TAMPA, Fla.—A Florida engineer has pleaded guilty to acting as a Chinese agent to collect intelligence on dissidents and U.S. nonprofits and firms.
Under the direction of the Ministry of State Security, China’s top intelligence gathering agency, Li collected a wide range of information on the targets of the Chinese regime, including pro-democracy activists, practitioners of the persecuted faith group Falun Gong, and the telecom and tech firms he’s worked at, court filings show.
His LinkedIn profile indicates he has over two decades of experience as a software engineer at U.S. telecom giant Verizon.
The court document also stated that he discussed hacking tactics with a Chinese intelligence officer and provided cybersecurity training materials from his current employer at the officer’s request.
Li faces up to five years in prison along with a maximum $250,000 fine, as well as up to three years of supervised release. He would also be asked to make restitution to any victims of the offenses, according to the plea agreement.
The sentencing hearing is expected to take place in 70 to 90 days.
One of Li’s earliest assignments in 2012 was to collect information regarding lawsuits that Falun Gong practitioners planned to bring against Chinese state government officials, according to court filings.
In August 2012, about a month after he traveled to the central Chinese city of Wuhan to meet with a provincial-level Ministry of State Security officer, Li thanked the officer for “the help that he had provided when Li was in China,” the court document states.
Li then shared biographical information about an attorney in St. Petersburg, Florida, he had spoken with, saying that the attorney had lent his wife some Falun Gong books. He also provided information about a blog the attorney had written for a Falun Gong-associated publication, according to the court filing.
In five days, the officer wrote back thanking Li for the information. Addressing Li as “bro,” the officer asked Li to “look out for movement of the pro-democracy activists” ahead of a key upcoming Chinese political leadership conference, the 18th Party Congress, and to pay attention to whether anyone he knew “works at the CIA or FBI.”
Asked by the Chinese officer in April 2013, Li sent public information and the social media handles of two Israeli authors who had penned books concerning Falun Gong. In September 2014, the officer again tapped him to hunt for information about Falun Gong, providing him with biographical information about a Falun Gong practitioner from Hubei, China, including his California home address, phone number, and the make and model of his car. He said the man had protested in front of a Chinese consulate in California. He responded the same day with information about an individual he believed the officer was looking for.
Two days later, Li made additional internet searches about the person and shared his findings with the Chinese intelligence officer.
Li and the officer had maintained close relationships throughout the years, the prosecutors noted at the hearing. The two frequently referred to each other as “brother,” and according to court filings, the officer and his colleagues treated Li to a hot spring in Beijing in December 2014.
They also made various efforts to disguise their communications from U.S. law enforcement, including by routinely deleting emails and materials that Li had provided and creating multiple fake accounts. Li, lacking a Chinese phone number, asked the officer to help set up a shared account on the Chinese social networking platform Sina, which they used to transmit documents.
The ministry officer also tasked him with conducting research on other topics to further his agency’s mission.
He had asked Li about the new Chinese branch offices of his then employer, Verizon, in 2015, to understand whether “the company was engaging in any data collection in China.”
In March 2022, the officer asked him about his current employer—India’s second-largest information technology company, Infosys—and its customer base. He also asked for materials on the firm’s cybersecurity training and discussed hacking tactics that could be employed, according to the court document. Li replied with a cybersecurity manual and gave a description of his employer and its customers.
In June 2022, he also helped the officer find details about the property address of an individual in Ezhou, Hubei, the officer’s home province, including the real estate company website with photos and the tax information for the property that identified the owners. The individual had fled China after committing some actions that offended Beijing and was on a “wanted” notice from Hubei security officials.
Li, who acquired U.S. citizenship about two decades ago, appeared in a sapphire blue T-shirt at the court hearing on Aug. 23. When asked by The Epoch Times whether he regretted his actions, he said “no.”
His lawyer Daniel Fernandez insisted that the case is “not espionage.”
“He provided information to childhood friends that became government employees. And the information shared is public information that you could Google,” Fernandez told The Epoch Times.
He noted that Li was aware that the officer worked for and was reporting to the Chinese state.
He’s “taking responsibility,” Fernandez said before the hearing.
The case, he said, represents only the tip of the iceberg.
“[There are] many other Chinese spies still living in [the] community,” he told The Epoch Times, adding that he’s glad U.S. authorities are paying attention to covert Chinese operations.
“I hope, by this guilty plea, he can really repent what he did. I don’t hold anything against him. I just hope he really thinks about the damage his action can cause.”
Two other China-related prosecutions have led to guilty pleas recently.