← Back to Index

China / Counterintelligence / Covert Operations

China Executes US Spies — Publicly & Brutally

Between 2010 and 2012, China systematically dismantled the CIA's network of human sources inside the People's Republic — killing or imprisoning up to 20 assets, and using the executions as deliberate deterrence signals.

CIA / MSS / Counterintelligence
18–20
CIA assets killed or imprisoned, 2010–2012
~2
Years to fully roll up CIA's China network
3
Competing theories for how China found them

The Unraveling — What Happened

Starting around 2010, the CIA began losing contact with its sources inside China at an alarming rate. Assets it had spent years — sometimes decades — cultivating began going silent. Some were arrested. Some were shot. In at least one documented case, a CIA source was executed in the courtyard of a Chinese government building, in front of colleagues, as an explicit deterrence message to others who might consider cooperating with foreign intelligence services.

By 2012, the CIA's human intelligence network inside China had been effectively gutted. The New York Times, in a landmark 2017 investigation, reported that the loss was one of the worst intelligence failures in decades — described by current and former US officials as comparable to the damage caused by turncoat CIA officer Aldrich Ames in the 1990s.

The NYT Investigation
The New York Times' May 2017 report "Killing C.I.A. Informants, China Crippled U.S. Spy Network" by Mark Mazzetti, Adam Goldman, and Michael S. Schmidt remains the definitive public account. It was based on interviews with more than a dozen current and former American officials. The CIA's network inside China was described as taking years to build — and dismantled in roughly two years.

The Executions — Method & Message

Chinese counterintelligence's response was not merely to arrest and imprison identified CIA assets — it was to weaponize the executions as a communication. Multiple accounts describe assets being executed in settings designed to maximize the psychological impact on potential future sources:

This is a studied doctrine. China's Ministry of State Security (MSS) understands that human intelligence networks run on trust and risk calculation. A source weighs the value of cooperation against the risk of detection. Public, visible executions — particularly those witnessed by colleagues — recalibrate that risk calculation for anyone observing.

Deterrence by Spectacle
Unlike Western democracies, which typically handle espionage prosecutions quietly to protect intelligence equities, China periodically publicizes spy executions and arrests — particularly in cases where the target audience is domestic. State broadcaster CCTV has aired "confessions" by accused foreign spies. The public nature serves recruitment deterrence: it tells potential sources that cooperation with foreign intelligence is not merely risky but visibly fatal.

The Three Theories: How China Found Them

How China identified and rolled up the CIA network remains officially unresolved and is the subject of active counterintelligence debate. Three leading theories emerged from the investigation:

Theory 1: A Mole Inside the CIA

The most alarming possibility: a CIA officer with access to source identities or communication protocols betrayed the network to Chinese intelligence. A CIA officer, Jerry Chun Shing Lee, was ultimately arrested in 2018 and pleaded guilty to retaining classified notebooks containing asset names and meeting sites. Prosecutors argued he passed this information to Chinese intelligence. Whether Lee was solely responsible — or one of multiple sources of the breach — remains unclear.

Lee was sentenced to 19 years in federal prison in 2019.

Theory 2: Compromised Communications Infrastructure

A competing theory, reported by Yahoo News in 2018, holds that the CIA was using a commercially available internet communication system — originally developed for dissidents in authoritarian countries — to communicate with sources in China. Chinese counterintelligence allegedly cracked or monitored this system, identifying CIA sources through their communication patterns rather than through a human betrayal. The CIA reportedly received warnings about the system's vulnerabilities and delayed addressing them.

This theory implies a systemic operational security failure, not just an individual traitor.

Theory 3: Chinese Intelligence Penetration of Non-CIA Systems

A third theory suggests Chinese intelligence gained access to classified US government databases through one of several documented Chinese hacks — including the 2015 OPM breach (which exposed 22 million federal employee personnel records, including SF-86 security clearance forms) — and cross-referenced data to identify individuals likely to be intelligence sources or case officers. This would represent a signals-to-HUMINT crossover: using cyber collection to enable physical counterintelligence.

Likely Answer
Most intelligence analysts believe the catastrophic scope of the rollup — 18 to 20 assets — suggests multiple breach vectors operating simultaneously, not a single cause. The combination of a mole, compromised communications, and cyber-enabled identification likely all contributed.

The CIA's Institutional Response — and Failure to Act

What makes the episode particularly damning is the internal response — or lack of one. According to the NYT investigation and subsequent reporting:

China's Broader Espionage Prosecution Record

China's legal framework for handling espionage is designed to maximize state discretion and minimize transparency:

Timeline: China's Counterintelligence Wins

2010
CIA network rollup begins
First assets go silent. CIA initially attributes losses to individual operational failures. MSS has likely already identified multiple network members.
2010–2012
18–20 assets killed or imprisoned
The network is systematically dismantled. At least one public execution in a government courtyard. CIA loses its primary human intelligence capability inside China for years.
2012
CIA task force established
Special counterintelligence unit formed to investigate the breach. Mole vs. technical compromise debate paralyzes the investigation.
2015
OPM Breach — 22 million records stolen
Chinese hackers (attributed to MSS) steal personnel files of virtually every federal employee with a security clearance, including SF-86 forms listing foreign contacts, family members, and personal vulnerabilities. A database of potential intelligence targets and vulnerabilities.
2017
NYT publishes investigation
Public account of the CIA network rollup published. CIA and FBI furious at disclosure; counterintelligence investigations into the leak begin.
2018
Jerry Chun Shing Lee arrested
Former CIA officer arrested at JFK Airport. Found with classified notebooks. Pleads guilty to retaining national defense information; prosecutors believe he passed it to China. Sentenced to 19 years.
2018
Yahoo News: compromised communications system
Competing theory published — CIA used vulnerable commercial communication platform; China cracked it independently of any human source.
2020–Present
China continues publicizing espionage arrests
MSS arrests of alleged foreign agents — including US, Australian, and EU nationals — publicized via state media. Confessions aired on CCTV. Multiple cases involve individuals with no apparent intelligence background, suggesting broad intimidation targeting.

The Asymmetry: How the US Handles Chinese Spies

The contrast with US practice is stark. When the US catches Chinese intelligence officers or their assets:

This asymmetry is not simply a legal or moral difference — it is a strategic one. China's willingness to execute spies publicly, and the US's institutional reluctance to impose comparable costs, creates an imbalanced deterrence environment that China has explicitly exploited in its recruitment doctrine.

"They were not just killing our people. They were sending a message — to anyone inside China who might think about working with us. The message was: we will find you. We will shoot you in front of your colleagues. And we will not apologize."

— Former senior CIA official, speaking anonymously to the New York Times (2017)

Primary Sources & Further Reading