Examples of foreign intelligence entity threats include a variety of traditional and non-traditional activities aimed at exploiting sensitive information and technology. Some key examples are:
- Operating from official locations such as embassies, consulates, universities, and trade missions to conduct espionage activities
- Use of insiders or insider threats , where foreign entities recruit or coerce individuals within organizations to steal classified or sensitive information
- Academic solicitation , involving recruitment of students, professors, or researchers to obtain sensitive or classified data improperly
- Economic espionage , including theft or misappropriation of trade secrets to benefit foreign entities, such as stealing genetically modified seeds or proprietary research
- Cyber and technical methods , such as hacking, malware, phishing, intercepting communications, and exploiting unsecured networks to access classified or unclassified systems
- Elicitation and social engineering , where foreign agents use conversations, impersonation, or online interactions to extract information or gain access credentials
- Suspicious activities at conferences, trade shows, or foreign visits , including excessive photography, suspicious questioning, or unusual requests for information
- Use of foreign government-sponsored commercial enterprises and international trafficking or terrorist organizations to mask intelligence collection efforts
- Human targeting , where individuals with access to sensitive information are approached for ongoing relationships or recruitment, sometimes linked to talent recruitment programs like China’s Thousand Talents Program
Additionally, foreign intelligence threats can also include hackers, foreign corporations, and state-sponsored computer experts engaged in cyber espionage and attacks
. These threats are sophisticated, persistent, and increasingly diverse, targeting a wide range of sectors including defense, agriculture, research, and critical infrastructure