Chinese defector reveals identities of Chinese undercover spies in Asia and Australia
November 25, 2019 4 Comments
A Chinese intelligence defector has reportedly given the Australian government information about entire networks of Chinese undercover spies in Hong Kong, Taiwan and Australia, according to reports. The story of Wang “William” Liqiang, made headlines all over Australia during the weekend, culminating in an entire episode of 60 Minutes Australia about him airing on Sunday. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son, who live in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).
Police in the Chinese city of Shanghai claim that Mr. Wang is a small-time criminal who has been found guilty of using fraudulent documents and has a 15-month suspended prison sentence on his record. In a statement issued on Sunday, China’s embassy in Canberra described Mr. Wang as a “convicted fraudster” who was “wanted by police after fleeing [China] on a fake passport”. But according to reports in the Australian media, Mr. Wang has provided the ASIO with a 17-page sworn statement, in which he details his work as an undercover intelligence officer. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they organize and implement espionage operations on behalf of Bejing.
In a leading article published on Saturday, The Sydney Morning Herald referred to Mr. Wang as “the first Chinese operative to ever blow his cover” and claimed that he had given the ASIO “a trove of unprecedented inside intelligence” about Chinese espionage operations in Southeast Asia. The newspaper said that the defector had revealed details about entire networks of Chinese intelligence operatives in Taiwan and Hong Kong. He also reportedly provided identifying information about deep-cover Chinese intelligence networks in Australia.
Meanwhile, in an unrelated development, Australian media said yesterday that the ASIO was examining allegations that a Chinese espionage ring tried to recruit an Australian businessman of Chinese background and convince him to run for parliament. According to reports, the spy ring approached Nick Zhao, a successful luxury car dealer, and offered to fund his political campaign with nearly $700,000 (AUS$1 million) if he run as a candidate for the Liberal Party of Australia. Zhao reportedly told the ASIO about the incident last year, shortly before he was found dead in a Melbourne hotel room. His death remains under investigation.
► Author: Joseph Fitsanakis | Date: 25 November 2019 | Permalink
The United States has pressed espionage charges against a naturalized American citizen who operated as a courier for Chinese intelligence while working as a tour operator in California. On Monday federal prosecutors in San Francisco filed espionage charges against Xuehua “Edward” Peng, a 56-year-old Chinese-born American citizen. Peng, a trained mechanical engineer, reportedly entered the United States in June 2001 on a temporary visa. In 2012 he became a naturalized American citizen. By that time he was working for US Tour and Travel, an independent tour operator in California.
In a move observers describe as unprecedented, a United States government regulator is preparing to recommend blocking the construction of an 8,000-mile long undersea cable linking America with China, allegedly due to national security concerns. Washington has never before halted the construction of undersea cables, which form the global backbone of the Internet by facilitating nearly 100% of Internet traffic. Much of the undersea cable network is in the process of being replaced by modern optical cables that can facilitate faster Internet-based communications than ever before.
A Swiss court has ordered the extradition to the United States of the brother of one of the world’s leading biochemists, who spied on a British pharmaceutical firm to help a Chinese startup. The extradition is part of a large corporate espionage case centered on Yu Xue, a Chinese scientist described by US federal prosecutors as “one of the world’s top protein biochemists”. Yu specializes in drug research for cancer and other serious terminal illnesses. From 2006 until 2016 he worked in the US for GlaxoSmithKline (GSK), a leading British pharmaceutical group.
The Polish government has authorized the release on bail of a former counterintelligence officer who was charged in January of this year with spying for China. The man has been identified in media reports as Piotr Durbajlo and is believed to have served as deputy director of the Internal Security Agency, Poland’s domestic counterintelligence service. A cyber security expert, Durbajlo also served in Poland’s Office of Electronic Communications with a top security clearance and unrestricted access to classified systems of Poland and the North Atlantic Treaty Organization, of which Poland is a member.
A hacker attack of impressive magnitude targeted specific individuals of interest to the Chinese government as they moved around the world, in what appears to be the first such operation in the history of cyberespionage. The attack was revealed late last month by Cybereason, an American cybersecurity firm based in Boston, Massachusetts. Company experts
Despite allegations in the French press that China has been spying for years on the internal communications of the African Union, the organization appears to be deepening its ties with a leading Chinese telecommunications firm. The allegations
German intelligence officials appear to be dismissing Washington’s warning that it will limit security cooperation with Berlin if China’s Huawei Telecommunications is allowed to build Germany’s 5G network. The company, Huawei Technologies, is a private Chinese venture and one of the world’s leading telecommunications hardware manufacturers. In recent years, however, it has come under scrutiny by some Western intelligence agencies, who view it as being too close to the Communist Party of China. More recently, Washington has intensified an international campaign to limit Huawei’s ability to build the infrastructure for 5G, the world’s next-generation wireless network. Along with Britain, Australia and Canada, the US is concerned that the Chinese telecommunications giant may facilitate global wiretapping on behalf of Beijing’s spy agencies.
The United States has warned Germany that intelligence sharing between the two countries will be threatened if the Chinese telecommunications giant Huawei is awarded a contract to build Germany’s 5G network. The company, Huawei Technologies, is a private Chinese venture and one of the world’s leading telecommunications hardware manufacturers. In recent years, however, it has come
A security firm founded by Erik Prince, the former boss of the private military company Blackwater, has announced a deal with the Chinese state to operate a training facility in China’s largely Muslim Xinjiang province. In the months following the United States invasion of Iraq, Blackwater was hired by the Department of State to provide diplomatic security at several locations throughout the Middle Eastern country. By 2010, when the company was abruptly sold to a group of private investors, its tactics in Iraq had prompted international controversy. Prince went on to help found Frontier Services Group (FSG), another private security firm registered in Hong Kong. The company provides security training to personnel working for Chinese companies. Its specialization is training personnel of Chinese firms based abroad, mainly in regions of Africa.
The Chinese telecommunications giant Huawei has fired one of its employees who was arrested last week in Poland on charges of spying for China,
A group of hackers, allegedly working for the Chinese military, accessed thousands of classified diplomatic cables from the European Union during a protracted cyber-espionage operation, a report has revealed. Over 100 organizations are believed to have been targeted in the multi-year cyber-espionage campaign, including the United Nations, international labor groups, as well as government ministries from dozens of countries. The operation was revealed on Tuesday by Area 1, a cyber-security company founded by former officials of the United States National Security Agency, and 






As Australia launches probe, skeptics cast doubts on Chinese defector’s spy claims
November 27, 2019 by Joseph Fitsanakis 1 Comment
The Australian spy agency confirmed last week that Mr. Wang had provided a 17-page sworn statement, in which he detailed his work as an undercover intelligence officer for Chinese military intelligence. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they plan to carry out espionage operations on behalf of Bejing. Some media reports claimed that Mr. Wang had shared details about deep-cover Chinese intelligence networks in Australia. The Australian government said on Tuesday that an official investigation had been launched into Mr. Wang’s claims.
But some skeptics in Australia and elsewhere have begun to raise doubts about the Chinese defector’s claims, suggesting that he has given little —if any information— that is genuinely new. Some argue that Mr. Wang is much too young to have been entrusted with senior-level responsibilities in the intelligence agency of a country that rarely promotes twenty-somethings in high-ranking positions. Additionally, Mr. Wang appears to have no military background —he claims to have been recruited while studying fine art— which is not typical of a Chinese military intelligence operative.
Furthermore, Mr. Wang episode interviewers from Australian television’s 60 Minutes program that he began feeling tormented by moral dilemmas when his staff officers supplied him with a fake passport bearing a different name, in preparation for an operation in Taiwan. However, by his own admission, Mr. Wang had been supplied with fake passports for previous operations, so it is not clear why he lost his nerve at the time he did. In fact, case officers usually covet the opportunity to go undercover and feel a sense of exhilaration when they receive fake identification documents for an undercover mission.
Is Mr. Wang not sharing the entire background to his decision to defect to Australia? Or could he be deliberately amplifying his role in Chinese intelligence, in an effort to appear useful to the Australian government and thus secure political protection by Canberra? In the words of Alex Joske, an analyst at the International Cyber Policy Centre of the Australian Strategic Policy Institute, the details in some of Mr. Wang’s claims mean that “government investigations should uncover the facts eventually. But we don’t know the full story and we probably never will”.
► Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with ASIO, Australia, China, defectors, espionage, News, Wang Liqiang