China is actively developing human intelligence operations in the U.S., using methods previously employed by Russian intelligence services, particularly the so-called “honey‑trap” tactics, according to the Robert Lansing Institute (RLI).
Beijing increasingly deploys female agents who gain access to American specialists in technology, defense, and science through personal relationships. Experts note that this strategy aims to collect intellectual property, confidential data, and infiltrate U.S. technology networks.
In recent years, China’s Ministry of State Security has systematically applied human intelligence (HUMINT) as a complement to cyberespionage. Female operatives, posing as investors, businesspeople, or scientists, establish contacts with Americans involved in technological and research projects. This approach allows them to bypass cyber defenses and access internal information through trust-based relationships.
According to the report, China is adopting Russian methods of emotional and sexual manipulation used to recruit targets or obtain classified information. The RLI notes that the open U.S. technology ecosystem makes American specialists vulnerable to such tactics, especially in startups, scientific research, and venture capital.
Special attention is given to cases where Chinese female agents attempted to infiltrate conferences and scientific events discussing advanced technologies. Experts emphasize that these operations are often disguised as professional networking but are actually intended to establish emotional dependency and subsequently extract confidential information.
U.S. counterintelligence agencies acknowledge that “bait tactics” have become a new focus of Chinese operations. In April 2025, the U.S. State Department officially prohibited its personnel working in China from engaging in romantic relationships with Chinese citizens, citing the risk of such ties being exploited for intelligence purposes.
The RLI notes that Chinese agent activity poses a threat to U.S. national security, particularly in sectors related to defense technology, artificial intelligence, and semiconductors. Data leaks and intellectual property theft, analysts warn, could undermine U.S. technological superiority and strengthen China’s position in the global market.
The report emphasizes that countering these operations requires not only technical measures but also a broader shift in security strategy. The U.S., the authors argue, must pay greater attention to protecting academic and investment environments from social engineering and covert recruitment tactics.
In summary, China is gradually shifting from traditional cyberespionage to leveraging personal relationships, turning trust and personal connections into tools of intelligence. Experts warn that if Washington does not adapt its security measures to this new reality, “honey-trap” operations could become one of the most effective tools of Chinese espionage in the race for technological supremacy.