China’s New Espionage Buys Experts, Not Data

China’s New Espionage Buys Experts, Not Data

A fundamental shift in global espionage is underway, where the most valuable asset is no longer encrypted data on a server but the nuanced, experience-based knowledge locked within the minds of key specialists. China has refined and operationalized a sophisticated strategy that moves beyond traditional cyberattacks to directly acquire human expertise, a model termed “Bounty-as-a-Service” (BaaS). This state-directed initiative proactively recruits and compensates foreign experts with sensitive, tacit knowledge in critical technological fields, effectively “buying” the human capital necessary to overcome immense developmental hurdles. This approach has matured from a theoretical threat into a primary offensive tactic, transforming the focus of intelligence operations from hacking corporate networks to hacking individual careers by targeting and subverting essential personnel. The modern battlefield for technological supremacy is now being fought on personal devices and social media platforms through seemingly legitimate, yet highly deceptive, professional opportunities.

The Strategic Pivot to Human Capital

The new era of espionage is marked by a deliberate move away from network intrusion toward direct human recruitment, a trend confirmed by a February 2026 warning from the Google Threat Intelligence Group. State-sponsored actors, particularly from China, are increasingly bypassing robust corporate security measures by using sophisticated social engineering. Instead of deploying malware, they create fraudulent job offers, spoofed interview portals, and fake consulting opportunities to approach targeted individuals on their personal devices and social media accounts. This method exploits workforce volatility and personal ambition, effectively turning trusted employees into witting or unwitting insiders without ever needing to compromise a corporate system. The strategy capitalizes on the fact that human judgment can be a more vulnerable entry point than a fortified digital perimeter, making personnel the new primary target for foreign intelligence services seeking a technological edge.

At the heart of the BaaS model is the relentless pursuit of “tacit knowledge,” a form of expertise that cannot be reverse-engineered from a stolen blueprint or patent filing. This refers to the nuanced, experience-based wisdom held by highly specialized engineers, scientists, and technicians—the practical “know-how” that enables them to solve complex problems, optimize intricate processes, and drive genuine innovation. China is no longer content with merely stealing intellectual property; it is actively recruiting the people who understand how to create, improve, and operationalize that property. By acquiring this deep, practical expertise, the nation can collapse its own development timelines, leapfrogging years of painstaking research and experimentation that its competitors undertook. This strategic acquisition of human talent represents a far more significant and sustainable threat to long-term technological leadership than the theft of static data alone.

A Case Study in Semiconductor Supremacy

A compelling and specific example of the BaaS model’s devastating effectiveness is China’s recent and unexpected development of an Extreme Ultraviolet (EUV) lithography prototype, a cornerstone technology for producing the world’s most advanced semiconductors. This breakthrough, achieved at a secure facility in Shenzhen, occurred years ahead of Western intelligence predictions and sent shockwaves through the global technology landscape. The project’s accelerated success is not attributed to a novel internal discovery but is directly linked to the targeted recruitment of former engineers from ASML, the Dutch company that holds a near-monopoly on EUV technology. This case serves as a stark illustration of how acquiring a handful of key experts can enable a nation to surmount technological barriers that were once considered insurmountable, fundamentally altering the competitive dynamics in a critical industry.

The success of the Shenzhen EUV project can be traced to specific individuals, most notably Lin Nan, who previously led ASML’s light source technology division. In 2021, he returned to China under the auspices of a national talent acquisition program specifically to spearhead this high-stakes effort. His direct involvement, along with that of other former ASML personnel, demonstrates a clear and undeniable correlation between the acquisition of foreign human expertise and a monumental leap in China’s domestic technological capabilities. This is not an isolated incident but part of a broader, well-established pattern. Dutch military intelligence has independently confirmed that China is actively targeting Dutch semiconductor, aerospace, and maritime industries through a variety of methods, including cyber espionage and insider recruitment, all aimed at strengthening its own technological and military power.

The Architecture of Deception

To maintain plausible deniability and enhance operational security, the recruitment process is managed through a sophisticated “cutout architecture” designed to obscure any direct connection to the Chinese state. This intricate structure mirrors a model previously used by the People’s Liberation Army Air Force to recruit former NATO fighter pilots via South African intermediaries, proving its efficacy. This same playbook is now being applied to the semiconductor industry and other high-tech sectors. It relies on a network of third-country intermediaries, such as shell corporations and consulting firms established in neutral locations like Singapore, Dubai, and Eastern Europe. These entities handle the initial outreach, negotiation, and contracting, presenting the engagements as legitimate, high-value consulting opportunities and effectively insulating the state sponsor from the recruitment activity.

This covert operational structure is further fortified by meticulous security protocols designed to protect both the mission and the recruited asset. Individuals are often provided with aliases and state-managed identities to obscure their Western origins and safeguard them upon their eventual return home. The engagements themselves are typically transactional and short-term, structured as lucrative contracts focused on solving specific “technical lifts” or overcoming discrete engineering challenges. Once recruited, the experts are moved into sealed, PRC-controlled facilities where their work, communications, and interactions can be closely monitored and controlled. This combination of intermediaries, aliases, and controlled environments creates a formidable shield of secrecy, making it exceedingly difficult for Western organizations and intelligence agencies to verify or track this activity, even while it is actively underway.

Redefining the Front Line of Corporate Security

The calculated evolution of this espionage model rendered many traditional security frameworks insufficient. Standard Insider Risk Management programs, which primarily focus on monitoring employee activities within the corporate network, were ill-equipped to detect a threat where the critical phases of recruitment—outreach, negotiation, and contracting—occurred entirely offshore and on personal devices. These programs might have only caught ancillary activities, such as unusual data access patterns as an expert prepared to leave, but they missed the core recruitment event. This placed the burden of defense squarely on the individuals themselves, who became the new front line for protecting intellectual property. Organizations that had failed to proactively brief their high-risk personnel on how to recognize, report, and rebuff these sophisticated approaches found themselves at a significant disadvantage, as their most valuable human assets were targeted outside the view of conventional security tools.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later