From China with Love: Beijing Deploys PLA Spy Waitresses to Observe President Trump and the U.S. Delegates in China.

James Bond willingly inserts himself into an assassination plot involving a naive Russian beauty in order to retrieve a Soviet encryption device that was stolen by the evil SPECTRE organization.

James Bond searches for a Lektor cryptographic device that could wreak havoc worldwide and stops SPECTRE, a secret crime organisation, from acquiring it.

There was no Lektor cryptographic device, but China unleashed a web of spy watchers to observe the summit between President Trump and President Xi.

James Bond movies played in real time in Beijing as American delegates dumped all the gifts, devices, and event passes they had received during their Beijing visits into the bin before boarding Air Force One.

Over 80 percent of U.S. DOJ National Security Division cases have involved China since 2012. China has targeted the aerospace, semiconductors, defence, AI, and agricultural chemicals sectors, which cost the U.S. economy an annual loss of $600 billion.

Trump’s state visit to China

President Donald Trump struck a conciliatory tone during his trip to China. He returned from his Beijing summit with Xi Jinping yesterday full of praise for the “great leader,” who is, in Trump’s estimations, “an incredible guy.” The summit was “very successful, world-renowned, and unforgettable,” according to the President, who insisted that “a lot of different problems were settled.” But there’s one problem that hasn’t been addressed: the growing number of Chinese operations on US soil.

Eileen Wang, unsolved mystery

Last week Eileen Wang, the mayor of the southern Californian city of Arcadia agreed to plead guilty to acting as an illegal agent of China. She was once regarded as a rising political star, named “woman of the year” in 2024 by Californian Congresswoman Judy Chu, who applauded her “strong voice, leadership, and dedication to serving her community.” Her plea came just two days before a New York man was found guilty of acting as a Chinese agent, having been accused of operating a “secret police station” on behalf of Beijing.

The latest cases are “just the tip of the iceberg,” according to Michael Lucci, the founder of Armor Action, a conservative group that monitors threats from China. While the Washington DC based Center for Strategic and International Studies warned last week that Beijing has “aggressively ramped up its offensive irregular warfare activities against the United States.”

China’s espionage and influence operations are extensive. They range from attempts to intimidate dissidents living in the US to the peddling of Communist party propaganda, the recruiting of members of the military to steal state secrets to the theft of artificial intelligence know-how and the smuggling of top-end chips to train AI models. Late last year, a Chinese national even pleaded guilty to bringing a biological pathogen into the US. Multiple Chinese-linked biolabs have been found across the country, often in residential areas and with garages filled with potentially deadly viruses.

Eileen Wang, who could face as many as ten years in jail, ran a website called the US News Center, which described itself as a source of news for Chinese Americans living in Arcadia, but was accused of pumping out CCP propaganda. The Department of Justice said a Chinese government official sent Wang pre-written articles via the WeChat messaging app, a Chinese phone application widely used in the Chinese diaspora. One article identified by the DoJ denied allegations of well-documented abuse of ethnic Uyghurs in Xinjiang province.

Chinese State-backed Espionage

Chinese state‑backed espionage activity across the United States, Australia, and Europe follows a consistent pattern: long‑term infiltration, credential harvesting, and targeting of government, defense, telecom, and critical infrastructure networks. The most important trend is the shift from simple data theft to pre‑positioning for potential disruption of national infrastructure.

Chinese APT groups have conducted multi‑year intrusions into U.S. networks, especially telecommunications, transportation, government systems and defense‑related networks.

Key characteristics

  • U.S. agencies (CISA, FBI, NSA) warned in 2024–2026 that Chinese APTs such as Salt Typhoon exploited vulnerabilities in routers and firewalls to gain persistent access.
  • Attackers modified access control lists, opened non‑standard ports, and captured sensitive network traffic for credential harvesting.
  • The strategic shift: from espionage to preparing for possible disruption of critical services.

This represents one of the most serious long‑term cyber threats facing the U.S.

Chinese operations in Australia  

Although the search results did not return Australia-specific reporting in this query, Australia has historically been a major target of Chinese intelligence operations due to its status as a Five Eyes nation, strategic geography in the Indo-Pacific, and political stance on foreign interference.

Based on well‑documented patterns (inference noted), Chinese operations in Australia typically include attempts to influence political processes, cyber intrusions into universities, research institutions, and government agencies, targeting of critical infrastructure and telecom networks.

Renewed Targeting of EU & NATO

Europe has seen a major resurgence of Chinese espionage activity since mid‑2025.

TA416 (aka Mustang Panda / Twill Typhoon) operations targeted Europe after years of reduced activity, targeting EU governments, NATO delegations, and diplomatic missions. Activity spiked immediately after the 25th EU–China summit.

TA416 used highly adaptive infection chains, reconnaissance emails with tracking pixels, and cloud‑hosted malware delivery. Final payload often involved PlugX backdoors delivered via DLL sideloading.

Chinese groups leaked 350GB of stolen European Commission data on the dark web. Another China‑linked actor was found embedded inside European telecom networks.

Summary Table — Chinese Espionage Activity (2024–2026)

RegionPrimary TargetsKey APT BehaviorStrategic Goal
United StatesCritical infrastructure, telecom, defensePersistent access via routers/firewalls; credential harvestingPre‑positioning for disruption; long‑term espionage
AustraliaGovernment, academia, critical infrastructure (inferred from historical patterns)Political interference, cyber intrusionsIntelligence collection; influence operations
Europe (EU & NATO)Diplomatic missions, EU institutions, telecomTA416 adaptive phishing, PlugX backdoors, cloud‑based deliveryIntelligence on EU–China tensions, NATO, Ukraine war

Timeline of Major Chinese Espionage Operations (2000–2025)

Below is a clean, chronological, evidence‑based timeline of major Chinese espionage operations, drawn directly from the search results and expanded with structured context. Each entry includes what happened, why it mattered, and how it fits into China’s broader intelligence strategy.

2000–2008 — Foundation of Modern Chinese Espionage Abroad

This period established the legal and operational patterns that would define the next two decades.

2001–2006 — Fei Ye & Ming Zhong Case

  • Stole microprocessor design trade secrets from Sun Microsystems, NEC, and Transmeta.
  • Intended to use the stolen IP to start a company in China.
  • Both pleaded guilty in 2006.

Early 2000s — Peter Lee Case

  • Passed classified U.S. national defense information to Chinese scientists.
  • Sentenced to 12 months in a halfway house.

2004 — Yan Ming Shan Case

  • Attempted to illegally export sensitive U.S. software technology to China.

2008 — Dongfan Chung Case

  • Boeing engineer stole secrets on the Space Shuttle, C‑17, and Delta IV rocket.
  • One of the most damaging aerospace espionage cases of the decade.

2008 — Tai Shen Kuo Case

  • Provided China with classified information between 2007–2008.

2009–2015 — Expansion into Cyber & Industrial Espionage

China’s Ministry of State Security (MSS) and PLA units expanded cyber operations globally, targeting defence contractors, semiconductor firms, aerospace companies and Western government networks.

This era saw the rise of PLA Unit 61398 (APT1), responsible for massive cyber intrusions into U.S. companies.

2016–2020 — Globalization of Chinese Intelligence Activity

According to the search results, Chinese intelligence activity abroad during this period involved Cyber espionage, signals intelligence, Human intelligence (HUMINT), United Front influence operations and Industrial espionage.

Chinese cyber units conducted intrusions in Australia, New Zealand, Canada, France, Germany, the Netherlands, the UK, India, and the United States. This reflects a worldwide expansion of MSS and PLA cyber operations.

China also intensified transnational repression of dissidents abroad, including Uyghurs, Tibetans, Hong Kong activists, and Falun Gong practitioners.

China’s HUMINT operations abroad focus heavily on diaspora infiltration, activist monitoring, and coercion, rather than classic Cold War–style spy arrests.

The most clearly documented arrest and conviction is the 2025 Germany case.

Many other incidents involve detentions, exposures, or coerced informants, reflecting a modern model of transnational repression.

China’s 2017 National Intelligence Law requires all citizens and organisations to support intelligence work. China uses non-traditional collectors, such as Chinese intelligence, which frequently uses Students, Researchers, Businesspeople, and front companies.

Condensed Timeline Table

PeriodMajor EventsStrategic Significance
2001–2006Fei Ye & Ming Zhong microprocessor theftEarly economic espionage precedent
Early 2000sPeter Lee passes defense secretsHighlighted vulnerabilities in U.S. defense sector
2004Yan Ming Shan export attemptGrowing concern over tech transfer
2008Dongfan Chung aerospace espionageMajor breach of U.S. aerospace secrets
2008Tai Shen Kuo HUMINT caseTraditional espionage still active
2010sGlobal cyber expansion (APT1, PLA units)China becomes dominant cyber actor
2017National Intelligence LawLegalizes broad civilian support for espionage
2012–202580% of U.S. NSD cases involve ChinaMassive scale of economic espionage
2024–2025Global cyber intrusions across Five Eyes & EUWorldwide offensive cyber posture

A region‑by‑region breakdown of specific APT groups

Below is a region‑by‑region breakdown of the major Chinese APT groups active in the United States, Australia, and Europe, built directly from the search results and expanded with structured analysis. This gives you a clean operational picture of which groups operate where, what they target, and how they differ.

The U.S. is the primary global target of Chinese cyber espionage. The most active groups include:

Salt Typhoon

  • Identified as the top threat in the 2025 joint international advisory.
  • Targets: Telecommunications, critical infrastructure, transportation, military networks.
  • Capabilities: Long‑term persistence, stealthy router exploitation, ability to disrupt systems.
  • Backed by: Three Chinese companies providing resources and intelligence.

APT1 (Comment Crew)

  • Targets: Defense, aerospace, technology.
  • Tools: Custom malware, Mimikatz.

APT3 (Gothic Panda)

  • Targets: Aerospace, defense, technology.
  • Tools: BACKSPACE, COOKIEBAG.

APT10 (Stone Panda)

  • Targets: Healthcare, defense, aerospace.
  • Tools: ChChes, QuasarRAT.

APT41 (Winnti/BARIUM)

  • Hybrid espionage + financially motivated attacks.
  • Targets: Healthcare, telecom, video game industry.
  • Tools: Winnti malware family, Cobalt Strike.

GhostEmperor, OPERATOR PANDA, UNC5807

  • Identified in 2025 advisory as active in U.S. critical infrastructure intrusions.

Australia — Five Eyes Targeting & Critical Infrastructure

Australia is a high-priority target because of its Five Eyes membership and its Indo-Pacific strategic position.

The 2025 joint advisory explicitly includes Australia as a contributor and target of the same Chinese APT ecosystem.

Salt Typhoon

  • Actively targeting Australian telecom and infrastructure networks.
  • Uses router exploitation to maintain persistent access.

APT40 (Leviathan/Periscope)

  • Targets: Maritime industries, sectors tied to Belt & Road.
  • Highly relevant to Australia due to maritime geography.

APT27 (Emissary Panda/LuckyMouse)

  • Targets: Government and defense sectors in Central Asia and Europe, but historically active in broader regions including Five Eyes.
  • Tools: HyperBro, PlugX.

RedMike, OPERATOR PANDA, GhostEmperor

  • Listed in the 2025 advisory as part of the overlapping Chinese threat ecosystem affecting Australia.

Key pattern: Australia is hit by the same APT clusters that target the U.S., especially those focused on telecom, defense, and maritime intelligence.

Europe — Diplomatic, Government, and Industrial Espionage

Europe faces a broad spectrum of Chinese APT activity, especially around EU institutions, NATO, and high‑tech industries.

APT27 (Emissary Panda)

  • Targets: Government and defense sectors in Central Asia and Europe.
  • Tools: HyperBro, PlugX.

APT31 (Zirconium/Judgment Panda)

  • Targets: Political entities, defense, high‑tech sectors.
  • Tools: Custom implants + public tools.

APT17 (DeputyDog)

  • Targets: Government, law enforcement, technology firms.
  • Tools: BLACKCOFFEE, Hikit.

Bronze Union (Emissary Panda variant)

  • Targets: Economic and industrial espionage across Europe.
  • Tools: PlugX, ZxShell.

Salt Typhoon & related clusters

  • The 2025 advisory includes Germany, Italy, Netherlands, Finland, Spain, Poland as signatories, indicating active targeting.

GhostEmperor, UNC5807, OPERATOR PANDA

  • Identified as part of the global campaign affecting European telecom and infrastructure networks.

Regional Comparison Table

RegionMost Active APT GroupsPrimary TargetsKey Tactics
United StatesSalt Typhoon, APT1, APT3, APT10, APT41, GhostEmperorTelecom, critical infrastructure, defense, aerospaceRouter exploitation, long‑term persistence, credential theft
AustraliaSalt Typhoon, APT40, APT27, RedMike, GhostEmperorTelecom, maritime, defense, critical infrastructureInfrastructure infiltration, maritime intel collection
EuropeAPT27, APT31, APT17, Bronze Union, Salt Typhoon clustersEU institutions, NATO, high‑tech, governmentDiplomatic targeting, PlugX backdoors, political espionage

© 2026, GDC. © GDC and www.globaldefensecorp.com. Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to www.globaldefensecorp.com with appropriate and specific direction to the original content.