkin, a former KGB agent, in Almaty, on charges of passing classified documents to Chinese spies.{{cite news |url=https://www.wsj.com/articles/a-spy-case-exposes-chinas-power-play-in-central-asia-11562756782 |newspaper=The Wall Street Journal |title=A Spy Case Exposes China's Power Play in Central Asia |first=Thomas |last=Grove |date=10 July 2019 |access-date=10 July 2019 |archive-url=https://web.archive.org/web/20190710125000/https://www.wsj.com/articles/a-spy-case-exposes-chinas-power-play-in-central-asia-11562756782 |archive-date=10 July 2019 |url-status=live }} China-linked hackers have also targeted entities in Kazakhstan.{{Cite news |last1=Vavra |first1=Shannon |last2=Lyngaas |first2=Sean |title=Chinese hackers suspected in cyber-espionage operation against Russia, India |url=https://www.cyberscoop.com/chinese-hackers-espionage-russia-india-dhs-cisa-alert/ |website=www.cyberscoop.com |date=7 October 2020 |publisher=Cyberscoop |access-date=11 October 2020 |archive-date=11 October 2020 |archive-url=https://web.archive.org/web/20201011101232/https://www.cyberscoop.com/chinese-hackers-espionage-russia-india-dhs-cisa-alert/ |url-status=live }}

==Malaysia==

In 2020 Chinese hackers were implicated in the hacking of a Malaysian government official. The attacks were attributed to APT40.{{Cite news |last1=Lyngaas |first1=Sean |title=China-linked hackers have targeted Malaysian government, officials warn |url=https://www.cyberscoop.com/china-malaysia-fireeye-kaspersky/ |website=www.cyberscoop.com |date=6 February 2020 |publisher=Cyberscoop |access-date=11 October 2020 |archive-date=7 October 2020 |archive-url=https://web.archive.org/web/20201007091807/https://www.cyberscoop.com/china-malaysia-fireeye-kaspersky/ |url-status=live }}

==Philippines==

{{Further|China–Philippines relations#National security concerns in the Philippines}}

FireEye President Travis Reese has stated that the Chinese-sponsored Conference Crew, founded in 2016, has engaged in cyber-espionage against the Philippines, targeting diplomatic and national security information.{{cite news |last=Badilla |first=Nelson |date=25 May 2017 |title=China, Vietnam behind cyber attacks on PH, Asia |url=http://www.manilatimes.net/china-vietnam-behind-cyber-attacks-ph-asia/329196/ |url-status=live |archive-url=https://web.archive.org/web/20170527204352/http://www.manilatimes.net/china-vietnam-behind-cyber-attacks-ph-asia/329196/ |archive-date=27 May 2017 |newspaper=The Manila Times |quote=He cited as an example the Conference Crew, which was founded in 2016 and has since expanded its operations early this year against critics of public and private institutions in seven countries, including the Philippines, where it collected important and strategic information that it will use for the interest and advantage of China. Boland said the Conference Crew sponsored by the Chinese government has increased its attacks on the defense and banking industries, financial services, telecommunications, consulting and media. The Conference Crew attack on the government is 'predominantly [focused] on national security and diplomacy'.}}

In 2020, Facebook took down a network that was part of a Chinese disinformation campaign against the Philippines. The campaign used false profiles to influence public opinion, particularly related to politics.{{Cite news |last1=Winger |first1=Gregory |title=China's Disinformation Campaign in the Philippines |url=https://thediplomat.com/2020/10/chinas-disinformation-campaign-in-the-philippines/ |url-status=live |archive-url=https://web.archive.org/web/20201009032656/https://thediplomat.com/2020/10/chinas-disinformation-campaign-in-the-philippines/ |archive-date=9 October 2020 |access-date=6 October 2020 |website=The Diplomat |publisher=}}

Following a murder in Makati City in which two Chinese PLA IDs were recovered,{{Cite news|url = https://newsinfo.inquirer.net/1235169/pla-ids-add-to-chinese-slay-mystery|title = 'PLA' IDs add to Chinese slay mystery|date = March 2020|access-date = 15 July 2021|archive-date = 15 July 2021|archive-url = https://web.archive.org/web/20210715111140/https://newsinfo.inquirer.net/1235169/pla-ids-add-to-chinese-slay-mystery|url-status = live}} Philippines Senator Panfilo Lacson claimed he had received information that between 2,000 and 3,000 Chinese PLAN (People's Liberation Army Navy) members were in the Philippines.{{Cite news|url = https://newsinfo.inquirer.net/1236772/a-good-number-of-chinese-army-reportedly-in-ph-lacson|title = 'A good number' of Chinese army reportedly in Philippines – Lacson|date = 4 March 2020|access-date = 15 July 2021|archive-date = 15 July 2021|archive-url = https://web.archive.org/web/20210715111137/https://newsinfo.inquirer.net/1236772/a-good-number-of-chinese-army-reportedly-in-ph-lacson|url-status = live}} Replying on Twitter, the Chinese Embassy in Manila said the Senator was "testing the intelligence of the Philippine people", to which Lacson responded saying his information is still worth looking into, while the Armed Forces of the Philippines said it is validating the information as a "matter of serious concern."{{Cite news|url = https://newsinfo.inquirer.net/1237781/lacson-alleged-chinese-soldiers-entry-in-ph-a-test-for-intelligence-community|title = Lacson: Chinese soldiers' PH immersion' a test to intelligence community|date = 6 March 2020|access-date = 15 July 2021|archive-date = 15 July 2021|archive-url = https://web.archive.org/web/20210715111137/https://newsinfo.inquirer.net/1237781/lacson-alleged-chinese-soldiers-entry-in-ph-a-test-for-intelligence-community|url-status = live}}

In November 2023, the Chinese embassy in the Philippines denied allegations made by Rafael Alunan III of having sleeper cells in the country after the Philippine National Police and National Bureau of Investigation arrested Chinese nationals for illegal possession of firearms.{{cite news

| title = China denies having 'sleeper cells' in Philippines

| first = Marc Jayson

| last = Cayabyab

| date = November 5, 2023

| newspaper = The Philippine Star

| url = https://www.philstar.com/headlines/2023/11/05/2309033/china-denies-having-sleeper-cells-philippines

| access-date = 28 December 2023

| archive-date = 1 September 2024

| archive-url = https://web.archive.org/web/20240901215956/https://www.philstar.com/headlines/2023/11/05/2309033/china-denies-having-sleeper-cells-philippines

| url-status = live

}}

In 2024, former Bamban mayor Alice Guo was removed from office over questions regarding her citizenship as well her involvement in the Philippine Offshore Gaming Operator (POGO) in her town.{{Cite web |title=Philippines: Alleged Chinese spy Alice Guo arrested in Indonesia |url=https://www.bbc.com/news/articles/c0mnyrm8739o |url-status=live |archive-url=https://web.archive.org/web/20240904084201/https://www.bbc.com/news/articles/c0mnyrm8739o |archive-date=September 4, 2024 |access-date=2024-09-04 |website=BBC News |date=4 September 2024 |language=en-GB}}{{cite news |last1=Oliquino |first1=Edjen |date=28 September 2024 |title=Self-confessed Chinese asset names Alice Guo a Chinese spy |url=https://tribune.net.ph/2024/09/27/self-confessed-chinese-asset-names-alice-guo-a-chinese-spy |url-status=live |archive-url=https://web.archive.org/web/20240928142341/https://tribune.net.ph/2024/09/27/self-confessed-chinese-asset-names-alice-guo-a-chinese-spy |archive-date=September 28, 2024 |access-date=28 September 2024 |work=Daily Tribune |language=en}} She Zhijiang a self-confessed spy detained in Thailand named Guo as a fellow spy.{{cite news |last1=Abarca |first1=Charie |date=8 October 2024 |title=Alice Guo confirmed as spy by She Zhijang's ex-cellmate |url=https://globalnation.inquirer.net/251640/alice-guo-confirmed-as-spy-by-she-zhijangs-ex-cellmate |access-date=8 October 2024 |newspaper=Philippine Daily Inquirer |language=en}} Wang Fugui a cellmate of She also said that Guo's 2022 mayoral campaign was "arranged by Chinese state security".{{cite news |last1=Bordey |first1=Hana |date=8 October 2024 |title='Alice Guo's 2022 campaign was arranged by Chinese state security' |url=https://www.gmanetwork.com/news/topstories/nation/922950/alice-guo-s-2022-campaign-was-arranged-by-chinese-state-security/story/ |access-date=8 October 2024 |work=GMA News Online |language=en}}

Deng Yuanqing was arrested in January 2025 over allegations of mapping sensitive data involving military sites in Luzon.{{cite news |last1=Go |first1=Miriam Grace |date=20 January 2025 |title=Arrest of suspected Chinese spy: What we know so far |url=https://www.rappler.com/philippines/what-we-know-so-far-arrest-suspected-chinese-spy-january-2025/ |access-date=21 January 2025 |work=Rappler |archive-date=20 January 2025 |archive-url=https://web.archive.org/web/20250120131459/https://www.rappler.com/philippines/what-we-know-so-far-arrest-suspected-chinese-spy-january-2025/ |url-status=live }}

==Singapore==

Huang Jing (黄靖), an academic at the Lee Kuan Yew School of Public Policy, was expelled from Singapore in 2017, reportedly for working as an agent of influence for Chinese intelligence services.

{{cite news |url=http://www.scmp.com/news/china/diplomacy-defence/article/2107971/chinese-american-academic-loses-appeal-against?mc_cid=f15813197c&mc_eid=1f9d28130a |title=Chinese-American academic loses appeal against Singapore expulsion |author=Agence France-Presse and Kristin Huang |date=24 August 2017 |access-date=29 August 2017 |newspaper=South China Morning Post |quote=A prominent Chinese-born academic has lost an appeal against Singapore's decision to expel him for allegedly being an 'agent of influence' for a foreign government, the interior ministry said on Wednesday. |archive-url=https://web.archive.org/web/20180615035113/http://www.scmp.com/news/china/diplomacy-defence/article/2107971/chinese-american-academic-loses-appeal-against?mc_cid=f15813197c&mc_eid=1f9d28130a |archive-date=15 June 2018 |url-status=live }}

{{cite news |url=http://www.scmp.com/week-asia/opinion/article/2106497/what-singapore-saying-expelling-china-hand-huang-jing |title=What Singapore is saying by expelling China hand Huang Jing |first=Zuraidah |last=Ibrahim |date=15 August 2017 |newspaper=South China Morning Post |quote=On 4 August, Singapore announced it was expelling a China-born American professor for trying to influence the city state's foreign policy on behalf of an unnamed foreign government |access-date=29 August 2017 |archive-url=https://web.archive.org/web/20170829203134/http://www.scmp.com/week-asia/opinion/article/2106497/what-singapore-saying-expelling-china-hand-huang-jing |archive-date=29 August 2017 |url-status=live }}

SingHealth medical data was hacked by suspected Chinese hackers around July 2018.

{{cite news |url=https://asia.nikkei.com/Spotlight/Asia-Insight/Suspected-China-cyberhack-on-Singapore-is-a-wake-up-call-for-Asia |newspaper=Nikkei Asian Review |title=Suspected China cyberhack on Singapore is a wake-up call for Asia |first=Justina |last=Lee |date=21 August 2018 |quote=Without naming names, Singapore's government said state actors were behind the attack that saw thieves take information such as names, identification numbers, and outpatient prescription details. Experts are pointing fingers at China. |access-date=23 August 2018 |archive-url=https://web.archive.org/web/20180823182108/https://asia.nikkei.com/Spotlight/Asia-Insight/Suspected-China-cyberhack-on-Singapore-is-a-wake-up-call-for-Asia |archive-date=23 August 2018 |url-status=live }}

==South Korea==

FireEye claims that two hacker operations tied to the Chinese military, dubbed Tonto Team and Stone Panda/APT10, have attempted to hack the South Korean Ministry of Foreign Affairs and other targets related to the deployment of THAAD.{{cite news |url=https://arstechnica.com/security/2017/04/researchers-claim-china-trying-to-hack-south-korea-missile-defense-efforts/ |title=Researchers claim China trying to hack South Korea missile defense efforts |first=Sean |last=Gallagher |date=21 April 2017 |archive-url=https://web.archive.org/web/20170513063827/https://arstechnica.com/security/2017/04/researchers-claim-china-trying-to-hack-south-korea-missile-defense-efforts/ |archive-date=13 May 2017 |quote=FireEye claims to have found evidence that the attacks were staged by two groups connected to the Chinese military. One, dubbed Tonto Team by FireEye, operates from the same region of China as previous North Korean hacking operations. The other is known among threat researchers as APT10, or 'Stone Panda'—the same group believed to be behind recent espionage efforts against US companies lobbying the Trump administration on global trade. These groups have also been joined in attacks by two 'patriotic hacking' groups not directly tied to the Chinese government, Hultquist told the Journal—including one calling itself 'Denounce Lotte Group' targeting the South Korean conglomerate Lotte. Lotte made the THAAD deployment possible through a land swap with the South Korean government.}}{{cite news |publisher=CNN |title=China tried to hack group linked to controversial missile defense system, US cybersecurity firm says |first1=Joshua |last1=Berlinger |first2=Juliet |last2=Perry |date=27 April 2017 |archive-url=https://web.archive.org/web/20170514071945/http://www.cnn.com/2017/04/27/asia/china-south-korea-thaad-hack/ |archive-date=14 May 2017 |url=http://www.cnn.com/2017/04/27/asia/china-south-korea-thaad-hack/ |quote=A cybersecurity firm in the United States believes state-sponsored Chinese hackers were trying to infiltrate an organization with connections to a US-built missile system in South Korea that Beijing firmly opposes. [...] When asked if the group could be North Koreans posing as Chinese hackers, Hultquist said his team had gathered plenty of evidence to prove the group's origins, including their use of the Chinese language.}}

China is reportedly engaged in economic espionage against South Korean technology companies, including Samsung Electronics and SK Hynix.

{{cite news |newspaper=Korea Times |quote=Chinese companies are suspected of stealing the intellectual property of Samsung Electronics and SK hynix to obtain advanced technological know-how from them, sources familiar with the matter said Wednesday. |url=https://www.koreatimes.co.kr/www/tech/2018/07/133_251708.html |title=China suspected of stealing Samsung, SK patents |first=Yoo-chul |last=Kim |date=5 July 2018 |access-date=8 July 2018 |archive-url=https://web.archive.org/web/20180708174729/http://www.koreatimes.co.kr/www/tech/2018/07/133_251708.html |archive-date=8 July 2018 |url-status=live }}

==Sri Lanka==

In 2010, Jayalalithaa Jayaram – head of the All India Anna Dravida Munnetra Kazhagam – stated that Chinese workers, working in parts of the country devastated by the Sri Lankan Civil War were infiltrated with Chinese spies on surveillance missions targeted at India.{{cite news |title=Jayalalithaa alleges Chinese espionage in Lanka |url=http://www.dailymirror.lk/print/index.php/news/front-page-news/13460-jayalalithaa-alleges-chinese-espionage-in-lanka-.html |publisher=Press Trust of India via The Daily Mirror |date=19 June 2010 |access-date=27 June 2010 |archive-url=https://web.archive.org/web/20160924161346/http://www.dailymirror.lk/print/index.php/news/front-page-news/13460-jayalalithaa-alleges-chinese-espionage-in-lanka-.html |archive-date=24 September 2016 |url-status=dead }}

In May 2019, Sri Lankan authorities caught the former chief of Military intelligence for allegedly acting as a Chinese mole and trying to obstruct a probe by Indian and American agencies into the Easter bombings.{{Cite news|url=https://theprint.in/world/sri-lanka-ex-military-intelligence-head-a-chinese-spy-who-was-blocking-bombings-probe/231805/|title=Sri Lanka ex-military intelligence head a 'Chinese spy' who was 'blocking' bombings probe|publisher=ThePrint|access-date=6 May 2019|date=6 May 2019|archive-url=https://web.archive.org/web/20190506130343/https://theprint.in/world/sri-lanka-ex-military-intelligence-head-a-chinese-spy-who-was-blocking-bombings-probe/231805/amp/|archive-date=6 May 2019|url-status=live}}

==Taiwan==

{{See also|United front in Taiwan}}

Taiwan and China regularly accuse each other of spying.

{{Cite news |url=https://www.voanews.com/a/taiwan-readies-for-fresh-wave-of-espionage-by-china/3306266.html |title=Taiwan Readies for Fresh Wave of Espionage by China |access-date=11 August 2016 |archive-url=https://web.archive.org/web/20160722231203/http://www.voanews.com/content/taiwan-readies-for-fresh-wave-of-espionage-by-china/3306266.html |archive-date=22 July 2016 |url-status=live }}

{{Cite news |url=https://www.voanews.com/a/taiwan-president-sounds-warning-on-future-of-china-ties/3000110.html |title=Taiwan President Sounds Warning on Future of China Ties |access-date=11 August 2016 |archive-url=https://web.archive.org/web/20160128122239/http://www.voanews.com/content/taiwan-president-sounds-warning-on-future-of-china-ties/3000110.html |archive-date=28 January 2016 |url-status=live }}

Presidential aide Wang Jen-ping was found in 2009 to have sold nearly 100 confidential documents to China since 2007; Military intelligence officer Lo Chi-cheng was found to have been acting as a double agent in 2010 for China since 2007; Maj. Gen. Lo Hsien-che, electronic communications and information bureau chief during the administration of former President Chen Shui-bian, has been suspected of selling military secrets to mainland China since 2004.United Daily News (11 February 2011). [http://focustaiwan.tw/ShowNews/WebNews_Detail.aspx?ID=201102110009&Type=aOPN "The lost military soul"] {{Webarchive|url=https://web.archive.org/web/20110214190746/http://focustaiwan.tw/ShowNews/WebNews_Detail.aspx?ID=201102110009&Type=aOPN |date=14 February 2011 }} , FocusTaiwan

In 2007 the Ministry of Justice Investigation Bureau stated that 500 gigabyte Maxtor Basics Personal Storage 3200 hard drives produced by Seagate Technology and manufactured in Thailand may have been modified by a Chinese subcontractor and shipped with the Virus.Win32.AutoRun.ah virus.{{Cite news |url=http://www.1up.com/news/seagate-hard-drives-virus-infected |archive-url=https://web.archive.org/web/20131111072452/http://www.1up.com/news/seagate-hard-drives-virus-infected |url-status=dead |archive-date=11 November 2013 |quote=The company is warning users today that a small percentage of Maxtor Basics Personal Storage 3200 hard drives purchased after August 2007 were shipped with a virus called 'virus.win32.autorun.ah.' |title=Some Seagate Hard Drives Virus-Infected |first=Steve |last=Watts |date=13 November 2007 |website=1UP.com }}

{{Cite news |url=https://www.pcworld.com/article/139576/article.html |title=Seagate Ships Virus-Laden Hard Drives |first=Robert |last=McMillan |work=PC World |date=13 November 2007 |access-date=6 November 2012 |archive-url=https://web.archive.org/web/20131111075516/http://www.pcworld.com/article/139576/article.html |archive-date=11 November 2013 |url-status=live }}

As many as 1,800 drives sold in the Netherlands and Taiwan after August 2007 were reportedly infected with the virus, which scanned for passwords for products such as World of Warcraft and QQ and uploading them to a website in Beijing.

{{cite news |url=http://www.dailytech.com/Seagate+Serves+External+HDDs+with+a+Side+of+Virus/article9662.htm |title=Seagate Serves External HDDs with a Side of Virus |first=Brandon |last=Hill |work=DailyTech |date=14 November 2007 |access-date=6 November 2012 |archive-url=https://web.archive.org/web/20131111070731/http://www.dailytech.com/Seagate+Serves+External+HDDs+with+a+Side+of+Virus/article9662.htm |archive-date=11 November 2013 |url-status=dead }}

Zhou Hongxu (周泓旭), a graduate of National Chengchi University's MBA program, has been accused of attempting to recruit an official from the Ministry of Foreign Affairs to provide intelligence to China.

{{cite news |url=https://www.reuters.com/article/us-taiwan-china-students-idUSKBN16H13T |title=Taiwan detains Chinese student in unusual suspected spying case |date=10 March 2017 |access-date=14 May 2017 |work=Reuters |first1=J.R. |last1=Wu |first2=Carol |last2=Lee |editor-first=Nick |editor-last=Macfie |quote='A man named Zhou Hongxu has been detained,' Liao Chien-yu, a judge and spokesman for the Taipei District Court, told Reuters. Liao said the named suspect was the same individual being cited in local media reports. Prosecutors asked that Zhou be taken into custody on suspicion of violating national security laws and the request was approved by the court, Liao said, adding that Zhou could be held for at least two months. |archive-url=https://web.archive.org/web/20170404040404/http://www.reuters.com/article/us-taiwan-china-students-idUSKBN16H13T |archive-date=4 April 2017 |url-status=live }}

{{cite news |url=http://www.japantimes.co.jp/news/2017/03/12/asia-pacific/crime-legal-asia-pacific/china-suspects-graduate-taiwan-university-espionage/ |newspaper=The Japan Times |title=China suspects graduate of Taiwan university of espionage |date=12 March 2017 |access-date=14 May 2017 |archive-url=https://web.archive.org/web/20170502045953/http://www.japantimes.co.jp/news/2017/03/12/asia-pacific/crime-legal-asia-pacific/china-suspects-graduate-taiwan-university-espionage |archive-date=2 May 2017 |url-status=live }}

Zhou was reportedly instructed by China's Taiwan Affairs Office to enroll in the university to make friends and develop a spy ring. Zhou reportedly solicited classified documents, offering trips to Japan and United States dollars in payment.

{{cite news |url=http://focustaiwan.tw/news/asoc/201705080015.aspx |publisher=3=Central News Agency |title=Suspected Chinese spy to be held in Taiwan for another two months |date=8 May 2017 |access-date=14 May 2017 |first=Elizabeth |last=Hsu |quote=Zhou Hongxu (周泓旭), 29, from Liaoning Province in China, was enrolled in an MBA program at National Chengchi University in Taipei 2012–2016 [...] Investigators said that Zhou allegedly was in contact with a Ministry of Foreign Affairs official, whom he had met while studying in Taiwan, and was trying to persuade the contact to hand over classified information in exchange for free trips abroad. |archive-url=https://web.archive.org/web/20170511074855/http://focustaiwan.tw/news/asoc/201705080015.aspx |archive-date=11 May 2017 |url-status=live }}

In October 2020 it was revealed that Chinese hackers had compromised the largest job bank in Taiwan, hacking the information of over five million people.{{Cite news |last1=Everington |first1=Keoni |title=Chinese hackers steal data of nearly half of Taiwan's workforce |url=https://www.taiwannews.com.tw/en/news/4023359 |website=www.taiwannews.com.tw |date=5 October 2020 |publisher=Taiwan News |access-date=6 October 2020 |archive-date=8 October 2020 |archive-url=https://web.archive.org/web/20201008135253/https://www.taiwannews.com.tw/en/news/4023359 |url-status=live }}

On 11 December 2020, the Ministry of Justice Investigation Bureau (MJIB) caught three Taiwanese who worked for Chinese intelligence. They were spreading propaganda about how Taiwan and the US were trying to overthrow the Thai monarchy, supporting the democracy protesters. The case is important because it is Taiwan's first Internet-related national security case, which the bureau investigated. Secondly, it is the first time Taiwan has documented that China has successfully recruited Taiwanese to work as paid online agents of its cyber army.{{cite news |title=Three alleged Chinese cyberagents held |url=https://www.taipeitimes.com/News/front/archives/2020/12/12/2003748568 |publisher=Taipei Times |access-date=14 December 2020 |archive-date=12 December 2020 |archive-url=https://web.archive.org/web/20201212105002/https://taipeitimes.com/News/front/archives/2020/12/12/2003748568 |url-status=live }}{{cite news |title=Taiwan's govt says it has solved its 1st cyber national security case |url=https://focustaiwan.tw/politics/202012110023 |publisher=Focus Taiwan CNA |access-date=14 December 2020 |archive-date=11 December 2020 |archive-url=https://web.archive.org/web/20201211152540/https://focustaiwan.tw/politics/202012110023 |url-status=live }} This disinformation operation also tried to falsely portray the Milk Tea Alliance as a color revolution style American government plot.{{Cite news |last1=Hioe |first1=Brian |title=Is the Milk Tea Alliance the Latest Target by Chinese Disinformation Efforts in Taiwan? |url=https://newbloommag.net/2020/12/17/milk-tea-disinformation-target/ |website=newbloommag.net |date=17 December 2020 |publisher=New Bloom Magazine |access-date=22 December 2020 |archive-date=17 December 2020 |archive-url=https://web.archive.org/web/20201217070028/https://newbloommag.net/2020/12/17/milk-tea-disinformation-target/ |url-status=live }}

Chinese spy balloons have overflown Taiwan.{{cite news |last1=Corera |first1=Gordon |title=New images show Chinese spy balloons over Asia |work=BBC News |date=26 June 2023 |url=https://www.bbc.com/news/world-65972168 |access-date=26 June 2023 |archive-date=21 September 2023 |archive-url=https://web.archive.org/web/20230921152936/https://www.bbc.com/news/world-65972168 |url-status=live }}

In August 2022, during Speaker of the House Nancy Pelosi's visit to Taiwan, a TV screen at a Taiwan Railway Ministration (TRA) station displayed a message referring to Pelosi as an "old witch" in simplified Chinese characters (official characters in mainland China), while TV screens at multiple 7-Elevens began referring to her as a "warmonger."{{Cite web |date=August 3, 2022 |title=Chinese suspected of hacking Taiwan 7-Eleven, TRA signs to mock Pelosi |url=https://www.taiwannews.com.tw/en/news/4615238 |access-date=October 6, 2023 |website=Taiwan News |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195803/https://www.taiwannews.com.tw/en/news/4615238 |url-status=live }}{{Cite web |last=Loh |first=Matthew |title=Some of Taiwan's 7-Eleven outlets said an 'unknown source' hacked their store TVs to display the message 'Warmonger Pelosi get out of Taiwan' |url=https://www.businessinsider.com/taiwan-nancy-pelosi-7-11-hack-get-out-messages-cyberattack-2022-8 |access-date=2023-10-07 |website=Business Insider |language=en-US |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195801/https://www.businessinsider.com/taiwan-nancy-pelosi-7-11-hack-get-out-messages-cyberattack-2022-8 |url-status=live }} China was suspected of hacking the TRA signs and Taiwan 7-Eleven to mock Pelosi.

In March 2023, Taiwan prosecutors charged two former officials with violating the national security law by organizing meetings between former senior military officers and Chinese intelligence personnel.{{Cite news |date=2023-03-17 |title=Taiwan charges ex-MP and former admiral with spying for China |language=en-GB |work=BBC News |url=https://www.bbc.com/news/world-asia-64985532 |access-date=2023-10-07 |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195801/https://www.bbc.com/news/world-asia-64985532 |url-status=live }} Retired rear admiral Hsia Fu-hsiang and former lawmaker Lo Chih-ming began their espionage after being recruited by the Chinese military and United Front Work Department.{{Cite web |date=2023-03-17 |title=Former lawmaker, retired rear admiral face espionage charges - Taipei Times |url=https://www.taipeitimes.com/News/taiwan/archives/2023/03/17/2003796255 |access-date=2023-10-07 |website=www.taipeitimes.com |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195802/https://www.taipeitimes.com/News/taiwan/archives/2023/03/17/2003796255 |url-status=live }} Each faces up to five years in jail if convicted.

In August 2023, Taiwan's Ministry of National Defense detained a lieutenant colonel, Hsieh, for leaking military secrets to China. Hsieh and several others were suspected of having been recruited by China to provide China with national defense secrets and other information. Hsieh is also suspected of developing a spy organization of current and retired military personnel to collect intelligence for China.{{Cite web |date=2023-08-02 |title=Taiwan detains army officer suspected of leaking military secrets to China |url=https://apnews.com/article/taiwan-china-army-spies-military-secrets-06c3ae0ab0b379cb60a8da53bea5cb4d |access-date=2023-10-07 |website=AP News |language=en |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195801/https://apnews.com/article/taiwan-china-army-spies-military-secrets-06c3ae0ab0b379cb60a8da53bea5cb4d |url-status=live }}

=== Military espionage ===

{{Further|Intelligence Bureau of the Joint Staff Department|Anti-Infiltration Act}}

In May 2017, Major Wang Hung-ju, a retired military police officer assigned to the National Security Bureau, was indicted on charges of spying for the People's Republic of China.{{cite news |url=http://www.taipeitimes.com/News/taiwan/archives/2017/05/13/2003670493 |newspaper=Taipei Times |title=Retired military police officer indicted for spying |date=13 May 2017 |access-date=13 May 2017 |quote=A retired military police officer who was on the security detail of former vice president Annette Lu (呂秀蓮) was yesterday indicted for spying for China, the Taoyuan District Prosecutors' Office said. The office said it had charged Major Wang Hung-ju (王鴻儒), 46, with violating the National Security Act (國家安全法) after he was found to be involved in espionage. |archive-url=https://web.archive.org/web/20170514040056/http://www.taipeitimes.com/News/taiwan/archives/2017/05/13/2003670493 |archive-date=14 May 2017}}

Army Major General Hsieh Chia-kang, deputy commander of Matsu Defense Command, has been accused of providing intelligence to China, having been recruited by retired army colonel Hsin Peng-sheng.{{cite news |url=http://www.taipeitimes.com/News/taiwan/archives/2017/05/11/2003670361 |title=Second suspect investigated in spy case |first=Jason |last=Pan |date=11 May 2017 |quote=Army Major General Hsieh Chia-kang (謝嘉康), who is being investigated over allegations he leaked classified information on Taiwan's missile defense systems to China, was released late on Tuesday after posting bail, prosecutors said. |archive-url=https://web.archive.org/web/20170514070527/http://www.taipeitimes.com/News/taiwan/archives/2017/05/11/2003670361 |archive-date=14 May 2017}}

In January 2018, it was reported that the Taipei District Prosecutor's Office is investigating if classified information regarding the Airborne Special Service Company was passed on to Zhou Hongxu (周泓旭), who was already convicted for violating the National Security Act.

{{cite news |url=http://www.taipeitimes.com/News/taiwan/archives/2018/01/06/2003685274 |newspaper=Taipei Times |title=Spy possibly targeted top secret army unit: reports |first=Jason |last=Pan |date=6 January 2018 |access-date=7 January 2018 |quote=The Taipei District Prosecutors' Office is looking into allegations that New Party Youth Corps member Lin Ming-cheng (林明正) passed on personal information and contact details of soldiers in the Army Aviation and Special Forces Command's secretive Airborne Special Service Company (高空特種勤務中隊), also known as the 'Liang Shan Special Operations Company' (涼山特勤隊) to former Chinese student Zhou Hongxu (周泓旭), who has been convicted of doing intelligence work for China, the newspaper said yesterday. |archive-url=https://web.archive.org/web/20180108062633/http://www.taipeitimes.com/News/taiwan/archives/2018/01/06/2003685274 |archive-date=8 January 2018 |url-status=live }}

In March 2018, a retired colonel was charged with breaching the National Security Act by the Kaohsiung District Prosecutors' Office, which alleged that the colonel shared classified personal information and planned to develop a spy ring in Taiwan.

{{cite news |url=http://www.taipeitimes.com/News/taiwan/archives/2018/03/08/2003688896 |date=8 March 2018 |quote=Investigators said that documents show Lan passed on the personal information of six colonels and lieutenant colonels, as well as other university officers and military unit members, to China. Lan allegedly also passed on other classified military materials provided by his former colleagues and that he had agreed to develop a spy network in Taiwan to conduct espionage for China. |title=Retired colonel arrested over espionage charges |first=Jason |last=Pan |newspaper=The Taipei Times |access-date=8 March 2018 |archive-url=https://web.archive.org/web/20180307205323/http://www.taipeitimes.com/News/taiwan/archives/2018/03/08/2003688896 |archive-date=7 March 2018 |url-status=live }}

In April 2018, Hung Chin-hsi (洪金錫), a Macau-born businessman, was accused of developing a spy ring in the Ministry of Justice, on behalf of China.

{{cite news |url=http://www.taipeitimes.com/News/taiwan/archives/2018/04/20/2003691676 |newspaper=The Taipei Times |title=Man charged with espionage detained |first=Jason |last=Pan |date=20 April 2018 |access-date=23 April 2018 |archive-url=https://web.archive.org/web/20180424071326/http://www.taipeitimes.com/News/taiwan/archives/2018/04/20/2003691676 |archive-date=24 April 2018 |url-status=live }}

Captain Zhen Xiaojiang (鎮小江) was convicted in 2015 of recruiting Taiwanese military officers as part of a spy ring on behalf of China, including Army Major-General Hsu Nai-chuan (許乃權).

{{cite news |newspaper=Taipei Times |url=https://www.taiwannews.com.tw/en/news/3485401 |title=Taiwan has deported Chinese spy to Hong Kong: reports |first=Matthew |last=Strong |date=18 July 2018 |access-date=19 July 2018 |archive-url=https://web.archive.org/web/20180719233555/https://www.taiwannews.com.tw/en/news/3485401 |archive-date=19 July 2018 |url-status=live }}

Zhen sent intelligence regarding Taiwan's radar installations and Dassault Mirage 2000 fighters to China. He was deported to Hong Kong in July 2018.

In 2022, Taipei District Prosecutors Office charged retired major general Chien and retired lieutenant colonel Wei for developing a spy network for China. They were accused of working for a Hong Konger named Tse, who would visit Taiwan to recruit retired officers and reach out to those on active duty. Chien and Wei tried unsuccessfully to recruit Chang Che-ping, who was a deputy minister at the ROC Ministry of National Defense before serving as a strategic adviser to President Tsai Ing-wen. Chang was probed as a defendant last year but later renamed as a witness.{{Cite news |last=Times |first=The Thread |date=2022-06-24 |title=Retired Taiwan general charged with spying for China |url=https://thethreadtimes.com/retired-taiwan-general-charged-with-spying-for-china |access-date=2022-06-24 |website=The Thread Times |language=en |archive-date=24 December 2023 |archive-url=https://web.archive.org/web/20231224031615/https://thethreadtimes.com/ |url-status=live }}

From January 2022 to June 2024, the Taiwanese government reported over 1,700 instances of Chinese intelligence trying to recruit Taiwanese military personnel.{{Cite news |date=6 February 2025 |title=China is infiltrating Taiwan's armed forces |url=https://www.economist.com/asia/2025/02/06/china-is-infiltrating-taiwans-armed-forces |url-access=subscription |archive-url=https://archive.today/20250207141458/https://www.economist.com/asia/2025/02/06/china-is-infiltrating-taiwans-armed-forces |archive-date=7 February 2025 |access-date=2025-02-08 |newspaper=The Economist |issn=0013-0613}}

===Economic espionage===

{{Further|Industrial espionage|Allegations of intellectual property infringement by China}}File:ARMCortexA57A53.jpg

The Wall Street Journal reported that Taiwan has been "ground zero" for economic espionage related to its integrated circuit fabrication industry.{{cite news |archive-url=https://archive.today/20180701182838/https://www.wsj.com/articles/taiwans-technology-secrets-come-under-assault-from-china-1530468440 |archive-date=1 July 2018 |newspaper=The Wall Street Journal |title=Taiwan's Technology Secrets Come Under Assault From China |first=Chuin-Wei |last=Yap |date=1 July 2018 |url=https://www.wsj.com/articles/taiwans-technology-secrets-come-under-assault-from-china-1530468440}} In a review of ten prosecutions for technology-related intellectual property infringement in Taiwan, WSJ found that nine of those cases involved technology transfer to China. An employee of Nanya Technology Corp. allegedly stole designs for dynamic random-access memory (DRAM) on behalf of Tsinghua Holdings. Hsu Chih-Peng, an engineer for Taiwan Semiconductor Manufacturing Co., allegedly stole microchip designs after being solicited by the Chinese government-owned Shanghai Huali Microelectronics Corporation.

According to Taiwanese prosecutors, engineer Wang Yongming (on behalf of Fujian Jinhua Integrated Circuit) engaged in espionage to steal Micron Technology microchip designs via the Taiwanese company UMC.

{{cite news |url=https://www.nytimes.com/2018/06/22/technology/china-micron-chips-theft.html |newspaper=The New York Times |title=Inside a Heist of American Chip Designs, as China Bids for Tech Power |first1=Paul |last1=Mozur |first2=Carolyn |last2=Zhang |date=22 June 2018 |access-date=24 June 2018 |archive-url=https://web.archive.org/web/20180624200122/https://www.nytimes.com/2018/06/22/technology/china-micron-chips-theft.html |archive-date=24 June 2018 |url-status=live }}

Micron alleges that UMC hired Micron's engineers, asking them to steal files on advanced memory chips. The files Wang allegedly stole were said to be production secrets, including testing procedures related to metallization, and the DR25nmS design protocol.

==Vietnam==

According to the security research firm FireEye, Chinese hackers are suspected of targeting Vietnamese government and corporate targets.

{{cite news |url=http://www.straitstimes.com/asia/se-asia/chinese-cyber-spies-broaden-attacks-in-vietnam-security-firm-says?mc_cid=18ce6cbbce&mc_eid=1f9d28130a |newspaper=The Straits Times |title=Chinese cyber spies broaden attacks in Vietnam, security firm says |date=31 August 2017 |agency=Reuters |access-date=23 September 2017 |archive-url=https://web.archive.org/web/20180306022756/http://www.straitstimes.com/asia/se-asia/chinese-cyber-spies-broaden-attacks-in-vietnam-security-firm-says?mc_cid=18ce6cbbce&mc_eid=1f9d28130a |archive-date=6 March 2018 |url-status=live }}

The hacking group, designated Conimes, phished the targets and delivered malware via a pre-2012 version of Microsoft Word.

{{cite news |url=https://www.buzzfeed.com/kevincollier/chinas-cut-its-cyber-attacks-on-us-now-vietnam-is-a-target |publisher=BuzzFeed News |quote=Both the lures, as well as others Read said his team has seen, contain malware exploits of Microsoft Word, a common tactic against computers that either run pirated versions of Microsoft Office or versions that haven't been updated. |title=China Is Boosting Its Phishing Attacks – Against Vietnam |first=Kevin |last=Collier |date=22 August 2017 |access-date=3 September 2017 |archive-url=https://web.archive.org/web/20170903082740/https://www.buzzfeed.com/kevincollier/chinas-cut-its-cyber-attacks-on-us-now-vietnam-is-a-target |archive-date=3 September 2017 |url-status=live }}

=Europe=

According to the cyber-security firm Area 1, hackers working for the People's Liberation Army Strategic Support Force compromised the COREU network used for communication by the European Union (EU), allowing it to access thousands of low-classified documents and diplomatic cables.

{{cite news |title=Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran |first1=David E. |last1=Sanger |first2=Steven |last2=Erlanger |date=18 December 2018 |url=https://www.nytimes.com/2018/12/18/us/politics/european-diplomats-cables-hacked.html |newspaper=The New York Times |access-date=19 December 2018 |archive-url=https://web.archive.org/web/20181219163552/https://www.nytimes.com/2018/12/18/us/politics/european-diplomats-cables-hacked.html |archive-date=19 December 2018 |url-status=live }}

According to a 2019 report released by the European External Action Service, an estimated 250 MSS spies were operating in the EU capital.{{Cite news|url=https://www.dw.com/en/hundreds-of-russian-and-chinese-spies-in-brussels-report/a-47437958|title=Hundreds of Russian and Chinese spies in Brussels – report|date=9 February 2019|work=Deutsche Welle|access-date=15 October 2019|archive-url=https://web.archive.org/web/20191020074708/https://www.dw.com/en/hundreds-of-russian-and-chinese-spies-in-brussels-report/a-47437958|archive-date=20 October 2019|url-status=live}}

In a July 2021 joint statement with NATO, the individual core Anglosphere/Five Eyes nations, and Japan, the EU accused the Ministry of State Security, along with MSS-contracted criminal hackers, of perpetrating several cyberattacks, most notably the 2021 Microsoft Exchange Server data breach. While some attacks were for-profit ransomware incidents by contracted hacker gangs, top EU diplomat Josep Borrell said the hacking was "for the purpose of intellectual property theft and espionage."{{cite news |last=Fried |first=Ina |date=19 July 2021 |title=U.S. and key allies accuse China of Microsoft Exchange cyberattacks |url=https://www.axios.com/china-cyberattacks-nato-181e71d2-7414-45f3-9463-c8b1d46392c1.html |work=Axios |access-date=19 July 2021 |archive-date=23 July 2021 |archive-url=https://web.archive.org/web/20210723044826/https://www.axios.com/china-cyberattacks-nato-181e71d2-7414-45f3-9463-c8b1d46392c1.html |url-status=live }}{{cite news |last=Tucker |first=Eric |date=19 July 2021 |title=Microsoft Exchange hack caused by China, US and allies say |url=https://apnews.com/article/microsoft-exchange-hack-biden-china-d533f5361cbc3374fdea58d3fb059f35 |work=Associated Press |access-date=19 July 2021 |archive-date=24 July 2021 |archive-url=https://web.archive.org/web/20210724214040/https://apnews.com/article/microsoft-exchange-hack-biden-china-d533f5361cbc3374fdea58d3fb059f35 |url-status=live }}{{cite news |last2=Sanger |first2=David E. |last1=Kanno-Youngs |first1=Zolan |date=19 July 2021 |title=U.S. Formally Accuses China of Hacking Microsoft |url=https://www.nytimes.com/2021/07/19/us/politics/microsoft-hacking-china-biden.html |work=The New York Times |access-date=19 July 2021 |archive-date=24 July 2021 |archive-url=https://web.archive.org/web/20210724014745/https://www.nytimes.com/2021/07/19/us/politics/microsoft-hacking-china-biden.html |url-status=live }}{{cite news |last=Liptak |first=Kevin |date=19 July 2021 |title=US blames China for hacks, opening new front in cyber offensive |url=https://www.cnn.com/2021/07/19/politics/us-china-cyber-offensive/index.html |work=CNN |access-date=19 July 2021 |archive-date=25 July 2021 |archive-url=https://web.archive.org/web/20210725044811/https://www.cnn.com/2021/07/19/politics/us-china-cyber-offensive/index.html |url-status=live }}

==Belgium==

In 2008, Belgian Justice Minister Jo Vandeurzen accused the Chinese government of electronic espionage against the government of Belgium, while Foreign Minister Karel De Gucht informed the Belgian Federal Parliament that Chinese agents hacked his ministry. The espionage is possibly linked to Belgium hosting the headquarters of NATO and the European Union.{{cite news |title=Belgium accuses Chinese government of cyber-espionage |publisher=Sophos |date=7 May 2008 |access-date=24 December 2009 |url=http://www.sophos.com/pressoffice/news/articles/2008/05/belgium.html |quote=According to media reports, Justice Minister Jo Vandeurzen has claimed that hacking attacks against the Belgian Federal Government have originated in China, and are likely to have been at the bequest of the Beijing government. Separately, Belgian minister of foreign affairs Karel De Gucht has told parliament that his ministry was the subject of cyberespionage by Chinese agents several weeks ago. [...] There has been speculation that China may be interested in spying on Belgium because NATO and the European Union have headquarters in the country. It has also been suggested that China may be interested in exploring Belgium's historical connections with Central Africa. |archive-url=https://web.archive.org/web/20170515162230/https://www.sophos.com/en-us/press-office/press-releases/2008/05/belgium.aspx |archive-date=15 May 2017}}

The Katholieke Universiteit Leuven in Leuven was also believed to be the center for a group of Chinese students in Europe conducting industrial espionage, operating under a front organization called the Chinese Students' and Scholars' Association of Leuven.

{{cite news |url=http://news.bbc.co.uk/2/hi/4704691.stm |title=China's spies come out from the cold |first=Tim |last=Luard |publisher=BBC |date=22 July 2005 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20110218094044/http://news.bbc.co.uk/2/hi/4704691.stm |archive-date=18 February 2011 |url-status=live }}

{{cite news |title=Chinese Students Running Industrial 'Spy Network' Across Europe: Report |date=11 May 2005 |access-date=24 December 2009 |publisher=Agence France-Presse via spacedaily.com |url=http://www.spacedaily.com/news/china-05zw.html |archive-url=https://web.archive.org/web/20110225194137/http://www.spacedaily.com/news/china-05zw.html |archive-date=25 February 2011 |url-status=live }} In 2005 a leading figure of the Association defected to Belgium, providing information to the Sûreté de l'Etat on hundreds of spies engaged in economic espionage across Europe.{{cite news |url=https://www.smh.com.au/news/world/chinese-defectors-spy-claim/2005/07/04/1120329385689.html |title=Chinese defector's spy claim |work=Sydney Morning Herald |date=5 July 2005 |access-date=21 August 2012 |first=Damien |last=McElroy |archive-url=https://web.archive.org/web/20140921112513/http://www.smh.com.au/news/world/chinese-defectors-spy-claim/2005/07/04/1120329385689.html |archive-date=21 September 2014 |url-status=live }}

{{cite news |url=https://www.fbi.gov/about-us/investigate/counterintelligence/higher-education-and-national-security |title=Higher Education and National Security: The Targeting of Sensitive, Proprietary, and Classified Information on Campuses of Higher Education |publisher=Federal Bureau of Investigation |date=April 2011 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20120701055120/http://www.fbi.gov/about-us/investigate/counterintelligence/higher-education-and-national-security |archive-date=1 July 2012 |url-status=live}}

The group had no obvious links to Chinese diplomats and was focused on getting moles into laboratories and universities in the Netherlands, Britain, Germany, France and Belgium.

{{cite news |url=http://www.chinapost.com.tw/news/2005/05/12/62301/Chinese-students.htm |title=Chinese students running 'spy network' in EU |work=China Post |agency=Agence France-Presse |date=12 May 2005 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20140826114538/http://www.chinapost.com.tw/news/2005/05/12/62301/Chinese-students.htm |archive-date=26 August 2014 |url-status=live }}

The People's Daily, an organ of the Central Committee of the Chinese Communist Party, dismissed the reports as fabrications triggered by fears of China's economic development.{{cite news |archive-url=https://web.archive.org/web/20160112120751/http://en.people.cn/200507/01/eng20050701_193539.html |archive-date=12 January 2016 |quote=Some European countries deliberately sensationalized the so-called 'Chinese espionage' in the past half a month. At the end of April, France set off a new upsurge of 'Chinese girl student as industrial espionage'; on 9 May, various leading media in Sweden followed suit by creating the Karolinska 'Chinese scholar espionage'; on 11 May, L'Agence France-Presse and a Belgian news website concocted a 'Chinese economic espionage website' at Katholieke Universiteit Leuven. For a second, the 'Chinese espionage' incidents had spread like wildfire in the European continent. [...] When asked the reason for these false reports, Sun Ling, Counselor for Education of Chinese Embassy in Sweden, noted that the fast development of China's economy made a few people who hold biased attitude towards China feel ill at ease. They think that China's rapid development was achieved through illegal means such as grabbing advanced techniques from the Western countries. If we have a look at the latest development of such incidents, the truth will be clear that such moves are a vicious undercurrent discriminating and demonizing China. |url=http://english.peopledaily.com.cn/200507/01/eng20050701_193539.html |title=European media repeatedly fabricate 'Chinese espionage' |date=1 July 2005 |access-date=21 August 2012 |work=People's Daily}}

In February 2019, a report was released by European External Action Service which estimated that there were 250 Chinese MSS spies operating in Brussels, the capital of the European Union.{{Cite news|url=https://www.dw.com/en/hundreds-of-russian-and-chinese-spies-in-brussels-report/a-47437958|title=Hundreds of Russian and Chinese spies in Brussels – report|publisher=DW|access-date=2 February 2019|archive-url=https://web.archive.org/web/20190209105746/https://www.dw.com/en/hundreds-of-russian-and-chinese-spies-in-brussels-report/a-47437958|archive-date=9 February 2019|url-status=live}}

On 15 December 2023, a joint investigation by Financial Times, Der Spiegel and Le Monde revealed that former Vlaams Belang senator Frank Creyelman accepted bribes from Ministry of State Security for three years to influence discussions within the European Union.{{Cite web |author= |date=15 December 2023 |title=Chinese spies recruited European politician in operation to divide west |url=https://www.ft.com/content/601df41f-8393-46ad-9f74-fe64f8ea1a3f |url-access=subscription |work=Financial Times |access-date=24 December 2023 |archive-date=21 December 2023 |archive-url=https://web.archive.org/web/20231221041832/https://www.ft.com/content/601df41f-8393-46ad-9f74-fe64f8ea1a3f |url-status=live }} Subsequently, Vlaams Belang expelled him from the party.{{Cite web |url=https://www.gva.be/cnt/dmf20231215_93303453 |title=Vlaams Belang zet Frank Creyelman uit partij na onthullingen over spionage voor China |date=15 December 2023 |work=Gazet van Antwerpen |language=nl |access-date=24 December 2023 |archive-date=21 December 2023 |archive-url=https://web.archive.org/web/20231221105350/https://www.gva.be/cnt/dmf20231215_93303453 |url-status=live }} His brother, Steven Creyelman, also MP for the VB, is also linked to this case.{{cite news |title=Ook VB'er Steven Creyelman uit Buggenhout nu genoemd in Chinees spionagedossier waarbij zijn broer betrokken is |url=https://www.tvoost.be/nieuws/ook-vber-steven-creyelman-uit-buggenhout-nu-genoemd-in-chinees-spionagedossier-waarbij-zijn-broer-betrokken-is-162449 |access-date=18 December 2023 |work=TVOOST - Regionaal nieuws uit Oost-Vlaanderen |language=nl-nl |archive-date=16 December 2023 |archive-url=https://web.archive.org/web/20231216083434/https://www.tvoost.be/nieuws/ook-vber-steven-creyelman-uit-buggenhout-nu-genoemd-in-chinees-spionagedossier-waarbij-zijn-broer-betrokken-is-162449 |url-status=live }}

==Denmark==

In June 2023, Bloomberg News reported that Huawei engaged in espionage against the Danish telecom group (TDC) based in Copenhagen, Denmark. This espionage aimed to gain an advantage in their bid against the Swedish telecommunications company Ericsson for a lucrative 5G network contract valued at CHF 175 million ($198 million) to upgrade Denmark's cellular network.{{Cite news |date=2023-06-15 |title=When a Huawei Bid Turned Into a Hunt for a Corporate Mole |language=en |work=Bloomberg.com |url=https://www.bloomberg.com/news/features/2023-06-15/how-huawei-got-caught-spying-and-lost-a-200-million-5g-contract |access-date=2023-10-14 |archive-date=1 September 2023 |archive-url=https://web.archive.org/web/20230901104911/https://www.bloomberg.com/news/features/2023-06-15/how-huawei-got-caught-spying-and-lost-a-200-million-5g-contract |url-status=live }}

==Estonia==

In March 2021, Estonian scientist Tarmo Kõuts was convicted of spying for China.{{cite news |url=https://www.thedailybeast.com/top-nato-scientist-with-security-clearance-busted-spying-for-china |newspaper=The Daily Beast |title=Top NATO Scientist With Security Clearance Busted Spying for China |first=Holger |last=Roonemaa |date=19 March 2021 |archive-url=https://archive.today/20210319113810/https://www.thedailybeast.com/top-nato-scientist-with-security-clearance-busted-spying-for-china |archive-date=19 March 2021 |access-date=28 March 2021 |url-status=live }} According to the Estonian Internal Security Service, Kõuts was recruited in 2018 by China's Intelligence Bureau of the Joint Staff Department of the Central Military Commission, and was arrested on 9 September 2020. Kõuts was paid approximately €17,000 by his handlers. Kõuts worked for the Maritime Institute of Tallinn Technical University, and was also a member of the Scientific Committee of the Estonian Ministry of Defence and the NATO Undersea Research Center.

==Finland==

According to the security research firm F5, Chinese hackers launched widespread attacks against Finnish Internet of things computers before the 2018 Russia–United States summit in Helsinki.{{cite news |url=https://www.washingtontimes.com/news/2018/jul/19/chinese-hackers-struck-days-before-helsinki-summit/ |newspaper=The Washington Times |quote=The attacks on Finnish internet-connected devices originating from ChinaNet, China's largest internet backbone, began spiking 12 July, just four days before Mr. Trump and Mr. Putin met in Helsinki, claimed the analysis by the Seattle-based cybersecurity firm F5. |title=Chinese hackers struck days before Helsinki summit |archive-url=https://archive.today/20180720014227/https://www.washingtontimes.com/news/2018/jul/19/chinese-hackers-struck-days-before-helsinki-summit/ |archive-date=20 July 2018 |first=Dan |last=Boylan}}{{cite news |publisher=F5 Networks, Inc |title=Cyber Attacks Spike in Finland Before Trump-Putin Meeting |first1=Sara |last1=Boddy |first2=Justin |last2=Shattuck |date=19 July 2018 |archive-url=https://web.archive.org/web/20180720034634/https://www.f5.com/labs/articles/threat-intelligence/cyber-attacks-spike-in-finland-before-trump-putin-meeting |archive-date=20 July 2018 |url=https://www.f5.com/labs/articles/threat-intelligence/cyber-attacks-spike-in-finland-before-trump-putin-meeting}}

In March 2021, the Finnish government implicated the China-linked hacking group APT31 in a hack of the Finnish Parliament.{{Cite news |last1=Lyngaas |first1=Sean |title=Finland implicates China-linked APT31 in parliament hack |url=https://www.cyberscoop.com/finland-apt31-china-parliament-hack/ |website=www.cyberscoop.com |date=18 March 2021 |publisher=CyberScoop |access-date=20 March 2021 |archive-date=19 March 2021 |archive-url=https://web.archive.org/web/20210319042609/https://www.cyberscoop.com/finland-apt31-china-parliament-hack/ |url-status=live }}{{cite news |url=https://intelnews.org/2021/03/19/finnish-intelligence-identifies-chinese-state-linked-group-behind-cyber-attack/ |title=Finnish intelligence identifies Chinese state-linked group behind cyber-attack |publisher=intelNews |first=Joseph |last=Fitsanakis |date=19 March 2021 |quote=But on Thursday the Finnish Security and Intelligence Service (SUPO) issued a press release about the incident. It said the attack was likely part of a state-sponsored cyber espionage operation. It also identified those responsible for the attack as Advanced Persistent Threat (APT) 31. |access-date=30 March 2021 |archive-date=30 March 2021 |archive-url=https://web.archive.org/web/20210330054451/https://intelnews.org/2021/03/19/finnish-intelligence-identifies-chinese-state-linked-group-behind-cyber-attack/ |url-status=live }} In July that same year, as part of a joint EU/NATO/US/UK statement on Chinese-backed hacking campaigns (see 2021 Microsoft Exchange Server data breach), the British National Cyber Security Centre joined in accusing China-linked hacking groups of being behind the Finnish Parliament hack.

==France==

There have been several incidents of suspected Chinese spies in France. This includes Shi Pei Pu, a Chinese opera singer from Beijing who convinced a French diplomat that he was a woman and spied on France.[https://www.nytimes.com/2009/07/02/world/asia/02shi.html "Shi pei pu, singer spy and m butterfly, dies at 70, 1 July 2009"] {{Webarchive|url=https://web.archive.org/web/20170201023459/http://www.nytimes.com/2009/07/02/world/asia/02shi.html |date=1 February 2017 }} The New York Times

French media also portrayed Li Li Whuang (李李), a 22-year-old Chinese intern at car parts maker Valeo, as an industrial spy.{{Cite news |url=http://www.spacedaily.com/news/china-05zw.html |title=Space Daily, Chinese students running industrial spy network across Europe: report, 11 May 2005 |publisher=Spacedaily.com |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20150924104235/http://www.spacedaily.com/news/china-05zw.html |archive-date=24 September 2015 |url-status=live }} Both the French prosecution and Valeo refuted media claims of spying and the case was later considered to be a psychosis.

{{cite news |title=Mata Hari chez Valeo |work=Le Nouvel Observateur |date=19 May 2005 |access-date=28 January 2010 |url=http://hebdo.nouvelobs.com/hebdo/parution/p2115/articles/a268885-mata_hari_chez_valeo_.html |archive-url=https://web.archive.org/web/20090106113325/http://hebdo.nouvelobs.com/hebdo/parution/p2115/articles/a268885-mata_hari_chez_valeo_.html |archive-date=6 January 2009 |url-status=live }}

{{cite news |title=Espionnage industriel : de la faute professionnelle à la psychose |work=Le Point |date=21 November 2007 |access-date=28 January 2010 |url=http://www.lepoint.fr/actualites-technologie-internet/2007-11-21/espionnage-industriel-de-la-faute-professionnelle-a-la-psychose/1387/0/210971 |archive-url=https://web.archive.org/web/20100118201759/http://www.lepoint.fr/actualites-technologie-internet/2007-11-21/espionnage-industriel-de-la-faute-professionnelle-a-la-psychose/1387/0/210971 |archive-date=18 January 2010 |url-status=dead }} Li Li was ultimately convicted of violating the confidentiality clause of her contract and served two months in prison, but was allowed to continue her doctoral studies at the University of Technology of Compiègne.{{cite news |url=http://www.labtimes.org/labtimes/issues/lt2008/lt03/lt_2008_03_18_21.pdf |title=Live and Let Spy? |first=Jeremy |last=Garwood |work=Lab Times |year=2008 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20140826113831/http://www.labtimes.org/labtimes/issues/lt2008/lt03/lt_2008_03_18_21.pdf |archive-date=26 August 2014 |url-status=dead }}

Two French intelligence operatives, identified only as Henri M and Pierre-Marie H, were accused of communicating classified information to China.{{cite news |first=David |last=Chazan |date=28 May 2018 |url=https://www.smh.com.au/world/europe/french-spy-charged-with-treason-fell-for-chinese-honeytrap-20180528-p4zhwd.html |newspaper=The Sydney Morning Herald |title=French spy charged with treason fell for Chinese 'honeytrap' |access-date=29 May 2018 |archive-url=https://web.archive.org/web/20180528110914/https://www.smh.com.au/world/europe/french-spy-charged-with-treason-fell-for-chinese-honeytrap-20180528-p4zhwd.html |archive-date=28 May 2018 |url-status=live }} Henri M was reportedly the Beijing station chief for the Directorate-General for External Security.

{{Cite news |url=https://www.lejdd.fr/societe/un-des-espions-mis-en-examen-etait-soupconne-depuis-20-ans-3663524 |publisher=Le Journal du Dimanche |title=Un des espions mis en examen était soupçonné depuis 20 ans |language=fr |date=26 May 2018 |access-date=29 May 2018 |archive-url=https://web.archive.org/web/20180529203831/https://www.lejdd.fr/societe/un-des-espions-mis-en-examen-etait-soupconne-depuis-20-ans-3663524 |archive-date=29 May 2018 |url-status=live }}

According to reporting by Le Figaro, the General Directorate for Internal Security and Directorate-General for External Security believe that Chinese spies have used LinkedIn to target thousands of business and government officials as potential sources of information.

{{cite news |url=https://www.telegraph.co.uk/news/2018/10/23/chinese-online-spies-fool-hundreds-totally-unprepared-top-french/ |newspaper=3=The Telegraph |first=Henry |last=Samuel |date=23 October 2018 |title=Chinese spies fooled 'hundreds' of civil servants and executives, France reveals |access-date=26 October 2018 |archive-url=https://web.archive.org/web/20181026222445/https://www.telegraph.co.uk/news/2018/10/23/chinese-online-spies-fool-hundreds-totally-unprepared-top-french/ |archive-date=26 October 2018 |url-status=live }}

In 2011, a Chinese cyberattack against Airbus Astrium (now ArianeGroup) occurred, targeting technical specifications and test results of M51 SLBM.{{cite news |author=Antoine Izambard, Vincent Lamigeon |date=10 April 2020 |title=A400M, M51... Les guerres secrètes du contre-espionnage français |url=https://www.challenges.fr/entreprise/defense/enquete-sur-les-guerres-secretes-du-contre-espionnage-francais_705487 |work=Challenges |access-date=8 September 2021 |archive-date=8 August 2021 |archive-url=https://web.archive.org/web/20210808092657/https://www.challenges.fr/entreprise/defense/enquete-sur-les-guerres-secretes-du-contre-espionnage-francais_705487 |url-status=live }}

In December 2018, experts from the DGSI and ANSSI discovered a "sophisticated" supply chain attack targeting Airbus. The pattern of the attack has been described as typical of APT10 although unusually sophisticated.{{cite news |author=Antoine Izambard |date=4 February 2020 |title=Cyberattaque contre Airbus: la piste chinoise avancée |url=https://www.challenges.fr/entreprise/transports/cyberattaque-contre-airbus-la-piste-chinoise-avancee_640396 |work=Challenges |access-date=8 September 2021 |archive-date=7 April 2022 |archive-url=https://web.archive.org/web/20220407030838/https://www.challenges.fr/entreprise/transports/cyberattaque-contre-airbus-la-piste-chinoise-avancee_640396 |url-status=live }} It is suspected that the attack was motivated by economic warfare to benefit the development of the domestic Chinese C919 airliner.

In 2019, the admiral Morio de l'Isle warned the National Assembly about a high number of marriages between Chinese women and French servicemen in Brest, which host the general staff of the Strategic Oceanic Force, responsible for the sea-based French nuclear deterrence, and located next to Île Longue, the home base of French SSBN. He also notified of an "increasingly strong" Chinese presence around VLF military transmission center across France citing the example of the creation of "sino-european hub" funded by the investment company of Beijing Municipality in a remote town near the HWU transmitter. This choice was described by a local deputy as "troubling".{{cite news |last=Lagneau |first=Laurent |date=24 October 2019 |title=Le renseignement chinois s'intéresserait de très près aux militaires affectés en Bretagne |url=http://www.opex360.com/2019/10/24/le-renseignement-chinois-sinteresserait-de-tres-pres-aux-militaires-affectes-en-bretagne/ |trans-title=The Chinese intelligence would be very interested in the military assigned in Brittany |language=fr |work=Zone Militaire |access-date=8 September 2021 |archive-date=11 September 2021 |archive-url=https://web.archive.org/web/20210911232128/http://www.opex360.com/2019/10/24/le-renseignement-chinois-sinteresserait-de-tres-pres-aux-militaires-affectes-en-bretagne/ |url-status=live }}{{cite news |last=Lagneau |first=Laurent |date=15 July 2019 |title=Dissuasion : Une implantation étrangère ' de plus en plus forte ' constatée près des Centres de transmissions de la Marine |url=http://www.opex360.com/2019/07/15/dissuasion-une-implantation-etrangere-de-plus-en-plus-forte-constatee-pres-des-centres-de-transmissions-de-la-marine/ |work=Zone Militaire |trans-title=Deterrence: 'Increasingly strong' foreign presence near Navy signal centers |language=fr |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908142915/http://www.opex360.com/2019/07/15/dissuasion-une-implantation-etrangere-de-plus-en-plus-forte-constatee-pres-des-centres-de-transmissions-de-la-marine/ |url-status=live }}

In December 2020, Huawei announced it will open its first large factory outside China in France next to the border with Germany.{{cite news |author= |date=17 December 2020 |title=Huawei à Brumath : c'est confirmé ! |url=https://www.dna.fr/sport/2020/12/17/huawei-a-brumath-c-est-confirme |work=DNA |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908194818/https://www.dna.fr/sport/2020/12/17/huawei-a-brumath-c-est-confirme |url-status=live }} National and local newspapers have quickly expressed national security concerns about the location of the factory, situated between DRM headquarters, multiple electronic warfare, intelligence and transmission regiments, as well as about the company itself.{{cite news |author= |date=18 December 2020 |title=Le chinois Huawei va implanter une usine au milieu des unités de l'armée de Terre dédiées au renseignement |trans-title=China's Huawei to set up a factory in the middle of the Army's intelligence units |language=fr |url=http://www.opex360.com/2020/12/18/le-chinois-huawei-va-implanter-une-usine-au-milieu-des-unites-de-larmee-de-terre-dediees-au-renseignement/ |work=opex360 |access-date=8 September 2021 |archive-date=11 September 2021 |archive-url=https://web.archive.org/web/20210911195726/http://www.opex360.com/2020/12/18/le-chinois-huawei-va-implanter-une-usine-au-milieu-des-unites-de-larmee-de-terre-dediees-au-renseignement/ |url-status=live }}{{cite news |author= |date=22 December 2020 |title=Sécurité nationale: l'implantation de Huawei à Brumath interroge |url=https://www.dna.fr/defense-guerre-conflit/2020/12/22/huawei-au-coeur-du-renseignement-militaire |work=DNA |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908194816/https://www.dna.fr/defense-guerre-conflit/2020/12/22/huawei-au-coeur-du-renseignement-militaire |url-status=live }}{{Cite news|url = https://www.lesechos.fr/pme-regions/grand-est/limplantation-de-huawei-en-alsace-fait-toujours-debat-1300794|title = L'Implantation de Huawei en Alsace fait toujours débat|date = 23 March 2021|access-date = 8 September 2021|archive-date = 8 September 2021|archive-url = https://web.archive.org/web/20210908194814/https://www.lesechos.fr/pme-regions/grand-est/limplantation-de-huawei-en-alsace-fait-toujours-debat-1300794|url-status = live}}{{Cite news|url = https://www.capital.fr/entreprises-marches/huawei-ouvrira-en-alsace-sa-premiere-usine-hors-de-chine-en-2023-1392009|title = Huawei ouvrira en Alsace sa première usine hors de Chine en 2023|date = 26 January 2021|access-date = 8 September 2021|archive-date = 8 September 2021|archive-url = https://web.archive.org/web/20210908194820/https://www.capital.fr/entreprises-marches/huawei-ouvrira-en-alsace-sa-premiere-usine-hors-de-chine-en-2023-1392009|url-status = live}} The US Consul of Strasbourg met with the local mayor.{{cite news |author= |date=18 January 2021 |title=Huawei : l'étonnante visite de la consule des États-Unis |trans-title=Huawei: the surprising visit of the US consul |language=fr |url=https://www.dna.fr/politique/2021/01/18/huawei-l-etonnante-visite-de-la-consule-des-etats-unis |work=opex360 |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908194816/https://www.dna.fr/politique/2021/01/18/huawei-l-etonnante-visite-de-la-consule-des-etats-unis |url-status=live }}

In July 2021, the ANSSI issued a security alert about a "large intrusion campaign impacting numerous French entities" described as "especially virulent" using the mode of operation of APT31.{{cite web |author= |date=21 July 2021 |title=🇫🇷/🇬🇧 Campagne d'attaque du mode opératoire APT31 ciblant la France |url=https://www.cert.ssi.gouv.fr/ioc/CERTFR-2021-IOC-003/ |work=Centre gouvernemental de veille, d'alerte et de réponse aux attaques informatiques |access-date=8 September 2021 |archive-date=28 September 2021 |archive-url=https://web.archive.org/web/20210928155539/https://cert.ssi.gouv.fr/ioc/CERTFR-2021-IOC-003/ |url-status=live }}{{cite news |author= |date=22 July 2021 |title=Chinese hackers target swathe of French organisations, French cyber agency raises security alarm |url=https://www.defenceconnect.com.au/intel-cyber/8439-chinese-hackers-target-swathe-of-french-organisations-french-cyber-agency-raises-security-alarm |work=DefenseConnect |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908194820/https://www.defenceconnect.com.au/intel-cyber/8439-chinese-hackers-target-swathe-of-french-organisations-french-cyber-agency-raises-security-alarm |url-status=live }} Two weeks later, Minister of the Armed Forces Florence Parly at the International Cybersecurity Forum suggested the emergence of "a new cold war in cyberspace [...] without the corresponding restraint. [...] There is no red phone in the cyber" and warned "we could be confronted to quickly and uncontrollably escalating situations with unseen crisis and unpredictable domino effects".{{cite news |author=Olivier Berger |date=9 September 2019 |title=FIC: la cyberdéfense, priorité nationale et du recrutement des armées |trans-title=International cybersecurity forum: cyber defense, a national and military recruitment priority |url=https://www.lavoixdunord.fr/1066218/article/2021-09-07/fic-la-cyberdefense-priorite-nationale-et-du-recrutement-des-armees |language=fr |work=La Voix du Nord |access-date=9 September 2021 |archive-date=9 September 2021 |archive-url=https://web.archive.org/web/20210909183045/https://www.lavoixdunord.fr/1066218/article/2021-09-07/fic-la-cyberdefense-priorite-nationale-et-du-recrutement-des-armees |url-status=live }}

In March 2023, Taiwan's Overseas Community Affairs Council (OCAC) announced that a Chinese overseas police station in France engaged in cyberattacks against an OCAC language school in France.{{Cite news |date=March 9, 2023 |title=Taiwan Mandarin learning center cyberattacked by China |language=en-US |website=Focus Taiwan |url=https://focustaiwan.tw/politics/202303090016 |access-date=2023-03-10 |archive-date=13 March 2023 |archive-url=https://web.archive.org/web/20230313115405/https://focustaiwan.tw/politics/202303090016 |url-status=live }}

==Germany==

According to reporting in Süddeutsche Zeitung, China has been soliciting information from members of the Bundestag, including offering €30,000 for insider information from one parliamentarian.

{{cite news |url=https://www.dw.com/en/china-tried-to-spy-on-german-parliament-report/a-44548172 |publisher=Deutsche Welle |title=China tried to spy on German parliament – report |date=6 July 2018 |access-date=6 July 2018 |archive-url=https://web.archive.org/web/20180706094600/https://www.dw.com/en/china-tried-to-spy-on-german-parliament-report/a-44548172 |archive-date=6 July 2018 |url-status=live }}

Between August and September 2007 Chinese hackers were suspected of using Trojan horse spyware on various government computers, including those of the Chancellory, the Ministry of Economics and Technology, and the Ministry of Education and Research.{{cite news |url=http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf |page=72 |title=Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation |author=Northrop Grumman |publisher=United States – China Economic and Security Review Commission |date=9 October 2009 |access-date=21 August 2012 |url-status=dead |archive-url=https://web.archive.org/web/20110203052113/http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf |archive-date=3 February 2011 |author-link=Northrop Grumman }} Germans officials believe Trojan viruses were inserted in Microsoft Word and PowerPoint files, and approximately 160 gigabytes of data were siphoned to Canton, Lanzhou and Beijing via South Korea, on instructions from the People's Liberation Army.

{{cite news |url=http://www.spiegel.de/international/world/espionage-report-merkel-s-china-visit-marred-by-hacking-allegations-a-502169.html |title=Merkel's China Visit Marred by Hacking Allegations |date=27 August 2012 |access-date=21 August 2012 |work=Der Spiegel |archive-url=https://web.archive.org/web/20121009052716/http://www.spiegel.de/international/world/espionage-report-merkel-s-china-visit-marred-by-hacking-allegations-a-502169.html |archive-date=9 October 2012 |url-status=live }}

The Federal Ministry of the Interior estimates that Chinese economic espionage could be costing Germany between 20 and 50 billion euros annually.

{{Cite news |url=http://articles.economictimes.indiatimes.com/2012-03-13/news/31159554_1_german-companies-german-firms-spy |title=The Economic Times |date=13 March 2012 |access-date=21 August 2012 |author=Press Trust of India |work=The Times of India |archive-url=https://web.archive.org/web/20120317055756/http://articles.economictimes.indiatimes.com/2012-03-13/news/31159554_1_german-companies-german-firms-spy |archive-date=17 March 2012 |url-status=dead |author-link=Press Trust of India }}

Spies are reportedly targeting mid- and small-scale companies that do not have as strong security regimens as larger corporations.

{{cite news |url=https://www.bloomberg.com/news/2012-04-04/chinese-espionage-targets-small-german-companies-die-welt-says.html |title=Chinese Espionage Targets Small German Companies, Die Welt Says |first=Richard |last=Weiss |date=3 April 2012 |access-date=21 August 2012 |publisher=Bloomberg News |archive-url=https://web.archive.org/web/20120529222342/http://www.bloomberg.com/news/2012-04-04/chinese-espionage-targets-small-german-companies-die-welt-says.html |archive-date=29 May 2012 |url-status=live }}

Berthold Stoppelkamp, head of the Working Group for Economic Security (ASW), stated that German companies had a poor security culture making espionage easier, exacerbated by the absence of a "strong, centralized" police command.

{{cite news |url=https://www.reuters.com/article/us-germany-espionage-idUSBRE82C0CT20120313 |title=Insight: How German history helps modern spies |work=Reuters |first=Marilyn |last=Gerlach |date=13 March 2012 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20120727015425/http://www.reuters.com/article/2012/03/13/us-germany-espionage-idUSBRE82C0CT20120313 |archive-date=27 July 2012 |url-status=live }}

Walter Opfermann, a counter-intelligence expert for the state of Baden-Württemberg, claimed that China is using extremely sophisticated electronic attacks capable of endangering portions of critical German infrastructure, having gathered sensitive information through techniques such as phone hacking and Trojan emails.

{{cite news |url=https://www.theguardian.com/world/2009/jul/22/germany-china-industrial-espionage |title=Germany accuses China of industrial espionage |work=The Guardian |date=22 July 2009 |access-date=21 August 2012 |first=Kate |last=Connolly |location=London |archive-url=https://web.archive.org/web/20130907003316/http://www.theguardian.com/world/2009/jul/22/germany-china-industrial-espionage |archive-date=7 September 2013 |url-status=live }}

In November 2018, German prosecutors in Cologne charged a former employee of Lanxess for engaging in industrial espionage on behalf of a Chinese copycat company.

{{cite news |work=Reuters |date=16 November 2018 |first1=Patricia |last1=Weiss |first2=Ludwig |last2=Burger |first3=Noah |last3=Barkin |editor-first=Mike |editor-last=Collett-White |url=https://www.reuters.com/article/us-germany-chemicals-espionage-exclusive/exclusive-german-prosecutors-charge-chinese-born-engineer-in-industrial-espionage-case-idUSKCN1NK0UT?il=0 |title=Exclusive: German prosecutors charge Chinese-born engineer in industrial espionage case |access-date=16 November 2018 |archive-url=https://web.archive.org/web/20190114100524/https://www.reuters.com/article/us-germany-chemicals-espionage-exclusive/exclusive-german-prosecutors-charge-chinese-born-engineer-in-industrial-espionage-case-idUSKCN1NK0UT?il=0 |archive-date=14 January 2019 |url-status=live }}

Germany suspects China of spying both on German corporations and on Uyghur expatriates living in the country.

{{Cite news |url=http://www.thelocal.de/money/20090520-19399.html |title=The Local, Russia and China spying on German firms |publisher=Thelocal.de |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20090527013205/http://www.thelocal.de/money/20090520-19399.html |archive-date=27 May 2009 |url-status=live |date=20 May 2009 }}

{{cite news |last=Stark |first=Holger |url=http://www.spiegel.de/international/germany/0,1518,663090,00.html |title=Spiegel, Germany suspects China of spying on Uighur expatriates, 24 November 2009 |publisher=Spiegel.de |date=24 November 2009 |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20091127010151/http://www.spiegel.de/international/germany/0,1518,663090,00.html |archive-date=27 November 2009 |url-status=live |newspaper=Spiegel Online }}

In 2011, a 64-year-old German man was charged with spying on Uyghurs in Munich between April 2008 and October 2009.

{{Cite news |url=https://www.foxnews.com/world/german-man-charged-with-spying-on-exiles-for-china/ |title=German man charged with spying on exiles for China |publisher=Fox News Channel |date=8 April 2011 |access-date=21 August 2012 |agency=Associated Press |archive-url=https://web.archive.org/web/20131220182551/http://www.foxnews.com/world/2011/04/08/german-man-charged-spying-exiles-china/ |archive-date=20 December 2013 |url-status=live }}

{{cite news |url=http://www.foxnews.com/world/german-man-charged-with-spying-on-exiles-for-china |date=8 April 2011 |access-date=11 April 2011 |title=German man charged with spying on exiles for Chinay |archive-url=https://web.archive.org/web/20160112120748/http://www.foxnews.com/world/2011/04/08/german-man-charged-spying-exiles-china.html |archive-date=12 January 2016 |url-status=live }}

Munich is a center for expatriate Uyghurs, and in November 2009 members of the Federal Criminal Police Office arrested four Chinese nationals on charges of spying on Uyghurs. In 2007 Chinese diplomat Ji Wumin left Germany after being observed meeting with individuals engaged in surveillance of Munich Uyghurs, and German investigators suspect China is coordinating espionage activities out of its Munich consulate in the Neuhausen district.

{{cite news |url=http://www.spiegel.de/international/germany/police-raid-in-munich-germany-suspects-china-of-spying-on-uighur-expatriates-a-663090.html |title=Germany Suspects China of Spying on Uighur Expatriates |work=Der Spiegel |first=Holger |last=Stark |date=24 November 2009 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20121019092106/http://www.spiegel.de/international/germany/police-raid-in-munich-germany-suspects-china-of-spying-on-uighur-expatriates-a-663090.html |archive-date=19 October 2012 |url-status=live }}

In 2012, EADS (Airbus) and steel maker ThyssenKrupp were attacked by Chinese hackers. ThyssenKrupp described the attack as "massive" and "especially qualitative".{{cite news |author= |date=24 February 2013 |title=Chinesische Hacker greifen EADS und ThyssenKrupp an |trans-title=Chinese hackers attack EADS and ThyssenKrupp |url=https://www.spiegel.de/netzwelt/web/it-sicherheit-chinesische-hacker-greifen-eads-und-thyssenkrupp-an-a-885189.html |language=de |work=Der Spiegel |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908130221/https://www.spiegel.de/netzwelt/web/it-sicherheit-chinesische-hacker-greifen-eads-und-thyssenkrupp-an-a-885189.html |url-status=live }}

In 2016, ThyssenKrupp underwent an "organized, highly professional hacking attack" conducted "with state backing and the best attack techniques" whose aim was "to steal technological know-how and research".{{cite news |author= |date=8 December 2016 |title=Massiver Hackerangriff auf Thyssen-Krupp |trans-title=Massive hacking attack on Thyssen-Krupp |url=https://www.handelsblatt.com/unternehmen/industrie/datendiebstahl-massiver-hackerangriff-auf-thyssen-krupp/14951314.html |language=de |work=Handelsblatt |access-date=8 September 2021 |archive-date=8 April 2022 |archive-url=https://web.archive.org/web/20220408035149/https://www.handelsblatt.com/unternehmen/industrie/datendiebstahl-massiver-hackerangriff-auf-thyssen-krupp/14951314.html |url-status=live }} The group stated to have successfully repealed the attack after a "6 months long defensive battle". Some information was obtained by the hackers but critical divisions concerning blast furnace, power stations and submarines have reportedly not been affected.{{cite web |url=https://www.thyssenkrupp.com/en/newsroom/dataprotection |title=Statement on the cyber-attack at thyssenkrupp |publisher=thyssenkrupp AG |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908130221/https://www.thyssenkrupp.com/en/newsroom/dataprotection |url-status=live }}
{{cite web |url=https://www.thyssenkrupp.com/de/newsroom/dataprotection |title=Cyberangriff auf thyssenkrupp |publisher=thyssenkrupp AG |language=de |access-date=8 September 2021 }}{{Dead link|date=June 2022 |bot=InternetArchiveBot |fix-attempted=yes }}
The timing of the attacks suggest that attackers are based in China or southeast Asia.

In 2017, the Federal Office for the Protection of the Constitution (BfV) published information alleging that Chinese intelligence services had created fake social media profiles on sites such as LinkedIn, using them to gather information on German politicians and government officials.

{{cite news |title=German intelligence unmasks alleged covert Chinese social media profiles |url=https://www.reuters.com/article/us-germany-security-china/german-intelligence-unmasks-alleged-covert-chinese-social-media-profiles-idUSKBN1E40CA |work=Reuters |date=10 December 2017 |access-date=10 December 2017 |quote=Germany's intelligence service has published the details of social network profiles which it says are fronts faked by Chinese intelligence to gather personal information about German officials and politicians [...] Among the faked profiles whose details were published were that of 'Rachel Li', identified as a 'headhunter' at 'RiseHR', and an 'Alex Li', a 'Project Manager at Center for Sino-Europe Development Studies'. |editor-first=Matthew Mpoke |editor-last=Bigg |archive-url=https://web.archive.org/web/20171210151926/https://www.reuters.com/article/us-germany-security-china/german-intelligence-unmasks-alleged-covert-chinese-social-media-profiles-idUSKBN1E40CA |archive-date=10 December 2017 |url-status=live }}

{{cite news |url=https://www.theglobeandmail.com/news/world/germanys-intelligence-head-warns-of-increased-cyberspying-from-china/article37282135/ |title=Germany's intelligence head warns of increased cyberspying from China |newspaper=The Globe and Mail |first=Kirsten |last=Grieshaber |date=10 December 2017 |access-date=10 December 2017 |quote=Hans-Georg Maassen said his agency, known by its German acronym BfV, believes more than 10,000 Germans have been targeted by Chinese intelligence agents posing as consultants, headhunters or researchers, primarily on the social networking site LinkedIn. |archive-url=https://web.archive.org/web/20171211040953/https://www.theglobeandmail.com/news/world/germanys-intelligence-head-warns-of-increased-cyberspying-from-china/article37282135/ |archive-date=11 December 2017 |url-status=live }}

The Verfassungsschutz had previously warned that Chinese intelligence officers are making use of social networking sites such as LinkedIn and XING to recruit informants.

{{cite news |url=https://global.handelsblatt.com/politics/german-intelligence-agency-warns-of-chinese-espionage-696852 |title=German Intelligence Agency Warns of Chinese Espionage |first=Christian |last=Ramthun |date=3 February 2017 |access-date=14 May 2017 |publisher=Handelsblatt |quote=Germany's domestic intelligence service, the Federal Office for the Protection of the Constitution, is warning of increasing Chinese espionage all the way up to the German chancellery, according to an intelligence report obtained by weekly business magazine WirtschaftsWoche, a sister publication of Handelsblatt Global. The report states that Chinese spies increasingly utilize social networks such as Facebook or the business networking site Xing to recruit informants. |archive-url=https://web.archive.org/web/20170209163046/https://global.handelsblatt.com/politics/german-intelligence-agency-warns-of-chinese-espionage-696852 |archive-date=9 February 2017 |url-status=live }}

Lu Kang of the Ministry of Foreign Affairs denied the allegations.

{{cite news |newspaper=The New York Times |first1=Javier C. |last1=Hernández |first2=Melissa |last2=Eddy |first3=Iris |last3=Zhao |title=China Denies Using LinkedIn to Recruit German Informants |url=https://www.nytimes.com/2017/12/11/world/asia/china-germany-linkedin.html |date=11 December 2017 |access-date=11 December 2017 |quote=In Beijing on Monday, Lu Kang, a spokesman for the Ministry of Foreign Affairs, called the investigation 'complete hearsay and groundless'. He urged German officials to 'speak and act more responsibly'. |archive-url=https://web.archive.org/web/20171212012148/https://www.nytimes.com/2017/12/11/world/asia/china-germany-linkedin.html |archive-date=12 December 2017 |url-status=live }}

In 2019, an investigation led by the Bayerischer Rundfunk uncovered that a hacker group called Winnti had attacked twelve major companies including six German DAX-traded companies: Bayer AG, BASF, Siemens, Henkel, Covestro.{{cite news |author=Hakan Tanriverdi |author2=Svea Eckert |author3=Jan Strozyk |author4=Maximilian Zierer |author5=Rebecca Ciesielski |date=24 July 2019 |title=Attacking the Heart of the German Industry |url=https://interaktiv.br.de/winnti/english/index.html |work=Bayerischer Rundfunk |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908130222/https://interaktiv.br.de/winnti/english/index.html |url-status=live }} The Kapersky Lab first uncovered Winnti in 2011 after it infected the German company Gameforge and has been highly active ever since. An IT security expert with whom they have worked said that "any DAX corporation that hasn't been attacked by Winnti must have done something wrong". This group has also been attributed the responsibility of the 2016 ThyssenKrupp hacking attack.{{cite news |author= |date=24 July 2019 |title=Hacker griffen mindestens sechs Dax-Konzerne an |trans-title=Hackers attacked at least six DAX companies |url=https://www.spiegel.de/netzwelt/web/hackergruppe-winnti-griff-auch-basf-siemens-roche-und-henkel-an-a-1278705.html |language=de |work=Der Spiegel |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908130219/https://www.spiegel.de/netzwelt/web/hackergruppe-winnti-griff-auch-basf-siemens-roche-und-henkel-an-a-1278705.html |url-status=live }}

{{Blockquote

|text=We can, based on many, many indicators, say with high confidence that Winnti is being directed by the Chinese [government].

|author=Dror-John Röcher (German Cyber Security Organization [DCSO])

}}

In October 2024, Germany arrests Chinese woman Yaqi X for passing defense info to China via EU lawmaker Maximilian Krah’s Chinese aide Jian Guo.{{cite web|title=Germany arrests Chinese woman for passing defense info to China via EU lawmaker Maximilian Krah's Chinese aide |date=October 2024 |url=https://www.politico.eu/article/chinese-spy-working-far-right-mep-aide-arrested-germany-secret-service-maximilian-krah/}}

In January 2025, German prosecutors indicted three individuals suspected of spying for China by gathering information on military technology for China's Ministry of State Security. The German Federal Criminal Police Office (BKA) arrested Herwig F., Ina F. and Thomas R., in Düsseldorf and Bad Homburg in April 2024.{{Cite web |title=Germany: Three indicted on charges of spying for China – DW – 01/09/2025 |url=https://www.dw.com/en/germany-three-indicted-on-charges-of-spying-for-china/a-71257247 |access-date=2025-05-13 |website=dw.com |language=en |archive-date=30 January 2025 |archive-url=https://web.archive.org/web/20250130093548/https://www.dw.com/en/germany-three-indicted-on-charges-of-spying-for-china/a-71257247 |url-status=live }}

In April 2025, a Chinese man, Jian Guo, who worked for a prominent German far-right lawmaker Maximilian Krah in the European Parliament has been charged with spying for China for more than four years.{{cite web |title=A former aide to a far-right German EU lawmaker Maximilian Krah is charged with spying for China |website=Associated Press News |date=29 April 2025 |url=https://apnews.com/article/germany-far-right-china-afd-spying-18b6c38a882028e258b1f890f72c5a6c |access-date=23 May 2025 |archive-date=11 May 2025 |archive-url=https://web.archive.org/web/20250511104410/https://apnews.com/article/germany-far-right-china-afd-spying-18b6c38a882028e258b1f890f72c5a6c |url-status=live }}

==Lithuania==

Lithuanian intelligence agencies have claimed that China is engaged in an "increasingly aggressive" campaign of espionage, which includes "attempts to recruit Lithuanian citizens".

{{cite news |newspaper=The South China Morning Post |url=https://www.scmp.com/news/china/diplomacy/article/2185529/china-denies-ridiculous-spying-allegations-lithuania |title=China denies 'ridiculous' spying allegations by Lithuania |date=9 February 2019 |author=Agence France-Presse |access-date=15 February 2019 |archive-url=https://web.archive.org/web/20190217194223/https://www.scmp.com/news/china/diplomacy/article/2185529/china-denies-ridiculous-spying-allegations-lithuania |archive-date=17 February 2019 |url-status=live |author-link=Agence France-Presse }}

Darius Jauniskis, Director of the State Security Department of Lithuania, has cautioned against a potential threat posed by Huawei telecommunications equipment.

==Norway==

Hackers working as part of APT 10, on behalf of the Chinese government, hacked Norwegian business software provider Visma, reportedly to gain access to the information on the company's customers.

{{cite news |url=https://www.reuters.com/article/us-china-cyber-norway-visma/china-hacked-norways-visma-to-steal-client-secrets-investigators-idUSKCN1PV141 |first=Jack |last=Stubbs |editor-first=William |editor-last=Maclean |work=Reuters |title=China hacked Norway's Visma to steal client secrets: investigators |date=6 February 2019 |access-date=15 February 2019 |archive-url=https://web.archive.org/web/20190215215827/https://www.reuters.com/article/us-china-cyber-norway-visma/china-hacked-norways-visma-to-steal-client-secrets-investigators-idUSKCN1PV141 |archive-date=15 February 2019 |url-status=live }}

Beginning on 30 August 2018, APT10 used a malware program dubbed Trochilus and accessed a backdoor, and then proceeded to use WinRAR and cURL to exfiltrate data from Visma to a Dropbox account.

{{cite news |author=Insikt Group |publisher=Recorded Future |title=APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign |date=6 February 2019 |url=https://www.recordedfuture.com/apt10-cyberespionage-campaign/ |access-date=15 February 2019 |archive-url=https://web.archive.org/web/20190215104404/https://www.recordedfuture.com/apt10-cyberespionage-campaign/ |archive-date=15 February 2019 |url-status=usurped }}

==Poland==

On April 19, 2009, Stefan Zielonka, a non-commissioned officer serving as a cipher operator for the Military Information Services and later the {{Ill|Military Intelligence Service (Poland)|lt=Military Intelligence Service|pl|Służba Wywiadu Wojskowego}}, mysteriously disappeared. Following his disappearance, some speculated that Zielonka may have worked for Russian intelligence or defected to China, where his expertise in cryptography and knowledge of NATO communication systems could have provided valuable information.{{cite news |url=http://www.wbj.pl/article-49513-military-coder-confirmed-dead.html |work=Warsaw Business Journal |date=6 May 2010 |access-date=21 August 2012 |title=Military coder confirmed dead? |url-status=dead |archive-url=https://archive.today/20130416120317/http://www.wbj.pl/article-49513-military-coder-confirmed-dead.html |archive-date=16 April 2013 }}

{{cite news |date=22 December 2009 |title=Polish cipher officer worked for Chinese intelligence? |url=http://www.thenews.pl/national/artykul122444_polish-cipher-officer-worked-for-chinese-intelligence-.html |url-status=dead |archive-url=https://web.archive.org/web/20091224165540/http://www.thenews.pl/national/artykul122444_polish-cipher-officer-worked-for-chinese-intelligence-.html |archive-date=24 December 2009 |access-date=24 December 2009 |publisher=Polskie Radio}}

Conversely, others suggested that Zielonka struggled with depression and personal issues, though this was disputed by some. On April 27, 2010, Zielonka's body was found in an advanced state of decomposition on the banks of the Vistula River, with a rope hanging from a nearby tree and documents bearing his name. Some speculated that his death may have been staged. Eventually, DNA testing of four bone fragments confirmed the body was his, and investigators ruled out third-party involvement.{{Cite web |date=2010-06-02 |title=Śledczy pewni: znaleziono ciało szyfranta Zielonki |trans-title=Investigators confident: body of cipher operator Zielonka found |url=https://polskieradio24.pl/artykul/205902,Sledczy-pewni-znaleziono-cialo-szyfranta-Zielonki |url-status=live |archive-url=https://web.archive.org/web/20250213175103/https://polskieradio24.pl/artykul/205902,Sledczy-pewni-znaleziono-cialo-szyfranta-Zielonki |archive-date=2025-02-13 |access-date=2025-02-13 |website=Polskie Radio 24 |language=pl}} However, the case and its investigation remained shrouded in numerous unresolved and puzzling circumstances.{{Cite web |title=Domniemane zwłoki szyfranta należały do dwóch osób? |trans-title=The alleged corpse of the cipher operator belonged to two people? |url=https://wiadomosci.wp.pl/domniemane-zwloki-szyfranta-nalezaly-do-dwoch-osob-6082130219766913a |website=WP Wiadomości |date=13 May 2010 |language=pl}}

In April 2018, a former member of the Parliament of Poland for Samoobrona, Mateusz Piskorski, was charged with espionage on behalf of Russia and China.

{{cite web|url=https://wiadomosci.wp.pl/byly-polityk-samoobrony-z-zarzutami-szpiegostwa-na-rzecz-rosji-i-chin-6237254638246017a|title=Były polityk Samoobrony z zarzutami szpiegostwa na rzecz Rosji i Chin|last=Baran|first=oprac Violetta|date=3 April 2018|website=wiadomosci.wp.pl|language=pl|access-date=31 December 2018|archive-url=https://web.archive.org/web/20190101002920/https://wiadomosci.wp.pl/byly-polityk-samoobrony-z-zarzutami-szpiegostwa-na-rzecz-rosji-i-chin-6237254638246017a|archive-date=1 January 2019|url-status=live}}

{{cite news |publisher=Radio Poland |quote=Mateusz P., who was once an MP for Poland's Samoobrona (Self-Defence) party and headed the Zmiana (Change) grouping, has been charged with working for the Russian and Chinese intelligence services and against Poland's national interests, broadcaster RMF FM reported, citing a bill of indictment that it said prosecutors had submitted against the suspect. |title=Former Polish MP charged with spying for Russia, China: report |date=23 April 2018 |url=http://thenews.pl/1/9/Artykul/360142,Former-Polish-MP-charged-with-spying-for-Russia-China-report |access-date=24 April 2018 |archive-url=https://web.archive.org/web/20180425032052/http://thenews.pl/1/9/Artykul/360142,Former-Polish-MP-charged-with-spying-for-Russia-China-report |archive-date=25 April 2018 |url-status=live }}

In January 2019, the Huawei sales director for Poland, identified as Weijing Wang (a.k.a. "Stanislaw Wang") was arrested, along with a former senior agent of the Agencja Bezpieczeństwa Wewnętrznego (ISA) named Piotr Durbajlo, on suspicion of espionage.

{{cite news |first1=William |last1=Zheng |first2=Josephine |last2=Ma |first3=Keegan |last3=Elmer |date=11 January 2019 |newspaper=The South China Morning Post |title=China voices 'grave concerns' over Poland's arrest of Huawei sales director on spying charges |url=https://www.scmp.com/news/china/politics/article/2181735/china-voices-grave-concerns-over-polands-arrest-huawei-sales |access-date=11 January 2019 |archive-url=https://web.archive.org/web/20190111115334/https://www.scmp.com/news/china/politics/article/2181735/china-voices-grave-concerns-over-polands-arrest-huawei-sales |archive-date=11 January 2019 |url-status=live }}

{{cite news |url=https://www.ft.com/content/8eda2ad8-1589-11e9-a581-4ff78404524e |newspaper=The Financial Times |title=Chinese Huawei employee arrested in Poland on spying allegations |date=11 January 2019 |first1=Monika |last1=Pronczuk |first2=Yuan |last2=Yang |quote=The Chinese executive is a sales director for Huawei in Poland and his full name is Weijing Wang, the person said. Mr Wang also uses the first name Stanislaw. According to his LinkedIn page, Mr Wang worked in the Chinese consulate in Gdansk for more than four years as the assistant to the general consul before working for Huawei. |access-date=11 January 2019 |archive-url=https://web.archive.org/web/20190112150030/https://www.ft.com/content/8eda2ad8-1589-11e9-a581-4ff78404524e |archive-date=12 January 2019 |url-status=live}} Wang was educated at the Beijing Foreign Studies University and studied Polish in Łódź, and subsequently worked as a cultural attaché at the Chinese consulate in Gdańsk.{{cite news |author=JSLegal Jankowski & Stroiński |title=Answers for Reuters Agency |date=24 April 2019 |url=https://www.reuters.com/investigates/special-report/assets/huawei-poland-spying/Wang_answers-for_special_report.pdf |work=Reuters |access-date=10 July 2019 |archive-url=https://web.archive.org/web/20190703025200/https://www.reuters.com/investigates/special-report/assets/huawei-poland-spying/Wang_answers-for_special_report.pdf |archive-date=3 July 2019 |url-status=live }}{{cite news |editor-first=Peter |editor-last=Hirschberg |first1=Joanna |last1=Plucinska |first2=Koh Gui |last2=Qing |first3=Alicja |last3=Ptak |first4=Steve |last4=Stecklow |date=2 July 2019 |work=Reuters |title=How Poland became a front in the cold war between the U.S. and China |url=https://www.reuters.com/investigates/special-report/huawei-poland-spying/ |access-date=10 July 2019 |archive-url=https://web.archive.org/web/20190703095724/https://www.reuters.com/investigates/special-report/huawei-poland-spying/ |archive-date=3 July 2019 |url-status=live }} Wang joined Huawei's Enterprise Business Group in 2017. Durbajlo worked at the Military University of Technology, working on telecommunications security projects. After retiring from the ISA, he began working as a consultant for Orange Polska.

==Russia==

In December 2007, Igor Reshetin, the Chief Executive of Tsniimash-Export, and three researchers were sentenced to prison for passing on dual-purpose technology to the Chinese. Analysts speculated that the leaked technology could help China develop improved missiles and accelerate the Chinese space program.{{cite news |url=https://www.telegraph.co.uk/news/worldnews/1580346/Has-Russia-got-a-new-Stalin.html |work=The Daily Telegraph |title=Has Russia got a new Stalin? |first=Adrian |last=Blomfield |date=1 March 2008 |access-date=25 September 2010 |location=London |archive-url=https://web.archive.org/web/20110206073942/http://www.telegraph.co.uk/news/worldnews/1580346/Has-Russia-got-a-new-Stalin.html |archive-date=6 February 2011 |url-status=live }} In September 2010, the Russian Federal Security Service detained two scientists working at the Baltic State Technical University in Saint Petersburg. The two are charged with passing on classified information to China, possibly through the Harbin Engineering University.{{cite news |url=http://www.themoscowtimes.com/news/article/2-scientists-held-in-murky-spy-case/416794.html |work=The Moscow Times |first=Alexandra |last=Taranova |title=2 Scientists Held in Murky Spy Case |date=22 September 2010 |access-date=25 September 2010 |archive-url=https://web.archive.org/web/20100924042141/http://www.themoscowtimes.com/news/article/2-scientists-held-in-murky-spy-case/416794.html |archive-date=24 September 2010 |url-status=live }}{{cite news |url=http://www.upi.com/Top_News/World-News/2010/09/22/Spies-arrest-overshadowed-by-spy-swap/UPI-93031285164114/ |work=United Press International |date=22 September 2010 |access-date=25 September 2010 |title=Spies' arrest overshadowed by spy swap |archive-url=https://web.archive.org/web/20121021234728/http://www.upi.com/Top_News/World-News/2010/09/22/Spies-arrest-overshadowed-by-spy-swap/UPI-93031285164114/ |archive-date=21 October 2012 |url-status=live }} Russia has been a significant target for China linked hackers.

In February 2020, the FSB detained Dr. Valery Mitko, President of Russia's Arctic Academy of Sciences, on charges of providing classified information related to underwater detection of submarines to Chinese intelligence operatives.{{cite news |first=Joseph |last=Fitsanakis |date=16 June 2020 |title=Russia accuses its top Arctic scientist of giving China submarine secrets |url=https://intelnews.org/2020/06/16/01-2806/ |publisher=intelNews |access-date=18 June 2020 |archive-url=https://web.archive.org/web/20200617163520/https://intelnews.org/2020/06/16/01-2806/ |archive-date=17 June 2020 |url-status=live }}

== Turkey ==

China has engaged in espionage campaigns in order to monitor Uyghurs in Turkey that have involved coercion and sophisticated cyber-espionage measures.{{Cite news|last=Beck|first=John|date=13 February 2020|title=How China spies on Uyghurs in Turkey|work=Coda Story|url=https://www.codastory.com/authoritarian-tech/surveillance/uyghurs-turkey-whatsapp-wechat/|access-date=14 April 2021|archive-date=14 April 2021|archive-url=https://web.archive.org/web/20210414220825/https://www.codastory.com/authoritarian-tech/surveillance/uyghurs-turkey-whatsapp-wechat/|url-status=live}}{{Cite news|last=Kakissis|first=Joanna|date=13 March 2020|title='I Thought It Would Be Safe': Uighurs In Turkey Now Fear China's Long Arm|work=National Public Radio|url=https://www.npr.org/2020/03/13/800118582/i-thought-it-would-be-safe-uighurs-in-turkey-now-fear-china-s-long-arm|access-date=14 April 2021|archive-date=15 April 2021|archive-url=https://web.archive.org/web/20210415073319/https://www.npr.org/2020/03/13/800118582/i-thought-it-would-be-safe-uighurs-in-turkey-now-fear-china-s-long-arm|url-status=live}}{{Cite news|last=Kharpal|first=Arjun|date=25 March 2021|title=Facebook says it blocked hackers in China who were trying to spy on Uyghur Muslims abroad|work=CNBC|url=https://www.cnbc.com/2021/03/25/facebook-says-chinese-hackers-tried-spy-on-uyghur-muslims-abroad.html|access-date=14 April 2021|archive-date=14 April 2021|archive-url=https://web.archive.org/web/20210414220825/https://www.cnbc.com/2021/03/25/facebook-says-chinese-hackers-tried-spy-on-uyghur-muslims-abroad.html|url-status=live}}{{Cite news|date=24 March 2021|title=Facebook finds Chinese hacking operation targeting Uyghurs|work=ABC News|agency=Associated Press|url=https://abcnews.go.com/Business/wireStory/facebook-finds-chinese-hacking-operation-targeting-uyghurs-76659661|access-date=14 April 2021|archive-date=14 April 2021|archive-url=https://web.archive.org/web/20210414220825/https://abcnews.go.com/Business/wireStory/facebook-finds-chinese-hacking-operation-targeting-uyghurs-76659661|url-status=live}} In February 2024, Turkey arrested six individuals suspected of spying on Uyghurs in the country on behalf of China's intelligence service.{{Cite news |date=February 20, 2024 |title=Turkey detains six suspected of spying on Uyghurs for China |url=https://www.reuters.com/world/turkey-detains-six-suspected-spying-uyghurs-china-2024-02-20/ |access-date=May 23, 2025 |work=Reuters |archive-date=21 February 2024 |archive-url=https://archive.today/20240221002628/https://www.reuters.com/world/turkey-detains-six-suspected-spying-uyghurs-china-2024-02-20/ |url-status=live }} In May 2025, the Turkish National Intelligence Organization (MIT) reportedly dismantled a Chinese cyber-espionage cell in Istanbul, accused of using ghost base stations to collect communication data and user information and conduct surveillance of Turkish public officials and Uyghur Turks.{{Cite web |title=Chinese spy network busted in Istanbul in major Turkish intel operation |url=https://www.turkiyetoday.com/nation/chinese-spy-network-busted-in-istanbul-in-major-turkish-intel-operation-3201723 |access-date=2025-05-24 |website=Türkiye Today |language=en}}

==Switzerland==

According to reports in Neue Zürcher Zeitung, Chinese intelligence services have attempted to recruit Swiss university staff and researchers using LinkedIn.{{Cite news |url=https://www.swissinfo.ch/eng/cyber-espionage_chinese-intelligence-using-fake-online-profiles-to-poach-swiss-knowledge/43804458 |website=Swissinfo |quote=The article claims that profiles with anodyne names such as Lily Hu or Rachel Li contact university staff or researchers in Switzerland and Europe, then encourage them to transfer know-how to China. |title=Chinese intelligence using fake online profiles to poach Swiss knowledge |date=7 January 2018 |access-date=9 January 2018 |archive-url=https://web.archive.org/web/20180109051137/https://www.swissinfo.ch/eng/cyber-espionage_chinese-intelligence-using-fake-online-profiles-to-poach-swiss-knowledge/43804458 |archive-date=9 January 2018 |url-status=live }}{{cite news |title=So spioniert der chinesische Geheimdienst in der Schweiz |url=https://nzzas.nzz.ch/schweiz/wie-der-chinesische-geheimdienst-in-der-schweiz-spioniert-ld.1345075?reduced=true |language=de |newspaper=Neue Zürcher Zeitung |first=Lukas |last=Häuptli |date=1 January 2018 |access-date=9 January 2018 |quote=Geheimdienste werben Informanten im Internet an: Der Bund warnt vor einschlägigen Kontakten auf Linkedin. |archive-url=https://web.archive.org/web/20180109181018/https://nzzas.nzz.ch/schweiz/wie-der-chinesische-geheimdienst-in-der-schweiz-spioniert-ld.1345075?reduced=true |archive-date=9 January 2018 |url-status=live }}

==Sweden==

Babur Maihesuti, a Uyghur who became a Swedish citizen was arrested for spying on the Uyghur refugee communities in Sweden, Norway, Germany and the United States, and ultimately sentenced for illegal espionage activity.

{{Cite news |url=http://www.thelocal.se/19912/20090606/ |title=The Local, Refugee spy remanded into custody, 6 June 2009 |publisher=Thelocal.se |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20090819022958/http://www.thelocal.se/19912/20090606/ |archive-date=19 August 2009 |url-status=live |date=6 June 2009 }}

{{cite news |title=Swedish citizen charged with spying for China |publisher=Agence France-Presse via The Swedish Wire |date=16 December 2009 |access-date=24 December 2009 |url=http://www.swedishwire.com/component/content/article/1:business/2087:man-in-sweden-charged-with-spying-for-china |archive-url=https://web.archive.org/web/20110716172418/http://www.swedishwire.com/component/content/article/1:business/2087:man-in-sweden-charged-with-spying-for-china |archive-date=16 July 2011 |url-status=dead }}

{{cite news |url=http://www.unhcr.org/refworld/type,COUNTRYNEWS,,SWE,4bab813422,0.html |publisher=United Nations Human Rights Council |date=9 March 2010 |access-date=25 September 2010 |title=Sweden: Uyghur sentenced for spying |archive-url=https://web.archive.org/web/20121015153434/http://www.unhcr.org/refworld/type,COUNTRYNEWS,,SWE,4bab813422,0.html |archive-date=15 October 2012 |url-status=live }}

In April 2018, Sweden charged Dorjee Gyantsan, a 49-year-old Tibetan refugee, with spying on Tibetan dissidents and refugees in Sweden between July 2015 and February 2017. Gyantsan is accused of collecting information on Tibetan refugees in Sweden, and then passing that information on to Chinese officials in Finland and Poland.{{cite news |url=https://www.nytimes.com/2018/04/12/world/europe/sweden-china-spy.html |newspaper=The New York Times |title=Sweden Accuses Man of Spying on Tibetan Refugees for China |first=Christina |last=Anderson |archive-url=https://web.archive.org/web/20180412214302/https://www.nytimes.com/2018/04/12/world/europe/sweden-china-spy.html |archive-date=12 April 2018 |date=12 April 2018}} Gyantsan was arrested upon returning from Warsaw, carrying $6,000 in cash.

{{cite news |quote=The indictment accuses Mr Gyantsan of having spied on Tibetan community members in Sweden for 'cash benefits' and says he met 'a representative of the Chinese state repeatedly in Poland, in connection with this activity'. The espionage allegedly took place in 2015–2017. When he was arrested, on returning from Warsaw, he was found to be carrying $6,000 (£4,200) in cash. |work=BBC News |title=Tibet group thanks Sweden in 'Chinese spy' case |url=https://www.bbc.com/news/world-europe-43753527 |date=13 April 2018 |access-date=20 June 2018 |archive-url=https://web.archive.org/web/20180630210247/https://www.bbc.com/news/world-europe-43753527 |archive-date=30 June 2018 |url-status=live }}

{{cite news |website=The Local |url=https://www.thelocal.se/20180411/man-charged-in-sweden-for-spying-on-tibetans-for-china |quote=Swedish prosecutor Mats Ljungqvist told Swedish broadcaster SVT that he man had been in contact with Chinese officials in Poland and Finland, and was paid 50,000 kronor ($6,000) on at least one occasion. |title=Man charged in Sweden for spying on Tibetans for China |date=11 April 2018 |access-date=13 April 2018 |archive-url=https://web.archive.org/web/20180414010852/https://www.thelocal.se/20180411/man-charged-in-sweden-for-spying-on-tibetans-for-china |archive-date=14 April 2018 |url-status=live }}

==United Kingdom==

UK officials, including experts at its MI5 intelligence agency, are fearful that China could shut down businesses in the nation with Chinese cyberattacks and spy equipment embedded in computer and telecommunications equipment.[https://www.thetimes.com/sunday-times-100-tech/hardware-profile/article/spy-chiefs-fear-chinese-cyber-attack-3z9vqhslsnt "Spy chiefs fear Chinese cyber attack"] {{Webarchive|url=https://web.archive.org/web/20250419152731/https://www.thetimes.com/sunday-times-100-tech/hardware-profile/article/spy-chiefs-fear-chinese-cyber-attack-3z9vqhslsnt |date=19 April 2025 }} , The Times, 29 March 2009[https://www.thetimes.com/world/us-world/article/mi5-alert-on-chinas-cyberspace-spy-threat-tbxdgkv5l9v "MI5 alert on china's cyberspace spy threat"] {{Webarchive|url=https://web.archive.org/web/20250419152214/https://www.thetimes.com/world/us-world/article/mi5-alert-on-chinas-cyberspace-spy-threat-tbxdgkv5l9v |date=19 April 2025 }} , The Times, 1 December 2007 MI5 has reportedly monitored Chinese espionage against Rio Tinto Group computers.{{cite news |publisher=Bloomberg News |url=https://www.bloomberg.com/news/features/2018-07-13/did-china-hack-rio-tinto-to-gain-a-billion-dollar-advantage |title=When Rio Tinto Met China's Iron Hand |date=13 July 2018 |archive-url=https://web.archive.org/web/20180716043759/https://www.bloomberg.com/news/features/2018-07-13/did-china-hack-rio-tinto-to-gain-a-billion-dollar-advantage |archive-date=16 July 2018 |first1=Kit |last1=Chellel |first2=Franz |last2=Wild |first3=David |last3=Stringer}}

According to Robert Hannigan, former Director of the Government Communications Headquarters, Chinese hackers have engaged in economic espionage against British universities and engineering companies, on behalf of the Chinese government.{{cite news |work=BBC News |title=Looking for China's spies |first=Gordon |last=Corera |url=https://www.bbc.co.uk/news/resources/idt-sh/Looking_for_Chinas_spies |date=19 December 2018 |editor-first=Finlo |editor-last=Rohrer |archive-url=https://web.archive.org/web/20181220211132/https://www.bbc.co.uk/news/resources/idt-sh/Looking_for_Chinas_spies |archive-date=20 December 2018}}{{cite news |last1=Fisher |first1=Lucy | title= Chinese students face ban amid security fears |url= https://www.thetimes.com/uk/politics/article/chinese-students-face-ban-amid-security-fears-nmp7plwch |access-date=4 October 2020|website= The Times |url-status=live |archive-url= https://web.archive.org/web/20201005044501/https://www.thetimes.co.uk/article/chinese-students-face-ban-amid-security-fears-nmp7plwch | archive-date=5 October 2020}}

In September 2023, British media reported that a British diplomat at the British embassy in Beijing discovered a listening device in the teapot that the Chinese officials gave to the diplomat as a farewell gift. After returning to Britain, the diplomat found the hidden bug inside the teapot when it was accidentally dropped and smashed on the floor.{{Cite web |date=2023-09-19 |title=Trouble brews after embassy worker finds spy bug in China teapot |url=https://www.thetimes.com/world/asia/article/china-spy-teapot-civil-servant-vhcpmvbhz |access-date=2024-02-19 |website=The Times |archive-date=1 September 2024 |archive-url=https://web.archive.org/web/20240901220020/https://www.thetimes.com/article/china-spy-teapot-civil-servant-vhcpmvbhz |url-status=live }}

In 2023 it has been revealed that an individual known as "H6" or Yang Tengbo, alleged to be a Chinese spy, has been at the center of a controversy involving the UK government and the royal family.{{Cite news |last1=Wallis |first1=William |last2=Rathbone |first2=John Paul |date=2024-12-12 |title=Alleged Chinese spy linked to Prince Andrew excluded from the UK |url=https://www.ft.com/content/c05642ae-5756-49e8-9eb4-c50d95e4eec0 |url-access=subscription |url-status=live |archive-url=https://archive.today/20241212224917/https://www.ft.com/content/c05642ae-5756-49e8-9eb4-c50d95e4eec0 |archive-date=2024-12-12 |access-date=2024-12-16 |work=Financial Times}}{{Cite news |last1=Brown |first1=David |last2=Mansey |first2=Kate |date=2024-12-13 |title=Prince Andrew 'ceases all contact' with Chinese spy suspect |url=https://www.thetimes.com/uk/law/article/prince-andrew-alleged-chinese-spy-banned-britain-rw8320qfh |url-status=live |archive-url=https://web.archive.org/web/20241212195053/https://www.thetimes.com/uk/law/article/prince-andrew-alleged-chinese-spy-banned-britain-rw8320qfh |archive-date=2024-12-12 |access-date=2024-12-14 |website=The Times |language=en}}{{Cite news |date=December 13, 2024 |title=Alleged Chinese spy tied to Prince Andrew is businessman Yang Tengbo |url=https://www.rfa.org/english/china/2024/12/13/chinese-spy-uk-prince-andrew-yang-tengbo/ |access-date=December 14, 2024 |work=Radio Free Asia}} H6 had connections with the Duke of York, Prince Andrew, and was invited to his birthday celebration in 2020. A royal aide, Dominic Hampshire, had given H6 permission to act on the duke's behalf when dealing with potential investors in China. The Home Office, under then-Home Secretary, Suella Braverman, barred H6 from entering the UK in 2023 due to alleged engagement in "covert and deceptive activity" on behalf of the CCP. A specialized tribunal in London upheld this decision, ruling that Braverman was justified in deeming H6 a risk to national security. A judge ruled the Chinese spy allegedly had an unusual degree of trust from the royal. Housing Minister, Jim McMahon, stated that revealing H6's identity is a matter for the courts, despite growing demand among MPs for more details. Former Conservative leader, Iain Duncan Smith, plans to pose an Urgent Question in parliament regarding the United Front Work Department, which is reportedly linked to H6. Sir Iain Duncan Smith has also warned there are many more like H6 in the UK. The Chinese embassy in London has denied the allegations, accusing some UK individuals of fabricating "spy" narratives to discredit China. Prince Andrew has ceased all contact with H6 following government concerns, while there are warnings of potential additional espionage activities in the UK. Home Secretary, Yvette Cooper, emphasized the need to balance economic collaboration with China while addressing national security threats. Prime Minister of the United Kingdom, Keir Starmer, has raised his concerns of the challenge China poses.{{Cite web |date=2024-12-16 |title=Sir Keir Starmer defends China policy after spy scandal |url=https://uk.news.yahoo.com/identifying-chinese-spy-alleged-links-073500309.html |access-date=2024-12-16 |website=Yahoo News |language=en-GB}}

In addition to concerns about espionage, MI5 is also worried about China covertly gaining influence. In January 2022, BBC reported that MI5 issued a rare warning to UK Parliament Members (MPs), alleging that a Chinese agent, Christine Ching Kui Lee, had infiltrated the Parliament to interfere in UK politics on behalf of the Chinese government. According to the warning, Lee "established links" with current and aspiring MPs on behalf of the CCP and provided donations to politicians, funded by foreign nationals in China and Hong Kong.{{Cite news |last1=Corera |first1=Gordon |last2=Scott |first2=Jennifer |date=January 13, 2022 |title=MI5 warning over 'Chinese agent' in Parliament |url=https://www.bbc.com/news/uk-politics-59984380 |access-date=December 18, 2024 |work=BBC |archive-date=17 December 2024 |archive-url=https://web.archive.org/web/20241217132829/https://www.bbc.com/news/uk-politics-59984380 |url-status=live }}{{Cite news |last=Haynes |first=Deborah |date=January 13, 2022 |title=Christine Lee: MPs alerted about suspected Chinese agent - but UK authorities have limited tools to combat alleged attacks |url=https://news.sky.com/story/christine-lee-mps-alerted-about-suspected-chinese-agent-but-uk-authorities-have-limited-tools-to-combat-alleged-attacks-12515195 |access-date=December 18, 2024 |work=Sky News |archive-date=2 December 2024 |archive-url=https://web.archive.org/web/20241202155525/https://news.sky.com/story/christine-lee-mps-alerted-about-suspected-chinese-agent-but-uk-authorities-have-limited-tools-to-combat-alleged-attacks-12515195 |url-status=live }} In December 2024, Christine Lee lost a legal challenge against MI5. She claimed that the security alert issued against her was politically motivated and violated her human rights.{{Cite news |last=Tobin |first=Sam |date=July 11, 2023 |title=Woman sues Britain's MI5 for calling her a Chinese agent |url=https://www.reuters.com/world/uk/woman-sues-britains-mi5-calling-her-chinese-agent-2023-07-11/ |access-date=December 18, 2024 |work=Reuters |archive-date=12 July 2023 |archive-url=https://web.archive.org/web/20230712123821/https://www.reuters.com/world/uk/woman-sues-britains-mi5-calling-her-chinese-agent-2023-07-11/ |url-status=live }} However, the Investigatory Powers Tribunal unanimously rejected her case, with all three judges affirming that MI5 had acted for "legitimate reasons."{{Cite news |last=Hui |first=Sylvia |date=December 17, 2024 |title=Lawyer accused of being Chinese spy loses legal case against UK intelligence agency |url=https://apnews.com/article/uk-china-spy-lee-legal-challenge-51af36ef39f635348168a910536c9e27 |access-date=December 18, 2024 |work=Associated Press |archive-date=18 December 2024 |archive-url=https://web.archive.org/web/20241218043653/https://apnews.com/article/uk-china-spy-lee-legal-challenge-51af36ef39f635348168a910536c9e27 |url-status=live }}{{Cite news |last=Sheridan |first=Danielle |date=December 17, 2024 |title=Alleged Chinese spy Christine Lee loses legal battle with MI5 |url=https://www.telegraph.co.uk/news/2024/12/17/alleged-chinese-spy-christine-lee-loses-legal-fight-mi5/ |access-date=December 18, 2024 |work=The Telegraph |archive-date=18 December 2024 |archive-url=https://web.archive.org/web/20241218074422/https://www.telegraph.co.uk/news/2024/12/17/alleged-chinese-spy-christine-lee-loses-legal-fight-mi5/ |url-status=live }}

==Vatican City==

According to an investigation by Recorded Future, Chinese hackers broke into the computer networks of the Vatican and the Holy See's Study Mission to China, including by placing malware in what appeared to be a letter from Cardinal Secretary of State Pietro Parolin.{{cite news |url=https://www.nytimes.com/2020/07/28/us/politics/china-vatican-hack.html |title=The Vatican Is Said to Be Hacked From China Before Talks With Beijing |newspaper=The New York Times |date=28 July 2020 |first1=David E. |last1=Sanger |first2=Edward |last2=Wong |first3=Jason |last3=Horowitz |access-date=7 August 2020 |archive-date=6 August 2020 |archive-url=https://web.archive.org/web/20200806151257/https://www.nytimes.com/2020/07/28/us/politics/china-vatican-hack.html |url-status=live }} In the weeks after the investigation was published the hackers continued to operate on Vatican networks,{{Cite news |last1=Vavra |first1=Shannon |title=Public disclosure didn't stop suspected Chinese hackers from targeting the Vatican |url=https://www.cyberscoop.com/chinese-hacking-vatican-recorded-future/ |website=www.cyberscoop.com |date=15 September 2020 |publisher=Cyberscoop |access-date=11 October 2020 |archive-date=14 October 2020 |archive-url=https://web.archive.org/web/20201014144754/https://www.cyberscoop.com/chinese-hacking-vatican-recorded-future/ |url-status=live }} by November 2020 the group targeting the Vatican had changed their tactics to avoid detection but were discovered by researchers from the firm Proofpoint.{{Cite news |last1=Vavra |first1=Shannon |title=Suspected Chinese hackers impersonate Catholic news outlets to gather intel about Vatican diplomacy |url=https://www.cyberscoop.com/chinese-hacking-catholic-church-vatican/ |website=www.cyberscoop.com |date=23 November 2020 |publisher=Cyberscoop |access-date=25 November 2020 |archive-date=24 November 2020 |archive-url=https://web.archive.org/web/20201124205157/https://www.cyberscoop.com/chinese-hacking-catholic-church-vatican/ |url-status=live }}

=North America=

==Canada==

{{Further|Chinese government interference in Canada}}

Newspapers have estimated that China may have up to 1,000 spies in Canada.{{Cite news |url=http://www.canada.com/montrealgazette/news/story.html?id=ca90416e-fe77-4b8d-ae59-a4e9f55b6441&k=26688 |title=Canwest News Service, Government vows to curb Chinese spying on Canada, 16 April 2006 |publisher=Canada.com |date=16 April 2006 |access-date=25 August 2014 |url-status=dead |archive-url=https://web.archive.org/web/20141004005118/http://www.canada.com/montrealgazette/news/story.html?id=ca90416e-fe77-4b8d-ae59-a4e9f55b6441&k=26688 |archive-date=4 October 2014 }}{{Cite news |title=Defectors say China running 1,000 spies in Canada |url=https://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085 |url-status=live |archive-url=https://web.archive.org/web/20070105144118/http://www.cbc.ca/canada/story/2005/06/15/spies050615.html |archive-date=5 January 2007 |access-date=1 December 2009}} [https://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085] {{Webarchive|url=https://web.archive.org/web/20230319231956/http://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085|date=19 March 2023}} The head of the Canadian Security Intelligence Service Richard Fadden in a television interview was assumed to have implied that various Canadian politicians at provincial and municipal levels had ties to Chinese intelligence. In an interview, he claimed that some politicians were under the influence of a foreign government, but he withdrew the statement a few days later. It was assumed by Chinese groups in Canada, and others, that he was referring to China because in the same interview he stressed the high level of Chinese spying in Canada, however Fadden did not say specifically which country these politicians were under the influence of. His statement was withdrawn a few days later.{{cite news |title=Claims of divided loyalty anger Canadians |url=https://www.smh.com.au/world/claims-of-divided-loyalty-anger-canadians-20100627-zc38.html |date=28 June 2010 |access-date=27 June 2010 |work=Sydney Morning Herald |archive-url=https://web.archive.org/web/20121106104932/http://www.smh.com.au/world/claims-of-divided-loyalty-anger-canadians-20100627-zc38.html |archive-date=6 November 2012 |url-status=live }}

In 2005, Canadian businessman Joe Wang stated his belief that threatening letters he received after broadcasting programs about alleged human rights abuses in China were from the Chinese consulate; one of the envelopes contained boric acid.{{Cite news|url=http://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085|title=Defectors say China running 1,000 spies in Canada|publisher=CBC News|date=15 June 2005|access-date=2 April 2017|url-status=bot: unknown|archive-url=https://web.archive.org/web/20160124023146/http://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085|archive-date=24 January 2016}}

In 2012 Mark Bourrie, an Ottawa-based freelance journalist, stated that the State Council-run Xinhua News Agency asked him to collect information on the Dalai Lama through their Ottawa bureau chief, Dacheng Zhang, by exploiting his journalistic access to the Parliament of Canada.{{cite news |url=https://www.cbc.ca/news/politics/reporter-says-chinese-news-agency-asked-him-to-spy-1.1223135 |title=Reporter says Chinese news agency asked him to spy |date=22 August 2012 |access-date=22 August 2012 |publisher=Canadian Broadcasting Corporation |author=The Canadian Press |author-link=The Canadian Press |archive-url=https://web.archive.org/web/20120823081937/http://www.cbc.ca/news/politics/story/2012/08/22/pol-cp-xinhua-spy-bourrie-allegation.html |archive-date=23 August 2012 |url-status=live }} Bourrie stated that he was asked to write for Xinhua in 2009 and sought advice from the Canadian Security Intelligence Service (CSIS), but was ignored. Bourrie was asked to collect information on the Sixth World Parliamentarians' Convention on Tibet at the Ottawa Convention Centre, although Xinhua had no intention of writing a story on the proceedings. Bourrie stated that at that point "We were there under false pretenses, pretending to be journalists but acting as government agents."

{{cite news |url=http://news.nationalpost.com/2012/08/22/bureau-chief-dismisses-spying-accusations-against-chinese-news-agency-as-cold-war-ideology/ |title=Ottawa bureau chief dismisses spying accusations against Chinese news agency as 'Cold War' ideology |first=Mike |last=Blanchfield |work=National Post |date=22 August 2012 |access-date=22 August 2012 |archive-url=https://archive.today/20130129163636/http://news.nationalpost.com/2012/08/22/bureau-chief-dismisses-spying-accusations-against-chinese-news-agency-as-cold-war-ideology/ |archive-date=29 January 2013 |url-status=live }}

Xinhua collects extensive information on Tibetan and Falun Gong dissidents in Canada, and is accused of being engaged in espionage by Chinese defector Chen Yonglin and Reporters Without Borders.{{Citation needed|date=April 2021}}

On 1 December 2013, Lloyd's Register employee Qing Quentin Huang was arrested and charged with violating the Security of Information Act, for allegedly communicating classified information on the federal shipbuilding strategy to China.{{cite news |url=http://www.timescolonist.com/accused-in-naval-spy-case-presses-for-info-on-csis-wiretaps-of-chinese-embassy-1.16576867 |title=Accused in naval spy case presses for info on CSIS wiretaps of Chinese Embassy |first=Jim |last=Bronskill |date=23 April 2017 |archive-url=https://web.archive.org/web/20170514140358/http://www.timescolonist.com/accused-in-naval-spy-case-presses-for-info-on-csis-wiretaps-of-chinese-embassy-1.16576867 |archive-date=14 May 2017 |quote=A naval engineer accused of trying to spy for Beijing is asking a federal judge for full access to information about Canadian Security Intelligence Service wiretaps of the Chinese Embassy. [...] Huang, 53 at the time, worked for Lloyd's Register, a subcontractor to Irving Shipbuilding Inc. He was charged under the Security of Information Act with attempting to communicate secret information to a foreign power. Police said the information related to elements of the federal shipbuilding strategy, which includes patrol ships, frigates, naval auxiliary vessels, science research vessels and icebreakers. |newspaper=Times Colonist}}

{{cite news |title=Ontario's Qing Quentin Huang, accused of spying for China, was 'against capitalism,' former employer says |url=http://news.nationalpost.com/news/canada/ontarios-qing-quentin-huang-accused-of-spying-for-china-was-against-capitalism-former-employer-says |first=Stewart |last=Bell |date=25 January 2014 |access-date=14 May 2017 |newspaper=National Post |archive-url=http://webarchive.loc.gov/all/20170116213423/http://news.nationalpost.com/news/canada/ontarios-qing-quentin-huang-accused-of-spying-for-china-was-against-capitalism-former-employer-says |archive-date=16 January 2017 |url-status=live }}

Huang reportedly contacted the Chinese Embassy in Ottawa in an attempt to pass on secrets, which was detected by the Canadian Security Intelligence Service, who in turn alerted the Royal Canadian Mounted Police.

Between 2006 and 2010 Yang Wang, a Chinese immigrant to Canada, admitted to providing intelligence to the Ministry of State Security, including on the activities of Falun Gong.

{{cite news |url=https://www.thestar.com/news/immigration/2018/05/17/man-accused-of-spying-for-china-can-remain-in-canada-immigration-board-rules.html |date=17 May 2018 |newspaper=The Toronto Star |title=Man accused of spying for China can remain in Canada, immigration board rules |first=Nicholas |last=Keung |access-date=24 May 2018 |archive-url=https://web.archive.org/web/20180524222137/https://www.thestar.com/news/immigration/2018/05/17/man-accused-of-spying-for-china-can-remain-in-canada-immigration-board-rules.html |archive-date=24 May 2018 |url-status=live }}

Around June 2014, the National Research Council was reportedly penetrated by Chinese state-sponsored hackers.

{{cite magazine |magazine=Wired |title=How the US Forced China to Quit Stealing—Using a Chinese Spy |url=https://www.wired.com/story/us-china-cybertheft-su-bin/ |first=Garrett M. |last=Graff |date=11 October 2018 |access-date=17 October 2018 |archive-url=https://web.archive.org/web/20181018003134/https://www.wired.com/story/us-china-cybertheft-su-bin/ |archive-date=18 October 2018 |url-status=live }}

In 2022, Yuesheng Wang, a researcher at Hydro-Québec, was arrested and charged with violating the Security of Information Act, for allegedly obtaining trade secrets and filing patents in connection with Chinese universities and publishing papers without the permission of Hydro-Québec. He is also charged with fraud for obtaining trade secrets, unauthorized use of a computer and breach of trust by a public officer. His crimes were allegedly committed between February 2018 and October 2022.{{Cite news |last=Lapierre |first=Matthew |date=14 November 2022 |title=Hydro-Québec employee charged with spying for China |url=https://www.cbc.ca/news/canada/montreal/hydro-quebec-china-spy-1.6650832 |access-date=14 November 2022 |website=CBC |archive-date=14 November 2022 |archive-url=https://web.archive.org/web/20221114180600/https://www.cbc.ca/news/canada/montreal/hydro-quebec-china-spy-1.6650832 |url-status=live }}

== Cuba ==

China has built listening stations in Bejucal and elsewhere on the island that can be used monitor U.S. communications.{{Cite news |date=June 9, 2023 |title=America and China try to move past a new bump in relations |url=https://www.economist.com/china/2023/06/09/america-and-china-try-to-move-past-a-new-bump-in-relations |url-access=subscription |url-status=live |archive-url=https://web.archive.org/web/20240607132212/https://www.economist.com/china/2023/06/09/america-and-china-try-to-move-past-a-new-bump-in-relations |archive-date=2024-06-07 |access-date=2023-06-16 |newspaper=The Economist |issn=0013-0613}}{{Cite news |last=Gámez Torres |first=Nora |date=June 8, 2023 |title=In bold move challenging the United States, Cuba agrees to host a Chinese spy base |url=https://www.miamiherald.com/news/nation-world/world/americas/cuba/article276215936.html |url-status=live |archive-url=https://web.archive.org/web/20230608164606/https://www.miamiherald.com/news/nation-world/world/americas/cuba/article276215936.html |archive-date=June 8, 2023 |access-date=June 16, 2023 |work=Miami Herald}}{{Cite web |last= |first= |date=July 1, 2024 |title=Secret Signals: Decoding China's Intelligence Activities in Cuba |url=https://features.csis.org/hiddenreach/china-cuba-spy-sigint |url-status=live |archive-url=https://web.archive.org/web/20240702051639/https://features.csis.org/hiddenreach/china-cuba-spy-sigint/ |archive-date=2024-07-02 |access-date=2024-07-02 |website=Center for Strategic and International Studies |language=en}}{{Cite journal |last1=Funaiole |first1=Matthew P. |last2=Powers-Riggs |first2=Aidan |last3=Hart |first3=Brian |last4=Ziemer |first4=Henry |last5=Jr |first5=Joseph S. Bermudez |last6=Berg |first6=Ryan C. |last7=Hernandez-Roy |first7=Christopher |date=2024-12-06 |title=China's Intelligence Footprint in Cuba: New Evidence and Implications for U.S. Security |url=https://www.csis.org/analysis/chinas-intelligence-footprint-cuba-new-evidence-and-implications-us-security |journal=Center for Strategic & International Studies |language=en}}

==United States==

{{Main|Chinese espionage in the United States|List of Chinese spy cases in the United States}}

{{See also|1996 United States campaign finance controversy}}

{{Quote frame

|quote = I think it's more than likely we're going to end up, if we end up in a war – a real shooting war with a major power – it's going to be as a consequence of a cyber breach of great consequence and it's increasing exponentially, the capabilities.

|author = President Biden

|source = at the Office of the Director of National Intelligence on 27 July 2021, in front of the U.S. intelligence community{{cite news |last=Bose |first=Nandita |date=28 July 2021 |title=Biden: If U.S. has 'real shooting war' it could be result of cyber attacks |url=https://www.reuters.com/world/biden-warns-cyber-attacks-could-lead-a-real-shooting-war-2021-07-27/ |work=Reuters |access-date=8 September 2021 |archive-date=8 September 2021 |archive-url=https://web.archive.org/web/20210908131551/https://www.reuters.com/world/biden-warns-cyber-attacks-could-lead-a-real-shooting-war-2021-07-27/ |url-status=live }}

|width = 50%

|align = center

}}

File:Delta IV Heavy in 2018.jpg in 2018]]

File:F-15 vertical deploy.jpg in 2004]]

China is suspected of having a long history of espionage in the United States against military and industrial secrets, often resorting to the exploitation of commercial entities and a network of scientific, academic, and business contacts. Several U.S. citizens have been convicted for spying for China. Naturalized citizen Dongfan Chung, an engineer working with Boeing, was the first person convicted under the Economic Espionage Act of 1996. Chung is suspected of having passed on classified information on designs including the Delta IV rocket, F-15 Eagle, B-52 Stratofortress and the CH-46 and CH-47 helicopters.

{{cite news |title=Ex-Boeing engineer gets 15 years in U.S. spy case |first=Dan |last=Whitcomb |work=Reuters |date=8 February 2010 |access-date=13 February 2010 |url=https://www.reuters.com/article/idUSN0821290920100208 |archive-url=https://web.archive.org/web/20100212070059/http://www.reuters.com/article/idUSN0821290920100208 |archive-date=12 February 2010 |url-status=live }}

The U.S. Department of Justice investigation into the fund-raising activities had uncovered evidence that Chinese agents sought to direct contributions from foreign sources to the Democratic National Committee (DNC) before the 1996 presidential campaign. The Chinese embassy in Washington, D.C. was used to coordinate contributions to the DNC.Woodward, Bob and Duffy, Brian, [https://www.washingtonpost.com/wp-srv/politics/special/campfin/stories/china1.htm "Chinese Embassy Role In Contributions Probed"] {{Webarchive|url=https://web.archive.org/web/20180818052223/http://www.washingtonpost.com/wp-srv/politics/special/campfin/stories/china1.htm |date=18 August 2018 }} , The Washington Post, 13 February 1997{{cite news |title=Findings Link Clinton Allies to Chinese Intelligence |url=https://www.washingtonpost.com/gdpr-consent/?destination=%2farchive%2fpolitics%2f1998%2f02%2f10%2ffindings-link-clinton-allies-to-chinese-intelligence%2f87265d5d-7452-41f2-ad2f-aa4abe7e579e%2f%3f |newspaper=The Washington Post |date=11 February 1998 |access-date=10 July 2018 |archive-url=https://web.archive.org/web/20190610181827/https://www.washingtonpost.com/gdpr-consent/?destination=%2farchive%2fpolitics%2f1998%2f02%2f10%2ffindings-link-clinton-allies-to-chinese-intelligence%2f87265d5d-7452-41f2-ad2f-aa4abe7e579e%2f%3f |archive-date=10 June 2019 |url-status=live }}

Taiwanese-American scientist Wen Ho Lee (born in Nantou, Taiwan 21 December 1939) was accused and investigated on the grounds of espionage in 1999 but was acquitted of all charges except for mishandling classified data.{{cite web|url=http://www.fas.org/irp/ops/ci/docs/lee_indict.html|archive-url=https://web.archive.org/web/20161009075445/http://www.fas.org/irp/ops/ci/docs/lee_indict.html|url-status=dead|archive-date=9 October 2016|title=Indictment of Wen Ho Lee|date=9 October 2016}}

In November 2005 the United States arrested four people in Los Angeles on suspicion of being involved in a Chinese spy ring.{{cite news|url=http://www.washingtontimes.com/news/2005/nov/4/20051104-111851-2539r|title=Four arrests linked to Chinese spy ring|newspaper=The Washington Times|date=4 November 2005|access-date=2 April 2017|url-status=bot: unknown|archive-url=https://web.archive.org/web/20170220090000/http://www.washingtontimes.com/news/2005/nov/4/20051104-111851-2539r|archive-date=20 February 2017}}

In 2008 the Chinese government was accused of secretly copying information from the laptop of Commerce Secretary Carlos Gutierrez during a trade mission to Beijing to gain information on American corporations.{{cite news |url=http://www.zdnet.com/blog/government/did-chinese-copy-unattended-u-s-laptop/3846 |title=Did Chinese copy unattended U.S. laptop? |work=ZDNet |date=30 May 2008 |access-date=22 August 2012 |first=Richard |last=Koman |archive-date=24 August 2020 |archive-url=https://web.archive.org/web/20200824001358/https://www.zdnet.com/article/did-chinese-copy-unattended-u-s-laptop/ |url-status=dead }}

{{cite news |url=https://www.telegraph.co.uk/news/worldnews/asia/china/2054874/Chinese-spies-stole-data-from-US-trade-secretarys-laptop.html |title=Chinese spies stole US trade secretary data |date=30 May 2008 |access-date=22 August 2012 |work=The Daily Telegraph |first=Tom |last=Leonard |location=London |archive-url=https://web.archive.org/web/20160112120747/http://www.telegraph.co.uk/news/worldnews/asia/china/2054874/Chinese-spies-stole-data-from-US-trade-secretarys-laptop.html |archive-date=12 January 2016 |url-status=live }}

The allegations were subsequently dismissed by Qin Gang, a spokesman for the Ministry of Foreign Affairs of the People's Republic of China.

{{cite news |url=https://abcnews.go.com/Technology/story?id=5014529&page=1#.UDXCedZlSSo |author=USA Today |title=China denies hacking U.S. government computer |access-date=22 August 2012 |work=ABC News |archive-url=https://web.archive.org/web/20130203220017/https://abcnews.go.com/Technology/story?id=5014529&page=1#.UDXCedZlSSo |archive-date=3 February 2013 |url-status=live |author-link=USA Today }}

In 2009 China was suspected of stealing terabytes of design data for the F-35 Joint Strike Fighter from defense contractor Lockheed Martin's computers. In 2012, a Chinese version, the J-31, appeared to rival the F-35.{{Cite news |title=China's Copycat Jet Raises Questions About F-35 |language=en |website=Defense One |url=https://www.defenseone.com/threats/2015/09/more-questions-f-35-after-new-specs-chinas-copycat/121859/ |access-date=2020-09-03 |archive-date=1 June 2024 |archive-url=https://web.archive.org/web/20240601141343/https://www.defenseone.com/threats/2015/09/more-questions-f-35-after-new-specs-chinas-copycat/121859/ |url-status=live }}

China's espionage and cyberattacks against the US government and business organizations are a major concern, according to the seventh annual report (issued September 2009) to the US Congress of the United States–China Economic and Security Review Commission.

{{cite web |url=http://www.uscc.gov/Annual_Reports/2009-annual-report-congress |title=2009 Annual Report to Congress | U.S.- China | Economic and Security Review Commission |access-date=18 October 2015 |archive-url=https://web.archive.org/web/20151024002928/http://www.uscc.gov/Annual_Reports/2009-annual-report-congress |archive-date=24 October 2015 |url-status=live }}

"Although attribution is a problem in cyber attacks, the scale and coordination of the attacks strongly indicates Chinese state involvement", said commission vice chairman Larry Wortzel. "In addition to harming U.S. interests, Chinese human and cyber espionage activities provide China with a method for leaping forward in economic, technological, and military development." The report cited that the number of cyberattacks from China against the US Department of Defense computer systems had grown from 43,880 in 2007 to 54,640 in 2008, a nearly 20 percent increase.

{{Cite news |url=http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=221900505 |title=Information Week, China cyber espionage threatens US, 20 November 2009 |publisher=Informationweek.com |date=12 August 2014 |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20100227050404/http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=221900505 |archive-date=27 February 2010 |url-status=live }}

{{cite web |url=http://www.uscc.gov/annual_report/2009/09report_chapters.php |title=USCC 2009 Annual Report Page |access-date=1 December 2009 |archive-url=https://web.archive.org/web/20091123072129/http://www.uscc.gov/annual_report/2009/09report_chapters.php |archive-date=23 November 2009 |url-status=dead }}

Reuters reported that the Commission found that the Chinese government has placed many of its computer network responsibilities under the direction of the People's Liberation Army, and was using the data mostly for military purposes.

{{cite news |last=Wolf |first=Jim |url=https://www.reuters.com/article/newsOne/idUSTRE5AI5UZ20091119 |title=China cyber spying growing against US, Reuters, 19 November 2009 |agency=Reuters.com |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20091123030416/http://www.reuters.com/article/newsOne/idUSTRE5AI5UZ20091119 |archive-date=23 November 2009 |url-status=live |date=19 November 2009 }}

In response, China slammed the report as "full of prejudice", and warning it could damage China-US relations. "We advise this so-called commission not to always view China through tinted glasses", Foreign Ministry spokesman Qin Gang said.

{{Cite news |url=https://www.google.com/hostednews/ap/article/ALeqM5h14LwiuVgsR8XxgGHKAXG9JxhlDwD9C54TEO0 |title=The Associated Press: China slams US report warning of spying by Beijing |access-date=10 November 2016 |archive-url=https://web.archive.org/web/20091210155528/https://www.google.com/hostednews/ap/article/ALeqM5h14LwiuVgsR8XxgGHKAXG9JxhlDwD9C54TEO0 |archive-date=10 December 2009 |url-status=dead }}

In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as four million people.

{{Cite news | url=https://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 | title=U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say | work=The Wall Street Journal | date=5 June 2015 | access-date=5 June 2015 | author=Barrett, Devlin | archive-url=https://web.archive.org/web/20150604215718/http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888 | archive-date=4 June 2015 | url-status=live | df=dmy-all }}

Later, FBI Director James Comey put the number at 18 million.

{{Cite news | url=https://edition.cnn.com/2015/06/22/politics/opm-hack-18-milliion/index.html | title=U.S. gov't hack may be four (4) times larger than first reported | date=22 June 2015 | access-date=10 July 2018 | archive-url=https://web.archive.org/web/20180710200241/https://edition.cnn.com/2015/06/22/politics/opm-hack-18-milliion/index.html | archive-date=10 July 2018 | url-status=live | df=dmy-all }}

The Washington Post has reported that the attack originated in China, citing unnamed government officials.

{{cite news | url=https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk | title=Massive Data Breach Puts 4 Million Federal Employees' Records at Risk | work=NPR | date=4 June 2015 | author=Sanders, Sam | access-date=10 July 2018 | archive-url=https://web.archive.org/web/20150605041629/http://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk | archive-date=5 June 2015 | url-status=live | df=dmy-all }}

James Comey said: "It is a very big deal from a national security perspective and from a counterintelligence perspective. It's a treasure trove of information about everybody who has worked for, tried to work for, or works for the United States government.""[https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/ Hacks of OPM databases compromised 22.1 million people, federal authorities say] {{Webarchive|url=https://web.archive.org/web/20180726051157/https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/ |date=26 July 2018 }} ". The Washington Post. 9 July 2015.

Voice of America reported in April 2020 that "U.S. intelligence agencies concluded the Chinese hackers meddled in both the 2016 and 2018 elections" and "Internet security researchers say there have already been signs that China-allied hackers have engaged in so-called 'spear-phishing' attacks on American political targets" ahead of the 2020 United States elections.{{cite news |title=China, Caught Meddling in Past Two US Elections, Claims 'Not Interested' in 2020 Vote |url=https://www.voanews.com/a/east-asia-pacific_china-caught-meddling-past-two-us-elections-claims-not-interested-2020-vote/6188474.html |work=Voice of America |date=30 April 2020 |access-date=17 May 2020 |archive-url=https://web.archive.org/web/20200518183055/https://www.voanews.com/east-asia-pacific/china-caught-meddling-past-two-us-elections-claims-not-interested-2020-vote |archive-date=18 May 2020 |url-status=live }}

In 2019, two Chinese nationals were indicted for the Anthem medical data breach.{{cite news | url=https://www.politico.com/story/2019/05/09/chinese-hackers-anthem-data-breach-1421341 | title=Chinese nationals charged for Anthem hack, 'one of the worst data breaches in history' | first=ERIC | last=GELLER | work=Politico | date=9 May 2019 | access-date=13 July 2020 | archive-url=https://web.archive.org/web/20190624114716/https://www.politico.com/story/2019/05/09/chinese-hackers-anthem-data-breach-1421341 | archive-date=24 June 2019 | url-status=live }} About 80 million company records were hacked, stoking fears that the copied data could be used for identity theft.{{cite news | url=https://www.nytimes.com/2015/02/06/business/experts-suspect-lax-security-left-anthem-vulnerable-to-hackers.html | title=Anthem Hacking Points to Security Vulnerability of Health Care Industry | first1=Reed | last1=Abelson | first2=Matthew | last2=Goldstein | work=The New York Times | date=5 February 2015 | url-access=subscription | access-date=13 July 2020 | archive-url=https://web.archive.org/web/20190807204250/https://www.nytimes.com/2015/02/06/business/experts-suspect-lax-security-left-anthem-vulnerable-to-hackers.html | archive-date=7 August 2019 | url-status=live }} In February 2020, the United States government indicted members of China's PLA for hacking into Equifax and plundering sensitive data as part of a massive heist that also included stealing trade secrets.{{Cite news | url = https://www.cbsnews.com/news/china-denies-responsibility-in-equifax-breach-after-doj-charges-four-military-members/ | title = Data from Equifax credit hack could 'end up on the black market,' expert warns | date = 11 February 2020 | work = CBS News | access-date = 13 July 2020 | archive-url = https://web.archive.org/web/20200702012248/https://www.cbsnews.com/news/china-denies-responsibility-in-equifax-breach-after-doj-charges-four-military-members/ | archive-date = 2 July 2020 | url-status = live }}{{Cite news | url = https://www.wsj.com/articles/four-members-of-china-s-military-indicted-for-massive-equifax-breach-11581346824 | title = Four Members of China's Military Indicted Over Massive Equifax Breach | date = 11 February 2020 | work = The Wall Street Journal | access-date = 13 July 2020 | archive-url = https://web.archive.org/web/20200529205316/https://www.wsj.com/articles/four-members-of-china-s-military-indicted-for-massive-equifax-breach-11581346824 | archive-date = 29 May 2020 | url-status = live }} Private records of more than 145 million Americans were compromised in the 2017 Equifax data breach.{{cite news |title=FBI Director Wray warns of Chinese hacking, espionage threats against American companies |url=https://thehill.com/policy/cybersecurity/506250-fbi-director-wray-warns-of-chinese-hacking-espionage-threats-against |work=The Hill |date=7 July 2020 |access-date=13 July 2020 |archive-url=https://web.archive.org/web/20200708154421/https://thehill.com/policy/cybersecurity/506250-fbi-director-wray-warns-of-chinese-hacking-espionage-threats-against |archive-date=8 July 2020 |url-status=live }}

In July 2020, FBI Director Christopher A. Wray called China the "greatest long-term threat" to the United States. He said that "the FBI is now opening a new China-related counterintelligence case every 10 hours. Of the nearly 5,000 active counterintelligence cases currently under way across the country, almost half are related to China."

{{Quote frame|The greatest long-term threat to our nation’s information and intellectual property, and to our economic vitality, is the counterintelligence and economic espionage threat from China. It’s a threat to our economic security—and by extension, to our national security...It’s the people of the United States who are the victims of what amounts to Chinese theft on a scale so massive that it represents one of the largest transfers of wealth in human history. We’ve now reached the point where the FBI is opening a new China-related counterintelligence case about every 10 hours. Of the nearly 5,000 active FBI counterintelligence cases currently underway across the country, almost half are related to China.|Director of the FBI Christopher Wray|Remarks at the Hudson Institute (July 7, 2020)|align=center}}

In July 2020, the United States Department of Justice indicted two Chinese hackers with global computer intrusion campaign targeting intellectual property and confidential business information, including COVID-19 research. It alleged that the two hackers worked with the Guangdong State Security Department of the Ministry of State Security (China).{{cite news |last= Office of Public Affairs |first= Department of Justice |date= 21 July 2020 |title= People around the globe are divided in their opinions of China |url= https://www.justice.gov/opa/pr/two-chinese-hackers-working-ministry-state-security-charged-global-computer-intrusion |work=United States Department of Justice |access-date= 6 August 2020 |archive-date= 2 August 2020 |archive-url= https://web.archive.org/web/20200802225703/https://www.justice.gov/opa/pr/two-chinese-hackers-working-ministry-state-security-charged-global-computer-intrusion |url-status= live }}

In a July 2021 joint statement with NATO, the EU, and other Western nations, the US accused the Ministry of State Security of perpetrating several cyberattacks, including the 2021 Microsoft Exchange Server data breach. However, it also noted that several attacks were for-profit ransomware attacks by non-government hackers contracted by the MSS for non-intelligence purposes. Additionally, the U.S. Justice Department charged four Chinese nationals accused of working for the MSS with a hacking campaign targeting government, academic, and private institutions; the individuals were each charged with one count of conspiracy to commit computer fraud and conspiracy to commit economic espionage.

In November 2022, Yanjun Xu, the first Chinese government intelligence officer ever to be extradited to the United States to stand trial was sentenced to 20 years in prison for espionage crimes, attempting to steal trade secrets.{{Cite web |last=Lybrand |first=Holmes |date=2022-11-16 |title=Chinese intel officer sentenced to 20 years in GE corporate espionage case {{!}} CNN Politics |url=https://www.cnn.com/2022/11/16/politics/chinese-intel-officer-sentenced-to-20-years-in-corporate-espionage-case/index.html |access-date=2023-10-07 |website=CNN |language=en |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195802/https://www.cnn.com/2022/11/16/politics/chinese-intel-officer-sentenced-to-20-years-in-corporate-espionage-case/index.html |url-status=live }}{{Cite web |date=2022-11-16 |title=Chinese intelligence officer sentenced to 20 years in prison in espionage case - CBS News |url=https://www.cbsnews.com/news/chinese-intelligence-officer-yanjun-xu-sentenced-espionage-stealing-trade-secrets/ |access-date=2023-10-07 |website=www.cbsnews.com |language=en-US |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195802/https://www.cbsnews.com/news/chinese-intelligence-officer-yanjun-xu-sentenced-espionage-stealing-trade-secrets/ |url-status=live }} According to the U.S. Justice Department, Xu targeted American aviation companies, recruited employees to travel to China, and solicited their proprietary information, all on behalf of China.{{Cite web |date=2022-11-16 |title=Southern District of Ohio {{!}} Chinese government intelligence officer sentenced to 20 years in prison for espionage crimes, attempting to steal trade secrets from Cincinnati company {{!}} United States Department of Justice |url=https://www.justice.gov/usao-sdoh/pr/chinese-government-intelligence-officer-sentenced-20-years-prison-espionage-crimes |access-date=2023-10-07 |website=www.justice.gov |language=en |archive-date=7 October 2023 |archive-url=https://web.archive.org/web/20231007195801/https://www.justice.gov/usao-sdoh/pr/chinese-government-intelligence-officer-sentenced-20-years-prison-espionage-crimes |url-status=live }}

In March 2023, the Center for Strategic and International Studies (CSIS) based in Washington DC published an updated Survey of Chinese Espionage in the United States since 2000, which includes 224 documented cases of Chinese espionage targeted at the United States as of February 2023. The list of cases is based on publicly accessible sources and CSIS believes it is likely incomplete.{{Cite web |title=Survey of Chinese Espionage in the United States Since 2000 |url=https://www.csis.org/programs/strategic-technologies-program/archives/survey-chinese-espionage-united-states-2000 |access-date=2023-10-11 |website=Center for Strategic and International Studies |language=en |archive-date=24 December 2023 |archive-url=https://web.archive.org/web/20231224031603/https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united-states-2000 |url-status=live }} According to CSIS, Chinese intelligence in the United States surpasses any other nation, including Russia. While the economic and technological espionage costs the United States billions of dollars since 2000, Chinese espionage has also resulted in immeasurable harm to national security, particularly through the theft of weapon technology, including data related to nuclear weapons testing.{{cite web|last=|first=|date=|title=Report of Defense of Democracy|url=https://s3.us-east-2.amazonaws.com/defenddemocracy/uploads/documents/REPORT_China_CEEW.pdf|access-date=|website=|archive-date=15 December 2020|archive-url=https://web.archive.org/web/20201215165343/https://s3.us-east-2.amazonaws.com/defenddemocracy/uploads/documents/REPORT_China_CEEW.pdf|url-status=live}} CSIS observed that in recent years, China has expanded its espionage efforts to include the theft of substantial amounts of personal information (PII), political manipulation, and influence operations.

On August 3, 2023, the United States Department of Justice announced two indictments of two U.S. Navy servicemembers for transmitting military information to Chinese intelligence officers. Jinchao Wei, an active-duty Navy sailor on the amphibious assault ship, the U.S.S. Essex stationed at Naval Base San Diego, was indicted for conspiracy to send national defense information to a Chinese spy.{{Cite web |date=2023-08-03 |title=Office of Public Affairs {{!}} Two U.S. Navy Servicemembers Arrested for Transmitting Military Information to the People's Republic of China {{!}} United States Department of Justice |url=https://www.justice.gov/opa/pr/two-us-navy-servicemembers-arrested-transmitting-military-information-peoples-republic-china |access-date=2023-10-13 |website=www.justice.gov |language=en |archive-date=1 December 2023 |archive-url=https://web.archive.org/web/20231201004745/https://www.justice.gov/opa/pr/two-us-navy-servicemembers-arrested-transmitting-military-information-peoples-republic-china |url-status=live }} Petty Officer Wenheng Zhao was charged with receiving bribes from a Chinese spy in exchange for classified U.S. military information. On January 8, 2024, Zhao was convicted of transmitting sensitive U.S. military information to a Chinese intelligence officer in exchange for bribery payments and sentenced to 27 months in prison and ordered to pay a $5,500 fine.{{Cite web |date=2024-01-09 |title=US Navy sailor sentenced to over 2 years in prison for accepting bribes from Chinese officer |url=https://apnews.com/article/china-us-navy-espionage-sentenced-california-8002cd4a180d839de9e747b982bc50d6 |access-date=2024-07-30 |website=AP News |language=en |archive-date=30 July 2024 |archive-url=https://web.archive.org/web/20240730210009/https://apnews.com/article/china-us-navy-espionage-sentenced-california-8002cd4a180d839de9e747b982bc50d6 |url-status=live }}

In January 2025, the United States Department of Justice announced the indictment and arrest of John Harold Rogers, a former senior advisor to the Federal Reserve Board of Governors, on charges that he conspired to steal Federal Reserve trade secrets for the Chinese government.{{Cite news |date=January 31, 2025 |title=Former Federal Reserve adviser arrested for passing trade secrets to China, Justice Department says |url=https://www.reuters.com/world/us/former-federal-reserve-adviser-arrested-passing-trade-secrets-china-justice-2025-01-31/ |access-date=February 12, 2025 |work=Reuters}}{{Cite web |date=2025-01-31 |title=Office of Public Affairs {{!}} Former Senior Adviser for the Federal Reserve Indicted on Charges of Economic Espionage {{!}} United States Department of Justice |url=https://www.justice.gov/opa/pr/former-senior-adviser-federal-reserve-indicted-charges-economic-espionage |access-date=2025-02-12 |website=www.justice.gov |language=en}}

=Oceania=

==Australia==

{{See also|2019 Australian Parliament infiltration plot}}

Former Department of Defence Secretary Dennis Richardson has stated that China is engaged in extensive espionage against Australia, and included surveillance of Chinese Australian communities.{{cite news |url=https://www.reuters.com/article/us-australia-china-idUSKBN1880ZB |work=Reuters |editor-first=Robert |editor-last=Birsel |title=China conducting extensive espionage against Australia: defense official |first=Colin |last=Packham |date=12 May 2017 |archive-url=https://web.archive.org/web/20170514040957/https://www.reuters.com/article/us-australia-china-idUSKBN1880ZB |archive-date=14 May 2017 |quote='It is no secret that China is very active in intelligence activities directed against us. It is more than cyber,' Dennis Richardson, secretary of the Defense Department, said in a speech in Canberra. [...] 'The Chinese government keeps a watchful eye inside Australian Chinese communities and effectively controls some Chinese-language media in Australia,' said Richardson.}}{{cite book|title=Silent Invasion: China's influence in Australia|last=Hamilton|first=Clive|date=22 February 2018|publisher=Hardie Grant Books|isbn=978-1-74358-544-3|author-link=Clive Hamilton|title-link=Silent Invasion (book)}} Australia believes that the Chinese government have been spying on Australian businesses.

{{cite magazine |url=https://www.forbes.com/2009/04/03/china-spies-scare-markets-equity-rio.html |title=Forbes, China Spies scare markets equity, 3 April 2009 |magazine=Forbes.com |date=4 March 2009 |access-date=25 August 2014 |archive-url=https://web.archive.org/web/20180915121030/https://www.forbes.com/2009/04/03/china-spies-scare-markets-equity-rio.html |archive-date=15 September 2018 |url-status=live }}

{{Cite news |url=http://www.csmonitor.com/2005/0608/dailyUpdate.html |title=Chinese spy ring in Australia? | first=Matthew | last=Clark | newspaper=The Christian Science Monitor | date=7 June 2005 |access-date=1 December 2009 |archive-url=https://web.archive.org/web/20090406170558/http://www.csmonitor.com/2005/0608/dailyUpdate.html |archive-date=6 April 2009 |url-status=live }}

A male Chinese student from Fujian was granted a protection visa by the Refugee Review Tribunal of Australia after revealing that he had been instructed to spy on Australian targets in exchange for an overseas scholarship, reporting to the Ministry of State Security.{{cite news |url=http://www.austlii.edu.au/au/cases/cth/RRTA/2012/359.html |title=1200907 [2012] RRTA 359 (23 May 2012) |publisher=Australasian Legal Information Institute |date=8 June 2012 |access-date=21 August 2012 |author=Refugee Review Tribunal of Australia |archive-date=24 August 2020 |archive-url=https://web.archive.org/web/20200824001401/http://www6.austlii.edu.au/cgi-bin/viewdoc/au/cases/cth/RRTA/2012/359.html |url-status=live }}

Nicola Roxon, the Attorney-General of Australia, blocked the Shenzhen-based corporation Huawei from seeking a supply contract for the National Broadband Network, on the advice of the Australian Security Intelligence Organisation (ASIO).

{{cite news |url=https://www.reuters.com/article/us-australia-huawei-nbn-idUSBRE82P0GA20120326 |title=Australia blocks China's Huawei from broadband tender |work=Reuters |first=Maggie |last=Lu-YueYang |date=26 March 2012 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20120623225308/http://www.reuters.com/article/2012/03/26/us-australia-huawei-nbn-idUSBRE82P0GA20120326 |archive-date=23 June 2012 |url-status=live }}

The Australian government feared Huawei would provide backdoor access for Chinese cyber espionage.

{{cite news |url=http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10795024 |title=Chinese espionage fears could damage NZ's global relations – analyst |first=Matthew |last=Theunissen |work=The New Zealand Herald |date=28 March 2012 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20120705133712/http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10795024 |archive-date=5 July 2012 |url-status=live }}

{{cite news |url=https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=12154552 |newspaper=New Zealand Herald |first=Chris |last=Keall |title=Aussie espionage report puts Huawei under more pressure |date=5 November 2018 |access-date=7 November 2018 |archive-url=https://web.archive.org/web/20181108025857/https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=12154552 |archive-date=8 November 2018 |url-status=live }}

The Chinese government is suspected of orchestrating an attack on the email network used by the Parliament of Australia, allowing unauthorized access to thousands of emails and compromising the computers of several senior Australian politicians including Prime Minister Julia Gillard, Foreign Minister Kevin Rudd, and Minister of Defense Stephen Smith.{{cite news |title=China spies suspected of hacking Julia Gillard's emails |url=http://www.news.com.au/technology/federal-ministers-emails-suspected-of-being-hacked/story-e6frfrnr-1226029713668 |first=Simon |last=Benson |date=29 March 2011 |access-date=21 August 2012 |work=The Daily Telegraph |archive-url=https://web.archive.org/web/20121203185259/http://www.news.com.au/technology/federal-ministers-emails-suspected-of-being-hacked/story-e6frfrnr-1226029713668 |archive-date=3 December 2012 |url-status=live }}{{cite news |url=http://www.heraldsun.com.au/news/china-suspected-as-spies-hack-gillard/story-e6frf7jo-1226029705738 |title=China suspected as spies hack Gillard |first=Simon |last=Benson |author2=Anne Wright |work=Herald Sun |date=29 March 2011 |access-date=21 August 2012 |archive-url=https://web.archive.org/web/20110411183355/http://www.heraldsun.com.au/news/china-suspected-as-spies-hack-gillard/story-e6frf7jo-1226029705738 |archive-date=11 April 2011 |url-status=live }}

Sheri Yan and a former Office of National Assessments (ONA) official, Roger Uren, were investigated by ASIO on suspicion of spying for China.{{cite news |url=https://www.smh.com.au/national/investigations/secret-asio-raid-uncovered-classified-documents-in-power-couples-canberra-apartment-20170602-gwjbrm.html |title=Secret ASIO raid uncovered classified documents in power couple's Canberra apartment |newspaper=Sydney Morning Herald |archive-url=https://web.archive.org/web/20170605144526/http://www.smh.com.au/national/investigations/secret-asio-raid-uncovered-classified-documents-in-power-couples-canberra-apartment-20170602-gwjbrm.html |archive-date=5 June 2017 |first1=Nick |last1=McKenzie |first2=Daniel |last2=Flitton |first3=Chris |last3=Uhlmann |first4=Richard |last4=Baker |date=5 June 2017}} Uren, former Assistant Secretary responsible for the Asia section of ONA, was found to have removed documents pertaining to Chinese intelligence operations in Australia, and kept them in his apartment. Yan was suspected of undertaking influence operations on behalf of the Chinese Communist Party, and introducing Colonel Liu Chaoying, a military intelligence officer, to Australian contacts.{{cite news |url=https://www.smh.com.au/national/investigations/charges-loom-for-ex-intelligence-official-roger-uren-after-asio-raid-20170727-gxjrks.html |newspaper=Sydney Morning Herald |quote=Fairfax Media has confirmed one of Yan's contacts was a Chinese military intelligence operative and reputed arms broker, Colonel Liu Chaoying. Yan introduced Colonel Liu to her Australian network, including a wealthy Australian businessman who took Colonel Liu on several dinner dates. |title=Charges loom for ex-intelligence official Roger Uren after ASIO raid |first1=Nick |last1=McKenzie |first2=Richard |last2=Baker |date=29 July 2017 |access-date=29 July 2017 |archive-url=https://web.archive.org/web/20170731092414/http://www.smh.com.au/national/investigations/charges-loom-for-ex-intelligence-official-roger-uren-after-asio-raid-20170727-gxjrks.html |archive-date=31 July 2017 |url-status=live }}{{cite news |author= |date=5 June 2017 |title=Canberra couple subject of ASIO raid |publisher=Yahoo News |agency=Australian Associated Press |url=https://au.news.yahoo.com/a/35756007/canberra-couple-subject-of-asio-raid/#page1 |archive-url=https://web.archive.org/web/20170605204344/https://au.news.yahoo.com/a/35756007/canberra-couple-subject-of-asio-raid/ |archive-date=5 June 2017 |quote=A Fairfax Media and Four Corners investigation reports the raid targeted Sheri Yan and former Australian diplomat Roger Uren, over allegations she was involved in operations for the Chinese Communist Party.}}

Hackers either working for or on behalf of the government of China are suspected as being responsible for a cyber-espionage attack against an Australian defense company.

{{Cite news |url=https://arstechnica.com/information-technology/2017/10/australian-defense-firm-was-hacked-and-f-35-data-stolen-dod-confirms/ |website=Ars Technica |title=Australian defense firm was hacked and F-35 data stolen, DOD confirms |first=Sean |last=Gallagher |date=13 October 2017 |access-date=17 October 2017 |archive-url=https://web.archive.org/web/20171018012445/https://arstechnica.com/information-technology/2017/10/australian-defense-firm-was-hacked-and-f-35-data-stolen-dod-confirms/ |archive-date=18 October 2017 |url-status=live }}

{{cite news |url=https://www.wsj.com/articles/cyberattack-captures-data-on-u-s-weapons-in-four-month-assault-1507806261?mc_cid=2eb5d3c315&mc_eid=1f9d28130a |title=Cyberattack Captures Data on U.S. Weapons in Four-Month Assault |first=Rob |last=Taylor |date=12 October 2017 |newspaper=The Wall Street Journal |access-date=12 November 2017 |archive-url=https://web.archive.org/web/20180915114409/https://www.wsj.com/articles/cyberattack-captures-data-on-u-s-weapons-in-four-month-assault-1507806261?mc_cid=2eb5d3c315&mc_eid=1f9d28130a |archive-date=15 September 2018 |url-status=live }}

Designated APT Alf by the Australian Signals Directorate, the hackers stole approximately 30 gigabytes of data on projects including the F-35 Joint Strike Fighter, the P-8 Poseidon, the C-130 Hercules and the Joint Direct Attack Munition. APT Alf used a remote access tool dubbed "China Chopper".

In 2017, Chinese hackers infiltrated the computers of Australian National University, potentially compromising national security research conducted at the university.{{cite news |url=https://www.smh.com.au/politics/federal/chinese-hackers-breach-anu-putting-national-security-at-risk-20180706-p4zq0q.html |newspaper=The Sydney Morning Herald |title=Chinese hackers breach ANU, putting national security at risk |date=6 July 2018 |first1=Nick |last1=McKenzie |first2=David |last2=Wroe |archive-url=https://web.archive.org/web/20180710075935/https://www.smh.com.au/politics/federal/chinese-hackers-breach-anu-putting-national-security-at-risk-20180706-p4zq0q.html |archive-date=10 July 2018}}{{cite news |url=http://www.abc.net.au/news/2018-07-06/chinese-hackers-infilitrate-anu-it-systems/9951210 |publisher=Australian Broadcasting Corporation |title=Chinese hackers infiltrate systems at Australian National University |first=Stephanie |last=Borys |date=8 July 2018 |quote=The ABC has been told the Australian National University (ANU) system was first compromised last year. |access-date=11 July 2018 |archive-url=https://web.archive.org/web/20180710025722/http://www.abc.net.au/news/2018-07-06/chinese-hackers-infilitrate-anu-it-systems/9951210 |archive-date=10 July 2018 |url-status=live }} In 2015, Chinese hackers infiltrated the Bureau of Meteorology.

In February 2019, the Sydney Morning Herald reported that Chinese businessman and real-estate developer Huang Xiangmo had been denied permanent residency by the Department of Home Affairs reportedly due to character and national security concerns.{{Cite news |last1=McKenzie |first1=Nick |last2=Uhlmann |first2=Chris |date=2019-02-05 |title=Canberra strands Beijing's man offshore, denies passport |url=https://www.smh.com.au/politics/federal/canberra-strands-beijing-s-man-offshore-denies-passport-20190205-p50vtg.html |access-date=2022-08-26 |website=The Sydney Morning Herald |language=en |archive-date=26 August 2022 |archive-url=https://web.archive.org/web/20220826074204/https://www.smh.com.au/politics/federal/canberra-strands-beijing-s-man-offshore-denies-passport-20190205-p50vtg.html |url-status=live }} Huang was the chairman of the Australian Council for the Promotion of the Peaceful Reunification of China (ACPPRC), the China Council for the Promotion of Peaceful National Reunification (CCPPNR) and the Oceanic Alliance of the Promotion of Peaceful Reunification of China; all three either umbrella organizations of the United Front Work Department or having close ties with the UFWD itself.{{Cite news |last=Wyeth |first=Grant |title=Why Did Australia Push Out a Chinese Communist Party-Linked Billionaire? |url=https://thediplomat.com/2019/02/why-did-australia-push-out-a-chinese-communist-party-linked-billionaire/ |access-date=2022-08-26 |website=thediplomat.com |language=en-US |archive-date=17 May 2019 |archive-url=https://web.archive.org/web/20190517062022/https://thediplomat.com/2019/02/why-did-australia-push-out-a-chinese-communist-party-linked-billionaire/ |url-status=live }} Prior to his forced departure, Huang had been active in Australian political circles, donating some $2.7 million to both the Australian Labor and Liberal parties respectively as well as delivering $100,000 in cash to the New South Wales branch of the Australian Labor party in breach of electoral donation laws.{{Cite news |date=2019-09-18 |title=Huang Xiangmo pulls nearly $50m out of Australia as tax office chases $140m |url=http://www.theguardian.com/australia-news/2019/sep/18/huang-xiangmo-pulls-nearly-50m-out-of-australia-as-tax-office-chases-140m |access-date=2022-08-26 |website=The Guardian |language=en |archive-date=26 August 2022 |archive-url=https://web.archive.org/web/20220826074208/https://www.theguardian.com/australia-news/2019/sep/18/huang-xiangmo-pulls-nearly-50m-out-of-australia-as-tax-office-chases-140m |url-status=live }} In 2021, Huang was elected to Hong Kong's new electoral committee implemented under the 2021 Hong Kong electoral changes imposed on Hong Kong by the National People's Congress in Beijing with the electoral message of "Support[ing] the implementation of ‘patriots administer[ing] Hong Kong".{{Cite news |date=2021-10-19 |title=Huang Xiangmo: alleged agent of Chinese influence exiled from Australia now on Hong Kong electoral body |url=https://www.theguardian.com/australia-news/2021/oct/20/huang-xiangmo-alleged-agent-of-chinese-influence-exiled-from-australia-now-on-hong-kong-electoral-body |access-date=2022-08-26 |website=The Guardian |language=en |archive-date=26 August 2022 |archive-url=https://web.archive.org/web/20220826074204/https://www.theguardian.com/australia-news/2021/oct/20/huang-xiangmo-alleged-agent-of-chinese-influence-exiled-from-australia-now-on-hong-kong-electoral-body |url-status=live }}

In March 2019, the Australian Broadcasting Corporation reported that the body of a member of the Australian Liberal Party Bo ("Nick") Zhao had been inside a hotel room in Melbourne. Zhao had been a member of the Liberal party in the electorate of Chisholm, Victoria since 2015. Reports emerged afterwards that Zhao had been approached by a businessman originating from China who offered a $1 million in exchange for Zhao's running of candidacy to the Federal Parliament.{{Cite news|date=24 November 2019|title=ASIO investigating reports of Chinese plot to install agent in Parliament, suspicious death|url=https://www.abc.net.au/news/2019-11-25/asio-says-its-taking-allegations-of-suspicious-death-serious/11733532|access-date=1 August 2021|newspaper=ABC News|language=en-AU|archive-date=27 November 2019|archive-url=https://web.archive.org/web/20191127020222/https://www.abc.net.au/news/2019-11-25/asio-says-its-taking-allegations-of-suspicious-death-serious/11733532|url-status=live}} Zhao allegedly reported the encounter to the Australian Security and Intelligence Organisation resulting in his death months later.{{Cite news|date=25 November 2019|title=A man is dead. Another fears being killed. Here's a breakdown of the claims about Chinese espionage|url=https://www.abc.net.au/news/2019-11-25/chinese-spy-parliament-foreign-interference-in-hong-kong-taiwan/11735176|access-date=1 August 2021|newspaper=ABC News|language=en-AU|last1=Conifer|first1=Dan|archive-date=22 December 2019|archive-url=https://web.archive.org/web/20191222082041/https://www.abc.net.au/news/2019-11-25/chinese-spy-parliament-foreign-interference-in-hong-kong-taiwan/11735176|url-status=live}} Member of the Parliamentary Joint Intelligence Committee on Intelligence and Security (PJCIS) Andrew Hastie stated that Zhao was: "the perfect target for cultivation", remarking that he was "a guy who was a bit of a high-roller in Melbourne, living beyond his means, someone who was vulnerable to a foreign state intelligence service cultivating [him]."

In April 2023, it was reported that two individuals believed to be Chinese spies provided a Sydney-based businessman with cash-filled envelopes in exchange for intelligence on various topics, including an Australian government agreement involving the construction of Australian nuclear-powered submarines in collaboration with the United States and Britain.{{Cite web |date=2023-04-17 |title=Australian charged over reports to suspected Chinese spies |url=https://apnews.com/article/australia-foreign-interference-china-nuclear-submarine-a7dde67899e3177cdd9b1f402d896711 |access-date=2023-10-08 |website=AP News |language=en |archive-date=20 December 2023 |archive-url=https://web.archive.org/web/20231220123222/https://apnews.com/article/australia-foreign-interference-china-nuclear-submarine-a7dde67899e3177cdd9b1f402d896711 |url-status=live }}

==New Zealand==

{{See also|Foreign espionage in New Zealand}}

Jian Yang, a member of the New Zealand House of Representatives and the New Zealand National Party was investigated by the New Zealand Security Intelligence Service (NZSIS) as a possibly spy due to his links to Chinese military and intelligence schools.

{{cite news |url=https://www.bbc.com/news/world-asia-41256914 |work=BBC News |quote=They say Mr Yang, who was elected in 2011, was investigated for the decade he spent in China, where he received military and intelligence training at so-called 'spy schools'. |date=13 September 2017 |access-date=13 September 2017 |title=New Zealand MP Jian Yang denies being a Chinese spy |archive-url=https://web.archive.org/web/20180720103020/https://www.bbc.com/news/world-asia-41256914 |archive-date=20 July 2018 |url-status=live }}

Yang reportedly failed to declare that he had taught at the Air Force Engineering University or the Luoyang People's Liberation Army University of Foreign Languages, which are commonly used as training grounds for Chinese intelligence officers.

{{cite news |url=http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11922025 |newspaper=The New Zealand Herald |title=National MP didn't name Chinese military institutes in citizenship application |date=14 September 2017 |access-date=13 September 2017 |first=Nicholas |last=Jones |quote=A National MP who taught English to Chinese spies didn't declare the names of the military institutions where that happened to New Zealand authorities. Jian Yang told the Herald he didn't name the Air Force Engineering University or Luoyang People's Liberation Army University of Foreign Languages when making the applications that led to New Zealand citizenship, which he was granted in 2004. |archive-url=https://web.archive.org/web/20170913225302/http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11922025 |archive-date=13 September 2017 |url-status=live }}

{{cite news |url=https://www.newsroom.co.nz/@politics/2017/09/13/47665/national-no-idea-of-sis-inquiry-into-yang |publisher=Newsroom |title=National: no idea of SIS inquiry into Yang |date=13 September 2017 |quote=Goodfellow said he could not recall if the party knew Yang had spent a decade at the People's Liberation Army-Air Force Engineering School and the Luoyang Foreign Languages Institute but it did know about him studying there. Told the two venues were commonly training grounds for Chinese intelligence officers, and the language institute specialized in preparing spies linguistically, Goodfellow said, 'He is a very good linguist.' |access-date=13 September 2017 |archive-url=https://web.archive.org/web/20170914035932/https://www.newsroom.co.nz/@politics/2017/09/13/47665/national-no-idea-of-sis-inquiry-into-yang |archive-date=14 September 2017 |url-status=live }}

Yang has denied the allegations that he is a spy.

{{cite news |url=https://www.ft.com/content/ca20bfc9-6159-3cf0-920e-ef1e6d7b326d |newspaper=Financial Times |title=China-born New Zealand MP responds to FT report |first=Edward |last=White |quote=A Chinese-born member of New Zealand's parliament denied being a spy for China at a press conference on Wednesday, although he acknowledged having taught students English for information gathering at one of China's leading military academies [...] He also said the reports about his background were a 'smear campaign' and suggested that anti-Chinese racism was the motive. |date=13 September 2017 |access-date=13 September 2017 |archive-url=https://web.archive.org/web/20170914035404/https://www.ft.com/content/ca20bfc9-6159-3cf0-920e-ef1e6d7b326d |archive-date=14 September 2017 |url-status=live }}

{{cite news |newspaper=Nikkei Asian Review |quote=The debate over political influence within New Zealand intensified last year with revelations that Jian Yang, a legislator in New Zealand's then-ruling center-right National Party, had taught English to Chinese spies before leaving China in the 1990s and becoming a New Zealand citizen in 2004. Yang denied having spied for China and remains in Parliament. |title=New Zealand ends China honeymoon over security concerns |first=David |last=Brooks |date=1 July 2018 |url=https://asia.nikkei.com/Politics/International-Relations/New-Zealand-ends-China-honeymoon-over-security-concerns |access-date=15 July 2018 |archive-url=https://web.archive.org/web/20180715040312/https://asia.nikkei.com/Politics/International-Relations/New-Zealand-ends-China-honeymoon-over-security-concerns |archive-date=15 July 2018 |url-status=live }}

In February 2020, the Serious Fraud Office of New Zealand charged three Chinese nationals: Zhang Yikun, Zheng (Colin) Shijia, Zheng Hengjia and a member of parliament Jami Lee Ross over allegations of providing misleading information in relation to donations to the National Party donations amounting up to $100,000.{{Cite news|date=25 February 2020|title=Four men facing charges over National Party donations case to appear in court|url=https://www.rnz.co.nz/news/political/410265/four-men-facing-charges-over-national-party-donations-case-to-appear-in-court|access-date=1 August 2021|website=RNZ |language=en-nz}} Zhang, a well known business man in the New Zealand Chinese community is a native of Guangdong province and allegedly served in the People's Liberation Army prior to immigrating to New Zealand in 2000{{Cite news|date=20 February 2020|title=Who are the people at the centre of the SFO political donation row?|url=https://www.stuff.co.nz/national/119681317/who-are-the-people-at-the-centre-of-the-sfo-political-donation-row|access-date=1 August 2021|website=Stuff |language=en}} as well as the founder of Chao San General Association (CGSA) ({{Lang-zh|c=新西兰潮属总会|p=Xīnxīlán cháo shǔ zǒng huì}}) registered with the Ministry of Ethnic Communities New Zealand.{{cite web|title=Our Communities {{!}} Ministry for Ethnic Communities|url=https://www.ethniccommunities.govt.nz/community-directory/show/1015|access-date=1 August 2021|website=www.ethniccommunities.govt.nz}}

The stated purpose of the association is to serve the Teochow community (an ethnic sub-group) from Guangdong in New Zealand, however Chinese dissident and local journalist Chen Wenjie has claimed the association is part of the CCP's United Front Work Department (UFWD) and donations by the association including those to the Christchurch Foundation in the sum of some $2.1 million to assist the victims of the 2019 Mosque shootings are part of a coordinated strategy to: "purchase political influence" and engage in "strategic infiltration" of the political systems of host countries.{{Cite news|date=4 January 2020|title=$2m donation by China-linked group criticised|url=https://www.stuff.co.nz/the-press/118512019/2m-donation-to-st-john-by-chinalinked-group-criticised|access-date=1 August 2021|website=Stuff |language=en}}

Local media outlet Stuff also reported that Zhang led a delegation of New Zealand business leaders and politicians to visit the Overseas Chinese Affairs Office (OCAO) of the State Council, the Chinese government agency responsible for liaison with overseas Chinese communities in 2017 and that in 2018 the association officially became part of the UFWD. On 25 February 2020, the Serious Fraud Office reported that Zhang along with three others had been charged with obtaining by deception under the Crimes Act and providing false or misleading information under the Serious Fraud Office Act, with each pleading not guilty in Auckland District Court.{{cite web|last=Serious Fraud Office|first=New Zealand|title=Defendants plead not guilty in National Party donations case|url=https://sfo.govt.nz/media-cases/media-releases/defendants-plead-not-guilty-in-national-party-donations-case/|access-date=1 August 2021|website=Serious Fraud Office, New Zealand|date=25 February 2020 |language=en-NZ}}

On 23 July 2020 local media outlet newsroom reported that two Chinese dissidents: Yuezhong Wang and Weiguo Xi had been killed in a car crash on their way to Wellington to parliament to deliver a petition the New Zealand government about Chinese Communist Party political interference in New Zealand.{{Cite news |last=Walters |first=Laura |date=2020-07-26 |title=Chinese dissident community mourns deaths of activists after double fatal crash |url=https://www.stuff.co.nz/national/300066448/chinese-dissident-community-mourns-deaths-of-activists-after-double-fatal-crash |access-date=2022-08-25 |website=Stuff |language=en}} Xi was reportedly a former member of the PLA while in China who campaigned against government corruption and was detained by police as a result of his activism and the Chairman of the New Zealand Branch of The Federation for a Democratic China; with being a writer affiliated with the Chinese democracy movement.{{Cite news |last=Yalden |first=Phillipa |date=2020-07-23 |title=Chinese activists on way to protest at Parliament killed in double fatal crash |url=https://www.stuff.co.nz/national/122219496/chinese-activists-on-way-to-protest-at-parliament-killed-in-double-fatal-crash |access-date=2022-08-25 |website=Stuff |language=en}} While no comments were made by police in relation to the circumstances of death were suspicious, according to political researcher Anne-Marie Brady, significant speculation existed within the local Chinese diaspora community on whether Wang and Xi's death were the product of "saboutage".{{Cite news |title='Sabotage' questions after Chinese activists killed in fiery crash |url=https://www.nzherald.co.nz/rotorua-daily-post/news/fatal-crash-sabotage-questions-after-chinese-activists-killed-in-fiery-tokoroa-crash/FTOINMJAVRJS4LEYTZKXBA3YRU/ |access-date=2022-08-25 |website=The New Zealand Herald |language=en-NZ}}

On 15 September 2020, the Stuff media company reported that the Chinese data intelligence company Zhenhua Data had collected open source data intelligence on 730 New Zealand politicians, diplomats, academics, business executives, sportspersons, judges, fraudsters and their families including Prime Minister Jacinda Ardern, former Prime Minister John Key's son Max, former Finance Minister Ruth Richardson, and sportsperson Barbara Kendall. Ten percent of Zhenhua Data's database had been leaked to American academic Chris Balding, who then passed the material to Canberra-based cybersecurity firm Internet 2.0.{{cite news |last1=Manch |first1=Thomas |last2=Cornish |first2=Sophie |title=New Zealand politicians, diplomats, judges, and fraudsters found on massive Chinese intelligence database |url=https://www.stuff.co.nz/national/politics/122773268/new-zealand-politicians-diplomats-judges-and-fraudsters-found-on-massive-chinese-intelligence-database |access-date=15 September 2020 |work=Stuff |date=15 September 2020 |archive-url=https://web.archive.org/web/20200915191534/https://www.stuff.co.nz/national/politics/122773268/new-zealand-politicians-diplomats-judges-and-fraudsters-found-on-massive-chinese-intelligence-database |archive-date=15 September 2020|url-status=live}}

In August 2023, an NZSIS threat assessment which identified China, Iran, and Russia as the three foreign governments most responsible for foreign interference in New Zealand. According to the report, Chinese intelligence services were actively targeting ethnic Chinese communities in New Zealand including surveillance, monitoring, harassment, and threats of dissidents.{{cite news |title=NZSIS's first unclassified threat assess |url=https://www.rnz.co.nz/news/political/495571/nzsis-s-first-unclassified-threat-assessment-targets-competition-public-trust-technology |access-date=13 August 2023 |work=Radio New Zealand |date=11 August 2023 |archive-url=https://web.archive.org/web/20230811021440/https://www.rnz.co.nz/news/political/495571/nzsis-s-first-unclassified-threat-assessment-targets-competition-public-trust-technology |archive-date=11 August 2023|url-status=live}}{{cite news |last1=McClure |first1=Tess |title=New Zealand intelligence report accuses China of 'foreign interference' |url=https://www.theguardian.com/world/2023/aug/11/new-zealand-intelligence-report-accuses-china-of-foreign-interference |access-date=13 August 2023 |work=The Guardian |date=11 August 2023 |archive-url=https://web.archive.org/web/20230812203858/https://www.theguardian.com/world/2023/aug/11/new-zealand-intelligence-report-accuses-china-of-foreign-interference |archive-date=12 August 2023|url-status=live}}

=Latin America=

==Cuba==

{{Further|China–Cuba relations|Bejucal}}

In June 2023, Cuba agreed to host a Chinese spying facility that could allow the Chinese to eavesdrop on electronic communications across the southeastern United States, an area populated with key military installations and extensive maritime traffic.{{Cite news |last1=Strobel |first1=Warren P. |last2=Lubold |first2=Gordon |date=2023-06-08 |title=WSJ News Exclusive {{!}} Cuba to Host Secret Chinese Spy Base Focusing on U.S. |language=en-US |work=Wall Street Journal |url=https://www.wsj.com/articles/cuba-to-host-secret-chinese-spy-base-focusing-on-u-s-b2fed0e0 |access-date=2023-10-07 |issn=0099-9660}}{{Cite web |last=Bertrand |first=Natasha |date=2023-06-08 |title=Cuba gives China permission to build spying facility on island, US intel says {{!}} CNN Politics |url=https://www.cnn.com/2023/06/08/politics/cuba-china-spying-facility/index.html |access-date=2023-10-07 |website=CNN |language=en}}

==Peru==

The computer security firm ESET reported that tens of thousands of blueprints were stolen from Peruvian corporations through malware, which were traced to Chinese e-mail accounts. This was done through an AutoCAD worm called ACAD/Medre.A, written in AutoLISP, which located AutoCAD files, at which point they were sent to QQ and 163.com email accounts in China.{{Cite news |url=http://blog.eset.com/2012/06/21/acadmedre-10000s-of-autocad-files-leaked-in-suspected-industrial-espionage |title=ACAD/Medre.A – 10000's of AutoCAD files leaked in suspected industrial espionage |date=22 June 2012 |access-date=22 August 2012 |publisher=ESET |first=Righard |last=Zweinnberg |archive-url=https://web.archive.org/web/20120814070748/http://blog.eset.com/2012/06/21/acadmedre-10000s-of-autocad-files-leaked-in-suspected-industrial-espionage |archive-date=14 August 2012 |url-status=dead }} ESET researcher Righard Zwienenberg claimed this was Chinese industrial espionage.

{{cite news |url=https://www.telegraph.co.uk/technology/news/9346734/Espionage-virus-sent-blueprints-to-China.html |title=Espionage virus sent blueprints to China |work=The Daily Telegraph |date=21 June 2012 |access-date=22 August 2012 |first=Christopher |last=Williams |location=London |archive-url=https://web.archive.org/web/20120827073301/http://www.telegraph.co.uk/technology/news/9346734/Espionage-virus-sent-blueprints-to-China.html |archive-date=27 August 2012 |url-status=live }}

The virus was mostly localized to Peru but spread to a few neighboring countries before being contained.

{{cite news |url=https://www.pcworld.com/article/258245/malware_gets_snoopy.html |title=Malware Gets Snoopy |first=Mark |last=Gibbs |work=PC World |date=24 June 2012 |access-date=22 August 2012 |archive-url=https://web.archive.org/web/20120628003016/http://www.pcworld.com/article/258245/malware_gets_snoopy.html |archive-date=28 June 2012 |url-status=live }}

See also

References

{{Reflist}}

Further reading

  • {{Cite book |last=Faligot |first=Roger |author-link=Roger Faligot |title=Chinese Spies: From Chairman Mao to Xi Jinping |title-link=Chinese Spies: From Chairman Mao to Xi Jinping |publisher=C. Hurst & Co. |year=2019 |isbn=9781787380967 |location=London, United Kingdom |language=en |translator-last=Lehrer |translator-first=Natasha |translator-link=Natasha Lehrer}}
  • {{Cite book |last=Joske |first=Alex |author-link=Alex Joske |title=Spies and Lies: How China's Greatest Covert Operations Fooled the World |publisher=Hardie Grant |year=2022 |isbn=9781743589007 |location=Melbourne |publication-date=5 October 2022 |language=en}}
  • {{Cite book |last1=Mattis |first1=Peter |title=Chinese Communist Espionage: An Intelligence Primer |title-link=Chinese Communist Espionage |last2=Brazil |first2=Matthew |publisher=Naval Institute Press |year=2019 |isbn=9781682473047 |location=Annapolis, MD}}