Connect with us
[bsa_pro_ad_space id=12]

espionage

Ex-NYPD Cop Jailed in Beijing’s Transnational Repatriation Plot, Canada Remains Soft Target

Published

12 minute read

Sam Cooper's avatar Sam Cooper

A former NYPD sergeant was sentenced to 18 months in prison this week for his role in a shadowy Chinese government operation that sought to coerce a political exile in New Jersey to return to the mainland. The conviction of Michael McMahon marks the first successful prosecution of a current or former American law enforcement officer accused of profiting from Beijing’s covert repatriation campaign, known as Operation Fox Hunt—a global manhunt that has ensnared operatives from Vancouver and Toronto to Los Angeles.

McMahon, 57, was convicted alongside two Chinese-American co-conspirators, Zhu Yong and Congying Zheng, who were previously sentenced to 24 and 16 months in prison, respectively. The trio was found guilty of interstate stalking and acting as unregistered agents of the People’s Republic of China, after a federal jury heard how they aided Beijing’s secret police—using Chinese businessmen and hired thugs based in the Tri-State area and California—to track and psychologically terrorize their target: a former Wuhan official named Xu Jin.

While McMahon’s sentencing concludes one legal chapter, The Bureau’s investigation into court records and national security sources reveals a far broader and ongoing web of espionage, coercion, and transnational repression—directed by senior Chinese Communist Party officials and bolstered by diaspora operatives and criminal proxies across North America.

McMahon and his family have fiercely denied his culpability as a tool of China’s secret police, insisting he was an unwitting pawn in a clandestine war that U.S. authorities failed to warn domestic citizens—including former law enforcement officers—about.

In private messages to The Bureau, following months of in-depth reporting into sealed court documents, McMahon’s wife, Martha Byrne, emphasized their belief that he had done nothing wrong.

“My husband, Michael McMahon, committed no crime,” she wrote. “There’s plenty of media to expose this grave injustice on my family.” She added a stark warning directed at law enforcement and intelligence communities: “It’s extremely important you use your platform to warn private investigators and local law enforcement of these patterns. Our government did nothing to warn us, and they knew my husband was being used. They knew since as early as 2015/16 these Chinese actors were using PIs. They put our family in danger and in turn the security of the entire country.”

But the sentencing judge in Brooklyn emphasized McMahon’s witting participation—and the fact that he profited from the scheme.

The case centered on Xu Jin, a former municipal official from Wuhan who fled China with his wife in 2010, seeking refuge in the United States. By 2015, his face appeared on a China Daily “most wanted” list—alongside dozens of Canada-based targets—part of Beijing’s sweeping Fox Hunt campaign to repatriate ex-officials accused of corruption, dissidents, and political rivals of President Xi Jinping. While Chinese authorities accused Xu of accepting bribes, he maintained he was not a criminal but a political target caught in a purge masked as anti-graft enforcement.

By 2017, the Chinese Ministry of Public Security escalated its efforts, dispatching emissaries, threatening Xu’s relatives in China, and launching a North American rendition operation. That’s when Zhu Yong, a 66-year-old Chinese national living in New York, hired McMahon—then working as a private investigator—to locate Xu.

Tapping law enforcement databases and traditional surveillance tactics, McMahon began tracking Xu and his family. The key break came in April 2017, when Xu’s elderly father—who had recently suffered a brain hemorrhage—was flown to the U.S. by the PRC, accompanied by a government doctor. His role: deliver a threatening message in person to his son. If Xu refused to return to China, his family would suffer the consequences.

These same tactics have been deployed in Canada, according to a January 2022 “Special Report” by the Privy Council Office on Chinese Fox Hunt operations, obtained by The Bureau.

McMahon surveilled the father’s arrival at a New Jersey home, then followed him to Xu Jin’s residence. Within days, the Chinese team had the address they needed.

Soon after, Congying Zheng and another associate showed up at Xu’s front door. They pounded on it, peered through the windows, and left a note that read: “If you are willing to go back to the mainland and spend 10 years in prison, your wife and children will be all right. That’s the end of this matter!”

By that point, McMahon’s role had deepened. Text messages recovered by federal investigators confirmed that he understood the objective of the operation. In one exchange with another investigator he had contracted, McMahon acknowledged that the goal was to repatriate the target to China “so they could prosecute him.”

After providing the address of Xu Jin, McMahon told his surveillance partner that he was “waiting for a call” to determine next steps. The partner replied, “Yeah. From NJ State Police about an abduction,” to which McMahon responded: “Lol.”

He later suggested further intimidation tactics to a Chinese co-conspirator, advising: “Park outside his home and let him know we are there.” According to prosecutors, McMahon also conducted background research on the victim’s daughter, including details about her university residence and academic major.

In total, McMahon was paid over $19,000 for his role in the PRC-directed operation. To obscure the origin of the funds, he deposited the payments into his son’s bank account—an arrangement prosecutors noted he had never used with any other client.

Court filings in the case traced troubling connections northward—to Canada—where suspects linked to Fujian-based organized crime networks, long known to Canadian police and senior elected officials, have been under investigation since at least 2022. Yet despite mounting intelligence, no charges have been laid.

The same Interpol “red notice” that named Xu also listed Chinese nationals living in Canada. According to Canadian law enforcement sources who spoke to The Bureau, multiple individuals now targeted by Fox Hunt reside in Vancouver and Toronto—cities with large mainland Chinese communities and a documented history of interference concerns.

“In Canada, we just knock on doors and talk to people,” one RCMP officer told The Bureau. “In the U.S., they go in and make arrests.” The officer pointed to a critical gap in Canadian law: the absence of a foreign agent registry—one of the FBI’s key legal tools in dismantling Fox Hunt cells on U.S. soil.

Beyond McMahon and Zhu Yong, the FBI investigation revealed a sprawling web of operatives functioning as “cutouts”—deniable intermediaries who provide a buffer between Chinese intelligence and the dirty work of coercion.

Even as the New Jersey operation began to falter—after Xu’s ailing father reportedly resisted efforts to pressure his son and Chinese operatives grew wary of U.S. law enforcement closing in—officials in Beijing leveraged McMahon’s surveillance to identify a new target: Xu’s daughter, a university student in Northern California. A second Fox Hunt pressure campaign was soon launched.

In California, the Ministry of Public Security dispatched Rong Jing—a PRC national and permanent U.S. resident—who had operated with apparent impunity across the U.S. as a bounty hunter for Beijing’s global rendition program.

This time, Rong sought to hire a new American private investigator.

On May 22, 2017, Rong met with the PI at a restaurant in Los Angeles. He didn’t know the man was an undercover FBI informant—and agreed to let their four-hour conversation be recorded.

When Rong proposed video surveillance on Xu’s daughter, the informant began to ask probing questions. Rong opened up—not only about the mission, but about the entire Fox Hunt apparatus behind it.

Asked how payment would be arranged, Rong said it would depend on what the PRC decided to do once the daughter was located. “Say, if the next step somebody asks me to catch [Xu’s] daughter,” he speculated. “When we get there, they wouldn’t feel comfortable to arrest her… So we need to be there on their behalf.”

According to Rong, successful Fox Hunt collaborators could submit for reward money—paid out inside China and split with U.S.-based operatives. The funds, he said, were controlled by Party officials, with the Communist Party overseeing all payments.

Rong contrasted his own freelance status with another class of agents—PRC “lobbyists” sent abroad as salaried civil servants. These operatives, he said, traveled under false names and work visas, sometimes posing as academics or trade representatives. Their job was to persuade overseas Chinese to return “voluntarily.”

“These lobbyists explain the advantages of returning to the PRC,” Rong said, euphemistically.

And then he pointed north.

Rong told the informant he had personally met one such PRC lobbyist in Canada. Though he did not name the individual, he described the tactic: use false identities, operate under official cover, and insulate the PRC government from any legal risk.

As the conversation turned back to Xu’s daughter, the informant asked the most pressing question: would she be safe?

“If there was an accident,” Rong replied, “in truth, you could claim that you were just investigating her.”

The Bureau is a reader-supported publication.

To receive new posts and support my work, consider becoming a free or paid subscriber.

Invite your friends and earn rewards

If you enjoy The Bureau, share it with your friends and earn rewards when they subscribe.

Invite Friends

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

Business

Canada invests $34 million in Chinese drones now considered to be ‘high security risks’

Published on

From LifeSiteNews

By Anthony Murdoch

Of the Royal Canadian Mounted Police’s fleet of 1,200 drones, 79% pose national security risks due to them being made in China

Canada’s top police force spent millions on now near-useless and compromised security drones, all because they were made in China, a nation firmly controlled by the Communist Chinese Party (CCP) government.

An internal report by the Royal Canadian Mounted Police (RCMP) to Canada’s Senate national security committee revealed that $34 million in taxpayer money was spent on a fleet of 973 Chinese-made drones.

Replacement drones are more than twice the cost of the Chinese-made ones between $31,000 and $35,000 per unit. In total, the RCMP has about 1,228 drones, meaning that 79 percent of its drone fleet poses national security risks due to them being made in China.

The RCMP said that Chinese suppliers are “currently identified as high security risks primarily due to their country of origin, data handling practices, supply chain integrity and potential vulnerability.”

In 2023, the RCMP put out a directive that restricted the use of the made-in-China drones, putting them on duty for “non-sensitive operations” only, however, with added extra steps for “offline data storage and processing.”

The report noted that the “Drones identified as having a high security risk are prohibited from use in emergency response team activities involving sensitive tactics or protected locations, VIP protective policing operations, or border integrity operations or investigations conducted in collaboration with U.S. federal agencies.”

The RCMP earlier this year said it was increasing its use of drones for border security.

Senator Claude Carignan had questioned the RCMP about what kind of precautions it uses in contract procurement.

“Can you reassure us about how national security considerations are taken into account in procurement, especially since tens of billions of dollars have been announced for procurement?” he asked.

The use of the drones by Canada’s top police force is puzzling, considering it has previously raised awareness of Communist Chinese interference in Canada.

Indeed, as reported by LifeSiteNews, earlier in the year, an RCMP internal briefing note warned that agents of the CCP are targeting Canadian universities to intimidate them and, in some instances, challenge them on their “political positions.”

The final report from the Foreign Interference Commission concluded that operatives from China may have helped elect a handful of MPs in both the 2019 and 2021 Canadian federal elections. It also concluded that China was the primary foreign interference threat to Canada.

Chinese influence in Canadian politics is unsurprising for many, especially given former Prime Minister Justin Trudeau’s past  admiration for China’s “basic dictatorship.”

As reported by LifeSiteNews, a Canadian senator appointed by Trudeau told Chinese officials directly that their nation is a “partner, not a rival.”

China has been accused of direct election meddling in Canada, as reported by LifeSiteNews.

As reported by LifeSiteNews, an exposé by investigative journalist Sam Cooper claims there is compelling evidence that Carney and Trudeau are strongly influenced by an “elite network” of foreign actors, including those with ties to China and the World Economic Forum. Despite Carney’s later claims that China poses a threat to Canada, he said in 2016 the Communist Chinese regime’s “perspective” on things is “one of its many strengths.”

Continue Reading

espionage

Western Campuses Help Build China’s Digital Dragnet With U.S. Tax Funds, Study Warns

Published on

Sam Cooper's avatar Sam Cooper

Shared Labs, Shared Harm names MIT, Oxford and McGill among universities working with Beijing-backed AI institutes linked to Uyghur repression and China’s security services.

Over the past five years, some of the world’s most technologically advanced campuses in the United States, Canada and the United Kingdom — including MIT, Oxford and McGill — have relied on taxpayer funding while collaborating with artificial-intelligence labs embedded in Beijing’s security state, including one tied to China’s mass detention of Uyghurs and to the Ministry of Public Security, which has been accused of targeting Chinese dissidents abroad.

That is the core finding of Shared Labs, Shared Harm, a new report from New York–based risk firm Strategy Risks and the Human Rights Foundation. After reviewing tens of thousands of scientific papers and grant records, the authors conclude that Western public funds have repeatedly underwritten joint work between elite universities and two Chinese “state-priority” laboratories whose technologies drive China’s domestic surveillance machinery — an apparatus that, a recent U.S. Congressional threat assessment warns, is increasingly being turned outward against critics in democratic states.

The key Chinese collaborators profiled in the study are closely intertwined with China’s security services. One of the two featured labs is led by a senior scientist from China Electronics Technology Group Corporation (CETC), the sanctioned conglomerate behind the platform used to flag and detain Uyghurs in Xinjiang; the other has hosted “AI + public security” exchanges with the Ministry of Public Security’s Third Research Institute, the bureau responsible for technical surveillance and digital forensics.

The report’s message is blunt: even as governments scramble to stop technology transfer on the hardware side, open academic science has quietly been supplying Chinese security organs with new tools to track bodies, faces and movements at scale.

It lands just as Washington and its allies move to tighten controls on advanced chips and AI exports to China. In the Netherlands’ Nexperia case, the Dutch government invoked a rarely used Cold War–era emergency law this fall to take temporary control of a Chinese-owned chipmaker and block key production from being shifted to China — prompting a furious response from Beijing, and supply shocks that rippled through European automakers.

“The Chinese Communist Party uses security and national security frameworks as tools for control, censorship, and suppressing dissenting views, transforming technical systems into instruments of repression,” the report says. “Western institutions lend credibility, knowledge, and resources to Chinese laboratories supporting the country’s surveillance and defense ecosystem. Without safeguards … publicly funded research will continue to support organizations that contribute to repression in China.”

Cameras and Drones

The Strategy Risks team focuses on two state-backed institutes: Zhejiang Lab, a vast AI and high-performance computing campus founded by the Zhejiang provincial government with Alibaba and Zhejiang University, and the Shanghai Artificial Intelligence Research Institute (SAIRI), now led by a senior CETC scientist. CETC designed the Integrated Joint Operations Platform, or IJOP — the data system that hoovered up phone records, biometric profiles and checkpoint scans to flag “suspicious” people in Xinjiang.

United Nations investigators and several Western governments have concluded that IJOP and related systems supported mass surveillance, detention and forced-labor campaigns against Uyghurs that amount to crimes against humanity.

Against that backdrop, the scale of Western collaboration is striking.

Since 2020, Zhejiang Lab and SAIRI have published more than 11,000 papers; roughly 3,000 of those had foreign co-authors, many from the United States, United Kingdom, and Canada. About 20 universities are identified as core collaborators, including MIT, Stanford, Harvard, Princeton, Carnegie Mellon, Johns Hopkins, UC Berkeley, Oxford, University College London — and Canadian institutions such as McGill University — along with a cluster of leading European technical universities.

Among the major U.S. public funders acknowledged in these joint papers are the National Science Foundation (NSF), the National Institutes of Health (NIH), the Office of Naval Research (ONR), the Defense Advanced Research Projects Agency (DARPA) and the Department of Transportation. For North America, the warning is twofold: U.S. and Canadian universities are far more entangled with China’s security-linked AI labs than most policymakers grasp — and existing “trusted research” frameworks, built around IP theft, are almost blind to the human-rights risk.

In one flagship example, Zhejiang Lab collaborated with MIT on advanced optical phase-shifting — a field central to high-resolution imaging systems used in satellite surveillance, remote sensing and biometric scanning. The paper cited support from a DARPA program, meaning U.S. defense research dollars effectively underwrote joint work with a Chinese lab that partners closely with military universities and the CETC conglomerate behind Xinjiang’s IJOP system.

Carnegie Mellon projects with Zhejiang Lab focused on multi-object tracking and acknowledged funding from the National Science Foundation and the U.S. Office of Naval Research. Multi-object tracking is a backbone technology for modern surveillance — allowing cameras and drones to follow multiple people or vehicles across crowds and city blocks. “In the Chinese context,” the report notes, such capabilities map naturally onto “public security applications such as protest monitoring,” even when the academic papers present them as neutral advances in computer vision.

The report also highlights Zhejiang Lab’s role as an international partner in CAMERA 2.0, a £13-million U.K. initiative on motion capture, gait recognition and “smart cities” anchored at the University of Bath, and its leadership in BioBit, a synthetic-biology and imaging program whose advisory board includes University College London, McGill University, the University of Glasgow and other Western campuses.

Meanwhile, SAIRI has quietly become a hub for AI that blurs public-security, military and commercial lines.

Established in 2018 and run since 2020 by CETC academician Lu Jun — a designer of China’s KJ-2000 airborne early-warning aircraft and a veteran of command-and-control systems — SAIRI specializes in pose estimation, tracking and large-scale imaging.

Under Lu, the institute has deepened ties with firms already sanctioned by Washington for their roles in Xinjiang surveillance. In 2024 it signed cooperation agreements with voice-recognition giant iFlytek and facial-recognition champion SenseTime, as well as CloudWalk and Intellifusion, which market “smart city” policing platforms.

SAIRI also hosted an “AI + public security” exchange with the Ministry of Public Security’s Third Research Institute — the bureau responsible for technical surveillance and digital forensics — and co-developed what Chinese media billed as the country’s first AI-assisted shooting training system. That platform, nominally built for sports, was overseen by a Shanghai government commission that steers AI into defense and public-security applications, raising the prospect of its use in paramilitary or police training.

Outside the lab, MPS officers have been charged in the United States with running online harassment and intimidation schemes targeting Chinese dissidents, and MPS-linked “overseas police service stations” in North America and Europe have been investigated for pressuring exiles and critics to return to China.

Meanwhile, Radio-Canada, drawing on digital records first disclosed to Australian media in 2024 by an alleged Chinese spy, has reported new evidence suggesting that a Chinese dissident who died in a mysterious kayaking accident near Vancouver was being targeted for elimination by MPS officers and agents embedded in a Chinese conglomerate that the U.S. Treasury accuses of running a money-laundering and modern-slavery empire out of Cambodia.

The new reporting focuses on a former undercover agent for Office No. 1 of China’s Ministry of Public Security — the police ministry at the core of so-called “CCP police stations” in global and Canadian cities, and reportedly tasked with hunting dissidents abroad.

Taken together, cases of alleged Chinese “police station” networks operating globally, new U.S. Congressional reports on worldwide threats from the Chinese Communist Party, and the warnings in Shared Labs, Shared Harm suggest that Western universities are not only helping to build China’s domestic repression apparatus with U.S. taxpayer funds, but may also be contributing to global surveillance tools that can be paired with Beijing’s operatives abroad.

To counter this trend, the paper urges a reset in research governance: broaden due diligence to weigh human-rights risk, mandate transparency over all international co-authorships and joint labs, condition partnerships with security-linked institutions on strict safeguards and narrow scopes of work, and strengthen university ethics bodies so they take responsibility for cross-border collaborations.

The Bureau is a reader-supported publication.

To receive new posts and support my work, consider becoming a free or paid subscriber.

Continue Reading

Trending

X