Connect with us

espionage

CSIS warned Health Canada of “insider threat” from Wuhan Institute-tied scientist Dr. Qiu Seven Months Before Lethal Ebola Shipped to China

Published

9 minute read

Sam Cooper 

@samthebureau

In an explosive admission, Parliament’s Canada-China Committee has confirmed that Canada’s spy agency, CSIS, issued a direct and unheeded warning to senior health officials in August 2018, raising concerns about “insider threat activities” linked to Dr. Xiangguo Qiu and her husband, Keding Cheng.

This alert, delivered seven months before the couple’s network—with connections to the highest levels of Chinese biological weapons research—coordinated the shipment of live Ebola and Henipah virus samples from Canada’s high-security National Microbiology Laboratory (NML) to the Wuhan Institute of Virology (WIV), highlighted risks posed by their continued access to sensitive materials.

“CSIS held a briefing for personnel responsible for security at [Public Health Canada],” in August 2018 that “focused on foreign interference and included possible indicators of insider threat activities, as well as other security risks,” according to CSIS’s submission to the Committee. In CSIS’s presentation, “student programs were identified as being one of these possible threat vectors,” prompting “[Public Health Canada] to flag two scientists to CSIS, Dr. Cheng and Dr. Qiu,” the Committee report, released Tuesday, states.

Despite these explicit warnings, no immediate restrictions were placed on Qiu, Cheng, or their Chinese students’ access to Canada’s sensitive research materials. In December 2018, Public Health Canada authorized a fact-finding investigation into the concerns, but the delayed response effectively allowed them to continue their operations, further endangering Canada’s security.

Please support this important journalism.

Consider becoming a free or paid subscriber of The Bureau.

The Committee report also finds—like the ongoing Hogue Commission—that Justin Trudeau’s government, including senior bureaucrats and ministers, showed a reluctance to act on or even acknowledge urgent alerts from CSIS, exposing a stark divide between CSIS’s view of Chinese threats and Trudeau’s.

Dr. Qiu’s associations with China’s military and scientific programs had deep roots. She began her work at the Winnipeg NML in 2003, followed by her husband’s employment there in 2006.

As early as 2013, Keding Cheng filled out an application for the PRC’s “Science and Technology Innovation Talent Program of Henan Province,” requiring applicants to “passionately love the socialist motherland [PRC]” and maintain Chinese citizenship.

By 2016, Dr. Qiu was nominated for an award by a senior military official from the Chinese Academy of Military Medical Sciences, recognizing her collaborations with Major-General Chen Wei, a leading figure in China’s biological weapons research. CSIS investigations revealed that Dr. Qiu and Major-General Chen collaborated on multiple research projects dating back to 2012.

Dr. Qiu’s use of Canada’s facilities to benefit China was well recognized in Beijing. An award nomination for Dr. Qiu noted that she “used Canada’s Level 4 Biosecurity Laboratory as a base to assist China to improve its capability to fight highly pathogenic pathogens … and achieved brilliant results.”

In October 2016, Dr. Qiu co-authored a paper with Major-General Chen and other scientists affiliated with the Chinese Academy of Military Medical Sciences, further deepening her connection to Chinese military research. By this time, Qiu had also been recruited into China’s Thousand Talents Program—a PRC initiative aimed at harnessing international scientific expertise—and these affiliations, conspicuously absent from her Canadian curriculum vitae, made her a person of interest to CSIS, especially as her work increasingly intersected with China’s biosecurity research.

Concerns over Qiu and Cheng’s activities continued to mount at the NML. In October 2018, Cheng, accompanied by a restricted visitor, attempted to exit the lab with two Styrofoam containers, claiming they were empty. By January 2019, Cheng breached security again by using another employee’s passcode to enter the NML.

On March 23, 2019, Public Health Canada received its fact-finding report, which advised administrative investigations into Qiu and Cheng. Yet, only days later, on March 31, live samples of Ebola and Henipah viruses were shipped from the NML to the WIV, highlighting critical lapses in Canada’s security protocols.

In response to these revelations, the Committee’s report outlines recommendations to safeguard Canada’s scientific resources from similar threats in the future. Chief among these is a call for the Government of Canada to immediately terminate all research collaboration with PRC-affiliated entities in sensitive fields, such as artificial intelligence, aerospace, and advanced digital infrastructure.

A key recommendation is to designate the Wuhan Institute of Virology and the Thousand Talents Program as Named Research Organizations under Public Safety Canada, subjecting them to enhanced scrutiny and restricted partnerships due to their potential security risks. Furthermore, the Committee suggests that Canada explore constitutionally compliant legal measures to prevent individuals under national security investigation from leaving the country. Despite RCMP investigations, the couple was able to leave Canada.

As investigations mounted, irregularities in the WIV shipment were noticed, and it was only in January 2021 that Public Health Canada terminated the couple’s employment. Nathalie Drouin, Deputy Clerk of the Privy Council, acknowledged with evident understatement, “it is a timeline that needs to be looked at.” However, Richard Fadden, the director of CSIS from 2009 to 2013, testified that the timeline “was too long” and the viral shipment to WIV “should not have happened.”

In his opinion, the incident at the Winnipeg NML revealed a deep cultural issue long present in Canada’s federal administration. “I don’t think the culture in this particular lab and in large parts of the public service had caught up with the change in facts as we understand China,” Fadden said. His comments emphasize a notable gap between CSIS’s understanding of the Chinese threat and that of Trudeau’s administration.

“This gap in the understanding of risk between national security and science sectors at the federal level, particularly with regard to the threat to Canadian interests posed by actions of the Chinese Communist Party (CCP), was illustrated in testimony before the Special Committee,” the report says.

On one hand, Minister of Health Mark Holland noted that “countries such as China are implicating themselves in our domestic processes in a way that would have been unimaginable just five years ago” and are “potentially willing, in this instance, to use pathogens that threaten humanity in order to advance their geopolitical agenda.” But Fadden pointed out that “CSIS was already aware of concerns about the PRC’s actions,” noting that since Xi Jinping’s rise to power in 2013, the institutionalization of espionage and interference techniques by the CCP has intensified.

Adding to these concerns is the Trudeau government’s controversial denial of access to related records, noted by the report, raising questions of transparency and whether there may have been a cover-up of key details surrounding the case.

The Bureau is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

Business

Canada invests $34 million in Chinese drones now considered to be ‘high security risks’

Published on

From LifeSiteNews

By Anthony Murdoch

Of the Royal Canadian Mounted Police’s fleet of 1,200 drones, 79% pose national security risks due to them being made in China

Canada’s top police force spent millions on now near-useless and compromised security drones, all because they were made in China, a nation firmly controlled by the Communist Chinese Party (CCP) government.

An internal report by the Royal Canadian Mounted Police (RCMP) to Canada’s Senate national security committee revealed that $34 million in taxpayer money was spent on a fleet of 973 Chinese-made drones.

Replacement drones are more than twice the cost of the Chinese-made ones between $31,000 and $35,000 per unit. In total, the RCMP has about 1,228 drones, meaning that 79 percent of its drone fleet poses national security risks due to them being made in China.

The RCMP said that Chinese suppliers are “currently identified as high security risks primarily due to their country of origin, data handling practices, supply chain integrity and potential vulnerability.”

In 2023, the RCMP put out a directive that restricted the use of the made-in-China drones, putting them on duty for “non-sensitive operations” only, however, with added extra steps for “offline data storage and processing.”

The report noted that the “Drones identified as having a high security risk are prohibited from use in emergency response team activities involving sensitive tactics or protected locations, VIP protective policing operations, or border integrity operations or investigations conducted in collaboration with U.S. federal agencies.”

The RCMP earlier this year said it was increasing its use of drones for border security.

Senator Claude Carignan had questioned the RCMP about what kind of precautions it uses in contract procurement.

“Can you reassure us about how national security considerations are taken into account in procurement, especially since tens of billions of dollars have been announced for procurement?” he asked.

The use of the drones by Canada’s top police force is puzzling, considering it has previously raised awareness of Communist Chinese interference in Canada.

Indeed, as reported by LifeSiteNews, earlier in the year, an RCMP internal briefing note warned that agents of the CCP are targeting Canadian universities to intimidate them and, in some instances, challenge them on their “political positions.”

The final report from the Foreign Interference Commission concluded that operatives from China may have helped elect a handful of MPs in both the 2019 and 2021 Canadian federal elections. It also concluded that China was the primary foreign interference threat to Canada.

Chinese influence in Canadian politics is unsurprising for many, especially given former Prime Minister Justin Trudeau’s past  admiration for China’s “basic dictatorship.”

As reported by LifeSiteNews, a Canadian senator appointed by Trudeau told Chinese officials directly that their nation is a “partner, not a rival.”

China has been accused of direct election meddling in Canada, as reported by LifeSiteNews.

As reported by LifeSiteNews, an exposé by investigative journalist Sam Cooper claims there is compelling evidence that Carney and Trudeau are strongly influenced by an “elite network” of foreign actors, including those with ties to China and the World Economic Forum. Despite Carney’s later claims that China poses a threat to Canada, he said in 2016 the Communist Chinese regime’s “perspective” on things is “one of its many strengths.”

Continue Reading

espionage

Western Campuses Help Build China’s Digital Dragnet With U.S. Tax Funds, Study Warns

Published on

Sam Cooper's avatar Sam Cooper

Shared Labs, Shared Harm names MIT, Oxford and McGill among universities working with Beijing-backed AI institutes linked to Uyghur repression and China’s security services.

Over the past five years, some of the world’s most technologically advanced campuses in the United States, Canada and the United Kingdom — including MIT, Oxford and McGill — have relied on taxpayer funding while collaborating with artificial-intelligence labs embedded in Beijing’s security state, including one tied to China’s mass detention of Uyghurs and to the Ministry of Public Security, which has been accused of targeting Chinese dissidents abroad.

That is the core finding of Shared Labs, Shared Harm, a new report from New York–based risk firm Strategy Risks and the Human Rights Foundation. After reviewing tens of thousands of scientific papers and grant records, the authors conclude that Western public funds have repeatedly underwritten joint work between elite universities and two Chinese “state-priority” laboratories whose technologies drive China’s domestic surveillance machinery — an apparatus that, a recent U.S. Congressional threat assessment warns, is increasingly being turned outward against critics in democratic states.

The key Chinese collaborators profiled in the study are closely intertwined with China’s security services. One of the two featured labs is led by a senior scientist from China Electronics Technology Group Corporation (CETC), the sanctioned conglomerate behind the platform used to flag and detain Uyghurs in Xinjiang; the other has hosted “AI + public security” exchanges with the Ministry of Public Security’s Third Research Institute, the bureau responsible for technical surveillance and digital forensics.

The report’s message is blunt: even as governments scramble to stop technology transfer on the hardware side, open academic science has quietly been supplying Chinese security organs with new tools to track bodies, faces and movements at scale.

It lands just as Washington and its allies move to tighten controls on advanced chips and AI exports to China. In the Netherlands’ Nexperia case, the Dutch government invoked a rarely used Cold War–era emergency law this fall to take temporary control of a Chinese-owned chipmaker and block key production from being shifted to China — prompting a furious response from Beijing, and supply shocks that rippled through European automakers.

“The Chinese Communist Party uses security and national security frameworks as tools for control, censorship, and suppressing dissenting views, transforming technical systems into instruments of repression,” the report says. “Western institutions lend credibility, knowledge, and resources to Chinese laboratories supporting the country’s surveillance and defense ecosystem. Without safeguards … publicly funded research will continue to support organizations that contribute to repression in China.”

Cameras and Drones

The Strategy Risks team focuses on two state-backed institutes: Zhejiang Lab, a vast AI and high-performance computing campus founded by the Zhejiang provincial government with Alibaba and Zhejiang University, and the Shanghai Artificial Intelligence Research Institute (SAIRI), now led by a senior CETC scientist. CETC designed the Integrated Joint Operations Platform, or IJOP — the data system that hoovered up phone records, biometric profiles and checkpoint scans to flag “suspicious” people in Xinjiang.

United Nations investigators and several Western governments have concluded that IJOP and related systems supported mass surveillance, detention and forced-labor campaigns against Uyghurs that amount to crimes against humanity.

Against that backdrop, the scale of Western collaboration is striking.

Since 2020, Zhejiang Lab and SAIRI have published more than 11,000 papers; roughly 3,000 of those had foreign co-authors, many from the United States, United Kingdom, and Canada. About 20 universities are identified as core collaborators, including MIT, Stanford, Harvard, Princeton, Carnegie Mellon, Johns Hopkins, UC Berkeley, Oxford, University College London — and Canadian institutions such as McGill University — along with a cluster of leading European technical universities.

Among the major U.S. public funders acknowledged in these joint papers are the National Science Foundation (NSF), the National Institutes of Health (NIH), the Office of Naval Research (ONR), the Defense Advanced Research Projects Agency (DARPA) and the Department of Transportation. For North America, the warning is twofold: U.S. and Canadian universities are far more entangled with China’s security-linked AI labs than most policymakers grasp — and existing “trusted research” frameworks, built around IP theft, are almost blind to the human-rights risk.

In one flagship example, Zhejiang Lab collaborated with MIT on advanced optical phase-shifting — a field central to high-resolution imaging systems used in satellite surveillance, remote sensing and biometric scanning. The paper cited support from a DARPA program, meaning U.S. defense research dollars effectively underwrote joint work with a Chinese lab that partners closely with military universities and the CETC conglomerate behind Xinjiang’s IJOP system.

Carnegie Mellon projects with Zhejiang Lab focused on multi-object tracking and acknowledged funding from the National Science Foundation and the U.S. Office of Naval Research. Multi-object tracking is a backbone technology for modern surveillance — allowing cameras and drones to follow multiple people or vehicles across crowds and city blocks. “In the Chinese context,” the report notes, such capabilities map naturally onto “public security applications such as protest monitoring,” even when the academic papers present them as neutral advances in computer vision.

The report also highlights Zhejiang Lab’s role as an international partner in CAMERA 2.0, a £13-million U.K. initiative on motion capture, gait recognition and “smart cities” anchored at the University of Bath, and its leadership in BioBit, a synthetic-biology and imaging program whose advisory board includes University College London, McGill University, the University of Glasgow and other Western campuses.

Meanwhile, SAIRI has quietly become a hub for AI that blurs public-security, military and commercial lines.

Established in 2018 and run since 2020 by CETC academician Lu Jun — a designer of China’s KJ-2000 airborne early-warning aircraft and a veteran of command-and-control systems — SAIRI specializes in pose estimation, tracking and large-scale imaging.

Under Lu, the institute has deepened ties with firms already sanctioned by Washington for their roles in Xinjiang surveillance. In 2024 it signed cooperation agreements with voice-recognition giant iFlytek and facial-recognition champion SenseTime, as well as CloudWalk and Intellifusion, which market “smart city” policing platforms.

SAIRI also hosted an “AI + public security” exchange with the Ministry of Public Security’s Third Research Institute — the bureau responsible for technical surveillance and digital forensics — and co-developed what Chinese media billed as the country’s first AI-assisted shooting training system. That platform, nominally built for sports, was overseen by a Shanghai government commission that steers AI into defense and public-security applications, raising the prospect of its use in paramilitary or police training.

Outside the lab, MPS officers have been charged in the United States with running online harassment and intimidation schemes targeting Chinese dissidents, and MPS-linked “overseas police service stations” in North America and Europe have been investigated for pressuring exiles and critics to return to China.

Meanwhile, Radio-Canada, drawing on digital records first disclosed to Australian media in 2024 by an alleged Chinese spy, has reported new evidence suggesting that a Chinese dissident who died in a mysterious kayaking accident near Vancouver was being targeted for elimination by MPS officers and agents embedded in a Chinese conglomerate that the U.S. Treasury accuses of running a money-laundering and modern-slavery empire out of Cambodia.

The new reporting focuses on a former undercover agent for Office No. 1 of China’s Ministry of Public Security — the police ministry at the core of so-called “CCP police stations” in global and Canadian cities, and reportedly tasked with hunting dissidents abroad.

Taken together, cases of alleged Chinese “police station” networks operating globally, new U.S. Congressional reports on worldwide threats from the Chinese Communist Party, and the warnings in Shared Labs, Shared Harm suggest that Western universities are not only helping to build China’s domestic repression apparatus with U.S. taxpayer funds, but may also be contributing to global surveillance tools that can be paired with Beijing’s operatives abroad.

To counter this trend, the paper urges a reset in research governance: broaden due diligence to weigh human-rights risk, mandate transparency over all international co-authorships and joint labs, condition partnerships with security-linked institutions on strict safeguards and narrow scopes of work, and strengthen university ethics bodies so they take responsibility for cross-border collaborations.

The Bureau is a reader-supported publication.

To receive new posts and support my work, consider becoming a free or paid subscriber.

Continue Reading

Trending

X