NewsBite

Chinese spy database: what you need to know about the Shenzhen Zhenhua espionage leak

Classified scientific operations and Australia’s work in the search for missing Malaysian Airlines flight MH370 are contained in the Chinese database designed for ‘hybrid warfare’. This is what the data leak means for you.

Leaked Chinese files reveal 2.4M Aussies targeted in 'sinister' surveillance program

More than 35,000 Australians, from singer Natalie Imbruglia to billionaire businessman Mike Cannon-Brookes, have been revealed as targets for Chinese espionage after a database of names, addresses, and personal details was leaked overnight.

The huge Australian contingent was among 2.4 million people profiled in the Overseas Key Information Database (OKIDB) that is believed to have been used by China’s Ministry of State Security.

Natalie Imbruglia was one of the stars targeted by Chinese spies. Picture: Getty Images
Natalie Imbruglia was one of the stars targeted by Chinese spies. Picture: Getty Images

Australia’s emerging space sector is also reportedly mentioned on the list.

The database details a 2019 event where “scientific equipment” was transferred from Canberra’s Deep Space Communication Complex at Tidbinbilla to NASA’s Jet Propulsion Laboratory in Pasadena, California, according to the ABC.

Other classified operations are also mentioned along with dozens of references to CSIRO staff.

The company behind the list reportedly spied on CSIRO’s “transformational bioinformatics team”, and has also recorded the government agency’s work in the search for missing Malaysian Airlines flight MH370.

Many are now asking who created the list, who is on it, and what it was used for. This is what you need to know about the latest international incident between China and Australia.

The Canberra Deep Space Communication Complex at Tidbinbilla in the ACT. Picture: Supplied
The Canberra Deep Space Communication Complex at Tidbinbilla in the ACT. Picture: Supplied

WHO CREATED THIS LIST?

The list was allegedly created by a Shenzhen-based company called China Revival, also known as Shenzhen Zhenhua, and was leaked to an American researcher, Christopher Balding, by a source connected to the company.

Mr Balding shared it with other academics including Canberra cybersecurity firm Internet 2.0, led by Robert Potter, and released a research paper about its contents.

Together, they were able to extract the records of 250,000 people listed in the database, including 35,000 prominent Australians.

WHO IS ON THE LIST?

A huge range of people were listed in China Revival’s database, from politicians and political aides to celebrities, billionaires, journalists, and military personnel.

Australian fitness guru Kayla Itsines made the list alongside Nine chief executive Hugh Marks.

Atlassian co-founders Scott Farquhar (left) and Mike Cannon-Brookes were listed in a Chinese database. Picture: AAP Image/Dan Himbrechts
Atlassian co-founders Scott Farquhar (left) and Mike Cannon-Brookes were listed in a Chinese database. Picture: AAP Image/Dan Himbrechts

Prime Minister Scott Morrison was profiled, as well as Foreign Affairs Minister Marise Payne, former PM Malcolm Turnbull and his children Alex and Daisy, and the son-in-law and son of former PM Kevin Rudd.

Information was also harvested on Reserve Bank of Australia Governor Philip Lowe, Atlassian co-founders Mike Cannon-Brookes and Scott Farquhar, and singer Natalie Imbruglia.

Fitness queen Kayla Itsines was also on the list.
Fitness queen Kayla Itsines was also on the list.

The list also included British and American targets, including the Queen, Prince Charles, and the Dukes of Cambridge and Sussex.

The researchers accessed the records of 51,000 Americans, 10,000 Indians, 10,000 Britons, 5000 Canadians, and 793 Kiwis.

WHERE DID THE INFORMATION COME FROM?

China Revival drew information from multiple sources to compile its database.

The database includes birthdates, addresses, photographs, marital status, family details, friendships, and political associations, alongside deeply sensitive information such as criminal records.

According to the researchers, the company “appeared to crawl information platforms to build out personal and professional profiles of key individuals globally”.

It may have used existing databases and added other information harvested from social networks, such as Facebook, Twitter and LinkedIn.

But as much as 20 per cent of the information listed in the database was not easy to find through public sources, the researchers warned, and may have come from unauthorised access.

HOW WAS IT USED?

The database appears to have been designed for “information warfare,” the researchers found, and “attempting to influence the debate and narrative about China”.

Chinese spies attempted to extract information about Prince William and his wife Catherine. Picture: Getty Images
Chinese spies attempted to extract information about Prince William and his wife Catherine. Picture: Getty Images

The information on file, they noted, could “provide China enormous benefit in opinion formation, targeting, and messaging” and could be used to create messages to appeal to specific individuals.

MORE NEWS

Cecilia Haddad’s accused killer seeking COVID jail release

‘Lunacy’: Abbott unleashes, Victoria’s new warning

Top cop: Locking your doors won’t protect your kids from predators

Before news of the database was exposed, Shenzhen Zhenhua’s website boasted that “social media can manipulate reality and weaken a country’s administrative, social, military, or economic forces” in what it called “hybrid warfare”.

The company shut down its website after journalists inquired about the database.

CAN I CHECK IF I AM ON THE LIST?

The database has not been made publicly available, but Mr Balding said he had shared it with government officials, journalists and other researchers to analyse its contents and understand how it had been used.

“What cannot be underestimated is the breadth and depth of the Chinese surveillance state and its extension around the world,” he said in a statement.

“The world is only at the beginning stages of understand how much China invests in intelligence and influence operations using the type of raw data we have to understand their targets.”

Australian Cyber Security Cooperative Research Centre chief executive Rachael Falk said the exposure of this database should act as a wake-up call to all internet users that the photos, comments, and personal information they put online could be used against them like “one global trash and treasure”.

- with staff writers

Originally published as Chinese spy database: what you need to know about the Shenzhen Zhenhua espionage leak

Add your comment to this story

To join the conversation, please Don't have an account? Register

Join the conversation, you are commenting as Logout

Original URL: https://www.dailytelegraph.com.au/technology/chinese-spy-database-what-you-need-to-know-about-the-shenzhen-zhenhua-espionage-leak/news-story/56a43e2d12640153862a4533b513748c