Affichage des articles dont le libellé est Glenn Duffie Shriver. Afficher tous les articles
Affichage des articles dont le libellé est Glenn Duffie Shriver. Afficher tous les articles

vendredi 2 août 2019

Chinese Spy Hunt

Graduates Of China's Yenching Academy Are Being Questioned By The FBI
By EMILY FENG

People cycle past a building at Peking University in Beijing in 2016. The university hosts Yenching Academy, a graduate studies program.

A sudden knock at one's door.
An unexpected call to meet off campus. 
Surreptitious visits to family members.
American graduates of the Yenching Academy, a one- to two-year master's degree program housed at Beijing's ePeking University, are being approached and questioned by the FBI about the time they spent in China. 
In the last two years, at least five Yenching graduates have been approached by agents to gather intelligence on the program and to ascertain whether they have been co-opted by Chinese espionage efforts.
Brian Kim is one of them. 
Five months ago, Kim received a call from an unfamiliar number. 
"It was a person who claimed to be an FBI agent, and I immediately thought it was a scam call," Kim recalls.
Now beginning his second year at Yale Law School, Kim was able to verify the agent's identity with the local FBI office in New Haven, Conn., the next day. 
He arranged for two FBI agents to meet him at a coffee shop near Yale's campus, where, over the next hour, they grilled him on his personal and academic history.
"It became clear to me, maybe three-quarters of the way through, that they were actually most interested in China," Kim says.
One of the agents asked if anyone in China had tried to recruit Kim for espionage efforts.
Who had encouraged Kim to apply for the Yenching program in the first place?
"I literally told them the Princeton fellowship office" had recommended he apply, says Kim, who has a bachelor's degree from Princeton University. 

Chinese espionageThe mistrust of Yenching Academy, dubbed the "Rhodes Scholarship of China," illustrates just how far fears of Chinese espionage have permeated among the U.S. defense and intelligence establishment.
Once cast as a way for America's best and brightest to build relationships with and improve understanding of China, academic programs and collaborations are now falling under scrutiny.
 FBI agents have been lobbying U.S. university administrators to monitor Chinese "researchers" and "students" working in certain science and technology fields. 
Federal funding agencies including the National Institutes of Health are also investigating academics for not properly disclosing Chinese funding or research done with Chinese institutions.
Suspicion of Yenching Academy stems in part from its funding — it is supported by China's education ministry. 
But Yenching administrators tell NPR they were not aware of their graduates being questioned upon return to the U.S.
"They don't have time to have made extensive contacts in the area that would be sensitive," David Moser, Yenching's associate dean since 2017, told NPR by phone. 
"I have not seen anything that would indicate problems. But of course, it's only recently that U.S.-China relations [have] gotten so fraught and with tension. So who knows?"
The FBI said in a statement emailed to NPR: "In an attempt to fulfill our national security mission, and in the hopes of better protecting U.S. citizens, the FBI will sometimes conduct voluntary interviews with individuals who have studied or conducted research abroad, often at their request. The goal of these interviews is to identify potential security risks and to protect U.S. citizens from illegally supporting foreign government interests."
When reached for comment, the FBI also highlighted the case of Glenn Duffie Shriver, who was convicted in 2011 of spying for the Chinese government. 
Shriver, who had studied abroad in China as an undergraduate, was recruited by three Chinese intelligence officers while living in Shanghai after graduation and encouraged to apply for U.S. intelligence positions.
"Foreign intelligence services have increasingly chosen to target and recruit academics, researchers, and others to conduct activities on behalf of foreign governments. Past investigations have identified Chinese universities as locations where such targeting occurs," according to the FBI statement. 
"These investigations have shown that foreign governments and intelligence services often seek to identify and develop relationships with U.S. students, scholars, and researchers who can help them gain access to information and persons that fulfill the foreign government's international intelligence agenda."
Yenching is no stranger to controversy. 
Ironically, when the program was launched in 2015, it was criticized in Chinese academic circles for being a vehicle of American soft power and influence.
"'English Chinese Studies' is simply a large-scale transplant of Western Chinese studies and Sinology to Peking University," two Chinese professors wrote in a widely circulated editorial for the news website Guancha in 2014.
In the U.S., Yenching was welcomed by China watchers and policymakers alongside the Schwarzman Scholars program — a rival, 3-year-old master's program funded by billionaire financier and Trump confidant Stephen Schwarzman — as an important component of people-to-people diplomacy with China. 
There are no known instances of Schwarzman students reporting scrutiny from U.S. authorities.
About 30% of Yenching's approximately 125 students each year are American or Canadian and a fifth come from mainland China.
"We know that bonds built between students of our two countries will last a lifetime," Michelle Obama said in a handwritten note, after visiting the Yenching campus in 2014.
But the bonds have led to espionage. 
Over the last year, local FBI agents have approached Yale several times, asking university officials to disclose the identities of Chinese and Chinese-American researchers and students working in certain laboratories.
Yale administrators refused. 
The experience prompted pro-China Yale President Peter Salovey to publish an open letter on the university website in May "to affirm Yale's steadfast commitment to our Chinese students and scholars."
Yale Law School declined to comment but the school's Dean Heather Gerken told NPR by email that "we are extremely protective of our students and care very much about this issue." 
When asked to comment, the university referred NPR to Salovey's letter.
When approached by the FBI, says Kim, "The instinct isn't to say, 'No, come back with a warrant.' The instinct is to say yes."
Other students accepted to Yenching Academy never made it to Beijing. 
When two West Point graduates were admitted to the fourth incoming Yenching class last year, the Department of Defense intervened and banned them from attending, according to two people with knowledge of the matter.
Kim hopes to serve in the public sector on Korean Peninsula issues, given his Korean language abilities and background in policy. 
But, he says, "Just the idea that somewhere in D.C., there is a file on me being a threat to the national security system is a very disturbing thought."

vendredi 2 novembre 2018

CHINA'S 5 STEPS FOR RECRUITING SPIES


US Stupidity Enabling Chinese Spies to Steal Tons of US Defense and Trade Secrets
By Garrett M. Graff
BEWARE OF CHINESE spies offering laptops, women, or educational stipends—and especially watch out for odd LinkedIn requests.
On Tuesday, the Justice Department unsealed new charges against 10 Chinese intelligence officers and hackers who perpetrated a years-long scheme to steal trade secrets from aerospace companies.
The case continues an impressive tempo from the Justice Department, as it continues to try curb China's massive, wide-ranging, and long-running espionage campaign. 
In fact, it's the third time since September alone that the US government has charged Chinese intelligence officers and spies, including one of its biggest coups in years: The extradition earlier this month of a Chinese intelligence officer, caught in Europe, who will face a US courtroom.
That arrest marks the first time the US has prosecuted an officer of China's Ministry of State Security. The feds believe that the suspect, Yanjun Xu, spent years cultivating a person he thought was a potential asset inside GE Aviation, which makes closely held jet engine technology.
While historic, the GE Aviation case hardly stands as an outlier. 
Chinese espionage against the US has emerged over the past two decades as the most widespread, damaging, and pernicious national security threat facing the country—compromising trade secrets, American jobs, and human lives.
Even as popular culture and public attention has focused in the past decade on a few high-profile cases against Russian intelligence operations, China’s spying efforts have yielded a more steady stream of incidents. 
Over the last 15 years, dozens of people have been arrested, charged, or convicted of economic or military espionage for China. 
In just the 28-month period that a notorious Russian spy ring unraveled around 2010, US officials charged and prosecuted more than 40 Chinese espionage cases, according to a Justice Department compilation.
The majority of Chinese espionage cases over the years have involved ethnic Chinese, including Chinese students who came to the US for college or advanced degrees, got hired at tech companies, and then absconded back to China with stolen trade secrets. 
Historically, very few Chinese spying cases have featured the targeting or recruitment of Westerners. But this year has seen a rash of cases of Sino-Americans recruited to spy on China’s behalf, encouraged to turn over sensitive military, intelligence, or economic information—at least one of which started with a simple LinkedIn message.
Sifting through more than a dozen of the major cases that have targeted Westerners, though, provides an illuminating window into how China recruits its spies. 
The recruitment follows a well-known five-step espionage road map: Spotting, assessing, developing, recruiting, and, finally, what professionals call “handling.”

Stage 1: Spotting
The first step in any espionage recruitment is simply knowing the right people to target. 
That job often falls to what intelligence professionals call a “spotter,” a person who identifies potential targets, then hands them off to another intelligence officer for further assessment. 
These spotters, sometimes friendly officials at think tanks, universities, or corporations, are often separate from the intelligence officers who ultimately approach potential spies, allowing a level or two of remove. 
They sometimes have such “deep cover” that they are considered too valuable to make a recruitment approach directly, leaving that work to a cut-out who could more easily disappear if the recruitment pitch is rejected.
In that vein, last week’s Yanjun Xu indictment ties in to another little-noticed September arrest, where the FBI charged a 27-year-old Chinese citizen and Chicago resident with acting as an unregistered foreign agent for China—the federal criminal charge that prosecutors often use as code for spying. That man, Ji Chaoqun, had arrived in the United States in 2013 to study electrical engineering at the Illinois Institute of Technology, and had subsequently enlisted in the Army Reserves.
Yet according to the government’s criminal complaint, Ji Chaoqun had less pure motives at heart than service: He had been recruited at a Chinese job fair while in college to join a “confidential unit” and work as a “spotter” for Yanjun Xu, helping the MSS officer identify potential recruits and providing background reports on at least eight potential spies. 
In a 2015 email, Ji Chaoqun wrote that he was enclosing “eight sets of the midterm test questions for the last three years,” according to court documents. 
He attached eight PDFs of background reports downloaded from sites like Intelius, Instant Checkmate, and Spokeo, which compile public records on individuals for purchase online. (The sites limit purchases to US-based consumers, so they were inaccessible to Yanjun Xu himself.)
All eight of the targeted individuals were ethnic Chinese who worked in science or technology. 
Seven of them were either currently employed or had recently retired from US defense contractors, according to the US government.
“Spotting” doesn’t necessarily have to involve human targets; an article in the November issue of WIRED, excerpted from the new book Dawn of the Code War, outlines the US pursuit of the Chinese spy Su Bin, who was captured in Canada in 2014 after working for years as a technical “spotter” for Chinese military intelligence officers.                         
Su, an aviation expert, would examine stolen file directories hacked by Chinese intelligence to point them to the most valuable and relevant documents, helping them navigate massive troves of files on secret projects like the US development of the C-17 military transport plane.

Chinese intelligence officer of China's Ministry of State Security Xu Yanjun was extradited to the US with help from Belgian authorities for seeking to steal trade secrets and other sensitive information from an American company that leads the way in aerospace.

Stage 2: Assessing
Once intelligence officers identify potential recruits, they then examine how they might encourage those targets to spy. 
Professionals often summarize the motives for espionage with the acronym MICE: money, ideology, coercion, and ego. 
Spies want to be paid for their work, or believe in the cause, or can be blackmailed, or want the ego boost that comes with leading a double life.
While it often relies on ideology or coercion in pressuring ethnic Chinese to spy on its behalf abroad, China has proved particularly successful in luring Westerners with cash. 
In June of this year, FBI agents arrested a Utah man as he prepared to fly to China and charged him with attempting to pass national defense information to China. 




The felony complaint says that Ron Rockwell Hansen, a former Defense Intelligence Agency officer, had been struggling financially, living primarily off his $1,900-a-month DIA pension and facing debts of more than $150,000. 
In 2014, Rockwell allegedly began meeting with two MSS officers—who introduced themselves to him as “David” and “Martin." 
During one 2015 business trip to China, they offered him up to $300,000 a year for “consulting services.” 
Hansen was, according to the government, to “attend conferences or exhibitions on forensics, information security, and military communications and to conduct product research.” 
The money, in turn, would be funneled to him by David and Martin by “overpaying him for purchases of computer forensic products.”
Hansen attended defense and intelligence conferences, on China’s behalf, for nearly four years, from 2013 through 2017. 
He took photos, made notes, and tried to strike up contact with former DIA and intelligence colleagues. 
He also purchased restricted forensics software to transport to China.
All told, according to the complaint, Hansen made 40 trips to China between 2013 and 2018, often returning with tens of thousands of dollars in cash—four trips cited by the government netted him $19,000, $30,000, $20,000, and, in 2015, $53,000. 
Ultimately, court documents show that Hansen received upwards of $800,000 from Chinese sources
Hansen pleaded not guilty to 15 counts in July.
In another major corporate espionage case that dates back to 2011, a grand jury indicted the Sinoval Wind Group, a Chinese company, for trade secret theft and wire fraud related to its partnership with American Superconductor
The indictment specifically alleged that Sinoval stole American Superconductor's source code for its wind turbine, recruiting an employee to betray the Massachusetts-based company with promises of wealth and women. 
The two firms had been working together on massive wind farms in China; American Superconductor provided the software for the turbines, while Sinovel manufactured the turbines and did the construction work.
American Superconductor managers had heard horror stories of American companies having their intellectual property stolen by Chinese business partners, so the company went to great lengths to lock down its software and allow access only by its own employees. 
Chinese spy Dejan Karabasevic

Sinovel, instead, recruited Dejan Karabasevic, a Serbian employee based in Austria, to out-and-out steal the source code. 
Karabasevic pleaded guilty in an Austrian court in 2011.
“They offered him women. They offered him an apartment. They offered him money. They offered him a new life,” the head of American Superconductor, Daniel McGahn, later told 60 Minutes.
Karabasevic was quite clear about his motives: As detailed in court documents, he wrote in one email to his new Chinese business partners, “All girls need money. I need girls. Sinovel needs me.” 
The Chinese firm ultimately offered Karabasevic $1.7 million to steal the turbine source code. 
He wrote to Sinovel in one text message: “I will send the full code of course.”
American Superconductor only became aware of the theft when its engineers noticed that some of the turbines being installed in Sinovel’s large wind farms in China were running a version of the operation software that hadn’t yet been released; by then, it was too late. 
The collapse of the partnership forced the company to lay off 600 of its 900 employees; a federal jury found Sinovel guilty on counts of theft of trade secrets and wire fraud in January of this year.


Spies for China. The Indian-American Noshir Gowadia; the Chinese-American Wenxia Man and the Chinese-Canadian Su Bin. 

Stage 3: Developing
Intelligence officers generally don’t lead off by asking potential sources to betray their country or their employer. 
The third stage of espionage recruitment, instead, is known as “developing,” when recruiters begin to ask for trivial requests or favors to establish rapport. 
As former CIA director John Brennan said last year, “Frequently, people who go along a treasonous path do not know they are on a treasonous path until it is too late.”
In one of its more daring efforts in recent years, Chinese intelligence tried to place an ambitious China-loving American student inside the CIA, hoping that the would-be mole could rise through the undercover ranks of the agency.











A shot of Glenn Duffie Shriver from the FBI's video.


Glenn Duffie Shriver, a student from outside Richmond, Virginia, had become intrigued with China during a 45-day summer study abroad program in 2001. 
He later returned for his junior year abroad, becoming fluent in Chinese, and moved to Shanghai, where he acted in Chinese films and commercials. 
Around 2004, he responded to a newspaper ad asking for someone to write a white paper about trade relations between the US, North Korea, and Taiwan; the woman who hired him, calling herself “Amanda,” paid him $120 for the essay. 
She told him she liked the work and asked if he’d be interested in more—and then introduced him to two men, “Mr. Wu” and “Mr. Tang.”
Over time, those two encouraged Shriver to return to the US to join either the State Department or the CIA. 
“We can be close friends,” they told him. 
Shriver flunked the foreign service exam twice, but the MSS paid him a combined $30,000 for the effort. 
In 2007, Shriver applied to the CIA’s National Clandestine Service, the unit that runs its undercover foreign operatives, and received a $40,000 payment from the Chinese MSS.
The US government ultimately arrested Shriver, and the FBI even turned the incident into a low-budget movie to warn other students studying abroad about Chinese friends bearing gifts. 
Shriver pleaded guilty to one count of conspiracy to communicate national defense information in 2010.
“It started out fairly innocuous: ‘Oh, you know, we really want to help young people here in China. You know, we realize sometimes you’re far from home and the costs can be quite a bit, so here is just a little bit to help you out,’” Shriver said at his sentencing. 
“And then it kind of spiraled out of control. I think I was motivated by greed. I mean, you know, large stacks of money in front of me.”
That subtle evolution and push over the line from personal or professional favor to outright espionage was also clearly evident in last week’s case against MSS official Yanjun Xu, who had targeted GE Aviation. 
The GE case, which reads almost like a slow-motion David Ignatius espionage novel, was somewhat unique: No documents or trade secrets were compromised—the sting appeared to unfold with the cooperation of the company—but the recruiter apparently followed a clear path of asking for small things before pushing the employee over the line to outright theft.
Yanjun Xu began his recruitment efforts, officials said, by contacting American aerospace experts under the guise of an educational exchange; he worked with the Nanjing University of Aeronautics and Astronomics, one of China’s top engineering schools, to invite the targeted aerospace engineers to give lectures on their work. 
The targeted GE employee, identified only as “Employee #1” in court documents, was both reimbursed for travel expenses and paid a $3,500 “stipend” for the lecture at NUAA. 
The ploy was one Xu appeared to use routinely; court documents cite other examples of “seminars” and “educational exchanges” with aerospace engineers that served as recruiting efforts for espionage.
During the unnamed GE employee’s visit to NUAA in June 2017, according to court records, Xu introduced himself, using the cover identity of “Qu Hui,” and explained that he worked for the Jiangsu Science and Technology Promotion Association. 
The American engineer and Xu had multiple meals together and Xu invited the engineer to return for another lecture. 
By January 2018, Xu was regularly asking the GE engineer to pass along small details about system specifications and the company’s design process, authorities say. 
He then provided what amounted to a shopping list of aviation design secrets, asking, “Can you take a look and see if you are familiar with those?”
In February, Xu allegedly asked for a copy of the employee’s file directory for his company-issued computer, explaining how to appropriately sort and save the directory for Xu’s review. 
The two then began to make plans for Xu to access the company computer during a business trip to Europe; as Xu explained, according to court documents, “We really don’t need to rush to do everything in one time because if we’re going to do business together, this won’t be the last time, right?” 
It was on what Xu thought was that European business trip in April that the Chinese intelligence officer was arrested in Belgium.

Stage 4: Recruiting
The direct request to spy is often the most fraught moment of an espionage operation—but sometimes it starts off easily enough. 
One-time CIA officer Kevin Mallory was recruited to spy for the Chinese right off LinkedIn in February 2017. 
Mallory, who was working as a consultant at the time, was contacted over the social network by someone from a Chinese think tank known as the Shanghai Academy of Social Sciences
The FBI said in court documents that the organization—China’s oldest social science think tank—is regularly relied upon by MSS, who “[use] SASS employees as spotters and assessors,” and that MSS officers “have also used SASS affiliation as cover identities.”
Mallory spoke by phone with the purported SASS employee, and subsequently traveled to China twice, in March and April 2017, for in-person meetings. 
There, he received a special phone and instructions on how to use its secure messaging capabilities to contact his Chinese “clients.” 
According to the criminal complaint, Mallory also wrote two short white papers on US policy matters for his Chinese intelligence handlers.
Mallory was caught, in part, because he didn’t realize that the device didn’t wipe sent secure messages, and FBI agents were able to peruse his communications with the Chinese intelligence officers. 
The deal was quite explicit: In one message, Mallory wrote, “your object is to gain information, and my object is to be paid for.” 
Ultimately, the FBI believed that Mallory passed at least three classified documents to the Chinese and was paid about $25,000.
Mallory was found guilty of conspiracy to commit espionage during a June trial, though the judge threw out two convictions related to sharing or trying to share national defense information.


Sino-American double loyalty: China gave ex-CIA agent Jerry Chun Shing Lee US$100,000 and promised to take care of him ‘for life’

Stage 5: Handling
The most delicate part of an espionage operation is always maintaining the regular, day-to-day communication between a spy and his or her assigned “handler.”
Whereas previous generations often relied on the Cold War tradecraft of physical “dead drops” or in-person “brush passes” for covert information exchanges, today’s espionage often relies on encrypted communication tools, surreptitious cell phones, and emails left in draft folders.
Some of that modern tradecraft was on display in the charges against another former CIA case officer, naturalized US citizen Jerry Chun Shing Lee, who is the most devastating Chinese spy ever. 
According to court documents released following his arrest in January, Lee met with two Chinese intelligence officers in April 2010, who promised him “a gift of $100,000 cash in exchange for his cooperation and that they would take care of him for life.” 
Beginning the very next month, the Chinese intelligence officers began passing “taskings” to Lee in envelopes, delivered by one of his business associates, that asked him to reveal sensitive information about the CIA.
Lee ultimately received requests for at least 21 different pieces of information, according to court documents. 
In response to one such request, Lee “created on his laptop computer a document that included entries pertaining to certain locations to which the CIA would assign officers and a particular location of a sensitive operation to which the CIA would assign officers with certain identified experience.” 
Communications flowed, in part, through an email address created using his daughter’s name.
It appears that Lee’s work has helped devastate America’s own spy networks inside China. 
While the government’s reliance on an insecure encrypted communications system exposed several of its own human assets, according to a recent report in Foreign Policy, its problems may not have only been high tech. 
When FBI agents covertly searched Lee’s luggage at one point, the Justice Department indictment says, they discovered a “Day Planner containing handwritten, classified information up to the Top Secret level pertaining to, but not limited to, operational notes from asset meetings, operational meeting locations, operational phone numbers, the true names of assets, and covert CIA facilities.”

President Trump noted that “almost every Chinese student that comes over to this country is a spy.”

mardi 13 juin 2017

U.S. 3.8 Million Chinese Spies

This Is How Chinese Spying Inside the U.S. Government Really Works
By Peter Mattis

The Department of Justice on March 29 unsealed a criminal complaint against Candace Claiborne, an office-management specialist with the U.S. Department of State, who is now facing charges related to concealing a relationship with Chinese intelligence. 
The extended fifty-nine-page affidavit catalogues Claiborne’s relationship with the Ministry of State Security, or MSS, China’s civilian intelligence service.
The MSS is a sprawling organization centered in Beijing. 
It has provincial departments and municipal bureaus all over the country. 
The central ministry does run intelligence operations, but the subnational departments and bureaus almost certainly include most of the ministry’s personnel. 
The main task of these departments is to protect state security inside their operational jurisdiction. However, some of them also run operations against foreign targets to support national policymakers.
The MSS unit with which Claiborne became involved was the Shanghai State Security Bureau (SSSB). 
Largely unknown outside of the small group of people who look at Chinese intelligence operations, the SSSB has surfaced only a few times in public. 
In 2009, the SSSB raided the China offices of Australian mining firm Rio Tinto. 
The office director, Stern Hu, came under investigation, because his aggressive approach to investment cost the Chinese government and state-owned enterprises several hundred million dollars. A year later, the FBI arrested Glenn Duffie Shriver, who applied to work at the State Department and CIA in exchange for $70,000. 
The SSSB recruited Shriver in Shanghai when he responded to an essay contest on U.S.-China relations and encouraged him to take a position in the U.S. government.
The affidavit reveals that the SSSB can operate all over China and the world, not just in Shanghai. 
In communications with Claiborne, her SSSB contacts—identified only as Co-Conspirator B and Co-Conspirator C—offered to meet her in Beijing as well as any third country if and when she left the United States. 
Co-Conspirator B also made references to business trips in Italy and Africa.
Despite the possibility of meetings anywhere, the case still exhibits the China connection that is distinctive of nearly every espionage case. 
The SSSB’s spotting and assessing work most likely took place in China. 
The affidavit states that Claiborne knew the SSSB officers at least since 2007 if not before. 
In 2007, Claiborne was stationed in Buenos Aires and had been away from China for two years. 
Her second tour in China was at the U.S. Consulate General in Shanghai from 2003–05.
The SSSB also operates with some unusual cover arrangements that suggests in some cases individual officers develop their own cover. 
Some of the normal MSS covers inside the country include unnamed, numbered government offices (e.g. Shanghai Municipal Government Office number seven), think tanks and businesses. 
Co-Conspirator B operated an import-export company, and he also owned a spa and a restaurant. 
In addition to allowing Co-Conspirator B to appear as ordinary businessman, these businesses were used to provide employment to Co-Conspirator A. 
The affidavit does nothing to describe Co-Conspirator C apart from his SSSB affiliation.
A caveat on Co-Conspirator B’s cover arrangements perhaps is in order. 
He may be what the affidavit calls a “cut out” or a “co-optee” of the SSSB. 
The affidavit describes this role in some detail as part of the background but it is mentioned nowhere else. 
The affidavit states “A cut-out or co-optee is a mutually trusted person or mechanism used to create a compartment between members of an operation to enable them to pass material and/or messages securely. A cut-out or co-optee can operate under a variety of covers, posing as diplomats, journalists, academics, or business people both at home and abroad. These individuals are tasked with spotting, assessing, targeting, collecting, and running sources.” 
Co-Conspirator B could easily be a co-optee from the description of him and his business activities. His role in handling Claiborne fits completely within the above definition, and the affidavit contains nothing to clarify his position.
Co-Conspirator A and his relationship with Claiborne illustrates the creative ways in which the MSS will develop emotional leverage over an agent. 
The affidavit does little to describe Co-Conspirator A apart from making it clear that the young man is someone important to Claiborne, probably a relative, because he lived with her in China from 2001–05. 
Her relationship with the SSSB was not simply an exchange of money for information, of dollars for documents. 
Much of the money dispensed by the SSSB went to pay for Co-Conspirator A’s college tuition, provide him with work, a furnished apartment, and pay for his travel rather than Claiborne directly. 
In several different emails, she told Co-Conspirator A to extricate himself of his relationship with the SSSB, because she did not want herself or him to continue to be indebted to Chinese intelligence.
Building a relationship with an agent almost appears to more important than collecting intelligence information. 
The SSSB paid out “tens of thousands of dollars in gifts and benefits” to Claiborne and Co-Conspirator A, but the return appeared minimal. 
For example, in 2011, at least four years into the relationship, the SSSB tasked Claiborne with gathering internal evaluations of the U.S.-China Strategic and Economic Dialogue. 
They specifically wanted to know about Chinese yuan exchange rates and what pressures Washington would be prepared to bring if China’s adjustments were insufficient. 
The SSSB officers complained of one of Claiborne’s responses that “It is useful but it is also on the Internet. What they are looking for is what they cannot find on the Internet,” believing that the publicly available information was not necessarily representative of U.S. government thinking.
There is little exotic in how the SSSB handled Candice Claiborne if the case ultimately holds up in court as described. 
They built psychological leverage through Co-Conspirator A. 
They exploited Claiborne’s greed through small payments and the promise of more—she believed the SSSB could pay as much as $20,000 per year. 
The only thing strange appears to be the callousness with which the SSSB treated her concerns about security and the seeming absence of any plans to end the relationship productively. 
Countering Chinese intelligence, then, is not about a dramatic departure from past practice, but rather a commitment to counterintelligence fundamentals and professionalism.