
- Inside China’s Expanding Intelligence Footprint in the US
- Understanding China’s Multi-Layered Intelligence Strategy
- The New Age of Espionage: Technology, Influence and the US–China Rivalry
By Jai Kumar Verma
New Delhi. 08 April 2026. In an era defined by technological rivalry and strategic competition, espionage has re-emerged as a central instrument of statecraft. The article explores how alleged Chinese intelligence operations within the United States are reshaping global security narratives. Moving beyond traditional spy craft, these activities, ranging from cyber intrusions to influence operations, reflect a deeper contest for technological supremacy, economic advantage, and geopolitical influence. As the lines blur between cooperation and competition, the story highlights how intelligence operations are increasingly embedded in the fabric of twenty-first century international relations.
Chinese espionage activities in the United States have moved to the forefront of strategic discourse. American intelligence agencies and policymakers increasingly view such operations as part of a long-term effort to gain economic, military, and political advantages. Alleged activities range from cyber espionage and data breaches to attempts at influencing institutions and accessing sensitive research. Though debated and sometimes contested, these claims reflect rising global tensions and show how espionage has become a key tool in shaping twenty-first century geopolitics.
The strategic objectives of Chinese intelligence agencies, particularly the Ministry of State Security (MSS), are closely aligned with China’s long-term national ambitions of becoming a leading global power. A key priority is technological advancement, with efforts directed toward acquiring cutting-edge knowledge in areas such as artificial intelligence, semiconductors, and aerospace to reduce dependence on foreign innovation. Parallel to this is the goal of military modernisation, where intelligence gathering supports the development of advanced defense capabilities and strategic deterrence. Economic competitiveness is another central objective, with alleged activities aimed at gaining access to trade secrets and boosting domestic industries. Additionally, these agencies are believed to engage in political influence operations abroad, seeking to shape narratives, policies, and public opinion in ways that are favourable to China’s interests, thereby strengthening its position on the global stage.
Observers and China watchers have long argued that Chinese intelligence agencies play a significant role in economic and industrial espionage, particularly in the alleged theft of trade secrets and intellectual property. Such activities are often viewed as part of a broader strategy to accelerate domestic innovation and reduce reliance on foreign technologies. High-value sectors including semiconductors, pharmaceuticals, and defense contracting are frequently cited as prime targets due to their strategic and commercial importance. Methods reportedly range from cyber intrusions and insider recruitment to joint ventures and academic collaborations that may be exploited for sensitive information. The Federal Bureau of Investigation (FBI) has consistently warned that these activities represent a substantial counterintelligence challenge, emphasizing the scale and persistence of attempts linked to Chinese actors. While these claims remain a subject of debate, they underscore growing concerns about safeguarding critical technologies.
Several high-profile cases have often been cited to illustrate concerns around alleged Chinese-linked industrial espionage. The case involving Micron Technology drew attention when trade secret disputes emerged in the semiconductor sector, highlighting vulnerabilities in protecting proprietary designs. Similarly, DuPont has been associated with incidents involving the alleged theft of chemical manufacturing secrets, raising alarms about risks to industrial innovation. U.S. authorities have pointed to such cases as examples of broader patterns, though legal outcomes and interpretations vary. Together, these incidents have reinforced calls for stricter safeguards and vigilance across sensitive industries.
China has often been associated with sophisticated cyber espionage operations aimed at gaining strategic, political, and economic advantages. These activities typically involve infiltrating government agencies, private corporations, and critical infrastructure systems to extract sensitive information over extended periods. Such campaigns are usually stealthy and highly coordinated, enabling attackers to remain undetected while conducting long-term data exfiltration. A prominent example is the Office of Personnel Management data breach, which compromised personal and security clearance information of millions of U.S. government employees, raising serious national security concerns. Cybersecurity firms have also attributed numerous global intrusion campaigns to groups like APT10 and APT41, which are believed to operate with state backing. These groups are known for targeting intellectual property, trade secrets, and confidential communications, highlighting the growing role of cyber capabilities in modern geopolitical competition. One notable case is Xu Yanjun, a Chinese intelligence officer arrested in Belgium and extradited to the United States in 2018. He was accused of attempting to steal aviation trade secrets from American companies through cyber and human intelligence operations, highlighting China’s blended espionage tactics.
Concerns about academic and research infiltration have grown in the United States, particularly around the potential transfer of sensitive knowledge to foreign institutions. Authorities have highlighted cases where researchers allegedly failed to disclose affiliations with Chinese universities or participation in state-linked initiatives such as the Thousand Talents Plan, which has been scrutinized for incentivizing technology transfer. These concerns often centre on transparency and compliance rather than collaboration itself. Importantly, most international academic partnerships remain legitimate and valuable; the issue arises when non-disclosure or misuse of research undermines institutional integrity and national security safeguards. Su Bin, a Chinese national pleaded guilty in the United States in 2016 for his role in a conspiracy to hack U.S. defense contractors. He helped obtain sensitive military data, including information on transport aircraft, and shared it with contacts in China, highlighting cyber-enabled espionage efforts.
China’s influence operations often work through networks aligned with the Chinese Communist Party’s United Front system, aiming to shape narratives abroad via cultural groups, business associations, and student bodies. These efforts may include lobbying politicians and monitoring diaspora communities. A notable example is Christine Fang, who reportedly cultivated relationships with local US officials to gain political access and subtly influence perceptions. Such cases highlight concerns about covert foreign political engagement.
U.S. authorities have pursued numerous legal cases addressing alleged Chinese espionage and influence activities, often focusing on individuals accused of acting as unregistered foreign agents or stealing sensitive research and trade secrets. These prosecutions have involved academics, business figures, and government-linked actors. The United States Department of Justice also launched the China Initiative in 2018 to counter such threats, though it ended in 2022 amid concerns over racial profiling and limited results. A prominent example is Charles Lieber, convicted for failing to disclose ties to Chinese funding programs, highlighting legal risks around transparency and foreign collaboration.
Concerns about espionage via technology and infrastructure centre on the potential for sensitive data access through telecom networks, hardware, and digital platforms. U.S. officials have imposed restrictions on firms like Huawei and ZTE, citing national security risks related to data interception and system vulnerabilities—allegations both companies deny. Beyond infrastructure, intelligence cases also highlight influence concerns: for example, Ji Chaoqun was convicted of acting as an unregistered agent, accused of gathering information on individuals and networks, underscoring fears of combined technological and human intelligence efforts.
U.S. counterintelligence efforts have intensified in response to concerns about Chinese espionage and influence operations. Agencies such as the FBI and Central Intelligence Agency (CIA) lead investigations into suspected activities, while policymakers have introduced export controls to limit China’s access to advanced technologies like semiconductors. Authorities have also strengthened cybersecurity standards to protect critical infrastructure and data. A notable case is Katrina Leung, who maintained relationships with U.S. officials while allegedly passing information to Chinese handlers, illustrating long-standing concerns over influence and intelligence penetration. (The details about Katrina Leung can be seen in an article captioned as “The high value double agent Katrina Leung” in following link https://www.aviation-defence-universe.com/the-high-value-double-agent-katrina-leung/)
An often-cited example in public discourse is Christine Fang, who reportedly built relationships with local politicians to gain influence. While such cases raise legitimate concerns, critics caution against generalizing them to broader communities, emphasizing the importance of evidence-based policy responses.
In view of the activities of Chinese intelligence agencies, Indian security agencies must adopt a multi-layered counterintelligence framework to address potential infiltration by foreign agents, particularly those linked to China and supported through networks involving foreign nationals, including individuals from Pakistan. Strengthening border management through advanced surveillance systems, biometric verification, and intelligence-sharing between central and state agencies is critical. Agencies should enhance scrutiny of visa processes, cross-border movement, and undocumented migration routes. Additionally, robust background checks in sensitive sectors such as telecommunications, defense, and research institutions can help prevent insider threats and unauthorized access to strategic information.
Equally important is the development of sophisticated cyber and human intelligence capabilities to detect covert networks and influence operations. Indian agencies should invest in monitoring financial transactions, shell organizations, and digital communications that may indicate espionage links. Collaboration with international partners can improve threat assessment and early warning systems. Public awareness programs and community engagement, especially in border regions, can help identify suspicious activities without fostering distrust. At the same time, strict adherence to legal safeguards and avoidance of profiling are essential to maintain civil liberties while ensuring national security and resilience against foreign intelligence penetration.
Concerns about Chinese influence operations, espionage and transnational repression reflect a complex intersection of national security, technology, and global diplomacy. While documented cases—such as those involving alleged agents like Christine Fang—underscore the real risks of covert intelligence and political influence, the broader debate highlights the need for careful, evidence-based responses. U.S. counterintelligence efforts, including investigations by the FBI and the CIA, export controls, and strengthened cybersecurity frameworks, aim to mitigate these threats without unduly harming scientific collaboration or civil liberties.
In India, direct Chinese espionage cases are less visible but concerns persist over cyber intrusions and surveillance linked to China, including attacks on power grids and telecom networks. Indian agencies have flagged reconnaissance attempts near sensitive border areas and risks from technology partnerships. More commonly, espionage cases involve operatives linked to Pakistan’s Inter-Services Intelligence (ISI), using honey traps, diplomatic channels, or illegal entry routes via Nepal. While no major confirmed cases of Pakistanis acting directly as Chinese agents are public, overlapping networks and shared strategic interests remain a continuing security concern. The observers claim that ISI might be sharing intelligence collected in India with China and the possibility, that Beijing assign tasks to Islamabad and ISI after collecting intelligence, communicates it to China, cannot be ruled out.
The evolving discourse around Chinese espionage in the United States underscores the complexity of modern geopolitics, where security concerns intersect with technology, academia, and global commerce. While documented cases point to genuine risks, the debate also reveals the dangers of overreach, politicisation, and unintended consequences such as mistrust and profiling. As nations navigate this delicate balance, the challenge lies in crafting responses that are both firm and fair—protecting national interests without undermining openness and collaboration. Ultimately, the issue is not just about espionage, but about how global powers manage competition in an interconnected world.
(Jai Kumar Verma is a Delhi-based strategic analyst and Life Member of United Services Institute of India and member of The Manohar Parrikar Institute for Defence Studies and Analyses. The views in the article are solely the author’s. He can be contacted at editor.adu@gmail.com)






















