In 2025 the debate about how China targets the UK is no longer academic — it helped shape the controversy around the recent collapse of a high-profile spying prosecution involving two British men, Christopher Cash and Christopher Berry. Charges were dropped, officials offered conflicting explanations, and the attorney general blamed outdated legislation. That legal drama exposed a deeper problem: understanding what modern Chinese intelligence activity actually looks like and how it differs from the old Cold War picture of spies in embassies handing over classified papers.
Traditional human espionage still exists. Chinese intelligence services recruit sources, develop diplomatic covers and seek information from policymakers, civil servants and political institutions. London and other capitals do similar things in return; when agents are exposed the result is usually a public row and reciprocal expulsions. But Chinese activity goes far beyond those familiar patterns.
Scale and priorities: Beijing’s intelligence apparatus is large and geared primarily toward protecting the Communist Party’s rule. That means priorities include influencing foreign political debate, targeting dissidents overseas, capturing vast amounts of data and supporting economic and technological advancement at home. The resources available allow China to run long-term, patient influence campaigns, including efforts to court young politicians early in their careers with the aim of shaping future decisions.
Political influence and transnational repression: UK security services have warned about attempts to seed pro-China voices inside institutions and about the surveillance and harassment of critics abroad. MI5 publicly issued an “interference alert” over a figure alleged to have worked on behalf of Chinese interests in Parliament. Separately, the arrival of Hong Kong pro-democracy activists in the UK has increased concerns about transnational repression — reports of intimidation, surveillance and even alleged bounties issued against activists have been raised by security services.
Cyber operations: China has been linked to highly sophisticated cyber campaigns. Beyond the theft of specific secrets, operations have targeted telecoms infrastructure and large-scale communications networks. The campaign codenamed Salt Typhoon, disclosed in coordination with other countries, illustrated how compromises of telecom suppliers can expose and track communications at scale. Intelligence agencies warn that data stolen this way can be used to identify and monitor targets’ movements and contacts worldwide.
An appetite for bulk data: Perhaps the feature that most alarms Western officials is China’s pursuit of bulk data — large, population-level datasets containing financial, health, location and other personal information. Such material can be used to train artificial intelligence, map societies, identify vulnerabilities and even shape influence campaigns. Former UK cyber officials have argued that collecting population-scale data is qualitatively different from classic spying on officials and institutions; it is about building capabilities at scale rather than acquiring narrow secrets.
How data is acquired varies. Some is stolen by cyber intrusions. Some is gathered through legal access to companies that operate in global markets, or by leveraging commercial relationships. This mix of state and commercial collection blurs lines between espionage, business practice and national economic policy.
Targeting academia and industry: Chinese efforts are not limited to state secrets. A longstanding focus has been on economic and technological advantage. Universities, research labs and private companies working on advanced materials, semiconductors, AI, biotech and other dual-use technologies are frequent targets. MI5 describes a steady stream of attempts to entice UK academics and experts — often starting with seemingly innocuous approaches over professional networks — to obtain research that could have military as well as civilian applications.
Economic coercion and strategic dependence: A deeper national security risk is not just theft but dependence. Adopting foreign technology at scale can create leverage. The debate over Chinese company participation in critical infrastructure — most notably Huawei and 5G — was less about a single company’s intent to spy and more about whether long-term reliance creates avenues for influence or coercion. Excluding particular suppliers may protect security but also carries economic and diplomatic costs. Similar questions now arise across clean energy, critical minerals, advanced manufacturing and widely used social platforms: how much openness is prudent when suppliers are aligned with a state that has different priorities?
The geopolitical squeeze: The UK also faces pressure from allies, especially the United States, which has pushed for tougher measures against Chinese technology and influence. That places London in a difficult position, balancing commercial opportunities and the political imperative to maintain good relations with Beijing, while responding to security concerns and allied expectations.
Legal and policy challenges: Part of the controversy around recent prosecutions has been whether existing laws and investigative frameworks are fit for purpose in this more complex environment. Some officials point to outdated legislation that struggles to capture non-traditional threats such as influence operations, mass data collection or commercially mediated espionage. Others argue the problem is less legal than strategic: without a clear, consistent China policy that reconciles economic engagement with security safeguards, governments will repeatedly struggle to decide where to draw the line.
Practical responses: On the operational side, British agencies are warning, naming and sometimes sanctioning activities they consider hostile. UK cyber agencies urge better protection of networks and telecoms, while MI5 focuses on countering influence, protecting research, and improving awareness among universities and businesses about approaches from foreign actors. Debates continue over how far to restrict market access to companies from China without causing unacceptable economic fallout.
In short, Chinese intelligence activity in 2025 cannot be reduced to a single model. It includes conventional human spying and covert recruitment, large-scale cyber operations and data collection, influence campaigns, transnational repression, and efforts to acquire technological know-how through commercial means. The central tension for Britain is balancing the economic and strategic benefits of engagement with China against the risks of espionage, coercion and dependence — all while coordinating with allies and updating laws and policies to reflect a 21st-century security landscape. Without a clear, consistently expressed strategy, UK governments are likely to find it difficult to navigate these competing pressures.
