<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JOBS</journal-id>
      <journal-title-group>
        <journal-title>Journal on Baltic Security</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2382-9230</issn>
      <issn pub-type="ppub">2382-9222</issn>
      <publisher>
        <publisher-name>BDC</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JOBS-9-1-JOBS-2023-002</article-id>
      <article-id pub-id-type="doi">10.57767/jobs_2023_0002</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Russia and China expected to renew their espionage vigour</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Putter</surname>
            <given-names>Dries</given-names>
          </name>
          <email xlink:href="mailto:putter@sun.ac.za">putter@sun.ac.za</email>
          <xref ref-type="aff" rid="j_JOBS_aff_000"/>
          <xref ref-type="corresp" rid="cor1">∗</xref>
        </contrib>
        <aff id="j_JOBS_aff_000">Intelligence Studies at the Faculty of Military Science, Stellenbosch University Affiliate Member, National Security Hub, University of Canberra; Researcher, Security Institute for Governance and Leadership in Africa (SIGLA); Researcher, African Research Institute – Óbuda University, Hungary</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Bachmann</surname>
            <given-names>Sascha-Dominik</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_001"/>
        </contrib>
        <aff id="j_JOBS_aff_001">Professor in Law &amp; Security and Co-Convener National Security Hub (University of Canberra), University of Canberra; Fellow Asia Pacific (Hybrid Threats and Lawfare) – NATO SHAPE; Research Fellow with the Security Institute for Governance and Leadership in Africa (SIGLA), Faculty of Military Science, Stellenbosch University.</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>9</volume>
      <issue>1</issue>
      <fpage>1</fpage>
      <lpage>31</lpage>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>05</month>
        <year>2023</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>16</day>
          <month>01</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>14</day>
          <month>02</month>
          <year>2023</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Open Access. ©</copyright-statement>
        <copyright-year>2023</copyright-year>
        <copyright-holder>Dries Putter and Sascha-Dominik Dov Bachmann</copyright-holder>
        <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>This article argues that both Russia and China will re-invigorate and expand their international espionage activities. Russia’s renewed vigour in engaging in aggressive espionage campaigns is due to the current setbacks that it is facing as a result of its ill-fated invasion of Ukraine.  The sanction-induced prohibitions that limit access to state-of-the-art technologies will unleash renewed enthusiasm to obtain these latest technologies by covert means, be it HUMINT and/or cyberespionage. The future robustness of China’s aggressive espionage activities is projected to be fuelled by its systematic ‘de-coupling’ from those nations leading in science, engineering and technology, such as the United States, as well as the growing opposition to the use of developmental institutions such as the Confucius Institute and the Belt and Road Initiative (BRI) as intelligence collection platforms. This article predicts that as Russia and China become ‘outsiders’, they will becoming increasingly aggressive in their espionage campaigns as pragmatic states acting in survival and developmental mindsets, and it elaborates on some of the more relevant forms of espionage employed.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>Russia</kwd>
        <kwd>China</kwd>
        <kwd>espionage</kwd>
        <kwd>counterintelligence</kwd>
        <kwd>national security</kwd>
      </kwd-group>
    </article-meta>
  </front>

<body>
<title>Introduction</title>
<p>
Russia is currently experiencing a diplomatic ice-age of its own making due to its aggression against 
Ukraine and the ensuing war since 24 February 2022. Russia’s national security is under severe pressure 
due to military strategic miscalculations, information blackouts, and increasing economic pressure. 
China is systematically being exposed as an aggressive imperialist regime, course-bound to challenge 
the extant world order and emerge as a superpower. Both of these nations have extended histories
<xref ref-type="fn" rid="footnote1">1</xref> of 
aggressive espionage to support their national ambitions. Walton retorted that ‘part of the surprise 
and shock about recent revelations about Russian active measures, from poisonings in England to election 
meddling in the U.S., has arisen because of a lack of public understanding about their long history’ 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_047">Pazzanese, 2019</xref>).
</p>

<p>
Rathbone and Jones write that ‘Intelligence agencies have been slow to respond to the 
growing scope of covert Kremlin operations overseas’ 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_052">Rathbone and Jones, 2022</xref>), 
inducing a sense of increased urgency within the Russian security services to conduct espionage 
against the West since the start of the Russo-Ukraine war 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046"><italic>Ibid.</italic></xref>).  
Five months after the start of the war, it was uncovered that Chinese state-sponsored 
cyber-threat groups are increasingly conducting cyberespionage on Russian organisations, 
based on findings by Sentinel Labs and the Google Threat Analysis Group 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_012">Coker, 2022</xref>). 
Western strategies aimed at keeping Russia and China strategically isolated to ensure that 
their exponential economic growth and imperialistic ambitions are stymied are fuelled by these developments. 
This is a key component that supports and enables Russian and Chinese ambition to grow and dominate is 
their aggressive appetite for espionage and consequently needs no introduction.  
From a pure theoretical perspective, such appetites are also supported by their realist 
approach to the international system, even self-defence could be argued, and some authors also 
argue for functionalist understanding 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_008">Baker, 2003</xref>; 
<xref ref-type="bibr" rid="j_jobs-2023-002_ref_033">Konstantopoulos, 2012</xref>; 
<xref ref-type="bibr" rid="j_jobs-2023-002_ref_049">Prochko, 2018</xref>).  
However, while international relations theories are useful to explain the behaviour of states, 
they tend to be less useful as a justification of such behaviour. 
</p>

<p>Increased Western efforts to expose Russia’s and China’s malign nationalist and 
  revisionist ambitions raise awareness of key intelligence programmes leveraged by them. 
  Their vast and inflated diplomatic networks, diaspora communities, 
  and quasi-developmental economic programs are prime examples of how these countries stay informed, 
  build capable espionage networks, and exercise foreign influence 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_005">Bachmann and Lee, 2020</xref>). 
  With these increasingly being exposed, it can be expected that these countries will redouble their 
  efforts to maintain and expand their foreign intelligence capabilities.
</p>

<p>Since Russia’s first bout of aggression against Ukraine and the subsequent invasion 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046">CFR, 2022</xref>) 
  in February 2014 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_004">Bachmann and Gunneriusson, 2015</xref>), 
  these national programs have been increasingly exposed for their true nature and labelled by 
  various countries as threats to international and national security. 
  Russia and China face the prospect of being systematically isolated from access to 
  Western technology and opportunities to stymie uncontrolled expansion; their intelligence 
  networks have been systematically dismantled by Western efforts. It would therefore not be 
  unreasonable to predict an increased focus on espionage activities from these countries in 
  the short-term to counter the escalating international push-back. Such a view is supported 
  by the unprecedented joint FBI and MI5 statement on the expanding espionage threat from China 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_064">The Guardian, 2022</xref>).
</p>

<p>Current and future espionage activities of any country are difficult to research academically due 
  to the nature of the trade and national security implications.  
  Thus, the researchers used open-source material from published media in support of their arguments. 
  It would be extremely difficult to provide immediate evidence of such renewed enthusiasm due to the 
  secret nature of this ‘trade,’ yet, however, the aim of the article is to highlight some of the 
  significant setbacks that have been experienced by these two states vis-à-vis their abilities for 
  intelligence collection. Based on these setbacks, the article projects that both Russia and China 
  will be extremely busy in the short to medium term with efforts to repair damage to their intelligence 
  networks and rebrand previously known initiatives, as well as to create new initiatives in support of 
  their national ambitions and level some of their disastrous strategic miscalculations. 
  The article will reflect on the role of Russia and China as increasingly outsiders in the 
  international system due to their own strategic behaviour and then continue to highlight 
  salient aspects that reinforce the contention of a future of heightened levels of espionage.
</p>
<title>Russia and China - The Two Outsiders</title>

<p>Adm. Davidson (previously head of the US Indo-Pacific Command) testified before the 
  US Senate Armed Services Committee that China poses the most significant 
  ‘long-term strategic threat’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_023">FBI, 2020</xref>) 
  to security and the rules-based international order in the 21st century. China is accelerating its 
  ambition to replace the US as a global leader by 2050 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_059">Starr, 2022</xref>). Both Russia and China have been 
  labelled as the most serious threats to US national security from a subversion perspective 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_036">Kruger, 2020</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_023">FBI, 2020</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_046">Star, 2022</xref>).
  <xref ref-type="fn" rid="footnote2">2</xref>  
  Similarly, the North Atlantic Treaty Organisation (NATO) finds both Russia and China to be the primary 
  instigators and exploiters of ‘political divergencies’ amongst NATO members 
  ‘in ways that endanger their collective interests and security’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_042">NATO, 2020</xref>). 
  Such divergencies are typically exploited through aggressive espionage targeting national security, 
  science, engineering, and technology (SET) capabilities, as well as foreign 
  influence operations and information operations.
</p>

<p>Similarly, Russia and China are specifically associated with aggressive espionage 
  programmes aimed at leveraging any comparative advantage in every possible state power domain. 
  Bachmann and Putter write that ‘every nation can be certain that their individual attempts at 
  gaining competitive and military advantage is under threat from nations such the [Peoples Republic of China] 
  who has discovered - long ago - that advantage does not have to be the fruit of entrepreneurial genius if it can be stolen’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_050">Putter and Bachman, 2022</xref>). 
  China’s aggressive industrial espionage actions, which might legally be construed as criminal,<xref ref-type="fn" rid="footnote3">3</xref>  
  will increasingly marginalise and isolate the country from circles of innovation and knowledge -
  specifically with regards to dual-use technologies and sensitive military technology.<xref ref-type="fn" rid="footnote4">4</xref>  
  Chinese ‘national security espionage’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009">Bateman, 2022, p. 65</xref>) 
  campaigns suffer from disruption to networked espionage activities of Confucius Institute initiatives, for example. 
</p>

<p>Both Russia and China are known for their proclivity to steal SET intellectual property (IP): 
  one recent endeavour from around June 2020 has been associated with the cyber-attacks on critical 
  European healthcare infrastructure to steal COVID-19 vaccine-related IP being developed by Western 
  companies such as BioNTech and Pfizer 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_060">Tessari &#38; Muti, 2021, pp. 29-30</xref>). 
  This is not only morally reprehensible against the backdrop of global suffering caused by the COVID-19 pandemic, 
  but it also acts as a trigger to strengthen measures against espionage, 
  which in itself reinforces their international isolation.  
</p>

<p>Another catalyst for isolation is interference in the political processes of 
  sovereign countries and attacks on their critical infrastructure. The European Union regards 
  Russia as a primary contributor to the proliferation of these acts 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046"><italic>Ibid.</italic></xref>). 
  Global security consultancy firm Control Risks summarises this threat as being 
  characterised by the Russian and Chinese espionage operations, demonstrated by 
  the cyber-attack on the Norwegian parliament, amongst others, and industrial espionage 
  ‘targeting sectors and technologies of strategic importance to domestic industrial policies 
  and economic development’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_013">Control Risks Group Limited, 2020</xref>).
</p>

<p>Strategic or great power Competition 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_006">Bachmann, <italic>et al</italic>., 2020</xref>) 
  between the United States and China and Russia also raises significant obstacles to keep 
  Russia and China isolated. One aspect of such competition is associated with the resources in the 
  Arctic as well as the Antarctic regions. Control Risks projects increased Sino-Russo intelligence 
  activity resulting from this competition 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_013">Control Risks, 2020</xref>). 
  Thus, foreseeing an increase of more aggressive espionage targets policy developments and 
  technological niches in support of their geo-strategic (e.g., forward operating infrastructure such 
  as those established by China at several locations around the globe) and commercial 
  (oil, gas, minerals, and trade routes) ambitions 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_013"><italic>Ibid</italic>.</xref>). 
</p>

<p>Once a state has been classified as an (inter)national threat, doing business in a 
  globally connected world, access to foreign investment and access to necessary networks are 
  negatively impacted. The number of millionaires (estimated at 15,000) who are expected to 
  leave Russia as a result of the Russo-Ukraine war, the resulting international sanctions, 
  and an overall tarnished Russian national brand 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_043">Neate, 2022</xref>) 
  are all examples of the consequences of Russia being viewed as a pariah state. 
  According to London-based investment and immigration firm Henley and Partners, 
  which specialises in immigration of wealthy clients to Europe, approximately fifteen percent 
  of all Russian millionaires (in USD) will have exited Russia by the end of 2022. 
  While not totally new, economic sanctions came of age in the 
  20th century <xref ref-type="fn" rid="51">5</xref>, 
  gaining improved efficiency over the years. For example, and critically so for Russia’s 
  national credibility as a superpower, Russia is losing civilian contractors 
  in certain areas within the armed forces due to compensation issues 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_053">Reich &#38; Starr, 2022</xref>). 
  Recently ‘a Vladivostok shipyard was allegedly unable to meet 25 billion rubles' 
  [<italic>sic!</italic>] worth of government orders to build two tankers, two missile boats, 
  and to maintain and repair other vessels’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046"><italic>Ibid</italic>.</xref>), 
  confirming some speculation on dependency of the Russian defence industry on Western technologies. 
   As these sanctions <xref ref-type="fn" rid="footnote6">6</xref> take effect, more Russian wealth will probably leave in the short to medium term. 
   With funding and associated commercial networks vacating Russia (and China) in 
   favour of more secure lodgings in, e.g., Malta, the UAE, or Mauritius 
   (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_043">Neate, 2022</xref>), 
   it disrupts the access of politicians, national industrial capabilities, 
   and supply chains, as well as research and development linked to that funding and networks. 
   This has an obvious disrupting effect on Russian armament production and 
   certainly on any form of military technology innovation. It is projected that an 
   increased emphasis will be made on espionage to overcome deficiencies in these areas as a state generated remedy. 
</p>

<title>Returning to the Cold War: the Russo-Ukraine War and Its Impact on Russian Espionage</title>
<p>
The February 2022 Russian invasion of Ukraine not only exposed Russia’s 
imperialistic tendencies but also uncovered some of the primary fault lines within Russian 
defence and security capabilities 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref> and 
<xref ref-type="bibr" rid="j_jobs-2023-002_ref_029">Ingalls, 2022</xref>). 
A visible fissure is the relatively dated Russian military technology that was on 
display during the first 100 days of the Russo-Ukraine War 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_044">Newman, 2022</xref>), 
resulting in the significant depletion of available combat capabilities 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_058">Sly, 2022</xref>) 
due to high rates of destruction and attrition achieved by a more agile Ukraine. 
Even modern and more advanced Russian military technologies fielded in the face of 
asymmetric defences (examples include ‘high-end heavy-armor platforms, such as 
T-72B3s, T-90s, and T-80 variants – including the latest T-80BVMs’ 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_032">Kasapoğlu, 2022</xref>), 
T90M and T-14 Armata tanks 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_069">WION, 2022</xref>), 
which hasn’t been fielded yet) turned out to be inferior resulting in catastrophic operational failures 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_032">Kasapoğlu, 2022</xref>) 
and revealed a strategic Russian disadvantage. 
</p>

<p>Resulting from inadequate military 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref>) 
  and defence industrial planning 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_032">Kasapoğlu, 2022</xref>) 
  combined with executive arrogance (or lack of professionalism) 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref>) and 
  low morale/discipline 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046">Jong, 2022</xref>), 
  Russia failed to capitalise on a critical advantage it had early in the campaign – i.e., mass. 
  These issues are highlighted in a quote from ‘The Russian Defense Industry: A Distressed Brand - 
  Expecting a short war’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_032">Kasapoğlu, 2022</xref>) 
  in which Ukrainian forces quickly folded, the Russians made no effort to ramp up production before the invasion, 
  and although they have presumably now done so, their defense industrial complex does not have the capacity to 
  keep up with the very high rate at which Russia is expending artillery shells 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_058">Sly, 2022</xref>). 
  These issues could have been mitigated with enhanced intelligence operations better 
  analysing the adversary and own operational and defence industrial 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_053">Reich &#38; Starr, 2022</xref>) 
  capabilities to do supply-support. 
  The backlash against Russian aggression became evident in the unexpected level of international solidarity 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_020">European Commission, 2022</xref>) 
  against the invasion as well as in the subsequent wave of sanctions 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_021">European Council, 2022</xref>), 
  which isolated Russia from critical supply-chains, e.g., 
  resulting in surface-to-air missile production capabilities shutting down due to 
  the unavailability of imported components 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_053">Reich &#38; Starr, 2022</xref>).
</p>

<p>Another strategic miscalculation that will fuel future Russian espionage efforts 
  resulted from the <italic>en masse</italic> expulsion of Russian diplomats internationally 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_062">The Economist, 2022</xref>) 
  – significantly disrupting diplomatic leverage and espionage architecture. 
  Such disruption is alluded to in the statement Sam Lichtenstein alludes to such disruption stating that 
  ‘[a]mid the intense global media coverage of the military conflict in Ukraine, another battle is 
  being waged largely in the shadows: Russia’s spy network across Europe is being decimated’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_037">Lichtenstein, 2022</xref>). 
  The chief of MI6 recently stated that Russian espionage capabilities in Europe were halved after the 
  expulsion of ‘more than 400’ intelligence officers across Europe with several 
  ‘deep-cover spies’ and ‘illegals’ arrested or exposed 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_010">Bertrand &#38; Sciutto, 2022</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_076">BBC News, 2022</xref>). 
  With Russia isolated – diplomatically, economically, and technologically – 
  a special effort can be expected to gain access to knowledge with which to modernise and innovate.  
</p>

<p>Russia’s intelligence agencies are belied to be on ‘war-footing’ 
  as a result of the unfolding failures in the Russo-Ukrainian War<xref ref-type="fn" rid="footnote7">7</xref>,  
  which could be interpreted as ramping up aggressiveness and innovativeness. 
  For example, Jamali and Soldatov project increased vigour in the Seattle region 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_029">Ingalls, 2022</xref>), 
  considered the hub of US technology, military infrastructure 
  (e.g., the Trident nuclear submarine base), and critical national industries such as Boeing 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>).
</p>

<p>Limiting Russian defence and security development and modernisation as a key NATO 
  priority is called for by Franklin D. Kramer and Barry Pavel during 2022. 
  They state that ‘NATO, along with other relevant institutions, should help organize 
  long-term limitations on trade with Russia that would achieve this effect’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_035">Kramer &#38; Pavel, 2022</xref> 
  and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_034">Kramer, 2022</xref>). 
  The authors recommend that NATO must collaborate and cooperate with the relevant organisations and 
  states to make sure that trade in support of ‘Russian military capabilities is prohibited’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>). 
  This will certainly add to the renewed focus of Russian espionage operations in 
  support of its national security objectives and countering international efforts to isolate the country. 
  This echoes the comprehensive package of international sanctions and export controls currently in 
  various stages of implementation, inclusive of dual-use material and knowledge and technology 
  export control that are required for military capabilities. 
</p>

<p>Thus, with the expected levels of isolation expanding, Russia will probably travel 
  with larger diplomatic groups to events where it is still allowed to attend in future. 
  For example, Russia is a member the Wassenaar Arrangement (WA)<xref ref-type="fn" rid="footnote8">8</xref>  and 
  usually attends with approximately four delegates. Russian attendance of the various WA meetings and programmes 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>) 
  will probably be maximised to unlock opportunity for new ‘diplomatic’ staff to officially enter 
  Europe to meet existing and potential future assets as part of 
  espionage networking.<xref ref-type="fn" rid="footnote9">9</xref>   
  This is but one opportunity available. Another example was the recent Russian attempt to 
  activate a GRU agent within the International Criminal Court in The Hague, Netherland 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_041">Muniz, 2022</xref>), 
  foiled by the Dutch General Intelligence and Security Service. This would have provided much 
  needed information and possible access to other opportunities in the run up of future war 
  crimes investigations (and even prosecutions) stemming from the Russo-Ukraine War(s) and the Russo-Georgia war 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_041">Muniz, 2022</xref>). 
  However, because there is such a focus on Russian HUMINT operations, their focus will 
  probably shift significantly towards other capabilities.
</p>

<p>Cyber-espionage is being used increasingly by Russia. In 2018 a former GRU (Soviet Chief Intelligence Office) 
  agent was caught for cyber-attacks on the Organization for the Prohibition of Chemical Weapons’ Wi-Fi network 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_018">Deutsche Welle, 2022</xref>). 
  This could have provided much needed cover for Russian chemical weapons programmes and usage in 
  conflicts around the globe. Based on the disruption to the Russian HUMINT networks 
  discussed <italic>vide supra</italic> and the difficulty it might face to re-establish and/or expand 
  Russian HUMINT capabilities in Europe and the United States, Russia will probably revert increasingly to cyberespionage 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_067">Volz, 2022</xref>). 
  Cyberattack incidents tracking data could be used in future to verify the trend vectors.
</p>

<p>The Russian cyber-offensive against Ukraine 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">2022</xref>) 
  did not deliver the advantage that Russia required and expected, 
  neither regarding the pre-invasion battlefield preparation nor during the first 200 days of the invasion 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref>). 
  Similarly, one year later, offensive Russian cyber capabilities have deteriorated even further. 
  Although Ukraine was subjected to a significant number of cyber-attacks and electronic 
  warfare operations, its military and society did not lose the ability to function coherently. 
  The Russian intelligence services led cyber offensive utilised an assortment of techniques 
  against Ukrainian critical infrastructure (40 percent of the attacks) and government 
  (32 percent of the attacks) 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_039">Microsoft, 2022</xref>). 
  This was a targeted attempt to cripple Ukrainian political astuteness and fighting spirit and 
  to conduct espionage on a mass scale in support of Russia’s military objectives 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref>). 
  Choosing a ‘hybrid’ counter approach in terms of actors and means involved, 
  Ukraine responded asymmetrically by calling on the international hacker-community to support 
  Ukraine in its defence against this expanded Russian cyber-attack campaign 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_002">Alspach, 2022</xref>). 
  ‘The Russian military faced considerable operational challenges, in part because of 
  outside state [amongst others – the US Cyber Command] and non-state 
  [amongst others – Microsoft Threat Intelligence Center 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_039">Microsoft, 2022</xref>) and SpaceX/Starlink satellites 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_003">Ankel, 2022</xref>)] 
  assistance to Ukraine to identify cyber and electronic warfare attacks, 
  attribute the perpetrators, and assist with remediation’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref>). 
  Thus, Russian attempts to exploit intelligence and counterintelligence measures 
  to secure advantages were swiftly parried, paralysed and, in some cases, eclipsed.  
  These setbacks inform our belief that Russian cyberespionage and attacks will relent, adapt, and expand 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_067">Volz, 2022</xref>) 
  to compensate for loss in capabilities, reputation, and access to intelligence.
</p>

<p>Russian military doctrine 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">Novosti, 2020</xref>) 
  also supports the projection of continued emphasis on aggressive espionage operations – 
  paralleling their quest for technology and other strategic intelligence that would support 
  their national interest – but more recently, it acts as an impetus to recover from their 
  strategic miscalculations in the Ukraine war.
</p>

<p>A catch-22 situation seems to be in play. The overall inferior performance of the 
  Russian cyberespionage capabilities and abilities during the current Russo-Ukraine War 
  could result in greater emphasis being placed on Russian HUMINT. However, its HUMINT capability 
  was significantly disrupted due to the en masse expulsion of Russian diplomats. This process 
  started around 28 February 2022 and continued into April 2022. By 8 April 2022, four hundred 
  (alleged) Russian intelligence personnel embedded within diplomatic and consular staffs have been 
  expelled numerous countries 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_068">Westfall and Simon, 2022</xref>). 
  These events provide significant motivation for refocussed Russian espionage efforts on more 
  cyberespionage and re-establishing HUMINT networks. With a severely disrupted diplomatic footprint internationally, 
  Russia will have to be innovative in their approaches outsmarting Western counterintelligence.
</p>

<p>Veiled under the pretence of commercial enterprises and similar to the Chinese BRI, 
  albeit at a smaller scale, is the Russian use of hybrid warfare tactics and techniques to 
  purchase real-estate in foreign countries of interest. There is the interesting case of 
  the Airiston Helmi real-estate company that wanted to purchase real estate located in 
  the Finnish Archipelago (the Turku archipelago) 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_073">Yle News, 2018</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_045">Normark, 2020</xref>). 
  The estate featured advanced technological capabilities and forward-basing space – 
  all within a strategically Finnish sea transport route and ‘key seabed communication cables’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>). 
  This is probably but one example, which if successful, would have provided Russian security 
  forces with critical capacity to conduct espionage within Scandinavia.  
  The other asymmetric example of moving real-estate that were probably used to host espionage 
  assets and facilitate such activities are the vast number of Russian oligarch-owned superyachts 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_027">Gregorian, 2022</xref>). 
  The disruption of this vast network of mobile platforms for networking at all levels by 
  international sanctions, with the ability to host HUMINT, IMINT and SIGINT capabilities 
  and any of the Russian security service personnel (FSB, GRU, or SVR), leaves another gap in 
  Russian espionage capabilities. Future expansion in this sector should be closely monitored 
  as an indicator of the renewal of specific capabilities.
</p>

<p>Russia will emerge from the current Russo-Ukraine war as a nation deeply engaged in introspection 
  on how to survive international sanctions whilst systematically recovering depleted military 
  <italic>matériel</italic> stock levels and re-evaluating technology requirements for the future and for the 
  modernisation of what is still in stock. The loss of so many HUMINT assets in key technology-leading 
  countries supports the projection that Russian espionage will not be any less aggressive but will 
  probably increase to re-established broken networks and assets and to establish new assets and 
  networks necessary to circumvent the effects of sanctions and the negative effect of the largescale 
  expulsion of diplomats during 2022.
</p>

<p>Vulnerabilities created by Western oil and gas embargoes coming into effect during 2022 might 
  create opportunities for Russia to trade energy for information, technology, and access to new 
  networks in support of espionage. The expectation would be that Russia will increase its 
  cyberespionage considerably based on its ‘stand-of’ characteristics.  
  Evidence of this became already available in June 2022 – ‘Russian intelligence agencies have 
  increased the pace of cyberattacks against nations that have provided aid to Ukraine, according 
  to new research published Wednesday by Microsoft Corp’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_067">Volz, 2022</xref>). 
  Reuter reports the same – ‘Russian government hackers have conducted multiple cyber spy 
  operations on countries allied with Ukraine […]’. In the past, Moscow has denied conducting 
  foreign cyber espionage missions, saying it ‘contradicts the principles of Russian foreign policy’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_057">Siddiqui, 2022</xref>). 
  Excessive increases in activity on platforms such as Twitter have already been detected. 
  Other social media platforms will also fall victim to this trend of gathering social media intelligence (SOCMINT) 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_051">Putter &#38; Henrico, 2022</xref>).
</p>

<title>Drawing the Bamboo Curtain – Chinese Espionage</title>

<p>In July 2022, The Director of the US Federal Bureau of Investigation stated that 
  China poses the most significant ‘long-term threat to [US] information and [IP]’ and 
  economic prowess based on their aggressive ‘counterintelligence and economic espionage’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_066">FBI, 2020</xref>).<xref ref-type="fn" rid="footnote10">10</xref>  
  Similarly, the Director of US National Intelligence testified before the US House Intelligence 
  Committee in March 2022, asserting that China represents an ‘unparalleled priority for the 
  intelligence community due to the fact that China is coming ever closer to being a peer 
  competitor to the [US] economically, militarily and technologically’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_024">Garamone, 2022</xref>). 
  This testimony was reinforced by the joint FBI-MI5 statement of July 2022, 
  stating that ‘MI5 is now running seven times as many investigations related to activities of the 
  Chinese Communist Party compared to 2018’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_014">Corera, 2022</xref>). 
  Then, on 22 July 2022, the Head of MI6 stated that the United Kingdom is currently 
  (and into the future) allocating more resources to the threat posed by China to 
  ‘Western governments and societies […] than to any other single subject within the service, 
  saying it had just moved past counterterrorism in terms of importance’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">Bloomberg, 2022</xref>). 
  This clearly shows the extent and threat of Chinese espionage efforts.
</p>

<p>What makes China a dangerous opponent is their (autocratic) ability to bring the 
  entire Chinese government to bear on national interest and security issues, 
  a truly whole of government approach with Chinese characteristics. Amongst several economic, defence, 
  and security related expansionism initiatives 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_036">Kruger, 2021</xref>), 
  e.g., the BRI, China’s national ambition to reunify with Taiwan, and become a superpower 
  (better yet, replace the United States as the world leader) – China presents the ‘broadest, 
  most active and persistent cyber espionage threat to U.S. government and private sector networks’.<xref ref-type="fn" rid="footnote11">11</xref> 
</p>

<p>China targets every possible advantage of leading SET nations to access SET-related IP 
  (Chinese industrial espionage) as well as military/security classified material, 
  political action, and counterespionage (Chinese national security espionage) 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009">Bateman, 2022, p. 65</xref>). 
  Then, there is a shift to cyberespionage. Jon Bateman writes that this cyberespionage 
  results in very successful ‘bulk collection efforts’, all enabled by ‘remote cyber operations’ 
  which precludes the requirement for ‘insider access to U.S. systems, companies, or supply chains’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009">Bateman, 2022, p. 65</xref>). 
  This standoff capability will just expand and increase in effectiveness into the future 
  but can probably be managed with technology and counterintelligence defences. However, what Loch Johnson 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_030">2010</xref>) labels ‘old-fashioned espionage, 
  known as human intelligence or “HUMINT”’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_030">Johnson, 2010, p. 7</xref>), referring to the age-old use of 
  people to acquire the information required by their governments, will remain a significantly more complex risk, 
  and more so in the case of China, to mitigate for democratic and open societies like the West.
</p>

<p>Chinese HUMINT is enabled by mass – the fact that the Chinese expatriate communities worldwide are numerous, 
  growing and integrated into national societal structures and culture in several countries. 
  For example, the US Marine Corps enlisted its first Chinese person as far back as 1944. 
  In 2016 the US military had 52,433 ‘Asian Americans’ on active duty 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">Centre for Minority Veterans, 2022</xref>). 
  When considering the size of the US security services (CIA, FBI, Homeland Security, etc) 
  and the unparalleled size of the US SET community – the numbers of Chinese and/or Chinese 
  heritage people vulnerable to Chinese subversion (or threats to their families back in China) 
  is a significant vulnerability for Western national security.
</p>

<p>This problem is no different in several other developed and developing countries worldwide – 
  albeit with scale differences. In fact, the US Academy for Cultural Diplomacy 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_075">Academy for Cultural Diplomacy, 2022</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_026">Goodkind, 2019, p. 23</xref>) 
  estimates a Chinese diaspora of approximately 39.5 million persons in 130 countries worldwide. 
  In Africa, South Africa has the largest Chinese diaspora amongst African countries – 
  estimated at 500,000 in 2012 and growing 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>). 
  Australia, a key NATO partner state in the Indo-Pacific, has an estimated 749,000 people of the Chinese diaspora 
  (<italic>circa</italic> 2011) (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">Ibid.</xref>); the United Kingdom follows with 630,000 (<italic>circa</italic> 2011) while France has 540,000 
  (<italic>circa</italic> 2011) Chinese nationals 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>). 
  These observations do not imply that every Chinese national is an automatic asset for 
  hostile espionage, as the Chinese diaspora is not homogenous and often even anti-CCP. 
  However, in the context of espionage activities and host state vulnerabilities, 
  the question that has to be asked is how national security agencies will be able to cope with the potential 
  for espionage activities given the size of these diaspora communities. This is further complicated 
  by a duality to the vulnerability. The Chinese diaspora have integrated over an extended period into 
  the societies of many countries and are now accepted as part of the background. On the other hand, 
  and from a reciprocal point, it is nearly impossible for Western expatriates to integrate as a diaspora 
  community in China, thus complicating the capability of Western HUMINT collection in China (other than cyberespionage).
</p>

<p>These diaspora communities make it possible to export other instruments that can be employed by 
  the Chinese national security apparatus as capabilities for subversion and espionage. 
  This is complicated by the reality that probably all primary Chinese business enterprises internationally 
  ‘ha[ve] an internal “cell” answerable to the [Chinese Communist Party (CCP)] to drive the political 
  agenda and ensure that the company is compliant with political directives’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_025">Gardner, 2020</xref>). 
  This CCP link has been enshrined in national Chinese law since 2017: under its 
  National Intelligence Law of 2017, all Chinese companies are required to assist, 
  support and cooperate when requested by the government to provide intelligence 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_007">Bachmann &#38; Anthony Paphiti, 2019</xref>). 
  Another known state-sponsored enterprise is the Chinese Confucius Institute, 
  established <italic>circa</italic> 2004 and successfully exported internationally – ‘enrolling more than nine 
  million students at 525 institutes in 146 countries and regions’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_019">Edwards, 2021</xref> and 
  <xref ref-type="bibr" rid="j_jobs-2023-002_ref_060">Tessari &#38; Muti, 2021</xref>).  
  The potential for subversion and espionage is part of ‘a key stratagem of China’s ‘soft war’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>) 
  or ‘soft power’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_074">Yle News, 2022</xref>) 
  against those nations successfully penetrated. Such ‘soft war’ takes place below the threshold, 
  as a non-kinetic warfighting approach that takes place in the ‘grey zone’ of kinetic and non-kinetic 
  operations and is manifest in China’s so called ‘unrestricted warfare’ under the subcategory of the 
  ‘three warfares’ of influence operations that take place in the perceptual domain of information operations 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_040">Mosquera &#38; Bachmann, 2020</xref>).
</p>

<p>The Confucius Institutes are modelled after internationally recognised cultural institutes such as 
  Alliance Française (France) and the Goethe Institute (Germany). However, they have been 
  revealed as CCP-funded propaganda and espionage platforms 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_019">Edwards, 2021</xref>). 
  The exposure of the corrosive effects of the Confucius Institute’s dogma/activities to 
  national interests drives international re-assessment of access to domestic societal 
  structures such as universities. Under suspicion of being a part of the CCP intelligence community 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>), 
  the Chinese Central Guidance Commission on Building Spiritual Civilization chairperson (April 2007) – 
  part of the ‘Propaganda Department of the Central Committee’ of the CCP – stated that the Confucius 
  Institutes were an ‘important part of the CCP's external propaganda structure’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_072">Yang, 2022</xref>).
</p>

<p>Finland, Denmark, and Sweden recently closed Confucius Institutes operating within their borders 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_074">Yle News, 2022</xref>). 
  Helsinki University will, henceforth, appoint their own Chinese language tutors because, 
  according to the university, there is an increasing demand for Chinese language proficiency.  
  This trend fits well with the massive Chinese diaspora community internationally. Of course, 
  better Chinese language literacy within individual countries has its advantages for political, 
  economic, and SET reasons. However, it is a double-edged sword. The better people understand each 
  other and converse in the same language, the quicker foreigners integrate into another country 
  and the easier it is to engage in espionage. So, China might consider inviting foreign nationals 
  to China for language training in future under the pretext of some cultural diversity programme 
  to ensure that integration of Chinese nationals abroad has a higher success rate – thus increasing 
  the likelihood of establishing and maintaining ever expanding networks for espionage.
</p>

<p>The closure of the Confucius Institutes also eliminates the requirement for 
  Chinese-paid staff to be in those countries. For example, the Confucius Institute’s deputy director 
  (Helsinki University) was deemed ‘unacademic’ whilst enjoying a close relationship with the Chinese embassy 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>). 
  Primary Chinese targets are ‘[A]merican academia, with its cutting-edge technology, 
  access to American thought leaders, and ability to shape future generations of American citizens 
  [however,] China knows that Confucius Institutes have become politically toxic, and it has 
  shifted its focus toward other means of engagement’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_048">Peterson, 2021</xref>).  
  This toxicity led to the closing of seventy-one Confucius Institutes in the United States <italic>circa</italic> March 2021 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>), 
  with a significant disruption to established Chinese networks due to the exfiltration of Chinese staff.  
  Realising that their strategy has become exposed, the Chinese government can be expected to replace it 
  with another programme to sustain established and sensitive espionage networks and assets. 
  China immediately set into motion a rebranding campaign – <italic>circa</italic> 2021, the Chinese government 
  set in motion deception manoeuvres to change the program structure to evade US policy regulations. 
  For example, ‘On July 1, 2021, one day after its Confucius Institute closed, 
  the College of William and Mary established the W&#38;M-BNU Collaborative Partnership 
  with Beijing Normal University, according to the school. The Chinese university was the American school’s 
  former Confucius Institute partner, providing the programs the Confucius Institute used to offer’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_072">Yang, 2022</xref>). 
  This is a direct response to an indication that continued access to conduct espionage and subversion is required.  
  The next section focusses on offensive cultural programmes to imperialism disguised as economic development.
</p>

<p>A key catalyst for current and increased levels of Chinese espionage is the BRI, 
  China’s ambitious global infrastructure development project. 
  Aiming to controlling geo-strategic locations internationally for a dual 
  military/economic purpose best describes the BRI. Consequently, 
  the BRI is increasingly being associated with Chinese espionage and subversion activities 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046">Palma, 2018</xref>). 
  The Chinese BRI is used to collect information to ‘damp dissent’ and to control the 
  ‘debate and ideas where that has specific security and diplomatic consequences’ 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic>.</xref>).  
  Such data collection occurs from various points - including but probably not limited to 
  ‘ecommerce platforms, Confucius Institutes, telecoms networks, transportation companies, 
  hotels, financial payment institutions and logistics companies’ – which is then channelled 
  to centralised analysis centres in China 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046">Palma, 2018</xref>). 
  With this initiative exposed for 
  its various threats, China will have to innovate new approaches to compensate.
</p>

<p>Open criticism towards the Chinese government and their policies also seems to be a trigger 
  for increased espionage against such perpetrators. For example, Malaysia could be targeted 
  by increasing Chinese cyber-espionage activities due to remarks by the Malaysian Prime Minister 
  about BRI contracting. Examples of cyber-attack using non-state and state capabilities are not in 
  short supply according to Palma 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_046">2018</xref>). 
  There is also the targeting of Chinese dissidents in the United States and other countries 
  in an attempt to silence dissent. According to a July 2022 report, by employing both HUMINT 
  operatives and cyberespionage and related activities, ‘[t]hese programmes are believed to be part of a wider, 
  growing and multi-faceted intelligence effort’ in support of CCP autocracy 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_017">Debusmann, 2022</xref>). 
  Increasingly, China interferes in US politics as well as those of other countries when their 
  policies are perceived as adversarial to the Chinese national interests 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_014">Corera, 2022</xref>). 
  Based on these trends, it is not unrealistic to project increasing levels of cyber-espionage 
  and -attacks in the short to medium term. 
</p>

<p>Staying with cyber-espionage, China has a healthy and growing cell phone software application 
  and video (software) games industry exploitable for the collection of untold volumes of data for analysis 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009">Bateman, 2022, p. 69-70</xref>).  
  This has also already been released by the West and countries such as India that responded by 
  banning a number of these applications 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009"><italic>Ibid</italic>.</xref>). 
  Thus, several of the Chinese espionage programs/capabilities have already been exposed, 
  and renewed and innovative measures can be expected from China as a result.  
  With cyber-espionage continuously being countered by targeted countries, 
  an increase in Chinese HUMINT can be expected as relationship building is at the heart of any espionage engagement and 
  is filled with complexities that seek to bypass logical conclusions about interest and security.
</p>

<title>The Prospects</title>
<p>In a world already accustomed to aggressive Russian and Chinese espionage activities, 
  it can be expected that Russia (and associated non-state actors) will retaliate with an 
  enhanced espionage campaign targeting those countries and organisations that provide military 
  and technological assistance (for example Elon Musk’s Starlink satellite internet constellation 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_031">Jones, 2022</xref>)) 
  to Ukraine and any NATO partner country. The sanction-induced access-to-the-latest-technology 
  prohibition against Russia will unlock a momentous ambition to obtain the latest technology knowledge. 
  Aggressive espionage remains the preferred option. With a greatly reduced Russian diplomatic staff 
  (and thus HUMINT capacity), usage of mobile platforms such as the Russian oligarch superyacht fleet 
  and other real estate world-wide (typical espionage capability staging areas) and reliance on 
  cyberespionage can be projected to display new vigour in the short to medium term. 
  he Microsoft Threat Intelligence Center reported that there is evidence of such trends unfolding 
  (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_028">Hope, 2022</xref>). 
  However, information networks and their associated crevasses can be secured. 
  Thus, the medium to long term will probably be remembered for an increase in Russian HUMINT 
  activity worldwide – albeit focussed on countries with significant SET capabilities and 
  knowledge and on those countries that have access to these and that are willing to share 
  information with Russia for access to energy commodities.
</p>

<p>
China is no different. With the Chinese Confucius Institute systematically exposed as an 
incubator for latent espionage capabilities and subversion, reliance will increasingly 
shift in the short to medium term to cyber-espionage 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_014">Corera, 2022</xref>). 
It can also be expected that Western institutions that financially gained from hosting the 
Chinese Confucius Institute will, together with China, innovate to maintain such lucrative enterprises – 
to the detriment of their national security. Reports of such adaptation appeared in June 2022: 
‘many once-defunct Confucius Institutes have since reappeared in other forms’ 
(<xref ref-type="bibr" rid="j_jobs-2023-002_ref_056">Sharma, 2022</xref>). 
This shows a clear intention to maintain established networks for espionage and the 
important link these Institutes form within the Chinese intelligence enterprise. 
They are also maintained in support of more mainstream efforts such as cyber-espionage because of their HUMINT focus.
</p>

<p>Then there is the corrosive impact of Chinese imperialism in the Pacific, Africa, 
  and even Europe through its BRI. An increase in Chinese HUMINT could be expected in 
  areas of interest to the BRI and related strategic geographic locations. Again, cyber-espionage 
  could be exploited to prepare the battlefield, but it invariably takes people to connect with other people.
</p>

<title>Conclusion</title>

<p>There are several indicators that point towards the isolation of Russia and China for several and 
  varied reasons that is disruptive to their espionage capabilities. It is projected that such disruptions 
  will provide renewed vigour to their intelligence collection efforts. In the short term, cyber-espionage 
  will probably take the lead based on its standoff characteristics and the fact that Russian and Chinese 
  HUMINT networks are continuously and systematically disrupted.  However, in the medium to long term, 
  cyber-espionage will be supplemented by HUMINT (even overtaken) in the event of the targeted countries 
  are successful in securing their critical cyber infrastructure. The more targeted countries report 
  successes against cyber-espionage and other forms of electronic and cyberspace-related collection, 
  the more the focus will shift towards HUMINT.  Expanding diplomatic staffs, collaborative university programmes, 
  and economic development initiatives are used to achieve expanded HUMINT footprints across entire regions. 
  Their systematic exposure will initiate innovative and aggressive measures by Russia and China to 
  reinvigorate lost espionage capacities. Such vigour will be fuelled by the need of Russia to 
  modernise their military and space capabilities – a typical realist anxiety related to great 
  power competition. Although the West’s capability to severely restrict Russia’s economic 
  growth and cash flow is significant, there are always countries and organisations that 
  would facilitate information flow for access to cheap energy – in a survivalist, defensive, 
  and/or functionalist tradition. Economic sanctions came of age during the 20th century and 
  with it came sanction busting. In the case of China, the West might be content on having 
  cleaned house of undue cultural influence in the short term. However, the medium to long term 
  will be littered with new CCP initiatives masquerading as diplomacy, development, assistance with 
  lowering the language barriers between China and the rest of the world, or academic and cultural 
  partnerships with eloquent names. With certainty, the international community will be confronted 
  with increased and probably more aggressive Russian and Chinese espionage activity as they are 
  systematically relegated to the margins of the international community.
</p>

<title>Disclosure statement</title>
<p>The authors hereby declare that no competing financial interest exists for this manuscript.
</p>

<title>Data availability statement</title>
<p>No new data were created or analysed in this study. Data sharing is not applicable to this article.
</p>



</body>

<back>
  <xref ref-type="fn" rid="footnote1">1</xref>
  <fn-group>
        <fn id="footnote1">
        1. See the summary for Richelson 
        (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_055">1997</xref>) amongst a several other sources.  
        Also, Faligot (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_022">2019</xref>).
        </fn>
        
        <fn id="footnote2">
          2.  For perspectives on both Russia and China from a subversion perspective – which makes them prolific national security threats. 
          This threat was already articulated by the FBI 
          (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_023">2020</xref>) 
          and more recently by Barbara Starr 
          (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_059">2022</xref>).
        </fn>
        
        <fn id="footnote3">
          3.  Complex arguments can be forwarded as to the criminal nature of industrial espionage 
          based on the various Hague Agreements and Conventions attempting to regulate international 
          IP rights, control, and ownership. ‘The Hague Agreement, concluded in 1925, was revised at 
          London in 1934 and at The Hague in 1960. It was completed by an Additional Act signed at 
          Monaco in 1961 and by a Complementary Act signed at Stockholm in 1967, which was amended in 1979. 
          As noted above, a further Act was adopted at Geneva in 1999.’
          (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">Summary of the Hague Agreement Concerning the International Registration of Industrial Designs, 1925</xref>).
          That said, it should also be taken into consideration that China only ascended to the Hague Treaty in May 2022, 
          which could be interpreted that China was under no legal obligation to avoid industrial espionage.  
          (The Hague Notification No. 146 Hague Agreement Concerning the International Registration of Industrial 
          Designs Geneva Act of the Hague Agreement Concerning the International Registration of Industrial Designs 
          Accession by the People's Republic of China. (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000">2022</xref>)).
        </fn>

        <fn id="footnote4">
          4.  ‘A partial “decoupling” of U.S. and Chinese technology ecosystems is well underway. 
          Beijing plays an active role in this process, as do other governments and private actors around the world.’ 
          (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009">Bateman, 2022</xref>).
      
        </fn>

        <fn id="footnote5">
          5.  ‘The first recorded use of sanctions was in 432 BC, when the Athenian Empire banned 
          traders from Megara from its marketplaces, thereby strangling the rival city state’s economy. 
          It was not however until the 20th century that the use of economic 
          sanctions became more prominent.’ 
          (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_001">Abughris, 2021</xref>).
        </fn>

        <fn id="footnote6">
          6.  ‘Fact Sheet: United States, G7 and Eu Impose Severe and Immediate Costs on Russia’, 
          (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_065">The White House, 2022</xref>).
        </fn>

        <fn id="footnote7">
          7.  Andrei Soldatov ‘is renowned for his inside reporting on Russia’s 
          three spy agencies and is a senior fellow with the Center for European 
          Policy Analysis’ (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_029">Ingalls, 2022</xref>). 
        </fn>
        
      <fn id="footnote8">
        8. See more, The Wassenaar Arrangement, 2022.
      </fn>
      <fn id="footnote9">
        9.  The Wassenaar Arrangement has 42 members – 
        Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Croatia, 
        Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, 
        India, Ireland, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Mexico, 
        Netherlands, New Zealand, Norway, Poland, Portugal, Republic of Korea, Romania, 
        Russian Federation, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, 
        Türkiye, Ukraine, United Kingdom, and United States 
        (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_000"><italic>Ibid</italic></xref>).
      
      </fn>
      <fn id="footnote10">
        10.    Also, in the latest joint statement by the heads of the FBI and MI5 - 
        Gordon Corera (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_076">BBC News, 2022</xref>) and 
        Bateman (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_009">2022</xref>).
      
      </fn>
      <fn id="footnote11">
        11.   Quoting Avril Haines in Garamone, 
        (<xref ref-type="bibr" rid="j_jobs-2023-002_ref_024">2022</xref>).
      </fn>
      
      <fn id="disclaimer">
            <bold>Disclosure statement</bold>
      The authors hereby declare that no competing financial interest exists for this manuscript.

      <bold>Data availability statement</bold>
      No new data were created or analysed in this study. Data sharing is not applicable to this article.
      </fn>
    </fn-group>



<ref-list id="j_jobs-2023-002">
  <title><lable></lable>Bibliography</title>
  
  <ref id="j_jobs-2022-002_ref_001">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>
      Abughris</surname>, <given-name>Noura</given-name> (<year>2021</year>) </bold>
      ‘<article-title>A Brief History of Economic Sanctions</article-title>’, 
      <source>Carter-Ruck</source>, 30 November 2021 [Online]. Available at: 
      <ext-link xlink:href="https://www.carter-ruck.com/insight/a-brief-history-of-economic-sanctions/">
      https://www.carter-ruck.com/insight/a-brief-history-of-economic-sanctions/</ext-link> (Accessed: 26 August 2022).


</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_075">
  <mixed-citation publication-type="journal">
  <bold>
    <given-names>Academy for Cultural Diplomacy</given-names>. 
    (<year>2022</year>)</bold> 
    ‘<article-title>Chinese Diaspora</article-title>’, 
    <italic><source>Academy for Cultural Diplomacy</source></italic> 
    [Online]. Available at: 
    <ext-link xlink:href="https://www.culturaldiplomacy.org/academy/index.php?chinese-diaspora">
      https://www.culturaldiplomacy.org/academy/index.php?chinese-diaspora</ext-link> (Accessed: 20 June 2022). 
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_002">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>Alspach</surname>, <given-names>Kyle</given-names>. 
    (<year>2022</year>)</bold> 
  ‘<article-title>Going on Offense: Ukraine Forms an ‘It Army,’ Nvidia Hacks Back</article-title>’, 
  <italic><source>VentureBeat.com</source></italic>, 26 February 2022. [Online]. Available at: 
  <ext-link xlink:href="https://venturebeat.com/2022/02/26/going-on-offense-ukraine-forms-an-it-army-nvidia-hacks-back/">
    https://venturebeat.com/2022/02/26/going-on-offense-ukraine-forms-an-it-army-nvidia-hacks-back/</ext-link> 
  (Accessed: 21 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_003">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>Ankel</surname>, <given-names>Sophia</given-names>. 
    (<year>2022</year>)</bold> 
    ‘<article-title>Ukrainian Soldier Says Elon Musk’s Starlink Satellites “Changed the War in Ukraine’s Favour”</article-title>’, 
    <italic><source>Businessinsider</source></italic>, 28 April 2022. [Online] Available at: 
    <ext-link xlink:href="https://www.businessinsider.co.za/elon-musk-starlink-satellites-helping-ukraine-fight-soldier-2022-4?r=US&#38;amp;IR=T">
      https://www.businessinsider.co.za/elon-musk-starlink-satellites-helping-ukraine-fight-soldier-2022-4?r=US&#38;amp;IR=T</ext-link> (Accessed: 21 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_004">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>Bachmann</surname>, <given-names>Sascha-Dominik</given-names> &#38; 
    <surname>Gunneriusson</surname>, <given-names>Hakan</given-names>. 
    (<year>2015</year>)</bold> 
    ‘<article-title>Hybrid Wars: The 21st Century New Threats to Global Peace and Security</article-title>’,
     <italic><source>Scientia Militaria</source></italic> 2015,  <volume>43</volume> (<issue>1</issue>), 
     pp <fpage>87</fpage> – <lpage>88</lpage>. Available at:  
     <ext-link xlink:href="https://scientiamilitaria.journals.ac.za/pub/article/view/1110/">
      https://scientiamilitaria.journals.ac.za/pub/article/view/1110/</ext-link> (Accessed: 10 February 2023).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_005">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>Bachmann</surname>, <given-names>Sascha-Dominik</given-names> (Dov) &#38; 
    <surname>Lee</surname>, <given-names>Doowan</given-names> (<year>2020</year>)</bold> 
    ‘<article-title>The Silent Erosion of Sovereignty:  A Sino–Australian Example</article-title>', 
    <italic><source>Wild Blue Yonder</source></italic>, 
    11 May 2020 [Online]. Available at:  
    <ext-link xlink:href="https://www.airuniversity.af.edu/Wild-Blue-Yonder/Article-Display/Article/2178205/the-silent-erosion-of-sovereignty-a-sinoaustralian-example">
      https://www.airuniversity.af.edu/Wild-Blue-Yonder/Article-Display/Article/2178205/the-silent-erosion-of-sovereignty-a-sinoaustralian-example</ext-link>  (Accessed: 10 February 2023).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_006">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>Bachmann</surname>, <given-names>Sascha-Dominik</given-names> (Dov), 
    <surname>Lee</surname>, <given-names>Doowan</given-names>, and 
    <surname>Dowse</surname> AO, <given-names>Andrew</given-names>. (<year>2020</year>)</bold> 
    ‘<article-title>#COVID Information Warfare and the Future of Great Power Competition</article-title>’, 
    <italic><source>The Fletcher Forum of World Affairs</source></italic> 2020, <volume>44</volume>:<issue>2</issue>.
  </mixed-citation></ref>

  <ref id="j_jobs-2023-002_ref_007">
    <mixed-citation publication-type="journal">
    <bold>
      <surname>Bachmann</surname>, <given-names>Sascha-Dominik</given-names> (Dov), and 
      <surname>Paphiti</surname>, <given-names>Anthony</given-names>. (<year>2019</year>)</bold> 
      ‘<article-title>Why Huawei security concerns cannot be removed from US-China relations</article-title>’, 
      <italic><source>The Conversation</source></italic>, <day>10</day> <month>May</month> <year>2019</year>, 
      [Online]. Available at: 
      <ext-link xlink:href="https://gcp.theconversation.com/why-huawei-security-concerns-cannot-be-removed-from-us-china-relations-116770">
        https://gcp.theconversation.com/why-huawei-security-concerns-cannot-be-removed-from-us-china-relations-116770</ext-link> (Accessed: 9 February 2023).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_008">
  <mixed-citation publication-type="journal">
  <bold>
    <surname>Baker</surname>, <given-names>Christopher D.</given-names> (<year>2003</year>)</bold> 
    ‘<article-title>Tolerance of International Espionage: A Functional Approach</article-title>’, 
    <italic><source>American University International Law Review</source></italic> Vol. <volume>19</volume>, 
    No. <issue>5</issue> (2003), pp. <fpage>1091</fpage>-<lpage>1113.</lpage>
  </mixed-citation></ref>

  <ref id="j_jobs-2023-002_ref_009">
    <mixed-citation publication-type="journal">
    <bold>
      <surname>Bateman</surname>, <giving-name>Jon</giving-name> (<year>2022</year>)</bold> 
  <italic><source>U.S.-China Technological ‘Decoupling’</source></italic>, 
  <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Carnegie Endowment for International Peace</publisher-name>, 
  Available at: 
  <ext-link xlink:href="https://carnegieendowment.org/files/Bateman_US-China_Decoupling_final.pdf">
    https://carnegieendowment.org/files/Bateman_US-China_Decoupling_final.pdf</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

   <ref id="j_jobs-2023-002_ref_076">
    <mixed-citation publication-type="journal">
    <bold>
      <given-names>BBC News</given-names>. (<year>2022</year>)</bold> 
      ‘<article-title>Russia About to Run out of Steam in Ukraine - MI6 Chief</article-title>’, 
      <italic><source>BBC News</source></italic>, 21 July 2022 [Online]. 
      Available at: 
      <ext-link xlink:href="https://www.bbc.com/news/world-europe-62259179">
      https://www.bbc.com/news/world-europe-62259179</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_010">
 <mixed-citation publication-type="journal">
  <bold>
    <surname>Bertrand</surname>, <given-names>Natasha</given-names>, 
    <surname>and Sciutto</surname>, <given-names>Jim</given-names>. 
    (<year>2022</year>) </bold> 
    ‘<article-title>Russia's Ukraine War Effort Running “out of Steam” as Putin's Ability to Spy in Europe Cut in Half, MI6 Chief Says</article-title>’,
     <italic><source>KTVZ</source></italic>, 21 July 2022 [Online]. Available at: 
     <ext-link xlink:href="https://ktvz.com/politics/cnn-us-politics/2022/07/21/russias-ukraine-war-effort-running-out-of-steam-as-putins-ability-to-spy-in-europe-cut-in-half-mi6-chief-says-2/">
     https://ktvz.com/politics/cnn-us-politics/2022/07/21/russias-ukraine-war-effort-running-out-of-steam-as-putins-ability-to-spy-in-europe-cut-in-half-mi6-chief-says-2/
     </ext-link> (Accessed: 25 August 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_011">
 <mixed-citation publication-type="journal">
  <bold>
    <given-names>Center for Minority Veterans</given-names>. 
    (<year>2016</year>)</bold> 
    ‘<article-title>Asian American and Pacific Islander Fact Sheet</article-title>’, 
    <source>Department of Veterans Affairs</source>. Center for Minority Veterans v.3/17/2016 [Online]. Available at: 
    <ext-link xlink:href="https://www.va.gov/centerforminorityveterans/docs/factSheetAanhpiOnePage.pdf">
    https://www.va.gov/centerforminorityveterans/docs/factSheetAanhpiOnePage.pdf</ext-link> (Accessed: 20 June 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_012">
 <mixed-citation publication-type="journal">
  <bold><surname>Coker</surname>, <given-names>James</given-names>. (<year>2022</year>)</bold> 
  ‘<article-title>Chinese Cyber Espionage Groups Increasingly Targeting Russia</article-title>’, 
  <italic><source>Infosecurity Magazine</source></italic>, 8 July 2022 [Online]. Available at: 
  <ext-link xlink:href="https://www.infosecurity-magazine.com/news/chinese-cyber-espionage-russia/">
  https://www.infosecurity-magazine.com/news/chinese-cyber-espionage-russia/</ext-link> (Accessed: 25 August 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_013">
 <mixed-citation publication-type="journal">
  <bold><given-names>
Control Risks</given-names>. (<year>2020</year>)</bold> 
‘<article-title>Cyber Threats in 2020 and Beyond - Nordic Strategic Outlook</article-title>’, 
<publisher-loc>Copenhagen</publisher-loc>: <publisher-name>Control Risks Group Limited</publisher-name> [Online]. 
Available at: 
<ext-link xlink:href="https://www.controlrisks.com/-/media/corporate/files/our-thinking/insights/cyber-threats-in-2020-and-beyond-nordic-strategic-outlook/nordics-cyber-threat-report.pdf">
https://www.controlrisks.com/-/media/corporate/files/our-thinking/insights/cyber-threats-in-2020-and-beyond-nordic-strategic-outlook/nordics-cyber-threat-report.pdf
</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_014">
 <mixed-citation publication-type="journal">
  <bold><surname>
Corera</surname>, <given-names>Gordon</given-names>. (<year>2022</year>)</bold>
 ‘<article-title>China: MI5 and FBI Heads Warn of “Immense” Threat</article-title>’, 
 <italic><source>BBC News</source></italic>, 7 July 2022 [Online]. Available at: 
 <ext-link xlink:href="https://www.bbc.com/news/world-asia-china-62064506">
 https://www.bbc.com/news/world-asia-china-62064506</ext-link> (Accessed: 24 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_015">
 <mixed-citation publication-type="journal">
  <bold><given-names>
CRF.org</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Conflict in Ukraine. Global Conflict Tracker</article-title>’, 
<italic><source>Council on Foreign Relations</source></italic>, 
12 May 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.cfr.org/global-conflict-tracker/conflict/conflict-ukraine">
https://www.cfr.org/global-conflict-tracker/conflict/conflict-ukraine</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_016">
 <mixed-citation publication-type="journal">
  <bold><surname>
de Jong</surname>, <given-names>Belle</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Putin Left in the Dark and “Low Morale” among Russian Soldiers, Western Intelligence Says</article-title>’, 
<italic><source>The Brussels Times</source></italic>, 31 March 2022 [Online]. 
Available at: 
<ext-link xlink:href="https://www.brusselstimes.com/214262/putin-left-in-the-dark-and-low-morale-among-russian-soldiers-western-intelligence-says">
https://www.brusselstimes.com/214262/putin-left-in-the-dark-and-low-morale-among-russian-soldiers-western-intelligence-says</ext-link> (Accessed: 29 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_017">
 <mixed-citation publication-type="journal">
  <bold><surname>
Debusmann</surname>, <given-names>Bernd</given-names>. (<year>2022</year>)</bold> 
‘<article-titles>Americans in the Crosshairs of China's Spy Game</article-titles>’, 
<italic><source>BBC News</source></italic>, Washington, 9 July 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.bbc.com/news/world-us-canada-62100402">https://www.bbc.com/news/world-us-canada-62100402</ext-link> (Accessed: 26 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_018">
 <mixed-citation publication-type="journal">
  <bold><given-names>
Deutsche Welle</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Netherlands Agency Says It Foiled Russian Spy Attempt to Infiltrate ICC</article-title>’, 
<italic><source>Deutsche Welle</source></italic>, 16 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.dw.com/en/netherlands-agency-says-it-foiled-russian-spy-attempt-to-infiltrate-icc/a-62162178">
https://www.dw.com/en/netherlands-agency-says-it-foiled-russian-spy-attempt-to-infiltrate-icc/a-62162178</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_019">
 <mixed-citation publication-type="journal">
  <bold><surname>
Edwards</surname>, <given-names>Lee</given-names>. (<year>2021</year>)</bold> 
‘<article-title>Confucius Institutes: China's Trojan Horse</article-title>’, 
<italic><source>The Heritage Foundation</source></italic>, 27 May 2021 [Online]. Available at: 
<ext-link xlink:href="https://www.heritage.org/homeland-security/commentary/confucius-institutes-chinas-trojan-horse">
https://www.heritage.org/homeland-security/commentary/confucius-institutes-chinas-trojan-horse</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_020">
 <mixed-citation publication-type="journal">
  <bold><given-names>
European Commission</given-names>. (<year>2022</year>)</bold> 
‘<article-title>EU Solidarity with Ukraine</article-title>’, 
<source>European Commission</source>, [Online]. Available at: 
<ext-link xlink:href="https://ec.europa.eu/info/strategy/priorities-2019-2024/stronger-europe-world/eu-solidarity-ukraine_en">
https://ec.europa.eu/info/strategy/priorities-2019-2024/stronger-europe-world/eu-solidarity-ukraine_en</ext-link> (Accessed: 21 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_021">
 <mixed-citation publication-type="journal">
  <bold><given-names>
European Council</given-names>. (<year>2022</year>)</bold> 
‘<article-title>EU Sanctions against Russia Explained</article-title>’, 
<source>European Council Consilium</source>, 8 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.consilium.europa.eu/en/policies/sanctions/restrictive-measures-against-russia-over-ukraine/sanctions-against-russia-explained/">
https://www.consilium.europa.eu/en/policies/sanctions/restrictive-measures-against-russia-over-ukraine/sanctions-against-russia-explained/</ext-link> (Accessed: 21 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_022">
 <mixed-citation publication-type="book">
  <bold><surname>
Faligot</surname>, <given-names>Roger</given-names>. (<year>2019</year>)</bold> 
<italic><source>Chinese Spies: From Chairman Mao to Xi Jinping</source></italic>. <publisher-name>Hurst &#38; Company</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_023">
 <mixed-citation publication-type="journal">
  <bold><given-names>
FBI</given-names>. (<year>2020</year>)</bold> 
‘<article-title>The China Threat</article-title>’, 
<source>FBI</source>, 10 July 2020 [Online]. 
Available at: <ext-link xlink:href="https://www.fbi.gov/investigate/counterintelligence/the-china-threat">
https://www.fbi.gov/investigate/counterintelligence/the-china-threat</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_024">
 <mixed-citation publication-type="journal">
  <bold><surname>
Garamone</surname>, <given-names>Jim</given-names>. (<year>2022</year>)</bold> 
‘<article-title>U.S. Intel Officials Detail Threats from China, Russia</article-title>’, 
<source>U.S. Department of Defense</source>, 8 March 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.defense.gov/News/News-Stories/Article/Article/2960113/us-intel-officials-detail-threats-from-china-russia/">
https://www.defense.gov/News/News-Stories/Article/Article/2960113/us-intel-officials-detail-threats-from-china-russia/</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_025">
 <mixed-citation publication-type="journal">
  <bold><surname>
Gardner</surname>, <given-names>Frank</given-names>. (<year>2020</year>)</bold> 
‘<article-title>The Spying Game: China's Global Network</article-title>’, 
<italic><source>BBC News</source></italic>, 7 July 2020. Available at: 
<ext-link xlink:href="https://www.bbc.com/news/uk-53329005">https://www.bbc.com/news/uk-53329005</ext-link> (Accessed: 24 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_026">
 <mixed-citation publication-type="journal">
  <bold><surname>
Goodkind</surname>, <given-names>Daniel</given-names>. (<year>2019</year>)</bold> 
‘<article-title>The Chinese Diaspora: Historical Legacies and Contemporary Trends</article-title>’, 
<source>Demographic and Economic Studies Branch, International Programs Population Division</source>, August 2019, p. 23 [Online]. 
Available at: <ext-link xlink:href="https://www.census.gov/content/dam/Census/library/working-papers/2019/demo/Chinese_Diaspora.pdf">
https://www.census.gov/content/dam/Census/library/working-papers/2019/demo/Chinese_Diaspora.pdf</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_027">
 <mixed-citation publication-type="journal">
  <bold><surname>
Gregorian</surname>, <given-names>Dareh</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Here Are the Superyachts Seized from Russian Oligarchs</article-title>’, 
<italic><source>NBC News</source></italic>, 5 May 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.nbcnews.com/politics/politics-news/are-superyachts-seized-russian-oligarchs-rcna20346">
https://www.nbcnews.com/politics/politics-news/are-superyachts-seized-russian-oligarchs-rcna20346</ext-link> (Accessed: 29 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_028">
 <mixed-citation publication-type="journal">
  <bold><surname>
Hope</surname>, <given-names>Alicia</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russia Accelerated Cyber Espionage against Ukraine's Allies During the Invasion, Warned Microsoft</article-title>’, 
<source>CPO Magazine</source>, 8 July 2022 [Online]. 
Available at: 
<ext-link xlink:href="https://www.cpomagazine.com/cyber-security/russia-accelerated-cyber-espionage-against-ukraines-allies-during-the-invasion-warned-microsoft/">
https://www.cpomagazine.com/cyber-security/russia-accelerated-cyber-espionage-against-ukraines-allies-during-the-invasion-warned-microsoft/</ext-link> (Accessed: 26 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_029">
 <mixed-citation publication-type="journal">
  <bold><surname>
Ingalls</surname>, <given-names>Chris</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Seattle Could Be Primed for Russian Spy Operations Amid Ukraine Conflict</article-title>’, 
<source>King5.com</source>, 19 May 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.king5.com/article/news/investigations/seattle-russian-spy-operations-ukraine/281-5504e5a2-5e78-4111-9b67-0c5739512038">
https://www.king5.com/article/news/investigations/seattle-russian-spy-operations-ukraine/281-5504e5a2-5e78-4111-9b67-0c5739512038</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_030">
 <mixed-citation publication-type="book">
  <bold><surname>
Johnson</surname>, <given-names>Loch K.</given-names> (<year>2010</year>)</bold> 
<italic><source>The Oxford Handbook of National Security Intelligence</source></italic>. 
<publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_031">
 <mixed-citation publication-type="journal">
  <bold><surname>
Jones</surname>, <given-names>Seth G.</given-names> (<year>2022</year>)</bold> 
‘<article-title>Russia's Ill-Fated Invasion of Ukraine: Lessons in Modern Warfare</article-title>’, 
<source>Center for Strategic and International Studies</source>, 1 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.csis.org/analysis/russias-ill-fated-invasion-ukraine-lessons-modern-warfare">
https://www.csis.org/analysis/russias-ill-fated-invasion-ukraine-lessons-modern-warfare</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_032">
 <mixed-citation publication-type="journal">
  <bold><surname>
Kasapoğlu</surname>, <given-names>Can</given-names>. (<year>2022</year>)</bold> 
‘<article-title>The Russian Defense Industry: A Distressed Brand</article-title>’, 
<italic><source>Hudson Institute Commentary</source></italic>, 15 April 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.hudson.org/research/17754-the-russian-defense-industry-a-distressed-brand">
https://www.hudson.org/research/17754-the-russian-defense-industry-a-distressed-brand</ext-link> (Accessed: 29 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_033">
 <mixed-citation publication-type="journal">
  <bold><surname>
Konstantopoulos</surname>, <given-names>Ioannis L.</given-names> (<year>2012</year>)</bold> 
‘<article-title>Intelligence and IR Theory: The Cases of Covert Action and Economic Espionage</article-title>’, 
in <given-names>Aristidis</given-names> <surname>Bitzenis</surname> &#38; <given-names>Vasileios A.</given-names> 
<surname>Vlachos</surname>, (<role>eds</role>), 
<source>Proceedings, International Conference on International Business (ICIB)</source>, 17-19 May 2012, 
<publisher-loc>Thessaloniki, Greece</publisher-loc>: <publisher-name>International Relations and European Integration Laboratory, University of Macedonia</publisher-name>. 
pp. <fpage>65</fpage>-<lpage>80</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_034">
 <mixed-citation publication-type="journal">
  <bold><surname>
Kramer</surname>, <given-names>Franklin D.</given-names> (<year>2022</year>)</bold> 
‘<article-title>Free but Secure Trade: Priorities in Support of National Security</article-title>’, 
<italic><source>Atlantic Council</source></italic>, 9 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.atlanticcouncil.org/in-depth-research-reports/report/free-but-secure-trade-priorities-in-support-of-national-security">
https://www.atlanticcouncil.org/in-depth-research-reports/report/free-but-secure-trade-priorities-in-support-of-national-security</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_035">
 <mixed-citation publication-type="journal">
  <bold><surname>
Kramer</surname>, <given-names>Franklin D.</given-names> &#38; <surname>Pavel</surname>, <given-names>Barry</given-names>. 
(<year>2022</year>) </bold>
‘<article-title>NATO Priorities: Initial Lessons from the Russia-Ukraine War</article-title>’, 
<italic><source>Atlantic Council</source></italic>, 14 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/nato-priorities-initial-lessons-from-the-russia-ukraine-war/">
https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/nato-priorities-initial-lessons-from-the-russia-ukraine-war/</ext-link> (Accessed: 20 June 2022).  
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_036">
 <mixed-citation publication-type="book">
  <bold><surname>
Kruger</surname>, <surname>Gary</surname>. (<year>2021</year>)</bold> 
<italic><source>Strategic Subversion: From Terrorists to Superpowers, How State and Non-State Actors Undermine One Another</source></italic>, 
<publisher-loc>Bloomington, IN</publisher-loc>: <publisher-name>AuthorHouse</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_037">
 <mixed-citation publication-type="journal">
  <bold><surname>
Lichtenstein</surname>, <given-names>Sam</given-names>. (<year>2022</year>)</bold> 
‘<article-title>The Impact of the Ukraine War on Russian Espionage in Europe, Part I: Rane</article-title>’, 
<italic><source>RANE Stratfor</source></italic>, 15 April 2022 [Online]. Available at: 
<ext-link xlink:href="https://worldview.stratfor.com/article/impact-ukraine-war-russian-espionage-europe-part-i">
https://worldview.stratfor.com/article/impact-ukraine-war-russian-espionage-europe-part-i</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_038">
 <mixed-citation publication-type="journal">
  <bold><surname>
Marlow</surname>, <given-names>Ian</given-names>. (<year>2022</year>)</bold> 
‘<article-title>UK Spy Chief Sees Russia’s Military Running “out of Steam” Soon</article-title>’, 
<source>Bloomberg</source>, 21 July 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.bloomberg.com/news/articles/2022-07-21/uk-spy-chief-sees-russia-s-military-running-out-of-steam-soon">
https://www.bloomberg.com/news/articles/2022-07-21/uk-spy-chief-sees-russia-s-military-running-out-of-steam-soon</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_039">
 <mixed-citation publication-type="journal">
  <bold><given-names>
Microsoft</given-names>. (<year>2022</year>)</bold> 
<italic><source>Ukraine, Redmond, Microsoft Special Report</source></italic>, 
<publisher-loc>WA</publisher-loc>: <publisher-name>Digital Security Unit</publisher-name>, 27 April 2022 [Online]. Available at: 
<ext-link xlink:href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd">
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd</ext-link> (Accessed: 5 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_040">
 <mixed-citation publication-type="journal">
  <bold><surname>
Mosquera</surname>, <given-names>Munoz</given-names> and <surname>Bachmann</surname>, <given-names>Sascha Dov-Dominik (Dov)</given-names>. 
(<year>2020</year>)</bold> 
‘<article-title>How China uses strategic preconditioning in the age of Great Power competition</article-title>’ 
<italic><source>The Fletcher Forum of World Affairs</source></italic>, 18 May 2020 [Online]. 
Available at: 
<ext-link xlink:href="http://www.fletcherforum.org/home/2020/5/13/how-china-uses-strategic-preconditioning-in-the-age-of-great-power-competition">
http://www.fletcherforum.org/home/2020/5/13/how-china-uses-strategic-preconditioning-in-the-age-of-great-power-competition</ext-link> (Accessed: 9 February 2023).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_041">
 <mixed-citation publication-type="journal">
  <bold><surname>
Muniz</surname>, <given-names>Luanna</given-names> (<year>2022</year>)</bold> 
‘<article-title>Dutch Say They Stopped Russian Spy from Infiltrating International Criminal Court</article-title>’, 
<italic><source>Politico</source></italic>, <day>16</day> <month>June</month> <year>2022</year> [Online]. Available at: 
<ext-link xlink:href="https://www.politico.eu/article/netherlands-intelligence-prevented-russia-spy-from-targeting-international-criminal-court-the-hague/">
https://www.politico.eu/article/netherlands-intelligence-prevented-russia-spy-from-targeting-international-criminal-court-the-hague/</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_042">
 <mixed-citation publication-type="journal">
  <bold><given-names>
NATO</given-names>. (<year>2020</year>)</bold>
 ‘<article-title>NATO 2030: United for a New Era Analysis and Recommendations of the Reflection Group</article-title>’, 
 <italic><source>North Atlantic Treaty Organization</source></italic>, 25 November 2020, p. 10 [Online]. Available at: 
 <ext-link xlink:href="https://www.nato.int/nato_static_fl2014/assets/pdf/2020/12/pdf/201201-Reflection-Group-Final-Report-Uni.pdf">
 https://www.nato.int/nato_static_fl2014/assets/pdf/2020/12/pdf/201201-Reflection-Group-Final-Report-Uni.pdf</ext-link> (Accessed: 12 December 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_043">
 <mixed-citation publication-type="journal">
  <bold><surname>
Neate</surname>, <given-names>Rupert</given-names> (<year>2022</year>)</bold> 
‘<article-title>More Than 15,000 Millionaires Expected to Leave Russia in 2022</article-title>’, 
<italic><source>The Guardian</source></italic>, 13 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.theguardian.com/world/2022/jun/13/more-than-15000-millionaires-expected-to-leave-russia-in-2022">
https://www.theguardian.com/world/2022/jun/13/more-than-15000-millionaires-expected-to-leave-russia-in-2022</ext-link> (Accessed: 21 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_044">
 <mixed-citation publication-type="journal">
  <bold><surname>
Newman</surname>, <given-names>Rick</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Why Russia's Military Is So Shabby</article-title>’, 
<italic><source>Yahoo!</source></italic> Finance, 1 April 2022 [Online]. Available at: 
<ext-link xlink:href="https://finance.yahoo.com/news/why-russias-military-is-so-shabby-214049654.html">
https://finance.yahoo.com/news/why-russias-military-is-so-shabby-214049654.html</ext-link> (Accessed: 25 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_045">
 <mixed-citation publication-type="journal">
  <bold><surname>
Normark</surname>, <given-names>Magnus</given-names>. (<year>2020</year>)</bold> 
‘<article-title>Hybrid Coe Strategic Analysis 15: How States Use Non-State Actors. A Modus Operandi 
for Covert State Subversion and Malign Networks</article-title>’,
 <italic><source>Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats</source></italic>, 10 November 2020 
 [Online]. Available at: 
 <ext-link xlink:href="https://www.hybridcoe.fi/publications/hybrid-coe-strategic-analysis-15-how-states-use-non-state-actors-a-modus-operandi-for-covert-state-subversion-and-malign-networks/">
 https://www.hybridcoe.fi/publications/hybrid-coe-strategic-analysis-15-how-states-use-non-state-actors-a-modus-operandi-for-covert-state-subversion-and-malign-networks/</ext-link> (Accessed: 22 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_046">
 <mixed-citation publication-type="journal">
  <bold><surname>
Palma</surname>, <given-names>Stefania</given-names>. (<year>2018</year>)</bold> 
‘<article-title>China Accused of Using Belt and Road Initiative for Spying</article-title>’, 
<italic><source>Financial Times</source></italic>, 15 August 2018 [Online]. Available at: 
<ext-link xlink:href="https://www.ft.com/content/d5ccb654-a02c-11e8-85da-eeb7a9ce36e4">
https://www.ft.com/content/d5ccb654-a02c-11e8-85da-eeb7a9ce36e4</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_047">
 <mixed-citation publication-type="journal">
  <bold><surname>
Pazzanese</surname>, <given-names>Christina</given-names>. (<year>2019</year>)</bold> 
‘<article-title>Harvard Expert Says Russian Spying Is Nothing New - Only the Technology Is</article-title>’, 
<italic><source>Harvard Gazette</source></italic>, 20 February 2019 [Online]. Available at: 
<ext-link xlink:href="https://news.harvard.edu/gazette/story/2019/02/harvard-expert-says-russian-spying-is-nothing-new-only-the-technology-is/">
https://news.harvard.edu/gazette/story/2019/02/harvard-expert-says-russian-spying-is-nothing-new-only-the-technology-is/</ext-link> (Accessed: 26 August 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_048">
 <mixed-citation publication-type="journal">
  <bold><surname>
Peterson</surname>, <given-names>Rachelle</given-names>. (<year>2022</year>)</bold> 
‘<article-title>China's Confucius Institutes might be Closing, but they Succeeded</article-title>’, 
<italic><source>National Association of Scholars</source></italic>, 31 March 2021 [Online]. Available at: 
<ext-link xlink:href="https://www.nas.org/blogs/article/chinas-confucius-institutes-might-be-closing-but-they-succeeded">
https://www.nas.org/blogs/article/chinas-confucius-institutes-might-be-closing-but-they-succeeded</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_049">
 <mixed-citation publication-type="journal">
  <bold><surname>
Prochko</surname>, <given-names>Veronika</given-names>. (<year>2018</year>)</bold> 
‘<article-title>The International Legal View of Espionage</article-title>’, 
<italic><source>E-International Relations</source></italic>, 2018 [Online]. Available at: 
<ext-link xlink:href="https://www.e-ir.info/2018/03/30/the-international-legal-view-of-espionage/">
https://www.e-ir.info/2018/03/30/the-international-legal-view-of-espionage/</ext-link> (Accessed: 18 July 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_050">
 <mixed-citation publication-type="journal">
  <bold><surname>
Putter</surname>, <given-names>Dries</given-names> &#38; <surname>Bachmann</surname> <given-names>Sascha-Dominik</given-names>. 
(<year>2022</year>)</bold> 
‘<article-title>Scoping the future counterintelligence focus</article-title>’, 
<italic><source>International Journal of Intelligence and Counterintelligence</source></italic>. 
vol <volume>36</volume>, issue <issue>2</issue> (2023). 
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_051">
 <mixed-citation publication-type="journal">
  <bold><surname>
Putter</surname>, <given-names>Dries</given-names> &#38; <surname>Henrico</surname>, <given-names>Susan</given-names>. 
(<year>2022</year>)</bold> 
‘<article-title>Social media intelligence: The national security-privacy nexus</article-title>’, 
<italic><source>Scientia Militaria - South African Journal of Military Studies</source></italic>, 
<volume>50</volume>(<issue>1</issue>), pp. <fpage>19</fpage>-<lpage>44</lpage>. 
<ext-link xlink:href="https://doi.org/10.5787/50-1-1345">https://doi.org/10.5787/50-1-1345</ext-link>.
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_052">
 <mixed-citation publication-type="journal">
  <bold><surname>
Rathbone</surname>, <given-names>John P</given-names>. &#38; <surname>Jones</surname>, <given-names>Sam</given-names>. 
(<year>2022</year>)</bold> ‘<article-title>Tip of the Iceberg: Rise in Russian Spying Activity Alarms European Capitals</article-title>’,
 <italic><source>Financial Times</source></italic>, 
 27 March 2022 [Online]. Available at: 
 <ext-link xlink:href="https://www.ft.com/content/bd74a542-3ce3-44de-a93a-36dc5929912b">
 https://www.ft.com/content/bd74a542-3ce3-44de-a93a-36dc5929912b</ext-link> (Accessed: 25 August 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_053">
 <mixed-citation publication-type="journal">
  <bold><surname>
Reich</surname>, <given-names>Aaron</given-names>, and <surname>Starr</surname>, 
<given-names>Michael</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russia's Military-Industrial Complex: Low Salaries, Mass Layoffs</article-title>’, 
<italic><source>The Jerusalem Post</source></italic>, 7 May 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.jpost.com/business-and-innovation/banking-and-finance/article-706060">
https://www.jpost.com/business-and-innovation/banking-and-finance/article-706060</ext-link> (Accessed: 25 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_054">
 <mixed-citation publication-type="journal">
  <bold><given-names>
Ria Novosti</given-names>. (<year>2020</year>)</bold> 
‘<article-title>Shoigu Spoke About the Tasks of the Information Operations Troops</article-title>’, 
<italic><source>РИА Новости [Ria Novosti]</source></italic>, 3 March 2020 [Online]. Available at: 
<ext-link xlink:href="https://ria.ru/20170222/1488617708.html">
https://ria.ru/20170222/1488617708.html</ext-link> (Accessed: 21 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_055">
 <mixed-citation publication-type="journal">
  <bold><surname>
Richelson</surname>, <given-names>Jeffery T.</given-names> (<year>1997</year>)</bold> 
<italic><source>A Century of Spies: Intelligence in the Twentieth Century</source></italic>. 
<publisher-name>Oxford University Press</publisher-name>, [Online]. Available at: 
<ext-link xlink:href="https://www.amazon.com/Russian-Espionage-History-Soviet-Spying/dp/1480131725">
https://www.amazon.com/Russian-Espionage-History-Soviet-Spying/dp/1480131725</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_056">
 <mixed-citation publication-type="journal">
  <bold><surname>
Sharma</surname>, <given-names>Yojana</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Confucius Institutes Reappear under New Names – Report</article-title>’, 
<italic><source>University World News</source></italic>, 30 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.universityworldnews.com/post.php?story=20220630152610783">
https://www.universityworldnews.com/post.php?story=20220630152610783</ext-link>. (Accessed: 15 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_057">
 <mixed-citation publication-type="journal">
  <bold><surname>
Siddiqui</surname>, <given-names>Zeba</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russian Cyber Spies Attack Ukraine's Allies, Microsoft Says</article-title>’, 
<italic><source>Thomson Reuters</source></italic>, 22 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.reuters.com/world/russian-hacking-groups-step-up-cyber-espionage-ukraine-allies-microsoft-says-2022-06-22/">
https://www.reuters.com/world/russian-hacking-groups-step-up-cyber-espionage-ukraine-allies-microsoft-says-2022-06-22/</ext-link> (Accessed: 28 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_058">
 <mixed-citation publication-type="journal">
  <bold><surname>
Sly</surname>, <given-names>Liz</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russia Will Soon Exhaust Its Combat Capabilities, Western Assessments Predict</article-title>’, 
<italic><source>The Washington Post</source></italic>, 26 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.washingtonpost.com/world/2022/06/25/ukraine-russia-balance-of-forces/">
https://www.washingtonpost.com/world/2022/06/25/ukraine-russia-balance-of-forces/</ext-link> (Accessed: 25 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_059">
 <mixed-citation publication-type="journal">
  <bold><surname>
Starr</surname>, <given-names>Barbara</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Top US General Orders Comprehensive Review of US-China Military Interactions</article-title>’, 
<italic><source>CNN Pentagon Correspondent</source></italic>, 19 July 2022 [Online]. Available at: 
<ext-link xlink:href="https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2022/07/18/politics/milley-china-military-review/index.html">
https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2022/07/18/politics/milley-china-military-review/index.html</ext-link> (Accessed: 20 July 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_060">
 <mixed-citation publication-type="journal">
  <bold><surname>
Tessari</surname>, <given-names>Paola</given-names> &#38; <surname>Muti</surname>, <given-names>Karolina</given-names>. 
(<year>2021</year>)</bold> 
‘<article-title>Strategic or Critical Infrastructures, a Way to Interfere in Europe: State of Play and Recommendations</article-title>’, 
<italic><source>European Parliament, INGE Committee</source></italic>, pp. 29-30 [Online]. Available: 
<ext-link xlink:href="https://www.europarl.europa.eu/RegData/etudes/STUD/2021/653637/EXPO_STU(2021)653637_EN.pdf">
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/653637/EXPO_STU(2021)653637_EN.pdf</ext-link> (Accessed: 21 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_061">
 <mixed-citation publication-type="journal">
  <bold><given-names>
The Wassenaar Agreement</given-names>. (<year>2022</year>)</bold> 
‘<article-title>The Wassenaar Arrangement</article-title>’, Available at: 
<ext-link xlink:href="https://www.wassenaar.org/about-us/">
https://www.wassenaar.org/about-us/</ext-link> (Accessed: 21 June 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_062">
 <mixed-citation publication-type="journal">
  <bold><given-names>
The Economist</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russia's Army Is in a Woeful State</article-title>’, 
<italic><source>The Economist Newspaper</source></italic>, 30 April 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.economist.com/briefing/how-deep-does-the-rot-in-the-russian-army-go/21808989">
https://www.economist.com/briefing/how-deep-does-the-rot-in-the-russian-army-go/21808989</ext-link> (Accessed: 15 June 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_063">
 <mixed-citation publication-type="journal">
  <bold><given-names>
The Economist</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russian Spooks Are Being Kicked out of Europe En-masse</article-title>’,
 <italic><source>The Economist</source></italic>, 7 April 2022 [Online]. Available at: 
 <ext-link xlink:href="https://www.economist.com/europe/2022/04/07/russian-spooks-are-being-kicked-out-of-europe-en-masse">
 https://www.economist.com/europe/2022/04/07/russian-spooks-are-being-kicked-out-of-europe-en-masse</ext-link> (Accessed: 15 April 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_064">
 <mixed-citation publication-type="journal">
  <bold><given-names>
The Guardian</given-names>. (<year>2022</year>)</bold> 
‘<article-title>FBI and MI5 Leaders Give Unprecedented Joint Warning on Chinese Spying</article-title>’, 
<italic><source>The Guardian</source></italic>, 7 July 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.theguardian.com/world/2022/jul/06/fbi-mi5-china-spying-cyberattacks-business-economy">
https://www.theguardian.com/world/2022/jul/06/fbi-mi5-china-spying-cyberattacks-business-economy</ext-link> (Accessed: 26 August 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_065">
 <mixed-citation publication-type="journal">
  <bold><given-names>
The White House</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Fact Sheet: United States, G7 and Eu Impose Severe and Immediate Costs on Russia</article-title>’, 
<italic><source>The White House</source></italic>, 6 April 2022. Available at: 
<ext-link xlink:href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/04/06/fact-sheet-united-states-g7-and-eu-impose-severe-and-immediate-costs-on-russia/">
https://www.whitehouse.gov/briefing-room/statements-releases/2022/04/06/fact-sheet-united-states-g7-and-eu-impose-severe-and-immediate-costs-on-russia/</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_066">
 <mixed-citation publication-type="journal">
  <bold><given-names>
US Federal Bureau of Investigation</given-names>. (<year>2020</year>)</bold> 
‘<article-title>The China Threat</article-title>’, 
<italic><source>FBI</source></italic>, 10 July 2020 [Online]. Available at: 
<ext-link xlink:href="https://www.fbi.gov/investigate/counterintelligence/the-china-threat">
https://www.fbi.gov/investigate/counterintelligence/the-china-threat</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_067">
 <mixed-citation publication-type="journal">
  <bold><surname>
Volz</surname>, <given-names>Dustin</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Russia Increased Cyber Espionage against Countries Supporting Ukraine, Microsoft Says</article-title>’, 
<italic><source>The Wall Street Journal</source></italic>, 23 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.wsj.com/articles/russia-increased-cyber-espionage-against-countries-supporting-ukraine-microsoft-says-11655910000">
https://www.wsj.com/articles/russia-increased-cyber-espionage-against-countries-supporting-ukraine-microsoft-says-11655910000</ext-link> (Accessed: 29 June 2022). 
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_068">
 <mixed-citation publication-type="journal">
  <bold><surname>
Westfall</surname>, <given-names>Sammy</given-names> &#38; <surname>Simon</surname>, <given-names>Maite Fernández</given-names>. 
(2022)</bold> ‘<article-title>Which countries have expelled Russian diplomats over Ukraine?</article-title>' 
<italic><source>The Washington Post</source></italic>, 30 March 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.washingtonpost.com/world/2022/03/30/diplomat-expulsion-russian-embassy-expel/">
https://www.washingtonpost.com/world/2022/03/30/diplomat-expulsion-russian-embassy-expel/</ext-link> (Accessed: 20 August 2022)
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_069">
 <mixed-citation publication-type="journal">
  <bold><given-names>
WION News</given-names>. (<year>2022</year>)</bold> ‘<article-title>Warzone Decoded: How Ukraine Has Fractured Russia's Feared T-90 Tank</article-title>’, 
<italic><source>WION</source></italic>, 8 May 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.wionews.com/photos/warzone-decoded-how-ukraine-has-fractured-russias-feared-t-90-tank-477346">
https://www.wionews.com/photos/warzone-decoded-how-ukraine-has-fractured-russias-feared-t-90-tank-477346</ext-link> (Accessed: 30 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_070">
 <mixed-citation publication-type="journal">
  <bold><given-names>
World Intellectual Property Organisation</given-names>. (n.d.)</bold> 
‘<article-title>Summary of the Hague Agreement Concerning the International Registration of Industrial Designs (1925)</article-title>’, 
<italic><source>World Intellectual Property Organisation</source></italic> [Online]. Available at: 
<ext-link xlink:href="https://www.wipo.int/treaties/en/registration/hague/summary_hague.html">
https://www.wipo.int/treaties/en/registration/hague/summary_hague.html</ext-link> (Accessed: 25 August 2022).  
</mixed-citation></ref>

<ref id="j_jobs-2023-002_ref_071">
 <mixed-citation publication-type="journal">
  <bold><given-names>
World Intellectual Property Organisation</given-names>. (<year>2022</year>)</bold> 
‘<article-title>The Hague Notification No. 146 Hague Agreement Concerning the International Registration of Industrial 
Designs Geneva Act of the Hague Agreement Concerning the International Registration of Industrial Designs Accession 
by the People's Republic of China</article-title>’, 
<italic><source>World Intellectual Property Organisation</source></italic> [Online]. Available at: 
<ext-link xlink:href="https://www.wipo.int/treaties/en/notifications/hague/treaty_hague_146.html">
https://www.wipo.int/treaties/en/notifications/hague/treaty_hague_146.html</ext-link> (Accessed: 25 August 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_072">
 <mixed-citation publication-type="journal">
  <bold><surname>
Yang</surname>, <given-names>Lin</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Controversial Confucius Institutes Returning to U.S. Schools under New Name</article-title>’, 
<italic><source>VOA</source></italic>, 28 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://www.voanews.com/a/controversial-confucius-institutes-returning-to-u-s-schools-under-new-name/6635906.html">
https://www.voanews.com/a/controversial-confucius-institutes-returning-to-u-s-schools-under-new-name/6635906.html</ext-link> (Accessed: 29 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_073">
 <mixed-citation publication-type="journal">
  <bold><given-names>
Yle News</given-names>. (<year>2018</year>)</bold> 
‘<article-title>Monday's Papers: A Closer Look at Airiston Helmi’s Land Grab and Speeding Penalty Changes</article-title>’, 
<italic><source>Yle News</source></italic>, 24 September 2018 [Online]. Available at: 
<ext-link xlink:href="https://yle.fi/news/3-10419525">
https://yle.fi/news/3-10419525 </ext-link> (Accessed: 23 June 2022).
</mixed-citation></ref>


<ref id="j_jobs-2023-002_ref_074">
 <mixed-citation publication-type="journal">
  <bold><given-names>
Yle News</given-names>. (<year>2022</year>)</bold> 
‘<article-title>Helsinki University Closes China-Funded Confucius Institute</article-title>’, 
<italic><source>Yle News</source></italic>, 18 June 2022 [Online]. Available at: 
<ext-link xlink:href="https://yle.fi/news/3-12500430">https://yle.fi/news/3-12500430</ext-link> (Accessed: 20 June 2022).
</mixed-citation></ref>

</ref-list>

</back>


</article>
