Honestly, all traitors should receive the death sentence, straight away, no exceptions.
Such inmates are not necessarily kept alive and healthy for their own sake, but as potential bargaining chips for future prisoner exchanges.
The traitors which I'm referring to are Chinese nationals with PRC citizenships, not foreigners. Who is China going to exchange those prisoners with?
Foreigners are not considered traitors if they are working against China on Chinese soil - They are classified as espionage agents or spies at best.
I would think so. They probably wouldn't publish things like this about ongoing cases.Was Zhang caught?
Harbin Municipal Public Security Bureau Publicly Issues Arrest Warrants for Three U.S. National Security Agency (NSA) Operatives
Xinhua News Agency, Harbin, April 15 (Reporter Xiong Feng) — On the 15th, reporters learned from the Harbin Municipal Public Security Bureau in Heilongjiang Province that, in order to lawfully and severely combat crimes of cyberattacks and espionage by foreign forces and effectively safeguard national cybersecurity and the safety of people’s lives and property, the Harbin Municipal Public Security Bureau has decided to issue arrest warrants for three criminal suspects affiliated with the U.S. National Security Agency (NSA):
Katheryn A. Wilson
Robert J. Snelling
Stephen W. Johnson.
Earlier, media reports on the foreign cyberattack against the "9th Asian Winter Games Harbin 2025" drew widespread attention. The National Computer Virus Emergency Response Center and the cybersecurity team for the Asian Winter Games promptly submitted all data related to the cyberattack to the Harbin Municipal Public Security Bureau. The bureau immediately organized a technical team of experts to conduct a traceability investigation into the cyberattack. With support from relevant countries, the technical team, after persistent efforts, successfully traced the involvement of three NSA operatives and two U.S. universities in the cyberattacks targeting the Asian Winter Games.
Through layered technical tracing, the cyberattack on the Asian Winter Games was determined to be a meticulously orchestrated operation by the NSA. The entity responsible for the attack was the Office of Tailored Access Operations (TAO, codenamed S32), a division under the NSA’s Data Reconnaissance Bureau (codenamed S3) of the Information Intelligence Directorate (codenamed S). To conceal the attack’s origin and protect its cyber weapons, TAO leveraged multiple affiliated front organizations to procure IP addresses from various countries and anonymously rent a large number of network servers located in Europe, Asia, and other regions.
Investigations revealed that the NSA’s pre-event attacks primarily targeted critical systems such as the Asian Winter Games’ registration system, arrival-departure management system, and competition entry system. These systems, used for pre-event operations, stored sensitive personal information of personnel involved in the Games. The NSA sought to steal private data of participating athletes through these cyberattacks. Starting from the first ice hockey match on February 3, the NSA’s cyberattacks intensified, focusing on the event information release system (including API interfaces) and the arrival-departure management system—key operational systems for the Games. The NSA aimed to disrupt these systems and sabotage the normal functioning of the Asian Winter Games. Simultaneously, the NSA launched cyberattacks against critical sectors in Heilongjiang Province, including energy, transportation, water conservancy, telecommunications, and defense research institutes, attempting to destabilize critical information infrastructure, incite social disorder, and steal vital classified information from these fields.
The NSA’s cyber infiltration targeted specific application systems, critical information infrastructure, and key departments, employing hundreds of known and unknown attack methods. These included advanced tactics such as blind exploitation of unknown vulnerabilities, file reading vulnerabilities, short-term high-frequency directional detection attacks, backup/sensitive file and path probing attacks, and brute-force password attacks, with clear objectives and malicious intent. The technical team also discovered that during the Asian Winter Games, the NSA sent unknown encrypted bytes to multiple Microsoft Windows-based devices in Heilongjiang Province, suspected of activating pre-embedded backdoors in the operating system.
After sustained investigative efforts, the Harbin Municipal Public Security Bureau successfully identified the three NSA operatives involved in the cyberattacks. Further investigations revealed that these operatives had repeatedly launched cyberattacks against China’s critical information infrastructure and participated in attacks targeting companies such as Huawei. The technical team also found that the University of California and Virginia Tech—both with ties to the NSA—were involved in the attacks. Public records show that the University of California has been designated an Academic Center of Excellence in Cyber Defense Education by the NSA and the Department of Homeland Security since 2015. Virginia Tech, one of the U.S.’s six senior military colleges, received NSA funding in 2021 to strengthen its cyber offense and defense capabilities. The university is an NSA-certified "Center of Academic Excellence in Cyber Defense" and "Cyber Operations Research Center," long participating in NSA-funded federal scholarship programs. Additionally, it oversees the construction of cyber attack/defense training ranges for the Virginia state government.
The Harbin Municipal Public Security Bureau urged the public to actively provide leads. Informants who supply valid information to authorities and individuals who assist in apprehending the suspects will receive monetary rewards.
Xinhua News Agency, Harbin, April 3 (Reporters Wang Junbao, Zhang Jianxin) — On the 3rd, the National Computer Virus Emergency Response Center and the National Engineering Laboratory for Computer Virus Prevention and Control Technology released a monitoring and analysis report on cyberattacks targeting the information systems of the "9th Asian Winter Games Harbin 2025" and critical information infrastructure in Heilongjiang Province. The report reveals that from January 26 to February 14, 2025, the Games' information systems suffered 270,167 cyberattacks originating from overseas.
The 9th Asian Winter Games, held successfully in Harbin, Heilongjiang Province from February 7 to 14, 2025, attracted widespread domestic and international attention but also became a target for cyberattacks. This analytical report comprehensively summarizes the cybersecurity threats monitored and addressed by the cybersecurity team during the event. Statistical data indicate that throughout the Games, both the event’s information systems and critical infrastructure within Heilongjiang Province faced massive cyberattacks, predominantly originating from the United States, the Netherlands, and other countries and regions. Despite these attacks failing to significantly disrupt the event—thanks to the joint efforts of the cybersecurity team—they highlighted the severe reality of China’s cyberspace being frequently targeted by overseas adversaries.
A comprehensive review of network logs by the cybersecurity team revealed that between January 26 and February 14, 2025, the Asian Winter Games’ information systems endured 270,167 cyberattacks from overseas. The frequency of attacks exhibited a fluctuating upward trend, with notably higher volumes from February 7 to 13, peaking on February 8.
Starting January 26, the cybersecurity team initiated joint analysis and emergency response measures, blocking IP addresses identified as high-risk overseas attack sources. This ensured secure and reliable data exchanges between event systems across different venues. Monitoring data showed that since the first ice hockey match on February 3, abnormal network traffic—including asset probing, bulk port scanning, and vulnerability exploitation—surged against the event’s information systems.
Cyberattacks targeted multiple event systems, with the three most heavily attacked being the event information release system, arrival-departure management system, and fee payment system. Attackers primarily sought to gather network asset fingerprints through probing and scanning, then exploited known system vulnerabilities or web injection flaws for intrusion. The methods and patterns reflected clear intent to compromise event-related systems.
Of the identified attacks, 170,864 (63.24%) originated from the United States, followed by Singapore, the Netherlands, Germany, South Korea, and other regions.
During the Games, 12,602 high-risk malicious IP addresses were blocked. These IPs engaged in malicious scanning and vulnerability exploitation aimed at infiltrating systems to steal data or directly sabotage operations. Most attacks were traced to overseas cloud service hosts, notably Digital Ocean.
Additionally, from January 31 to February 14, the three countries launching the most attacks against Heilongjiang’s critical infrastructure were the Netherlands (37.98 million times), the United States (11.79 million times), and Thailand (720,000 times). Australia, the UK, Germany, Lithuania, Canada, Japan, and Singapore ranked fourth to tenth.
Notably, a January 2025 report by China’s National Internet Emergency Center (CNCERT) explicitly identified U.S. intelligence agencies’ use of cloud hosts in the Netherlands, Germany, and other European countries as springboards or proxies for attacks. Based on detailed analysis of attack origins—including methods, tools, timing, and linguistic patterns—the cybersecurity team strongly suspects state-backed U.S. government involvement in the cyberattacks targeting the Asian Winter Games’ systems and Heilongjiang’s critical infrastructure.
Not only that, but assassinate her foreign handler, after all information are extracted.Honestly, all traitors should receive the death sentence, straight away, no exceptions.
I think this is the first time for China to want specific foreigners arrested for cyber attacks on Chinese targets. MSS has named names before but stopped short of issuing arrest warrants.Harbin Municipal Public Security Bureau Publicly Issues Arrest Warrants for Three U.S. National Security Agency (NSA) Operatives
Xinhua News Agency, Harbin, April 15 (Reporter Xiong Feng) — On the 15th, reporters learned from the Harbin Municipal Public Security Bureau in Heilongjiang Province that, in order to lawfully and severely combat crimes of cyberattacks and espionage by foreign forces and effectively safeguard national cybersecurity and the safety of people’s lives and property, the Harbin Municipal Public Security Bureau has decided to issue arrest warrants for three criminal suspects affiliated with the U.S. National Security Agency (NSA):
Katheryn A. Wilson
Robert J. Snelling
Stephen W. Johnson.
Earlier, media reports on the foreign cyberattack against the "9th Asian Winter Games Harbin 2025" drew widespread attention. The National Computer Virus Emergency Response Center and the cybersecurity team for the Asian Winter Games promptly submitted all data related to the cyberattack to the Harbin Municipal Public Security Bureau. The bureau immediately organized a technical team of experts to conduct a traceability investigation into the cyberattack. With support from relevant countries, the technical team, after persistent efforts, successfully traced the involvement of three NSA operatives and two U.S. universities in the cyberattacks targeting the Asian Winter Games.
Through layered technical tracing, the cyberattack on the Asian Winter Games was determined to be a meticulously orchestrated operation by the NSA. The entity responsible for the attack was the Office of Tailored Access Operations (TAO, codenamed S32), a division under the NSA’s Data Reconnaissance Bureau (codenamed S3) of the Information Intelligence Directorate (codenamed S). To conceal the attack’s origin and protect its cyber weapons, TAO leveraged multiple affiliated front organizations to procure IP addresses from various countries and anonymously rent a large number of network servers located in Europe, Asia, and other regions.
Investigations revealed that the NSA’s pre-event attacks primarily targeted critical systems such as the Asian Winter Games’ registration system, arrival-departure management system, and competition entry system. These systems, used for pre-event operations, stored sensitive personal information of personnel involved in the Games. The NSA sought to steal private data of participating athletes through these cyberattacks. Starting from the first ice hockey match on February 3, the NSA’s cyberattacks intensified, focusing on the event information release system (including API interfaces) and the arrival-departure management system—key operational systems for the Games. The NSA aimed to disrupt these systems and sabotage the normal functioning of the Asian Winter Games. Simultaneously, the NSA launched cyberattacks against critical sectors in Heilongjiang Province, including energy, transportation, water conservancy, telecommunications, and defense research institutes, attempting to destabilize critical information infrastructure, incite social disorder, and steal vital classified information from these fields.
The NSA’s cyber infiltration targeted specific application systems, critical information infrastructure, and key departments, employing hundreds of known and unknown attack methods. These included advanced tactics such as blind exploitation of unknown vulnerabilities, file reading vulnerabilities, short-term high-frequency directional detection attacks, backup/sensitive file and path probing attacks, and brute-force password attacks, with clear objectives and malicious intent. The technical team also discovered that during the Asian Winter Games, the NSA sent unknown encrypted bytes to multiple Microsoft Windows-based devices in Heilongjiang Province, suspected of activating pre-embedded backdoors in the operating system.
After sustained investigative efforts, the Harbin Municipal Public Security Bureau successfully identified the three NSA operatives involved in the cyberattacks. Further investigations revealed that these operatives had repeatedly launched cyberattacks against China’s critical information infrastructure and participated in attacks targeting companies such as Huawei. The technical team also found that the University of California and Virginia Tech—both with ties to the NSA—were involved in the attacks. Public records show that the University of California has been designated an Academic Center of Excellence in Cyber Defense Education by the NSA and the Department of Homeland Security since 2015. Virginia Tech, one of the U.S.’s six senior military colleges, received NSA funding in 2021 to strengthen its cyber offense and defense capabilities. The university is an NSA-certified "Center of Academic Excellence in Cyber Defense" and "Cyber Operations Research Center," long participating in NSA-funded federal scholarship programs. Additionally, it oversees the construction of cyber attack/defense training ranges for the Virginia state government.
The Harbin Municipal Public Security Bureau urged the public to actively provide leads. Informants who supply valid information to authorities and individuals who assist in apprehending the suspects will receive monetary rewards.
In official statement, intellectual family means her parents are high rank professor, even Academician, normally members of one of 9 democratic parties.Another espionage case. Unsure which specific government department it happened in.
Zhang, born into an intellectual family,