An expansive pro-Beijing influence operation has sought to sow division around the CCP (Chinese Communist Party) virus pandemic and incite street protests in the United States, cyber intelligence researchers found.
The network initially began in 2019 focusing on discrediting Hong Kong’s pro-democracy protests. The operation has since expanded in size and scope, spanning 30 social media platforms and 40 other websites and online forums in seven languages, according to a Sept. 8 report from U.S. security firm Mandiant Threat Intelligence.
In addition to echoing claims from Chinese state media, the group also made an active effort to get Americans to attend protests against anti-Asian sentiment, in what appears to show the Chinese operatives’ growing appetite to more directly influence real-world activities before a global audience.
In April, thousands of posts emerged calling on Asian Americans to demonstrate against “racial injustice.” Some posts—written in languages including Korean, Japanese, and English—specifically targeted fugitive businessman Guo Wengui, directing people to an address said to be Guo’s New York home to demonstrate against virus origin theories promoted by Guo, particularly that the virus was a biological weapon made by the Chinese regime.
The timing of these calls paralleled a rash of reports about anti-Asian hate crimes, which Chinese state media also turned into a propaganda prop to shun U.S. criticism.
While no evidence suggested such attempts were successful, it was an “early warning that the actors behind the activity may be starting to explore, in however limited a fashion, more direct means of influencing the domestic affairs of the U.S.,” the researchers wrote.
Mandiant didn’t have proof of involvement from Beijing-controlled bodies, and the pro-Beijing accounts have so far gained little traction on either major social media or niche platforms.
The network instead portrayed the April 24 protest as a success, posting doctored photos from a different rally that took place elsewhere a day earlier.
“It’s almost like they are being paid by volume,” instead of engagement, said Shane Huntley, director of the threat analysis group at Google.
By Eva Fu