Chinese espionage operations in the U.S. are “off the scale,” warns analyst
By Ramon Tomey // Oct 12, 2020

China’s global espionage operations have ramped up over the past decade and are now “off the scale.” This is according to Nicholas Eftimiades, a former senior U.S. intelligence official, who has been analyzing Beijing’s espionage activities for about three decades.


Eftimiades noted that China has been involved in more than 600 espionage cases over the past decade. These cases included theft of trade secrets, illegal export of key technologies for national security, cyberhacking and traditional spying.

More disturbingly, western governments have mostly been ignoring these for years. Talking to The Epoch Times, he said that the U.S. and other Western countries ignored his warnings about Chinese espionage when he first wrote about the subject in his 1994 book titled “Chinese Intelligence Operations.”

It was only during the current administration of President Donald Trump that the country started to understand the threat from China. Given that America’s response against Chinese espionage had been “lacking” for the past decade, intelligence and enforcement agencies have had to catch up.

The intelligence analyst said there was almost no way of finding out the full extent of Beijing’s spy efforts and noted that it could range from tens of thousands of cases up to hundreds of thousands.

Eftimiades explained that China has adopted a “whole-of-society” approach to obtaining foreign intellectual property (IP) through state agencies, state-owned enterprises, private enterprises and individual researchers. A substantial chunk of the foreign IP theft focused on aviation, information technology, energy and new materials – key sectors mentioned in the Chinese government’s “Made in China 2025” industrial policy.

American response to Chinese espionage “not very good”

According to Eftimiades, America's response to Chinese espionage has “not been very good.” He cited multiple instances of intelligence officers being recruited to spy for the communist country.

Federal authorities arrested Baimadajie Angwang, a naturalized U.S. citizen, last September for allegedly spying for China. Angwang used his position as a New York City Police Department officer to report on the activities of ethnic Tibetans at the behest of Chinese Consulate officials. Later that month, a federal judge denied bail to the former police officer over concerns that Angwang will seek protection from the Chinese Consulate if released from custody.

Less than a year before Angwang’s arrest, authorities bagged a naturalized citizen who planned to share sensitive information with China. Jerry Chun Shing Lee, a former officer of the Central Intelligence Agency, was sentenced to 19 years in prison in November 2019. The Hong Kong-born Lee pleaded guilty in May to the charge of conspiring to deliver information to Chinese agents – who promised to take care of him “for life” if he provided the information they needed.

Chinese espionage extends to cyberspace

Aside from recruiting individual operatives, the Chinese government has performed cyber-espionage efforts using both technology and human agents. Eftimiades described these efforts as “masterfully executed.”

The private sector, however, has yet to come to grips with the extent of Chinese espionage.

“Western industries as a whole remain quite ignorant of what’s happening,” Eftimiades said, adding that he was “routinely surprised” by the “lackadaisical” response of industries not related to defense technology.

He cited a report by U.S. cybersecurity firm Crowdstrike outlining an operation by Chinese hackers, intelligence officers and company staff members to obtain key aviation technology data. Orhcestrated by a branch of China’s Ministry of State Security, the operation managed to get data from a number of aviation companies over a five-year period. (Related: 5 Chinese nationals charged with hacking more than 100 companies worldwide.)

Despite moves by federal authorities to stop Chinese espionage, Eftimiades said that the U.S. is still likely “very deeply penetrated.”

With this in mind, a stronger response is needed to address China’s in both the real world and in cyberspace to ensure U.S national security is not undermined.

Sources include: 1 2

Take Action:
Support NewsTarget by linking to this article from your website.
Permalink to this article:
Embed article link:
Reprinting this article:
Non-commercial use is permitted with credit to (including a clickable link).
Please contact us for more information.
Free Email Alerts
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more. © 2022 All Rights Reserved. All content posted on this site is commentary or opinion and is protected under Free Speech. is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms and those published on this site. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.

This site uses cookies
News Target uses cookies to improve your experience on our site. By using this site, you agree to our privacy policy.
Learn More
Get 100% real, uncensored news delivered straight to your inbox
You can unsubscribe at any time. Your email privacy is completely protected.