China recruiting spies in the UK with fake headhunters and ‘sites like LinkedIn’

China recruiting spies in the UK with fake headhunters and ‘sites like LinkedIn’

Summary

MI5 has issued an espionage alert warning that Chinese intelligence officers are using fake recruitment agents and social‑networking profiles on professional sites (described as ‘sites like LinkedIn’) to recruit and cultivate people with access to sensitive information in the UK. The alert was briefed to MPs, peers and parliamentary staff and names two online profiles believed to be legitimate headhunters acting as cover for Chinese intelligence activity.

Key Points

  • MI5 issued an alert to Parliament and staff about targeted recruitment efforts by Chinese intelligence using cover companies and external headhunters.
  • Targets include MPs, parliamentary staff, economists, think‑tank employees, geopolitical consultants and government officials — essentially anyone with useful networks or access.
  • Two online profiles believed to be headhunters were named as examples of how actors cultivate relationships via professional networking sites.
  • MI5 emphasised China’s low threshold for what counts as valuable information — small pieces can be stitched into a broader intelligence picture.
  • The UK has removed surveillance equipment made by firms subject to China’s national intelligence law from sensitive sites and announced a £170m investment to replace sovereign and encrypted technology.
  • The warning echoes similar alerts by other agencies (for example ASIO in Australia) about the risks of publicly shared details on professional networking platforms.

Content Summary

The Security Minister Dan Jarvis told the House of Commons that MI5 has observed a pattern of covert and calculated efforts by Chinese actors to interfere with UK sovereign affairs through recruitment and cultivation of individuals with access to sensitive information. The campaign uses cover companies and apparent headhunters to build relationships on professional networks. The government linked this to prior incidents, including cyber operations targeting parliamentary emails and past interference cases, and has taken steps to remove potentially vulnerable Chinese‑made surveillance equipment from sensitive locations.

Alongside the alert, the government announced funding to renew encrypted and sovereign technology used by civil servants, aiming to harden defences and reduce exposure to state‑led intelligence collection.

Context and Relevance

This is part of a growing trend where state actors exploit social media and recruitment channels to gather intelligence. Publicly visible career details on professional sites make it easier for foreign services to identify, approach and cultivate sources. The alert underscores the intersection of cyber, human, and supply‑chain security: digital profiles, in‑person relationships via sham recruitment, and concerns about equipment subject to foreign intelligence laws all form a connected risk picture.

For anyone working in government, policy, defence, research or who maintains links to officials, this is a timely reminder to review what you share online, vet unsolicited recruiters, and follow organisational security guidance.

Why should I read this?

Because it’s not paranoia — it’s official. MI5 has flagged a deliberate, ongoing campaign using everyday tools (fake headhunters, LinkedIn‑style profiles) to pick off people with access. If you work near sensitive networks, handle policy or sit in a think‑tank, this affects your day‑to‑day. Quick wins: tidy your public profile, question unsolicited recruiters and follow your employer’s security guidance. We’ve saved you the time — read this so you know what to lock down first.

Source

Source: https://go.theregister.com/feed/www.theregister.com/2025/11/19/mi5_linkedin_china_spy_warning/