The FBI’s warning to Silicon Valley: China and Russia are trying to turn your employees into spies

A top special agent in San Francisco has a stark message: "Raise your shields."

A suspicious login screen

The FBI is warning tech companies of an insider threat that's not like anything they've seen in a James Bond movie.

Image: Christopher T. Fong / Protocol

When FBI special agent Nick Shenkin starts talking about spies in Silicon Valley, he's not describing a James Bond movie or even what people have seen on "The Americans." Instead, what he's there to warn the tech sector about is less dramatic but perhaps more insidious: the insider threat of economic espionage and intellectual property theft.

It's not the Hollywood image of espionage. But the risk to tech companies is real, the FBI says: Employees are being persuaded, or more typically, coerced by foreign autocracies into stealing information or handing over login credentials. In one case Shenkin worked on, Chinese government agents threatened to deny an employee's mother dialysis back in China if he didn't steal proprietary information from a large hardware/software company.

"This is a quotidian activity," Shenkin told Protocol in an interview. "This is a massive fundamental activity that bolsters and is one of the mainstays of many autocratic countries and their governments."

For the last few years, San Francisco-based Shenkin has been quietly briefing venture firms, startups, academics and tech industry groups that might be of interest to foreign actors. It's not the glamorous spy stings that form movie plots, but a subtle way of fighting espionage through education. After Protocol heard about the briefings from multiple sources, the FBI agreed to an interview about the content of the briefings and shared its framework, called the "Delta Protocol" (no relation to COVID-19 or this publication), which the agency developed to distribute to startups so they can learn to protect themselves.

"The reason why we're being so much more assertive about these briefings and trying to be more open with U.S. industry is because we've just come to the realization that if there is no cost, then they will continue to do what they're doing," Shenkin said. "So the briefings are like, 'Please American companies, raise your shields, protect yourselves, make it more expensive for the thieves to rob you, and the country is stronger, and you're stronger.'"

It's not your HR department's job to catch a spy

Five years ago when Shenkin started approaching companies, he was trying to convince them the threat wasn't just hypothetical. But hackings by foreign actors now routinely make headlines, and there's been a spate of indictments of individuals, from ex-Apple engineers to researchers, who were accused of smuggling information.

In 2018, the Department of Justice formally launched the China Initiative, and FBI Director Christopher Wray called China's economic espionage and counterintelligence "the greatest long-term threat to our nation's information and intellectual property, and to our economic vitality" in a 2020 speech. (Government estimates of losses from Chinese intellectual property theft run in the hundreds of billions of dollars a year, though some critics say those numbers are inflated.)

"Now you go to these companies and nobody needs to be convinced. Everybody knows that this is a threat, and the big issue becomes how do we defend against it," Shenkin said.

No one expects HR departments to screen out spies when hiring employees — nor is that even the way companies should be thinking about it, Shenkin said. Instead, he's trying to coach tech companies on how to identify vulnerabilities that a person could have and then find ways to protect the individual and the company from those vulnerabilities being taken advantage of by an autocratic government — namely, China and Russia.

There are four main vulnerabilities covered in the briefings: someone being a citizen of an autocracy, doing business with one, having assets in the country or having family members or employees living or working in the autocracy. But it's the family vulnerability in particular that Shenkin says he sees "exploited over and over and over again".

"A lot of what the briefings cover is the idea that this is not about the ethnicity of the individual. This is about: What is any individual's or entity's vulnerability to the jurisdiction of an autocracy? Because what we see overwhelmingly is people who end up stealing intellectual property, very often, they have no desire to be stealing intellectual property," Shenkin said.

While the government used to obsess about state-owned enterprises (or ones that are closely associated, like Huawei), Shenkin said it's shifted focus to what it calls the hybrid threat: autocracies essentially sinking their hooks into people and "forcing them to act as if they are an arm of that government, whether they want to or not."

The general ignorance of the threat — and the lack of incentives for companies to report suspicions — has meant Silicon Valley, in particular, has emerged as a "den of spies," according to POLITICO.

There have been a handful of high-profile cases to reach the level of indictments. The government charged two different Apple engineers in 2018 and early 2019 for allegedly stealing trade secret information about its self-driving car. The most famous case the FBI and experts draw from is the case of Walter Liew, who was found guilty of stealing information about the color white from DuPont. The Center for Strategic & International Studies maintains a list of more than 100 allegedly China-linked IP theft acts since 2000.

The challenge is that these cases are the prosecutable tip of what Shenkin believes is a much larger iceberg when it comes to theft of sensitive information.

To help identify some of the areas that it should be focusing on, the FBI has turned to the venture capital community. It's not that the FBI thinks Sand Hill Road is "housing intelligence officers from foreign countries," Shenkin said. Instead, it's interested in the firms as "knowledge nodes" that can help the FBI understand where the real valuable technological innovations are. The agency is also hoping to learn which companies in an investor's portfolio could most use a briefing to help protect their investments from IP theft.

That doesn't always mean the most cutting-edge tech. "If you're a quantum computing company, or a biotech company, or a green tech company, you are a juicier zebra on the Serengeti," Shenkin said. "But they're also going for just the slowest zebra on the Serengeti."

Not a witch hunt

The challenge with the briefings is not stoking the flames of anti-Chinese or anti-Russian resentment in the U.S., especially at a time when xenophobia is already on the rise. Shenkin said he doesn't want to start a witch hunt, or make companies afraid to hire people with Chinese or Russian names.

"The idea that we're out there, targeting Russian Americans, or Chinese Americans, or anybody of those ethnic groups — I mean, nothing could be further from the truth. We do not live under any delusion that one ethnic group has some sort of a genetic proclivity towards dishonest behavior. Absolutely not the case," Shenkin said.

He says it's a misconception, furthered by the media, that the FBI is targeting Chinese Americans when the reality, as he views it, is that the FBI is trying to protect them from the Chinese government. "From our perspective, the Chinese American community is being exploited by China. They're being targeted and exploited and forced to do illegal things by the government of China," he said.

The problem with that rhetoric is that it treats "China" or "Chinese Americans" as a homogenous body and introduces the idea that a person of Chinese ethnicity could be a threat when it's really based on the individual's vulnerabilities beyond whether they have family in an autocratic state, said Margaret Lewis, a professor at Seton Hall, who has argued for a rethink of the DOJ's larger China Initiative.

"That's creating this construct that Chinese Americans are vulnerable, by reason [of] being Chinese Americans, when I think we need to disaggregate that and look much more at an individual level," Lewis said. While there's no doubt China has exploited family connections some Chinese Americans may have, she said, there's also concern that it's both grouping too many people as vulnerable when they're not, and potentially excluding other vectors of vulnerabilities, like employees with gambling problems who may be desperate to sell information for cash.

Liu Pengyu, a spokesperson for the Chinese embassy in Washington, said in a statement that the media had "frequently hyped" the topic of spies, but that "quite a few later proved to be out of nothing." He added that "the cross-border flow of talent has driven technological and economic progress all across the world" and that he hoped the U.S. would "work to promote instead of disrupting China-US scientific exchange and cooperation."

Shenkin emphasized that the goal of the FBI's briefings, which predate the DOJ's China Initiative, is to focus on individual vulnerabilities, rather than having companies walk away not trusting their Chinese or Russian employees.

"What we're trying to say is, if you hire somebody that has a vulnerability to an autocracy, your best course of action is to help that person, to train that person to understand what their vulnerabilities are so they can protect themselves and the company can help protect that individual from exploitation by that autocratic government," he said. "That's our goal. And that's why we do this brief."

Like a phishing email

The solution the FBI pitches is neither a blanket ban on foreign nationals nor the shrug-emoji approach of assuming it's inevitable. Instead, Shenkin sees it like phishing emails: Companies need to train their employees to know what to look out for and install back-up measures to minimize the damage when someone slips up.

Big tech companies often already have the staff in place to assess insider threats and build the security back-ups needed to counter them, but startups are particularly vulnerable thanks to their size and work on cutting-edge technologies. That's why the FBI developed the Delta Protocol, named after the "delta" between when a company is formed and when it's large enough to have its own security staff trained for internal threats.

In the Delta Protocol, the FBI includes basic best practices like advising companies to log who has access to sensitive IP and install needed physical security, like self-locking doors and alarms. It also has a section on helping companies identify insider threat characteristics, from employees who may be coerced through high-risk activities (like racking up gambling debts that a government could pay off in exchange for information) to the mercenary employee who shows zero loyalty and will sell information to the highest bidder (described as someone who "may have significant issues in the workplace such as an inability to work with others, extreme disgruntlement, belligerence, and frequent violations of workplace rules and policies.")

Getting companies to adopt the Delta Protocol, or at least start grasping the scale of potential IP theft, is why the FBI has been doing more outreach.

"I think the most important thing for us is for people to understand the scope of this threat, and just how absolutely quotidian a large group of people's everyday job is to steal technology from Silicon Valley. That's just what they do for a living," Shenkin said. "And so much of it is not just people who steal because they want to steal technology. A very, very large chunk of it is normal human beings who do not want to steal, who were just trying to protect their families, and have to steal in order to protect their families."


Judge Zia Faruqui is trying to teach you crypto, one ‘SNL’ reference at a time

His decisions on major cryptocurrency cases have quoted "The Big Lebowski," "SNL," and "Dr. Strangelove." That’s because he wants you — yes, you — to read them.

The ways Zia Faruqui (right) has weighed on cases that have come before him can give lawyers clues as to what legal frameworks will pass muster.

Photo: Carolyn Van Houten/The Washington Post via Getty Images

“Cryptocurrency and related software analytics tools are ‘The wave of the future, Dude. One hundred percent electronic.’”

That’s not a quote from "The Big Lebowski" — at least, not directly. It’s a quote from a Washington, D.C., district court memorandum opinion on the role cryptocurrency analytics tools can play in government investigations. The author is Magistrate Judge Zia Faruqui.

Keep ReadingShow less
Veronica Irwin

Veronica Irwin (@vronirwin) is a San Francisco-based reporter at Protocol covering fintech. Previously she was at the San Francisco Examiner, covering tech from a hyper-local angle. Before that, her byline was featured in SF Weekly, The Nation, Techworker, Ms. Magazine and The Frisc.

The financial technology transformation is driving competition, creating consumer choice, and shaping the future of finance. Hear from seven fintech leaders who are reshaping the future of finance, and join the inaugural Financial Technology Association Fintech Summit to learn more.

Keep ReadingShow less
The Financial Technology Association (FTA) represents industry leaders shaping the future of finance. We champion the power of technology-centered financial services and advocate for the modernization of financial regulation to support inclusion and responsible innovation.

AWS CEO: The cloud isn’t just about technology

As AWS preps for its annual re:Invent conference, Adam Selipsky talks product strategy, support for hybrid environments, and the value of the cloud in uncertain economic times.

Photo: Noah Berger/Getty Images for Amazon Web Services

AWS is gearing up for re:Invent, its annual cloud computing conference where announcements this year are expected to focus on its end-to-end data strategy and delivering new industry-specific services.

It will be the second re:Invent with CEO Adam Selipsky as leader of the industry’s largest cloud provider after his return last year to AWS from data visualization company Tableau Software.

Keep ReadingShow less
Donna Goodison

Donna Goodison (@dgoodison) is Protocol's senior reporter focusing on enterprise infrastructure technology, from the 'Big 3' cloud computing providers to data centers. She previously covered the public cloud at CRN after 15 years as a business reporter for the Boston Herald. Based in Massachusetts, she also has worked as a Boston Globe freelancer, business reporter at the Boston Business Journal and real estate reporter at Banker & Tradesman after toiling at weekly newspapers.

Image: Protocol

We launched Protocol in February 2020 to cover the evolving power center of tech. It is with deep sadness that just under three years later, we are winding down the publication.

As of today, we will not publish any more stories. All of our newsletters, apart from our flagship, Source Code, will no longer be sent. Source Code will be published and sent for the next few weeks, but it will also close down in December.

Keep ReadingShow less
Bennett Richardson

Bennett Richardson ( @bennettrich) is the president of Protocol. Prior to joining Protocol in 2019, Bennett was executive director of global strategic partnerships at POLITICO, where he led strategic growth efforts including POLITICO's European expansion in Brussels and POLITICO's creative agency POLITICO Focus during his six years with the company. Prior to POLITICO, Bennett was co-founder and CMO of Hinge, the mobile dating company recently acquired by Match Group. Bennett began his career in digital and social brand marketing working with major brands across tech, energy, and health care at leading marketing and communications agencies including Edelman and GMMB. Bennett is originally from Portland, Maine, and received his bachelor's degree from Colgate University.


Why large enterprises struggle to find suitable platforms for MLops

As companies expand their use of AI beyond running just a few machine learning models, and as larger enterprises go from deploying hundreds of models to thousands and even millions of models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

As companies expand their use of AI beyond running just a few machine learning models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

Photo: artpartner-images via Getty Images

On any given day, Lily AI runs hundreds of machine learning models using computer vision and natural language processing that are customized for its retail and ecommerce clients to make website product recommendations, forecast demand, and plan merchandising. But this spring when the company was in the market for a machine learning operations platform to manage its expanding model roster, it wasn’t easy to find a suitable off-the-shelf system that could handle such a large number of models in deployment while also meeting other criteria.

Some MLops platforms are not well-suited for maintaining even more than 10 machine learning models when it comes to keeping track of data, navigating their user interfaces, or reporting capabilities, Matthew Nokleby, machine learning manager for Lily AI’s product intelligence team, told Protocol earlier this year. “The duct tape starts to show,” he said.

Keep ReadingShow less
Kate Kaye

Kate Kaye is an award-winning multimedia reporter digging deep and telling print, digital and audio stories. She covers AI and data for Protocol. Her reporting on AI and tech ethics issues has been published in OneZero, Fast Company, MIT Technology Review, CityLab, Ad Age and Digiday and heard on NPR. Kate is the creator of RedTailMedia.org and is the author of "Campaign '08: A Turning Point for Digital Media," a book about how the 2008 presidential campaigns used digital media and data.

Latest Stories