Fear Of Chinese Espionage Prompts U.S. To Impose “Blanket Ban” On Its Diplomats In China; What’s Cooking?

The U.S. has implemented a policy prohibiting its diplomats, their families, and security-cleared contractors in China from engaging in romantic or sexual relationships with Chinese nationals.

This directive, enacted in January 2025 by former U.S. Ambassador Nicholas Burns, applies to personnel at the U.S. embassy in Beijing and consulates in Guangzhou, Shanghai, Shenyang, Wuhan, and Hong Kong.

The policy stems from heightened concerns over espionage, particularly fears of Chinese intelligence using personal relationships, often referred to as “honeypot” tactics, to access sensitive information.

In the US, concerns about Chinese intelligence using honey traps surfaced when Axios reported in 2020 that a suspected Chinese operative, Fang Fang (aka Christine Fang), cultivated relationships with American politicians, including then-Congressman Eric Swalwell. While no evidence of espionage was confirmed, Fang’s fundraising and networking efforts raised alarms about potential honeytrap tactics targeting rising political figures.

Previously, U.S. personnel were required to report intimate contact with Chinese citizens, and some agencies had restrictions, but a blanket ban like this hasn’t been seen since Cold War-era policies targeting Soviet and Chinese nationals.

A more limited version of the rule, introduced last summer, barred relationships with Chinese citizens working as support staff, like guards, at U.S. missions. The new policy expands this to all Chinese nationals in China, though exemptions can be requested for pre-existing relationships.

If denied, individuals must end the relationship or leave their post. Violators face immediate expulsion from China, which could disrupt diplomatic operations and strain U.S.-China relations.

The policy reflects broader U.S.-China tensions, with Washington citing national security risks, while some critics argue it infringes on personal freedoms. China’s foreign ministry has declined to comment directly, referring to the U.S.

The State Department has not publicly detailed the policy’s enforcement or exact definitions of prohibited relationships, which has sparked debate about its scope and implications. The ban could strain U.S.-China relations and complicate diplomatic efforts, particularly if Chinese officials view it as an infringement on their sovereignty.

EU Intrudes In Russia, China’s Backyard With 1st Central Asia-EU Summit: Has The New ‘Great Game’ Begun?

Honey Trap Tactics: Deception Through Seduction

Honey trap tactics, often called “honeypot” operations in espionage and intelligence circles, involve using romantic or sexual allure to manipulate, compromise, or extract information from a target.

This age-old strategy exploits human vulnerabilities, desire, loneliness, or trust to achieve objectives ranging from espionage to personal gain. While commonly associated with intelligence agencies, honey traps are also used in corporate espionage, criminal schemes, and interpersonal conflicts.

Honey Trap: A honey trap is a form of social engineering in which an operative, often referred to as a “swallow” (female) or “raven” (male) in espionage terminology, uses charm, flirtation, or romantic promises to ensnare a target.

The goal is typically to extract sensitive information, compromise the target’s reputation, or manipulate their actions. The tactic relies on creating an emotional or physical connection that clouds the target’s judgment, making them more likely to divulge secrets or act against their interests. Honey traps are effective because they exploit universal human emotions.

A target may lower their guard in the presence of someone they find attractive or trustworthy, especially if they feel isolated or undervalued. The operative often tailors their approach to the target’s personality, preferences, or vulnerabilities, making the deception highly personalized. This personalization can make the betrayal even more devastating, as the target may feel a deep sense of loss and betrayal once they realize they have been manipulated.

Mechanics of a Honey Trap: A successful honey trap requires careful planning and execution. Technology has modernized honey traps, with operatives using social media, dating apps, and encrypted messaging to lure targets. Online honey traps can be conducted remotely, reducing the need for physical meetings while maintaining anonymity. The process typically involves the following steps:-

  • Target Selection: Operatives identify a target with access to valuable information or influence. This could be a government official, corporate executive, or even a low-level employee with insider knowledge.
  • Profiling: The operative gathers intelligence on the target’s personality, habits, and weaknesses. Are they lonely? Susceptible to flattery? Drawn to a specific type of person? This information shapes the approach.
  • Initial Contact: The operative engineers a seemingly chance encounter, such as a meeting at a social event, conference, or online platform. The interaction feels natural to avoid suspicion.
  • Building Rapport: Over time, the operative builds trust through shared interests, flattery, or romantic overtures. This phase may involve multiple meetings to deepen the emotional connection.
  • Exploitation: Once trust is established, the operative extracts information, manipulates the target’s decisions, or creates a compromising situation (e.g., recording intimate moments for blackmail).
  • Exit Strategy: The operative disengages without arousing suspicion, often leaving the target unaware they were manipulated.
China-spy
For representational purpose only.

Historical Context Of Honey Traps

Honey traps have been used for centuries, with roots in ancient warfare and diplomacy. In biblical accounts, figures like Delilah used seduction to extract secrets from Samson, illustrating an early example of the tactic.

During the 20th century, honey traps became a staple of espionage, particularly during the Cold War, when intelligence agencies like the KGB, CIA, and MI6 employed operatives to target diplomats, scientists, and military personnel.

This historical context helps us understand the evolution of honeytraps and their continued relevance in modern espionage.

The KGB was notorious for its use of honey traps, often deploying female agents to seduce Western officials. These operatives were trained in charm, psychology, and manipulation, and their missions frequently took place in carefully controlled environments like hotels or embassies.

The goal was to gather intelligence and blackmail targets into becoming double agents by threatening to expose compromising behavior.

Mata Hari (World War I): Perhaps the most famous alleged honey trap operative, Margaretha Zelle, known as Mata Hari, was an exotic dancer accused of spying for Germany during World War I.

While her role as a spy remains debated, French authorities claimed she seduced military officers to gather intelligence. She was executed in 1917, cementing her legend as a femme fatale.

The Profumo Affair (1963): In the UK, Christine Keeler, a model, became entangled in a scandal involving John Profumo, the British Secretary of State for War, and a Soviet naval attaché, Yevgeny Ivanov. Keeler’s romantic relationships with both men raised fears of a honey trap orchestrated by Soviet intelligence. Profumo’s affair led to his resignation and damaged the British government’s credibility.

Markus Wolf’s Romeo Spies (Cold War): The East German Stasi, under spymaster Markus Wolf, deployed male operatives known as “Romeo spies” to seduce lonely West German women, particularly secretaries in government offices. These relationships yielded sensitive NATO and West German intelligence. One such case involved Gabriele Kliem, a secretary who passed documents to her Stasi lover for years before being arrested.

Modern Methods Of Honey Traps

Corporate Espionage: In the private sector, honey traps are used to steal trade secrets. In one case, a tech executive was targeted at a conference by an attractive individual who engaged him in conversation and later extracted details about proprietary software during a private meeting. Such tactics are often more brutal to detect than state-sponsored espionage.

  • Online Catfishing Scams: Criminals use honey trap tactics in romance scams, posing as attractive individuals on dating platforms to defraud victims. For example, in 2021, the FBI reported that romance scams cost Americans over $600 million annually, with perpetrators often building months-long relationships to extract money or personal information.

Indian Cases

Defence and Espionage: The BrahMos Missile Leak (2010s): Between 2015 and 2018, Indian Army and Air Force personnel were targeted by a Pakistani operative using the alias “Sejal Kapoor” on Facebook.

To hack their systems, the operative engaged targets with flirtatious messages and sent provocative content embedded with malware, such as the Whisper and GravityRAT viruses. The malware allowed the operative to mask their identity while extracting sensitive data.

Indian authorities identified the breach, arrested involved personnel, and issued advisories restricting social media use among military personnel to prevent further incidents.

Diplomatic Espionage: Madhuri Gupta Case (2010): Madhuri Gupta, a second secretary at the Indian High Commission in Islamabad, was arrested in 2010 for allegedly passing classified information to Pakistan’s Inter-Services Intelligence (ISI).

Gupta was reportedly cultivated through a romantic relationship with a Pakistani operative named Jamshed, who posed as a divorcee and proposed marriage. Jamshed and his superior manipulated her into sharing sensitive diplomatic and defense-related information. Her case highlighted vulnerabilities in diplomatic postings in high-risk regions.

ISI honeytrap
ISI/Representational Image

Corporate Espionage: 2015 Scandal: In 2015, a corporate espionage scandal exposed how female operatives posing as employees or consultants targeted executives in Indian companies. These women used honeytrap tactics to build relationships, often meeting targets at conferences or social events.

Once trust was established, they coerced executives into sharing trade secrets, sometimes recording compromising situations for blackmail. The scandal, uncovered in Delhi, involved leaks of sensitive documents from ministries and corporations, prompting companies to strengthen employee training on social engineering risks.

Military Personnel & Online Traps: Operation Dolphin Nose (2019-2020): The Indian Navy’s Operation Dolphin Nose, conducted in 2019 and 2020, uncovered honey trap attempts targeting naval personnel.

Operatives posing as attractive women contacted sailors via Facebook and WhatsApp, liking posts or sending flattering messages to initiate contact. Conversations moved to private chats, where operatives requested photos of naval bases or equipment, later using blackmail to extract operational details.

Several sailors were arrested for leaking sensitive information. The Navy responded by banning personnel from using specific apps, including Facebook and dating platforms, and enhancing counterintelligence measures.

DRDO Scientist Case (2023): In 2023, Pradeep Kurulkar, a senior scientist at the Defence Research and Development Organisation (DRDO), was arrested by Maharashtra’s Anti-Terrorism Squad for allegedly sharing sensitive information with a suspected Pakistani operative.

Using the alias “Zara Dasgupta” and posing as a UK-based software engineer, the operative contacted Kurulkar through social media. Over several months, she sent provocative images and engaged in video calls, convincing him to download malicious software that compromised his device. He was charged under the Official Secrets Act, underscoring the threat of digital honey traps in India’s defense sector.

Defending Against Honey Traps

These cases demonstrate the diverse applications of honey traps, from state-sponsored espionage to political vendettas and financial scams. Social media has amplified the threat, enabling operatives to create fake profiles and deploy malware remotely.

Indian authorities have responded with social media bans for military personnel, mandatory cyber security training, and public advisories. For instance, the Indian Military issued guidelines in 2018 urging personnel to avoid unknown social media contacts.

In political and corporate spheres, enhanced security protocols and scrutiny of personal conduct aim to mitigate risks. Culturally, honey traps exploit societal pressures, such as expectations of masculinity or ambition, and victims often face stigma, discouraging reporting. Public awareness and stricter legal enforcement are critical to countering this evolving threat.

 Awareness is the first line of defense. Organizations must train employees to recognize suspicious behavior, such as overly personal questions or rapid romantic advances.

Governments and corporations should also conduct background checks and monitor unusual activity. Individually, skepticism toward unsolicited attention, especially in high-stakes environments, can prevent falling prey to a honey trap.

Conclusion

Honey trap tactics remain potent in espionage, crime, and personal deception, leveraging human emotions to achieve strategic goals. From Mata Hari’s alleged seductions to modern catfishing scams, the tactic has evolved while retaining its core principle: exploiting trust through allure.

As technology reshapes these operations, understanding their mechanics and historical context is crucial for recognizing and countering their use.

In an interconnected world, the honey trap’s blend of charm and deceit continues to captivate and compromise those who fall under its spell.

  • Air Marshal Anil Khosla is a former Vice Chief of Air Staff (VCAS) of the Indian Air Force and AOC in C of Eastern Air Command. 
  • VIEWS PERSONAL OF THE AUTHOR
  • He tweets at: @AnilKhosla16