The government of China is engaged in overseas, directed primarily through the Ministry of State Security (MSS). It is suspected of employing a variety of tactics including cyber spying to gain access to sensitive information remotely and physical agents (HUMINT). China is believed to be engaged in industrial espionage aimed at gathering information to bolster its economy, as well as monitoring dissidents abroad such as supporters of the Tibetan independence movement and Falun Gong.


Method of operation[edit | edit source]

It is generally believed that Chinese intelligence agencies operate differently from other espionage organizations by employing primarily academics or students who will be in their host country only a short time, rather than spending years cultivating a few high-level sources or double agents.[1][2][3] Much information about the Chinese intelligence services comes from defectors, whom the PRC accuses of lying to promote an anti-PRC agenda.[4][5][6][7] One known exception to this rule is the case of Katrina Leung, who was accused of starting an affair with an FBI agent to gain sensitive documents from him. A U.S. judge dismissed all charges against her due to prosecutorial misconduct.[8][9]

The United States believes the Chinese military has been developing network technology in recent years in order to perform espionage on other nations. Several cases of computer intrusions suspected of Chinese involvement have been found in various countries including Australia, New Zealand, France, Germany, the Netherlands, the United Kingdom, India and the United States.[10][11][12]

In 2009, Canadian researchers say they have found evidence that Chinese hackers had gained access to computers possessed by government and private organizations in 103 countries, although researchers say there is no conclusive evidence China's government was behind it.[13] Beijing also denied involvement. The researchers said the computers penetrated include those of the Dalai Lama and Tibetan exiles.[14]

Ira Winkler, a former National Security Agency staff and a security consultant, said that Chinese intelligence operatives work by approaching ethnic Chinese by reminding them of "Chinese heritage, telling them they must help".[15]

Objectives[edit | edit source]

It is believed that Chinese espionage is aimed at gaining commercial, technological, and military secrets.[16][17][18][19]

Two diplomats who defected in Australia have claimed that China operates more than 1,000 spies and informants in Australia alone; their mission, they said, is industrial espionage but also disruption of the Falun Gong movement. China accused them of lying so they could stay in Australia. Canadian businessman Joe Wang believes that threatening letters he received after broadcasting programs about alleged human rights abuses in China were from the Chinese consulate; one of the envelopes contained boric acid. In November 2005 the United States arrested four people in Los Angeles on suspicion of being involved in a Chinese spy ring.

Taiwanese-American scientist Wen Ho Lee (born in Nantou, Taiwan December 21, 1939) was accused and investigated on the grounds of espionage in 1999 but was acquitted of all charges except for mishandling classified data. Chinese "Subtle Spying" practice avoids and defends against the United States' prosecution-heavy investigative counterintelligence procedures by introducing large elements of plausible deniability and obfuscating the line between deliberate and unintentional espionage activities.

Intelligence activity worldwide[edit | edit source]

In recent years, the Chinese government is thought to have played a key role in conducting espionage activities on several other nations and regions.

Europe[edit | edit source]

Belgium[edit | edit source]

Belgian Justice Minister Jo Vandeurzen accused the Chinese government of electronic espionage against the government of Belgium, while Foreign Minister Karel De Gucht informed the Belgian Federal Parliament that his ministry was hacked by Chinese agents. The espionage is possibly linked to Belgium hosting the headquarters of NATO and the European Union.[20]

The Katholieke Universiteit Leuven in Leuven was also believed to be the center for a group of Chinese students in Europe conducting industrial espionage, operating under a front organization called The Chinese Students' and Scholars' Association of Leuven.[21][22] In 2005 a leading figure of the Association defected to Belgium, providing information to the Sûreté de l’Etat on hundreds of spies engaged in economic espionage across Europe.[23][24] The group had no obvious links to Chinese diplomats and was focused on getting moles into laboratories and universities in the Netherlands, Britain, Germany, France and Belgium.[25] The People's Daily, an organ of the Central Committee of the Communist Party of China, dismissed the reports as fabrications triggered by fears of China's economic development.[26]

France[edit | edit source]

There have been several incidents of suspected Chinese spies in France. This includes Shi Pei Pu, a Chinese opera singer from Beijing who convinced a French diplomat that he was a woman, and spied on France.[27]

French media also portrayed Li Li Whuang (李李), a 22-year-old Chinese intern at car parts maker Valeo, as an industrial spy.[28] Both the French prosecution and Valeo refuted media claims of spying and the case was later considered to be a psychosis.[29][30] Li Li was ultimately convicted of violating the confidentiality clause of her contract and served two months in prison, but was allowed to continue her doctoral studies at the University of Technology of Compiègne.[31]

Germany[edit | edit source]

Germany suspects China of spying both on German corporations and on Uyghur expatriates living in the country.[32] [33]

The Federal Ministry of the Interior estimates that Chinese economic espionage could be costing Germany between 20 and 50 billions euros annually.[34] Spies are reportedly targeting mid- and small-scale companies that do not have as strong security regimens as larger corporations.[35] Berthold Stoppelkamp, head of the Working Group for Economic Security (ASW), stated that German companies had a poor security culture making espionage easier, exacerbated by the absence of a "strong, centralized" police command.[36] Walter Opfermann, a counter-intelligence expert for the state of Baden-Württemberg, claimed that China is using extremely sophisticated electronic attacks capable of endangering portions of critical German infrastructure, having gathered sensitive information through techniques such as phone hacking and Trojan emails.[37]

Between August and September 2007 Chinese hackers have been suspected of using Trojan horse spyware on various government computers, including those of the Chancellory, the Ministry of Economics and Technology, and the Ministry of Education and Research.[38][39] Germans officials believe Trojan viruses were inserted in Microsoft Word and PowerPoint files, and approximately 160 gigabytes of data were siphoned to Canton, Lanzhou and Beijing via South Korea, on instructions from the People's Liberation Army.[40]

In 2011, a 64-year old German man was charged with spying on Uighurs in Munich between April 2008 and October 2009.[41][42] Munich is a center for expatriate Uyghurs, and in November 2009 members of the Federal Criminal Police Office arrested four Chinese nationals on charges of spying on Uyghurs. In 2007 Chinese diplomat Ji Wumin left Germany after being observed meeting with individuals engaged in surveillance of Munich Uyghurs, and German investigators suspect China is coordinating espionage activities out of its Munich consulate in the Neuhausen district.[43]

Poland[edit | edit source]

In May 2009, Stefan Zielonka, a Polish cipher officer working for the Military Information Services, disappeared. He is suspected of providing the Chinese or Russian governments with Polish and NATO cryptography information.[44][45] Zielonka's body was later retrieved from the Vistula river, although investigators remain uncertain as to whether Zielonka was attempting to defect or commit suicide, or whether the body retrieved actually was Zielonka's.[46]

Russia[edit | edit source]

In December 2007, Igor Reshetin, the Chief Executive of Tsniimash-Export, and three researchers were sentenced to prison for passing on dual-purpose technology to the Chinese. Analysts speculated that the leaked technology could help China develop improved missiles and accelerate the Chinese space program.[47][48] In September 2010, the Russian Federal Security Service detained two scientists working at the Baltic State Technical University in Saint Petersburg. The two are charged with passing on classified information to China, possibly through the Harbin Engineering University.[49][50]

Sweden[edit | edit source]

Babur Maihesuti, a Chinese Uighur who became a Swedish citizen was arrested for spying on the Uighur refugee communities in Sweden, Norway, Germany and the United States, and ultimately sentenced for illegal espionage activity.[51][52][53]

United Kingdom[edit | edit source]

UK officials, including experts at its MI5 intelligence agency, are fearful that China could shut down businesses in the nation with Chinese cyber attacks and spy equipment embedded in computer and telecommunications equipment. [54][55]

Asia[edit | edit source]

India[edit | edit source]

India has quietly informed companies to avoid using Chinese-made telecommunications equipment, fearing that it may have spy capabilities embedded within it. And, India's intelligence service, Research and Analysis Wing (RAW) believes that China is using dozens of study centers that it has set up in Nepal near the Indian border in part for the purposes of spying on India.[56][57] In August 2011 a Chinese research vessel disguised as a fishing trawler was detected off the coast of Little Andaman, collecting data in a geostrategically sensitive region.[58][59]

The "Luckycat" hacking campaign that targeted Japan and Tibet also targeted India.[60][61] A Trojan horse was inserted into a Microsoft Word file ostensibly about India's ballistic missile defense program, allowing for the command and control servers to connect and extract information. The attacks were subsequently traced back to a Chinese graduate student from Sichuan and the Chinese government is suspected of planning the attacks. [62]

Japan[edit | edit source]

According to a report by Trend Micro the "Luckycat" hacker group is engaged in cyber-espionage on targets in Japan, India and Tibet. During the 2011 Tōhoku earthquake and tsunami and nuclear meltdowns at Fukushima, the hackers inserted a Trojan virus into PDF attachments to emails being circulated containing information about radiation dosage measurements.[60][63] Investigation into ownership of the command and control servers by Trend Micro and The New York Times linked the malware to Gu Kaiyuan, through QQ numbers and and the alias "scuhkr".[64][62] Mr. Gu is a former graduate student of the Information Security Institute of Sichuan University in Chengdu and wrote his master's thesis on computer hacking. [65] James A. Lewis of the Center for Strategic and International Studies, believes the attacks were state-sponsored.[62]

Sri Lanka[edit | edit source]

In Sri Lanka, Jayalalithaa Jayaram - head of the All India Anna Dravida Munnetra Kazhagam - stated that Chinese laborers working in parts of the country devastated by the Sri Lankan Civil War were infiltrated with Chinese spies on surveillance missions targeted at Tamil Nadu, India.[66]

Taiwan[edit | edit source]

The PRC and Taiwan regularly accuse each other of spying.[67] Presidential aide Wang Jen-ping was found in 2009 to have sold nearly 100 confidential documents to China since 2007; Military intelligence officer Lo Chi-cheng was found to have been acting as a double agent in 2010 for China since 2007; Maj. Gen. Lo Hsien-che, electronic communications and information bureau chief during the administration of former President Chen Shui-bian, has been suspected of selling military secrets to Mainland China since 2004.[68]

North America[edit | edit source]

Canada[edit | edit source]

Former Chineses spies have reported that China has more than 1000 spies in Canada, more than in any other country outside China. The Canadian government fears that the Chinese have stolen considerable business and industrial secrets from the country.[69][70] The head of the Canadian Security Intelligence Service Richard Fadden in a television interview was assumed to have implied that various Canadian politicians at provincial and municipal levels had ties to Chinese intelligence. In an interview, he claimed that some politicians were under the influence of a foreign government, but he withdrew the statement a few days later. It was assumed by Chinese groups in Canada, and others, that he was referring to China because in the same interview he stressed the high level of Chinese spying in Canada, however Fadden did not say specifically which country these politicians were under the influence of. His statement was withdrawn a few days later. [71]

In 2012 Mark Bourrie, an Ottawa-based freelance journalist, stated that the State Council-run Xinhua News Agency asked him to collect information on the Dalai Lama through their Ottawa bureau chief, Dacheng Zhang, by exploiting his journalistic access to the Parliament of Canada.[72] Bourrie stated that he was asked to write for Xinhua in 2009 and sought advice from the Canadian Security Intelligence Service (CSIS), but was ignored. Bourrie was asked to collected information on the Sixth World Parliamentarians' Convention on Tibet at the Ottawa Convention Centre, although Xinhua had no intention of writing a story on the proceedings. Bourrie stated that at that point "We were there under false pretenses, pretending to be journalists but acting as government agents."[73] Xinhua collects extensive information on Tibetan and Falun Gong dissidents in Canada, and is accused of being engaged in espionage by Chinese defector Chen Yonglin and Reporters Without Borders.[74]

United States[edit | edit source]

Main article: Chinese intelligence operations in the United States

China is suspected of having a long history of espionage in the United States against military and industrial secrets, often resorting to direct espionage, exploitation of commercial entities, and a network of scientific, academic, and business contacts. Several U.S. citizens have been convicted for spying for China. Naturalized citizen Dongfan Chung, an engineer working with Boeing, was the first person convicted under the Economic Espionage Act of 1996. Chung is suspected of having passed on classified information on designs including the Delta IV rocket, F-15 Eagle, B-52 Stratofortress and the CH-46 and CH-47 helicopters.[75]

China’s espionage and cyber attacks against the US government and business organizations are a major concern, according to the seventh annual report (issued Sept 2009) to the US Congress of the U.S.-China Economic and Security Review Commission.[76] “Although attribution is a problem in cyber attacks, the scale and coordination of the attacks strongly indicates Chinese state involvement,” said commission vice chairman Larry Wortzel. “In addition to harming U.S. interests, Chinese human and cyber espionage activities provide China with a method for leaping forward in economic, technological, and military development.” The report cited that the number of cyber attacks from China against the US Department of Defense computer systems had grown from 43,880 in 2007 to 54,640 in 2008, a nearly 20 percent increase.[77][78] Reuters reported that the Commission found that the Chinese government has placed many of its computer network responsibilities under the direction of the People's Liberation Army, and was using the data mostly for military purposes.[79] In response, China slammed the report as “full of prejudice,” and warning it could damage China-US relations. "We advise this so-called commission not to always view China through tinted glasses," Foreign Ministry spokesman Qin Gang said.[80]

In 2008 the Chinese government was accused of secretly copying information from the laptop of Commerce Secretary Carlos Gutierrez during a trade mission to Beijing in order to gain information on American corporations.[81][82] The allegations were subsequently dismissed by Qin Gang, a spokesman for the Ministry of Foreign Affairs of the People's Republic of China.[83]

Elsewhere[edit | edit source]

Australia[edit | edit source]

Australia believes that Chinese have been spying on Australian businesses and the Falun Gong movement. A former Chinese diplomat has claimed that he spied for China and that China has 1000 spies in Australia.[84][85] A male Chinese student from Fujian was granted a protection visa by the Refugee Review Tribunal of Australia after revealing that he had been instructed to spy on Australian targets in exchange for an overseas scholarship, reporting to the Ministry of State Security.[86] Reported targets included Chinese students with anti-Communist sentiments and Falun Gong practitioners.[87][88]

Nicola Roxon, the Attorney-General of Australia, blocked the Shenzhen-based corporation Huawei from seeking a supply contract for the National Broadband Network, on the advise of the Australian Security Intelligence Organisation.[89] The Australian government feared Huawei would provide backdoor access for Chinese cyber espionage.[90]

The Chinese government is suspected of orchestrating an attack on the email network used by the Parliament of Australia, allowing unauthorized access to thousands of emails and compromising the computers of several senior Australian politicians including Prime Minister Julia Gillard, Foreign Minister Kevin Rudd, and Minister of Defense Stephen Smith.[91][92]

Peru[edit | edit source]

The computer security firm ESET reported that tens of thousands of blueprints were stolen from Peruvian corporations through malware, which were traced to Chinese e-mail accounts. This was done through an AutoCAD worm called ACAD/Medre.A, written in AutoLISP, which located AutoCAD files, at which point they were sent to QQ and 163.com email accounts in China.[93] ESET research Righard Zwienenberg claimed this was Chinese industrial espionage.[94] The virus was mostly localized to Peru but spread to a few neighboring countries before being contained.[95]

Latin America[edit | edit source]

Experts believe that China has recently increased its spy capabilities in Latin America, perhaps with help from the Cuban government.[96]

See also[edit | edit source]

References[edit | edit source]

  1. Johnston, David (1999-05-23). "The Nation; Finding Spies Is the Easy Part". New York Times. http://query.nytimes.com/gst/fullpage.html?res=9D07E2DE1731F930A15756C0A96F958260. Retrieved 2008-04-07. 
  2. Shulsky, Abram N. & Schmitt, Gary J. (2004-04-22). "Son of Al Qaeda: Human Intelligence Collection". PBS. http://www.pbs.org/wgbh/pages/frontline/shows/khadr/readings/humint.html. Retrieved 2008-04-07. 
  3. Warrick, Joby & Johnson, Carrie (2008-04-03). "Chinese Spy 'Slept' In U.S. for 2 Decades". Washington Post. http://www.washingtonpost.com/wp-dyn/content/story/2008/04/02/ST2008040204050.html. Retrieved 2008-04-07. 
  4. "Downer can grant defector political asylum: lawyer". ABC News. 2005-06-06. http://www.abc.net.au/news/newsitems/200506/s1385007.htm. Retrieved 2008-04-07. 
  5. "Defectors say China running 1,000 spies in Canada". CBC News. 2005-06-15. http://www.cbc.ca/canada/story/2005/06/15/spies050615.html. Retrieved 2008-04-07. 
  6. Jeldres, Julio A. (2005-06-17). "Canberra wakes up to China 'spies'". Asia Times. http://www.atimes.com/atimes/China/GF17Ad06.html. Retrieved 2008-04-07. 
  7. "Beijing Denies Involvement in China Spy Case". VOA. 2008-04-01. Archived from the original on April 6, 2008. http://web.archive.org/web/20080406010708/http://www.voanews.com/english/2008-04-01-voa34.cfm. Retrieved 2008-04-07. 
  8. Frontline (2004-01-15). "From China With Love". PBS. http://www.pbs.org/wgbh/pages/frontline/shows/spy/etc/synopsis.html. Retrieved 2008-04-07. 
  9. Geis, Sonya (2006-05-25). "FBI Officials Are Faulted In Chinese Spying Case". Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2006/05/24/AR2006052402386_pf.html. Retrieved 2008-04-07. 
  10. Macartney, Jane (2007-12-05). "China hits back at 'slanderous and prejudiced' alert over cyber spies". The Times (London). http://www.timesonline.co.uk/tol/news/world/asia/article3000697.ece. Retrieved 2008-04-07. 
  11. Barnes, Julian E. (2008-03-04). "China's computer hacking worries Pentagon". Los Angeles Times. Archived from the original on March 10, 2008. http://web.archive.org/web/20080310042216/http://www.latimes.com/news/nationworld/world/la-fg-uschina4mar04,1,3559963.story. Retrieved 2008-03-04. 
  12. Brookes, Peter (2008-03-13). "Flashpoint: The Cyber Challenge: Cyber attacks are growing in number and sophistication". Family Security Matters. http://www.familysecuritymatters.org/homeland.php?id=1386912. Retrieved 2008-04-07. 
  13. "Major cyber spy network uncovered". BBC News. 2009-03-29. http://news.bbc.co.uk/2/hi/americas/7970471.stm. Retrieved 2009-03-29. 
  14. "Western spies vs. Chinese spies". Press TV. 2009-03-29. http://www.presstv.ir/detail.aspx?id=89917&sectionid=351020601. Retrieved 2009-03-29. 
  15. Sisk, Richard (2008-02-12). "Pentagon analyst, Chinese immigrant busted for Chinese espionage plots". Daily News. http://www.nydailynews.com/news/us_world/2008/02/12/2008-02-12_pentagon_analyst_chinese_immigrant_buste-2.html. Retrieved 2008-07-06. 
  16. McElroy, Damien (2005-07-03). "China aims spy network at trade secrets in Europe". Daily Telegraph (London). http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/07/03/wchin03.xml&sSheet=/news/2005/07/03/ixnewstop.html. Retrieved 2008-04-08. 
  17. "Report: China spies threaten U.S. technology". CNN. 2007-11-15. Archived from the original on January 20, 2008. http://web.archive.org/web/20080120120103/http://www.cnn.com/2007/TECH/11/15/us.china.tech.ap/. Retrieved 2008-04-08. 
  18. "US man jailed in China 'spy' case". Al Jazeera. 2008-03-24. http://english.aljazeera.net/NR/exeres/F1D09CD9-C268-4C73-ACE3-F32C6FD4AD83.htm. Retrieved 2008-04-08. 
  19. Ward, Olivia (2007-06-06). "Ex-envoy warns of Chinese spies". Toronto Star. http://www.thestar.com/News/article/222118. Retrieved 2008-04-08. 
  20. "Belgium accuses Chinese government of cyber-espionage". Sophos. 7 May 2008. http://www.sophos.com/pressoffice/news/articles/2008/05/belgium.html. Retrieved 24 December 2009. 
  21. Luard, Tim (22 July 2005). "China's spies come out from the cold". BBC. http://news.bbc.co.uk/2/hi/4704691.stm. Retrieved 21 August 2012. 
  22. "Chinese Students Running Industrial 'Spy Network' Across Europe: Report". Agence France-Presse via Spacedaily.com. 11 May 2005. http://www.spacedaily.com/news/china-05zw.html. Retrieved 24 December 2009. 
  23. McElroy, Damien (5 July 2005). "Chinese defector's spy claim". Sydney Morning Herald. http://www.smh.com.au/news/world/chinese-defectors-spy-claim/2005/07/04/1120329385689.html. Retrieved 21 August 2012. 
  24. Federal Bureau of Investigations (April 2011). "Higher Education and National Security: The Targeting of Sensitive, Proprietary, and Classified Information on Campuses of Higher Education". Federal Bureau of Investigations. https://www.fbi.gov/about-us/investigate/counterintelligence/higher-education-and-national-security. Retrieved 21 August 2012. 
  25. Agence France-Presse (12 May 2005). "Chinese students running ‘spy network’ in EU". The China Post. http://www.chinapost.com.tw/news/2005/05/12/62301/Chinese-students.htm. Retrieved 21 August 2012. 
  26. "European media repeatedly fabricate "Chinese espionage"". People's Daily Online. 1 July 2005. http://english.peopledaily.com.cn/200507/01/eng20050701_193539.html. Retrieved 21 August 2012. 
  27. http://www.nytimes.com/2009/07/02/world/asia/02shi.html New York TImes, Shi pei pu, singer spy and m butterfly, dies at 70, July 1, 2009
  28. http://www.spacedaily.com/news/china-05zw.html Space Daily, Chinese students running industrial spy network across Europe: report, May 11, 2005
  29. "Mata Hari chez Valeo". Le Nouvel Observateur. 19 May 2005. http://hebdo.nouvelobs.com/hebdo/parution/p2115/articles/a268885-mata_hari_chez_valeo_.html. Retrieved 28 January 2010. 
  30. "Espionnage industriel : de la faute professionnelle à la psychose". Le Point. 21 November 2007. http://www.lepoint.fr/actualites-technologie-internet/2007-11-21/espionnage-industriel-de-la-faute-professionnelle-a-la-psychose/1387/0/210971. Retrieved 28 January 2010. 
  31. Garwood, Jeremy (2008). "Live and Let Spy?". Lab Times online. http://www.labtimes.org/labtimes/issues/lt2008/lt03/lt_2008_03_18_21.pdf. Retrieved 21 August 2012. 
  32. http://www.thelocal.de/money/20090520-19399.html The Local, Russia and China spying on German firms
  33. http://www.spiegel.de/international/germany/0,1518,663090,00.html Spiegel, Germany suspects China of spying on Uighur expatriates, Nov 24 2009
  34. Press Trust of India (13 March 2012). "The Economic Times". http://articles.economictimes.indiatimes.com/2012-03-13/news/31159554_1_german-companies-german-firms-spy. Retrieved 21 August 2012. 
  35. Weiss, Richard (3 April 2012). "Chinese Espionage Targets Small German Companies, Die Welt Says". Bloomberg News. http://www.bloomberg.com/news/2012-04-04/chinese-espionage-targets-small-german-companies-die-welt-says.html. Retrieved 21 August 2012. 
  36. Gerlach, Marilyn. "Insight: How German history helps modern spies". Reuters. http://www.reuters.com/article/2012/03/13/us-germany-espionage-idUSBRE82C0CT20120313. Retrieved 21 August 2012. 
  37. Connolly, Kate (22 July 2009). "Germany accuses China of industrial espionage". The Guardian. http://www.guardian.co.uk/world/2009/jul/22/germany-china-industrial-espionage. Retrieved 21 August 2012. 
  38. Northrop Grumman (9 October 2009). "Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation". United States - China Economic and Security Review Commission. p. 72. http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf. Retrieved 21 August 2012. 
  39. "Chinese spying on German government computer: report". 25 August 2007. http://www.globalsecurity.org/intell/library/news/2007/intell-070825-irna01.htm. Retrieved 24 December 2009. 
  40. "Merkel's China Visit Marred by Hacking Allegations". Der Spiegel. 27 August 2012. http://www.spiegel.de/international/world/espionage-report-merkel-s-china-visit-marred-by-hacking-allegations-a-502169.html. Retrieved 21 August 0212. 
  41. The Associated Press (8 April 2011). "German man charged with spying on exiles for China". Fox News. http://www.foxnews.com/world/2011/04/08/german-man-charged-spying-exiles-china/. 
  42. The Associated Press (8 April 2011). "Prosecutors charge German man with spying on Uighur exiles for Chinese intelligence agency". The Washington Post. http://www.washingtonpost.com/world/prosecutors-charge-german-man-with-spying-on-uighur-exiles-for-chinese-intelligence-agency/2011/04/08/AF14S00C_story.html. Retrieved 11 April 2011. 
  43. Stark, Holger (24 November 2009). "Germany Suspects China of Spying on Uighur Expatriates". Der Spiegel. http://www.spiegel.de/international/germany/police-raid-in-munich-germany-suspects-china-of-spying-on-uighur-expatriates-a-663090.html. Retrieved 21 August 2012. 
  44. "Military coder confirmed dead?". Warsaw Business Journal. 6 May 2010. http://www.wbj.pl/article-49513-military-coder-confirmed-dead.html. Retrieved 21 August 2012. 
  45. "Polish cipher officer worked for Chinese intelligence?". Polskie Radio. 22 December 2009. http://www.thenews.pl/national/artykul122444_polish-cipher-officer-worked-for-chinese-intelligence-.html. Retrieved 24 December 2009. 
  46. "Body found in Vistula is missing signals officer". thenews.pl. 5 April 2010. http://www.thenews.pl/national/artykul130997_body-found-in-vistula-is-missing-signals-officer-.html. Retrieved 6 May 2010. 
  47. "Reshetin sentenced to 11.5 years for passing technology to China". RIA Novosti. 3 December 2010. http://en.rian.ru/russia/20071203/90747889.html. Retrieved 25 September 2010. 
  48. Blomfield, Adrian (1 March 2008). "Has Russia got a new Stalin?". The Daily Telegraph. http://www.telegraph.co.uk/news/worldnews/1580346/Has-Russia-got-a-new-Stalin.html. Retrieved 25 September 2010. 
  49. Taranova, Alexandra (22 September 2010). "2 Scientists Held in Murky Spy Case". The Moscow Times. http://www.themoscowtimes.com/news/article/2-scientists-held-in-murky-spy-case/416794.html. Retrieved 25 September 2010. 
  50. "Spies' arrest overshadowed by spy swap". United Press International. 22 September 2010. http://www.upi.com/Top_News/World-News/2010/09/22/Spies-arrest-overshadowed-by-spy-swap/UPI-93031285164114/. Retrieved 25 September 2010. 
  51. http://www.thelocal.se/19912/20090606/ The Local, Refugee spy remanded into custody, June 6, 2009
  52. "Swedish citizen charged with spying for China". Agence France-Presse via The Swedish Wire. 16 December 2009. http://www.swedishwire.com/component/content/article/1:business/2087:man-in-sweden-charged-with-spying-for-china. Retrieved 24 December 2009. 
  53. "Sweden: Uyghur sentenced for spying". United Nations Human Rights Council. 9 March 2010. http://www.unhcr.org/refworld/type,COUNTRYNEWS,,SWE,4bab813422,0.html. Retrieved 25 September 2010. 
  54. http://www.timesonline.co.uk/tol/news/uk/article5993156.ece Times of London, Spy chiefs fear Chinese cyber attack, March 29, 2009
  55. http://business.timesonline.co.uk/tol/business/industry_sectors/technology/article2980250.ece Times of London, MI5 alert on china's cyberspace spy threat, Dec 1 2007
  56. http://www.upiasia.com/Security/2009/10/08/indias_telecom_agency_raises_china_spy_scare/1789/ UPI Asia, Indias telecom agency raises china spy scare, Oct 8 2009
  57. http://timesofindia.indiatimes.com/india/China-using-Nepal-study-centres-for-spying/articleshow/5074293.cms Times of India, China using Nepal study centres for spying, Oct 1 2009
  58. "‘Chinese ship caught spying on India’". Zee News. 31 August 2011. http://zeenews.india.com/news/world/chinese-ship-caught-spying-on-india_729165.html. Retrieved 22 August 2012. 
  59. "Chinese spy ship docked at Colombo Port, says Indian media". News First. 31 August 2011. http://www.newsfirst.lk/english-news/index.php?view=news_more&id=2733. Retrieved 22 August 2012. 
  60. 60.0 60.1 Trend Micro (2012). "Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan". MalwareLab. p. 6. https://malwarelab.zendesk.com/attachments/token/9ka92cuff4jqaev/?name=wp_luckycat_redux-1.pdf. 
  61. Agence France-Presse (30 March 2012). "Security firm links cyber spy campaign to Chinese hacker". Google. http://www.google.com/hostednews/afp/article/ALeqM5g1d_hpHVoMeP9CAwP5y6lfv0qawg?docId=CNG.1a373e3c26419d71d6a65008c3cd7b33.1211. Retrieved 22 August 2012. 
  62. 62.0 62.1 62.2 Perlroth, Nicole (29 March 2012). "Case Based in China Puts a Face on Persistent Hacking". The New York Times. https://www.nytimes.com/2012/03/30/technology/hacking-in-asia-is-linked-to-chinese-ex-graduate-student.html?_r=3&scp=1&sq=luckycat&st=cse. Retrieved 21 August 2012. 
  63. Gonsalves, Antone (30 March 2012). "Hackers Linked To Cyber-Espionage In Japan, India, Tibet". CRN Magazine. http://www.crn.com/news/security/232800058/chinese-hackers-linked-to-cyber-espionage-in-japan-india-tibet.htm. Retrieved 21 August 2012. 
  64. Hopkins, Curt (30 March 2012). "Reports identify Chinese grad student in hacks against Tibetans, others". Ars Technica. http://arstechnica.com/business/2012/03/reports-identifies-chinese-grad-student-in-hacks-against-tibetans-others/. 
  65. Brown, Mark (30 March 2012). "Global cyberattacks linked to Chinese LuckyCat hacker group". Wired. http://www.wired.co.uk/news/archive/2012-03/30/luckycat. Retrieved 21 August 2012. 
  66. "Jayalalithaa alleges Chinese espionage in Lanka". Press Trust of India via The Daily Mirror. 19 June 2010. http://www.dailymirror.lk/print/index.php/news/front-page-news/13460-jayalalithaa-alleges-chinese-espionage-in-lanka-.html. Retrieved 27 June 2010. 
  67. http://www1.voanews.com/english/news/a-13-a-2003-12-24-45-China-66306757.html?moddate=2003-12-24 Voice of America, china accuses 43 of spying for Taiwan, Dec 24 2003
  68. United Daily News (11 February 2011). "The lost military soul", FocusTaiwan
  69. http://www.canada.com/montrealgazette/news/story.html?id=ca90416e-fe77-4b8d-ae59-a4e9f55b6441&k=26688 Canwest News Service, Government vows to curb Chinese spying on Canada, April 16, 2006
  70. http://www.cbc.ca/canada/story/2005/06/15/spies050615.html CBC News, Defectors say China running 1000 spies in Canada,June 15, 2005
  71. "Claims of divided loyalty anger Canadians". The Sydney Morning Herald. 28 June 2010. http://www.smh.com.au/world/claims-of-divided-loyalty-anger-canadians-20100627-zc38.html. Retrieved 27 June 2010. 
  72. The Canadian Press (22 August 2012). "Reporter says Chinese news agency asked him to spy". Canadian Broadcasting Corporation. http://www.cbc.ca/news/politics/story/2012/08/22/pol-cp-xinhua-spy-bourrie-allegation.html. Retrieved 22 August 2012. 
  73. Blanchfield, Mike (22 August 2012). "Ottawa bureau chief dismisses spying accusations against Chinese news agency as ‘Cold War’ ideology". The National Post. http://news.nationalpost.com/2012/08/22/bureau-chief-dismisses-spying-accusations-against-chinese-news-agency-as-cold-war-ideology/. Retrieved 22 August 2012. 
  74. Little, Matthew (23 August 2012). "Canadian Reporter Used as Spy for China". The Epoch Times. http://www.theepochtimes.com/n2/canada/canadian-reporter-used-as-spy-for-china-283035.html. Retrieved 22 August 2012. 
  75. Whitcomb, Dan (8 February 2010). "Ex-Boeing engineer gets 15 years in U.S. spy case". Reuters. http://www.reuters.com/article/idUSN0821290920100208. Retrieved 13 February 2010. 
  76. http://www.uscc.gov/pressreleases/2009/09_11_19pr.php US China Security and Review Commission, Nov 9 2009
  77. http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=221900505 Information Week, China cyber espionage threatens US, Nov 20 2009
  78. http://www.uscc.gov/annual_report/2009/09report_chapters.php USCC Annual Report
  79. http://www.reuters.com/article/newsOne/idUSTRE5AI5UZ20091119 China cyber spying growing against US, Reuters, Nov 19 2009
  80. http://www.google.com/hostednews/ap/article/ALeqM5h14LwiuVgsR8XxgGHKAXG9JxhlDwD9C54TEO0 Associated Press, China slams US report warning of spying by Beijing, Nov 23 2009[dead link]
  81. Koman, Richard (30 May 2008). "Did Chinese copy unattended U.S. laptop?". ZDNet. http://www.zdnet.com/blog/government/did-chinese-copy-unattended-u-s-laptop/3846. Retrieved 22 August 2012. 
  82. Leonard, Tom (30 May 2008). "Chinese spies stole US trade secretary data". The Daily Telegraph. http://www.telegraph.co.uk/news/worldnews/asia/china/2054874/Chinese-spies-stole-data-from-US-trade-secretarys-laptop.html. Retrieved 22 August 2012. 
  83. USA Today. "China denies hacking U.S. government computer". ABC News. http://abcnews.go.com/Technology/story?id=5014529&page=1#.UDXCedZlSSo. Retrieved 22 August 2012. 
  84. http://www.forbes.com/2009/04/03/china-spies-scare-markets-equity-rio.html Forbes, China Spies scare markets equity, April 3, 2009
  85. http://www.csmonitor.com/2005/0608/dailyUpdate.html Christian Science Monitor, Chinese spy ring in Australia, June 8, 2005
  86. Refugee Review Tribunal of Australia (8 June 2012). Australasian Legal Information Institute. http://www.austlii.edu.au/au/cases/cth/RRTA/2012/359.html. Retrieved 21 August 2012. 
  87. Granger, Daniel (9 August 2012). "Chinese Student Spy Defects to Australia". The Epoch Times. http://www.theepochtimes.com/n2/australia/chinese-student-spy-defects-to-australia-271572.html. Retrieved 21 August 2012. 
  88. New Tang Dynasty Television (13 August 2012). "Fearful Chinese Spy Applies for Protection". YouTube. https://www.youtube.com/watch?v=uDXTgTqT1Ao. Retrieved 21 August 2012. 
  89. Lu-YueYang, Maggie (26 March 2012). "Australia blocks China's Huawei from broadband tender". Reuters. http://www.reuters.com/article/2012/03/26/us-australia-huawei-nbn-idUSBRE82P0GA20120326. Retrieved 21 August 2012. 
  90. Theunissen, Matthew (28 March 2012). "Chinese espionage fears could damage NZ's global relations - analyst". New Zealand Herald. http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10795024. Retrieved 21 August 2012. 
  91. Benson, Simon (29 March 2011). "China spies suspected of hacking Julia Gillard's emails". News Limited. http://www.news.com.au/technology/federal-ministers-emails-suspected-of-being-hacked/story-e6frfrnr-1226029713668. Retrieved 21 August 2012. 
  92. Benson, Simon; Anne Wright (29 March 2011). "China suspected as spies hack Gillard". Herald Sun. http://www.heraldsun.com.au/news/china-suspected-as-spies-hack-gillard/story-e6frf7jo-1226029705738. Retrieved 21 August 2012. 
  93. Zweinnberg, Righard (22 June 2012). "ACAD/Medre.A – 10000′s of AutoCAD files leaked in suspected industrial espionage". ESET. http://blog.eset.com/2012/06/21/acadmedre-10000s-of-autocad-files-leaked-in-suspected-industrial-espionage. Retrieved 22 August 2012. 
  94. Williams, Christopher (21 June 2012). "Espionage virus sent blueprints to China". The Telegraph. http://www.telegraph.co.uk/technology/news/9346734/Espionage-virus-sent-blueprints-to-China.html. Retrieved 22 August 2012. 
  95. Gibbs, Mark (24 June 2012). "Malware Gets Snoopy". PCWorld. https://www.pcworld.com/article/258245/malware_gets_snoopy.html. Retrieved 22 August 2012. 
  96. http://news.bbc.co.uk/2/hi/americas/8376363.stm BBC News, The role of spies in Latin America, Nov 28 2009

External links[edit | edit source]

Community content is available under CC-BY-SA unless otherwise noted.