!-- Google tag (gtag.js) -->

Major Leak in China Reveals Methods, Tools Used to Spy on Other Nations, Surveil Dissidents

The cache of documents provides unprecedented insight into the clandestine activities of private security contractor I-Soon, which has deep ties to China’s powerful Ministry of Public Security.

February 22, 2024
Major Leak in China Reveals Methods, Tools Used to Spy on Other Nations, Surveil Dissidents
									    
IMAGE SOURCE: AP/Dake Kang
The front desk of the I-Soon office, also known as Anxun in Mandarin, as seen after office hours in Chengdu in southwestern China’s Sichuan Province, on Tuesday.

Chinese authorities are dealing with a significant security breach after a trove of documents from a private security contractor connected to the nation’s top policing agency was leaked online. The cache of documents provides unprecedented insight into the clandestine activities of a company, I-Soon, also known as Anxun in Mandarin, which has deep ties to China’s powerful Ministry of Public Security.

The leaked documents, which surfaced late last week, comprise hundreds of pages of contracts, marketing presentations, product manuals, and lists of clients and employees. They offer a detailed look into I-Soon’s operations, including its surveillance techniques, hacking capabilities, and efforts to shape online narratives.

Spying Abilities

Among the most concerning revelations are the tools and methods employed by I-Soon to spy on both Chinese citizens and foreigners.
Additionally, the leaked documents indicate the apparent targeting of ethnic minorities and dissidents in regions where anti-government protests have occurred, such as Hong Kong and Xinjiang.


The documents suggest that I-Soon’s activities extend beyond China’s borders, with evidence of hacking operations across Central and Southeast Asia, Hong Kong, Taiwan, and even social media platforms used by Chinese citizens abroad.

Extent of Surveillance

The leaked material implicates I-Soon in a range of activities, including surveillance of dissidents overseas, hacking foreign networks, and promoting pro-Beijing narratives on social media.

It raises serious concerns about China’s expanding cyber capabilities and its use of private contractors to advance its security interests. It also highlights the challenges posed by state-sponsored hacking and espionage in an increasingly interconnected world.

The leak has prompted an investigation by Chinese police, who are working to determine the source of the breach. Meanwhile, analysts and cybersecurity experts are poring over the leaked documents to better understand the extent of I-Soon’s operations and its connections to the Chinese government.