The Unraveling — What Happened
Starting around 2010, the CIA began losing contact with its sources inside China at an alarming rate. Assets it had spent years — sometimes decades — cultivating began going silent. Some were arrested. Some were shot. In at least one documented case, a CIA source was executed in the courtyard of a Chinese government building, in front of colleagues, as an explicit deterrence message to others who might consider cooperating with foreign intelligence services.
By 2012, the CIA's human intelligence network inside China had been effectively gutted. The New York Times, in a landmark 2017 investigation, reported that the loss was one of the worst intelligence failures in decades — described by current and former US officials as comparable to the damage caused by turncoat CIA officer Aldrich Ames in the 1990s.
The Executions — Method & Message
Chinese counterintelligence's response was not merely to arrest and imprison identified CIA assets — it was to weaponize the executions as a communication. Multiple accounts describe assets being executed in settings designed to maximize the psychological impact on potential future sources:
- At least one execution conducted in a government courtyard, witnessed by coworkers, with no pretense of secrecy — the opposite of the typical clandestine handling of counterintelligence cases
- Families reportedly notified abruptly and without the legal formalities typically attendant even on Chinese capital cases
- In several cases, no announcement was made to the outside world — the silence itself serving as a message: disappearance without explanation, maximizing uncertainty and fear among potential recruits
This is a studied doctrine. China's Ministry of State Security (MSS) understands that human intelligence networks run on trust and risk calculation. A source weighs the value of cooperation against the risk of detection. Public, visible executions — particularly those witnessed by colleagues — recalibrate that risk calculation for anyone observing.
The Three Theories: How China Found Them
How China identified and rolled up the CIA network remains officially unresolved and is the subject of active counterintelligence debate. Three leading theories emerged from the investigation:
Theory 1: A Mole Inside the CIA
The most alarming possibility: a CIA officer with access to source identities or communication protocols betrayed the network to Chinese intelligence. A CIA officer, Jerry Chun Shing Lee, was ultimately arrested in 2018 and pleaded guilty to retaining classified notebooks containing asset names and meeting sites. Prosecutors argued he passed this information to Chinese intelligence. Whether Lee was solely responsible — or one of multiple sources of the breach — remains unclear.
Lee was sentenced to 19 years in federal prison in 2019.
Theory 2: Compromised Communications Infrastructure
A competing theory, reported by Yahoo News in 2018, holds that the CIA was using a commercially available internet communication system — originally developed for dissidents in authoritarian countries — to communicate with sources in China. Chinese counterintelligence allegedly cracked or monitored this system, identifying CIA sources through their communication patterns rather than through a human betrayal. The CIA reportedly received warnings about the system's vulnerabilities and delayed addressing them.
This theory implies a systemic operational security failure, not just an individual traitor.
Theory 3: Chinese Intelligence Penetration of Non-CIA Systems
A third theory suggests Chinese intelligence gained access to classified US government databases through one of several documented Chinese hacks — including the 2015 OPM breach (which exposed 22 million federal employee personnel records, including SF-86 security clearance forms) — and cross-referenced data to identify individuals likely to be intelligence sources or case officers. This would represent a signals-to-HUMINT crossover: using cyber collection to enable physical counterintelligence.
The CIA's Institutional Response — and Failure to Act
What makes the episode particularly damning is the internal response — or lack of one. According to the NYT investigation and subsequent reporting:
- CIA leadership was slow to accept the scale of the problem, initially attributing individual losses to operational mishaps
- A special task force established to investigate the breach became mired in institutional infighting between counterintelligence officers who believed the problem was a mole and those who believed it was a technical compromise
- Asset losses continued even after the task force was established, suggesting the breach was not contained
- The CIA's Inspector General later found systemic failures in source validation and communication security protocols
China's Broader Espionage Prosecution Record
China's legal framework for handling espionage is designed to maximize state discretion and minimize transparency:
- State Secrets Law: China's definition of "state secret" is intentionally vague and can be applied retroactively — virtually any information embarrassing to the state qualifies
- No independent judiciary: Espionage cases are tried by courts that answer to the CCP; acquittal rates in criminal cases are below 0.1%
- Death penalty: Espionage resulting in "particularly serious harm to state security" carries the death penalty; executions are not publicly announced and can be carried out within days of sentencing
- Televised confessions: CCTV broadcasts staged confessions from accused foreign agents — a practice condemned by international human rights bodies as coerced and scripted
Timeline: China's Counterintelligence Wins
The Asymmetry: How the US Handles Chinese Spies
The contrast with US practice is stark. When the US catches Chinese intelligence officers or their assets:
- Cases are prosecuted through civilian federal courts with public indictments
- Defendants receive legal representation, trials, and appeals
- Sentences are fixed and public
- Executions for espionage have not occurred in the US since the Rosenbergs in 1953
- In many cases, Chinese intelligence officers are quietly expelled (PNG'd) rather than prosecuted, to protect intelligence equities
This asymmetry is not simply a legal or moral difference — it is a strategic one. China's willingness to execute spies publicly, and the US's institutional reluctance to impose comparable costs, creates an imbalanced deterrence environment that China has explicitly exploited in its recruitment doctrine.
"They were not just killing our people. They were sending a message — to anyone inside China who might think about working with us. The message was: we will find you. We will shoot you in front of your colleagues. And we will not apologize."
— Former senior CIA official, speaking anonymously to the New York Times (2017)
Primary Sources & Further Reading
- Mazzetti, Goldman, Schmidt — "Killing C.I.A. Informants, China Crippled U.S. Spy Network," NYT, May 2017
- Zach Dorfman — "How China Infiltrated U.S. Spy Networks," Politico Magazine, 2018
- Zach Dorfman — Yahoo News investigation on CIA communications system compromise, 2018
- DOJ, US v. Jerry Chun Shing Lee — plea agreement and sentencing documents (2018–2019)
- US OPM, "OPM Data Breach: What You Need to Know" (2015)
- Office of the Director of National Intelligence, "Annual Threat Assessment" (2022, 2023)
- China's Counter-Espionage Law (2017, amended 2023) — official PRC text
- Human Rights Watch, "China's Overbroad State Secrets Apparatus" (2020)
- Mark Stout & others, "The Spy Who Couldn't Spell" — context on US counterintelligence failures