Power

The FBI’s warning to Silicon Valley: China and Russia are trying to turn your employees into spies

A top special agent in San Francisco has a stark message: "Raise your shields."

A suspicious login screen

The FBI is warning tech companies of an insider threat that's not like anything they've seen in a James Bond movie.

Image: Christopher T. Fong / Protocol

When FBI special agent Nick Shenkin starts talking about spies in Silicon Valley, he's not describing a James Bond movie or even what people have seen on "The Americans." Instead, what he's there to warn the tech sector about is less dramatic but perhaps more insidious: the insider threat of economic espionage and intellectual property theft.

It's not the Hollywood image of espionage. But the risk to tech companies is real, the FBI says: Employees are being persuaded, or more typically, coerced by foreign autocracies into stealing information or handing over login credentials. In one case Shenkin worked on, Chinese government agents threatened to deny an employee's mother dialysis back in China if he didn't steal proprietary information from a large hardware/software company.

"This is a quotidian activity," Shenkin told Protocol in an interview. "This is a massive fundamental activity that bolsters and is one of the mainstays of many autocratic countries and their governments."

For the last few years, San Francisco-based Shenkin has been quietly briefing venture firms, startups, academics and tech industry groups that might be of interest to foreign actors. It's not the glamorous spy stings that form movie plots, but a subtle way of fighting espionage through education. After Protocol heard about the briefings from multiple sources, the FBI agreed to an interview about the content of the briefings and shared its framework, called the "Delta Protocol" (no relation to COVID-19 or this publication), which the agency developed to distribute to startups so they can learn to protect themselves.

"The reason why we're being so much more assertive about these briefings and trying to be more open with U.S. industry is because we've just come to the realization that if there is no cost, then they will continue to do what they're doing," Shenkin said. "So the briefings are like, 'Please American companies, raise your shields, protect yourselves, make it more expensive for the thieves to rob you, and the country is stronger, and you're stronger.'"

It's not your HR department's job to catch a spy

Five years ago when Shenkin started approaching companies, he was trying to convince them the threat wasn't just hypothetical. But hackings by foreign actors now routinely make headlines, and there's been a spate of indictments of individuals, from ex-Apple engineers to researchers, who were accused of smuggling information.

In 2018, the Department of Justice formally launched the China Initiative, and FBI Director Christopher Wray called China's economic espionage and counterintelligence "the greatest long-term threat to our nation's information and intellectual property, and to our economic vitality" in a 2020 speech. (Government estimates of losses from Chinese intellectual property theft run in the hundreds of billions of dollars a year, though some critics say those numbers are inflated.)

"Now you go to these companies and nobody needs to be convinced. Everybody knows that this is a threat, and the big issue becomes how do we defend against it," Shenkin said.

No one expects HR departments to screen out spies when hiring employees — nor is that even the way companies should be thinking about it, Shenkin said. Instead, he's trying to coach tech companies on how to identify vulnerabilities that a person could have and then find ways to protect the individual and the company from those vulnerabilities being taken advantage of by an autocratic government — namely, China and Russia.

There are four main vulnerabilities covered in the briefings: someone being a citizen of an autocracy, doing business with one, having assets in the country or having family members or employees living or working in the autocracy. But it's the family vulnerability in particular that Shenkin says he sees "exploited over and over and over again".

"A lot of what the briefings cover is the idea that this is not about the ethnicity of the individual. This is about: What is any individual's or entity's vulnerability to the jurisdiction of an autocracy? Because what we see overwhelmingly is people who end up stealing intellectual property, very often, they have no desire to be stealing intellectual property," Shenkin said.

While the government used to obsess about state-owned enterprises (or ones that are closely associated, like Huawei), Shenkin said it's shifted focus to what it calls the hybrid threat: autocracies essentially sinking their hooks into people and "forcing them to act as if they are an arm of that government, whether they want to or not."

The general ignorance of the threat — and the lack of incentives for companies to report suspicions — has meant Silicon Valley, in particular, has emerged as a "den of spies," according to POLITICO.

There have been a handful of high-profile cases to reach the level of indictments. The government charged two different Apple engineers in 2018 and early 2019 for allegedly stealing trade secret information about its self-driving car. The most famous case the FBI and experts draw from is the case of Walter Liew, who was found guilty of stealing information about the color white from DuPont. The Center for Strategic & International Studies maintains a list of more than 100 allegedly China-linked IP theft acts since 2000.

The challenge is that these cases are the prosecutable tip of what Shenkin believes is a much larger iceberg when it comes to theft of sensitive information.

To help identify some of the areas that it should be focusing on, the FBI has turned to the venture capital community. It's not that the FBI thinks Sand Hill Road is "housing intelligence officers from foreign countries," Shenkin said. Instead, it's interested in the firms as "knowledge nodes" that can help the FBI understand where the real valuable technological innovations are. The agency is also hoping to learn which companies in an investor's portfolio could most use a briefing to help protect their investments from IP theft.

That doesn't always mean the most cutting-edge tech. "If you're a quantum computing company, or a biotech company, or a green tech company, you are a juicier zebra on the Serengeti," Shenkin said. "But they're also going for just the slowest zebra on the Serengeti."

Not a witch hunt

The challenge with the briefings is not stoking the flames of anti-Chinese or anti-Russian resentment in the U.S., especially at a time when xenophobia is already on the rise. Shenkin said he doesn't want to start a witch hunt, or make companies afraid to hire people with Chinese or Russian names.

"The idea that we're out there, targeting Russian Americans, or Chinese Americans, or anybody of those ethnic groups — I mean, nothing could be further from the truth. We do not live under any delusion that one ethnic group has some sort of a genetic proclivity towards dishonest behavior. Absolutely not the case," Shenkin said.

He says it's a misconception, furthered by the media, that the FBI is targeting Chinese Americans when the reality, as he views it, is that the FBI is trying to protect them from the Chinese government. "From our perspective, the Chinese American community is being exploited by China. They're being targeted and exploited and forced to do illegal things by the government of China," he said.

The problem with that rhetoric is that it treats "China" or "Chinese Americans" as a homogenous body and introduces the idea that a person of Chinese ethnicity could be a threat when it's really based on the individual's vulnerabilities beyond whether they have family in an autocratic state, said Margaret Lewis, a professor at Seton Hall, who has argued for a rethink of the DOJ's larger China Initiative.

"That's creating this construct that Chinese Americans are vulnerable, by reason [of] being Chinese Americans, when I think we need to disaggregate that and look much more at an individual level," Lewis said. While there's no doubt China has exploited family connections some Chinese Americans may have, she said, there's also concern that it's both grouping too many people as vulnerable when they're not, and potentially excluding other vectors of vulnerabilities, like employees with gambling problems who may be desperate to sell information for cash.

Liu Pengyu, a spokesperson for the Chinese embassy in Washington, said in a statement that the media had "frequently hyped" the topic of spies, but that "quite a few later proved to be out of nothing." He added that "the cross-border flow of talent has driven technological and economic progress all across the world" and that he hoped the U.S. would "work to promote instead of disrupting China-US scientific exchange and cooperation."

Shenkin emphasized that the goal of the FBI's briefings, which predate the DOJ's China Initiative, is to focus on individual vulnerabilities, rather than having companies walk away not trusting their Chinese or Russian employees.

"What we're trying to say is, if you hire somebody that has a vulnerability to an autocracy, your best course of action is to help that person, to train that person to understand what their vulnerabilities are so they can protect themselves and the company can help protect that individual from exploitation by that autocratic government," he said. "That's our goal. And that's why we do this brief."

Like a phishing email

The solution the FBI pitches is neither a blanket ban on foreign nationals nor the shrug-emoji approach of assuming it's inevitable. Instead, Shenkin sees it like phishing emails: Companies need to train their employees to know what to look out for and install back-up measures to minimize the damage when someone slips up.

Big tech companies often already have the staff in place to assess insider threats and build the security back-ups needed to counter them, but startups are particularly vulnerable thanks to their size and work on cutting-edge technologies. That's why the FBI developed the Delta Protocol, named after the "delta" between when a company is formed and when it's large enough to have its own security staff trained for internal threats.

In the Delta Protocol, the FBI includes basic best practices like advising companies to log who has access to sensitive IP and install needed physical security, like self-locking doors and alarms. It also has a section on helping companies identify insider threat characteristics, from employees who may be coerced through high-risk activities (like racking up gambling debts that a government could pay off in exchange for information) to the mercenary employee who shows zero loyalty and will sell information to the highest bidder (described as someone who "may have significant issues in the workplace such as an inability to work with others, extreme disgruntlement, belligerence, and frequent violations of workplace rules and policies.")

Getting companies to adopt the Delta Protocol, or at least start grasping the scale of potential IP theft, is why the FBI has been doing more outreach.

"I think the most important thing for us is for people to understand the scope of this threat, and just how absolutely quotidian a large group of people's everyday job is to steal technology from Silicon Valley. That's just what they do for a living," Shenkin said. "And so much of it is not just people who steal because they want to steal technology. A very, very large chunk of it is normal human beings who do not want to steal, who were just trying to protect their families, and have to steal in order to protect their families."

Fintech

Election markets are far from a sure bet

Kalshi has big-name backing for its plan to offer futures contracts tied to election results. Will that win over a long-skeptical regulator?

Whether Kalshi’s election contracts could be considered gaming or whether they serve a true risk-hedging purpose is one of the top questions the CFTC is weighing in its review.

Photo illustration: Getty Images; Protocol

Crypto isn’t the only emerging issue on the CFTC’s plate. The futures regulator is also weighing a fintech sector that has similarly tricky political implications: election bets.

The Commodity Futures Trading Commission has set Oct. 28 as a date by which it hopes to decide whether the New York-based startup Kalshi can offer a form of wagering up to $25,000 on which party will control the House of Representatives and Senate after the midterms. PredictIt, another online market for election trading, has also sued the regulator over its decision to cancel a no-action letter.

Keep Reading Show less
Ryan Deffenbaugh
Ryan Deffenbaugh is a reporter at Protocol focused on fintech. Before joining Protocol, he reported on New York's technology industry for Crain's New York Business. He is based in New York and can be reached at rdeffenbaugh@protocol.com.
Sponsored Content

Great products are built on strong patents

Experts say robust intellectual property protection is essential to ensure the long-term R&D required to innovate and maintain America's technology leadership.

Every great tech product that you rely on each day, from the smartphone in your pocket to your music streaming service and navigational system in the car, shares one important thing: part of its innovative design is protected by intellectual property (IP) laws.

From 5G to artificial intelligence, IP protection offers a powerful incentive for researchers to create ground-breaking products, and governmental leaders say its protection is an essential part of maintaining US technology leadership. To quote Secretary of Commerce Gina Raimondo: "intellectual property protection is vital for American innovation and entrepreneurship.”

Keep Reading Show less
James Daly
James Daly has a deep knowledge of creating brand voice identity, including understanding various audiences and targeting messaging accordingly. He enjoys commissioning, editing, writing, and business development, particularly in launching new ventures and building passionate audiences. Daly has led teams large and small to multiple awards and quantifiable success through a strategy built on teamwork, passion, fact-checking, intelligence, analytics, and audience growth while meeting budget goals and production deadlines in fast-paced environments. Daly is the Editorial Director of 2030 Media and a contributor at Wired.
Enterprise

The Uber verdict shows why mandatory disclosure isn't such a bad idea

The conviction of Uber's former chief security officer, Joe Sullivan, seems likely to change some minds in the debate over proposed cyber incident reporting regulations.

Executives and boards will now be "a whole lot less likely to cover things up," said one information security veteran.

Photo: Al Drago/Bloomberg via Getty Images

If nothing else, the guilty verdict delivered Wednesday in a case involving Uber's former security head will have this effect on how breaches are handled in the future: Executives and boards, according to information security veteran Michael Hamilton, will be "a whole lot less likely to cover things up."

Following the conviction of former Uber chief security officer Joe Sullivan, "we likely will get better voluntary reporting" of cyber incidents, said Hamilton, formerly the chief information security officer of the City of Seattle, and currently the founder and CISO at cybersecurity vendor Critical Insight.

Keep Reading Show less
Kyle Alspach

Kyle Alspach ( @KyleAlspach) is a senior reporter at Protocol, focused on cybersecurity. He has covered the tech industry since 2010 for outlets including VentureBeat, CRN and the Boston Globe. He lives in Portland, Oregon, and can be reached at kalspach@protocol.com.

Climate

Delta and MIT are running flight tests to fix contrails

The research team and airline are running flight tests to determine if it’s possible to avoid the climate-warming effects of contrails.

Delta and MIT just announced a partnership to test how to mitigate persistent contrails.

Photo: Gabriela Natiello/Unsplash

Contrails could be responsible for up to 2% of all global warming, and yet how they’re formed and how to mitigate them is barely understood by major airlines.

That may be changing.

Keep Reading Show less
Michelle Ma

Michelle Ma (@himichellema) is a reporter at Protocol covering climate. Previously, she was a news editor of live journalism and special coverage for The Wall Street Journal. Prior to that, she worked as a staff writer at Wirecutter. She can be reached at mma@protocol.com.

Entertainment

Inside Amazon’s free video strategy

Amazon has been doubling down on original content for Freevee, its ad-supported video service, which has seen a lot of growth thanks to a deep integration with other Amazon properties.

Freevee’s investment into original programming like 'Bosch: Legacy' has increased by 70%.

Photo: Tyler Golden/Amazon Freevee

Amazon’s streaming efforts have long been all about Prime Video. So the company caught pundits by surprise when, in early 2019, it launched a stand-alone ad-supported streaming service called IMDb Freedive, with Techcrunch calling the move “a bit odd.”

Nearly four years and two rebrandings later, Amazon’s ad-supported video efforts appear to be flourishing. Viewership of the service grew by 138% from 2020 to 2021, according to Amazon. The company declined to share any updated performance data on the service, which is now called Freevee, but a spokesperson told Protocol the performance of originals in particular “exceeded expectations,” leading Amazon to increase investments into original content by 70% year-over-year.

Keep Reading Show less
Janko Roettgers

Janko Roettgers (@jank0) is a senior reporter at Protocol, reporting on the shifting power dynamics between tech, media, and entertainment, including the impact of new technologies. Previously, Janko was Variety's first-ever technology writer in San Francisco, where he covered big tech and emerging technologies. He has reported for Gigaom, Frankfurter Rundschau, Berliner Zeitung, and ORF, among others. He has written three books on consumer cord-cutting and online music and co-edited an anthology on internet subcultures. He lives with his family in Oakland.

Latest Stories
Bulletins