
US arrests 2 Chinese nationals for allegedly spying on Navy personnel and bases
The US Department of Justice (DOJ) said that Yuance Chen, who lives in Happy Valley, Oregon, and Liren Lai, who entered the US on a tourist visa in April 2025, were arrested on Friday. Both are accused of helping the MSS with gathering intelligence and trying to recruit US military personnel.
The FBI and the Naval Criminal Investigative Service (NCIS) arrested Chen in Oregon and Lai in Houston, Texas.
'The individuals charged were acting on behalf of a hostile foreign intelligence service part of the Chinese Communist Party's broader effort to infiltrate and undermine our institutions,' FBI Director Kash Patel told Fox News. He added, 'We disrupted those efforts and sent a clear message, the United States will not tolerate espionage on American soil.'
According to the criminal complaint filed in federal court, Lai began working with the MSS in 2021 and later recruited Chen. In January 2022, they both travelled to Guangzhou, China, and allegedly arranged a 'dead drop' leaving $10,000 in a backpack in a day-use locker in Livermore, California.
The DOJ says the men continued working for the MSS after this operation. In 2022 and 2023, they visited a Navy base in Washington State and a recruitment office in California.
At the recruitment centre in San Gabriel, Chen reportedly photographed a bulletin board listing Navy recruits, including names and hometowns. Many of those listed had written that their hometown was 'China.' The DOJ claims these photos were sent to an MSS contact in China.
Chen is also accused of contacting a US Navy service member on social media. He later toured the USS Abraham Lincoln in San Diego with the help of this individual. Chen is said to have passed information about the employee to Chinese officials.
Between April 2024 and March 2025, Chen is believed to have visited Guangzhou multiple times to meet with MSS officers. The DOJ says he was given instructions on how to talk to potential recruits, including what the MSS could pay them and how to avoid detection.
Lai, meanwhile, told US authorities he was in Houston for business. But surveillance later showed him travelling between Texas and California in May 2025, well beyond the two-week stay he had declared.
Both men are charged with acting as agents of a foreign government without notifying the US attorney general a federal offence. If found guilty, they each face up to 10 years in prison and fines of up to $250,000.
(With inputs from Reuters and Fox News)

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Hindustan Times
30 minutes ago
- Hindustan Times
2 Chinese nationals charged with spying for China inside the US
Two Chinese nationals have been charged with spying inside the United States on behalf of Beijing, including by taking photographs of a naval base, coordinating a cash dead-drop and participating in efforts to recruit members of the military who they thought might be open to working for Chinese intelligence. According to an FBI affidavit filed in connection with the case, investigators believe Lai had been developing Chen to be a Chinese intelligence asset since at least mid-2021.(AFP/Representational) The case, filed in federal court in San Francisco and unsealed Monday, is the latest Justice Department prosecution to target what officials say are persistent efforts by the Chinese government to secretly collect intelligence about American military capabilities — a practice laid bare in startling fashion two years ago with China's launching of a surveillance balloon that U.S. officials ultimately shot down over the coast of South Carolina. "This case underscores the Chinese government's sustained and aggressive effort to infiltrate our military and undermine our national security from within,' Attorney General Pam Bondi said in a statement announcing the case. 'The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.' Officials identified the defendants as Yuance Chen, 38, who arrived in the U.S. on a visa in 2015 and later became a lawful permanent resident, and Liren 'Ryan' Lai, 39, who prosecutors say lives in China but traveled to Texas this past spring and was part of an effort to supervise clandestine espionage operations on behalf of China's Ministry of State Security or MSS. The two were arrested on charges of secretly doing China's bidding without registering as foreign agents with the Justice Department, as required by law. It was not immediately clear if they had lawyers. Liu Pengyu, a spokesman for the Chinese Embassy in Washington, said he had no information about the specific case but asserted that allegations against China 'have no facts or evidence' and that 'the U.S. has never stopped its espionage activities against China.' According to an FBI affidavit filed in connection with the case, investigators believe Lai had been developing Chen to be a Chinese intelligence asset since at least mid-2021. Their activities, the FBI says, included coordinating on a dead-drop of at least $10,000 in cash to another person who was operating at the direction of the MSS. They also participated and arranged surveillance of a Navy recruiting station in California and Navy base in Washington state, including through photographs that Chen is accused of taking and that investigators believe were transmitted to Chinese intelligence. Authorities say Lai and Chen also discussed recruiting Navy employees to work for China, with Chen at one point obtaining names, hometowns and programs of recent recruits. Many listed China as their hometown and investigators believe the information was sent to China, the FBI affidavit says. The affidavit recounts conversations aimed at assessing whether individual Navy employees would make for good recruits for Chinese intelligence. In one instance, the FBI said, Chen sent Lai the name of a Navy employee and wrote: 'I found out. His mother is Chinese. His father and mother did not get along and the mother was given custody when he was 8 years old. That is why he uses his mother's last name.' The case is one in a series concerning Chinese intelligence-gathering, sometimes related to the U.S. military. In August 2023, for instance, two Navy sailors were charged with providing sensitive military information to China, including details on wartime exercises, naval operations and critical technical material. "Adverse foreign intelligence services like the PRC's Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,' Assistant Attorney General John Eisenberg, the head of the Justice Department's National Security Division, said in a statement.


Mint
44 minutes ago
- Mint
Huawei Bid to Dismiss US Trade Sanction Case Rejected by Judge
Huawei Technologies Co. must face a criminal trial next year in New York after a federal judge refused a request by the Chinese wireless equipment maker to dismiss more than a dozen charges, including racketeering, trade secret theft and violating US sanctions on Iran. US District Judge Ann Donnelly on Tuesday rejected arguments by China's largest technology company that there wasn't enough evidence in the indictment to support 13 of the 16 charges. 'Dismissal of charges is an extraordinary remedy reserved for extremely limited circumstances implicating fundamental rights,' Donnelly wrote in a 52-page ruling. The Brooklyn judge called Huawei's challenge 'premature.' Huawei is accused of violating US sanctions against Iran and North Korea by misrepresenting to financial institutions that it conducted business in Iran in a way that didn't violate US law. Other charges include money laundering and obstruction of justice. The company has pleaded not guilty. Donnelly had previously set a trial date for May 4, 2026. David Bitkower and Douglas Axel, lawyers for Huawei, didn't immediately return emails seeking comment about the ruling. Huawei and the company's Chief Financial Officer Meng Wanzhou were first indicted in 2018 during the first Trump administration. Meng, who was arrested at Vancouver airport on the US charges in late 2018, reached a deal in 2021 to end the criminal case against her. Under the agreement, she admitted having misled HSBC Holdings Plc about the telecom company's business with Iran, in violation of US sanctions. The case is US v. Huawei, 18-cr-00457, US District Court for the Eastern District of New York This article was generated from an automated news agency feed without modifications to text.


Mint
2 hours ago
- Mint
China's giant new gamble with digital IDs
IT WAS IN 1984, of course, that police stations in China started issuing national ID cards to those over the age of 16. Citizens still need them to travel, pay taxes or gain access to public services. Now the Communist Party wants to cross another Rubicon. On July 15th the government will launch 'digital IDs" for use on the internet, shifting responsibility for online verification from private firms to the government. This is a potentially enormous step change in the state's control over data. It augments China's radically different approach to managing and surveilling the digital lives of its citizens. And it may alter who captures the profits generated from the online economy and even change the evolution of artificial intelligence in China. Under the new scheme people obtain a digital ID by submitting a raft of personal information, including scans of their faces, to the police via an app. They can then use it to register and log in to other apps or websites. A pilot went live a year ago and 6m people signed up. Currently voluntary, it may not remain so for long. Officials and state-run media are pressing citizens to sign up in the name of 'information security". China's 1.1bn internet users are in their sights. Some $1.3trn of market capitalisation is tied up in the big Chinese internet firms that cater to this huge customer base, from Alibaba to Meituan and Tencent. The state already tries to maintain a tight grip on what happens on the web. The government maintains the 'great firewall" through its control over telecoms infrastructure. It blocks hundreds of thousands of sites, including foreign news outlets, search engines and social media. But the system is multilayered and fiddly. Before posting a comment, playing an online game or paying for a takeaway, Chinese must register with the company running the service using their real name. This way the state partially outsources the job of surveillance. Last year the police say they punished 47,000 people who spread 'rumours". Firms help with gusto. Weibo, an X-like site owned by Sina Corp, uses a combination of blocked keywords and armies of censors to keep its 600m users in line, for example. The digital ID is an evolution of this set-up. Companies will know much less about who their users are from now on. Instead the IDs will allow people to log in to websites or apps without revealing their personal details to firms, which will see just an anonymised stream of digits and letters. Internet platforms can still censor users and report troublemakers—but only the police will hold all users' details. In some ways it is surprising that China, a forceful surveillance state, did not roll out digital IDs earlier. Dozens of countries have versions of one, including Australia and Britain, although their IDs are just used for access to government services, and are not run by the police. India began work on its vaunted Aadhaar programme back in 2009. So why is China doing this now? In the short term the scheme is meant to prevent consumer harm. Many Chinese are deluged with spam phone calls because their personal details have been sold to third parties. A lot of data also leak to gangs of telecoms fraudsters, whose scams cost China billions of yuan a year. 'It's like the government has sent us a bullet-proof vest for our personal information!" said one excited state-media journalist, in a video encouraging people to sign up. Critics fear the ID will turbocharge snooping. It may, for instance, help the police assemble a list of all the websites and apps each person uses. They could probably already get this information with a few phone calls, but the new scheme could make things more convenient. Data from the digital IDs might in the future be plugged into a new, more comprehensive online-surveillance system. When the scheme was first announced last year it created an online backlash. Lao Dongyan, a professor at Tsinghua University in Beijing, called it a 'ruse" on Weibo. Then her comments were scrubbed and her account was temporarily suspended. In the long term the digital ID is part of a far more ambitious vision, with the state taking firmer, more centralised control over the vast data flows the economy creates. In part this is motivated by national-security concerns. In the wrong hands—say, of foreign spies—personal data could be used for disinformation campaigns or cyberattacks. It could also be used to train AIs so as to glean insights on China's population. Economic opportunity underlies the vision, too. State planners say data is a factor of production, alongside labour, capital and land. They want to avoid it being hoarded inside companies and make it available for widespread use and trading. Local governments have built data exchanges to allow it to be monetised and traded between state agencies, state-owned enterprises and private companies. In Shenzhen, a tech hub in China's south, firms can buy data on how consumers use power from the national grid, for example. A national data-exchange is in the works. And in June the State Council, China's cabinet, announced new rules to prevent data being siloed by competing government departments. This all has implications for the rents derived from China's torrents of data and who gets them. In principle the digital ID harms the interests of private-sector internet platforms—not that the stockmarket seems to have noticed. The calm belies the government's capabilities. In recent years it has clobbered data-hoarding titans in other industries. In 2021 Ant Group, a subsidiary of Alibaba, a tech giant, was forced to share its consumer-credit data with China's central bank. That year Didi, a ride-hailing firm, angered regulators by listing on the New York Stock Exchange despite their concerns that its data might be exposed. In 2022 it was fined 8bn yuan ($1.2bn) and forced to delist for 'illegally collecting millions of pieces of user information" and processing data in a way that threatened 'national security". Centralised data flows may supercharge China's AI initiatives. Chinese firms are prevented from buying American-designed AI chips, which are the most powerful in the world. But they could still try to find a competitive edge by feeding their algorithms more and higher-quality data as Lee Kai-fu, a Taiwanese tech investor, has argued. One area where masses of data have already helped Chinese companies to the bleeding edge is facial-recognition technology, thanks to the millions of surveillance cameras Chinese officials have set up across cities. For all its techno-optimism about data, though, China's government has a poor record of managing it. Officials are often badly paid and looking for ways to make more money—for instance, by selling valuable information. And practices can be lax. In 2022 a hacker stole 1bn personal records from the Shanghai police by lifting them from an unsecured database. Scandals like this might have made Chinese people more wary of government schemes like digital IDs. Fortunately, China's ever-watchful tech firms stepped in: reports of the theft were censored.