By Manny Mogato
Law enforcement agents recently arrested a Chinese national, Deng Yuanqing, and two Filipino accomplices for alleged espionage activities in the country.
According to the National Bureau of Investigation (NBI), Deng and the two Filipinos used modern and sophisticated devices to collect sensitive and classified information from military bases and other critical infrastructures, including shopping malls.
Some of the areas the three visited included EDCA sites in Luzon, where the United States armed forces were granted access to preposition equipment and supplies.
The three used the devices to create maps but for an unspecified purpose. It was not clear who were the employers of the three.
The Bureau of Immigration (BI) said the Chinese national had lived in the Philippines for a decade and had a permanent residency after marrying a Filipina.
Armed Forces Chief of Staff, General Romeo Brawner, was alarmed by what law enforcement agents had found out after Yuanqing’s arrest.
“It’s very possible that the coordinates and the topography could be used for military purposes, military targeting purposes,” Brawner said.
“There are many other different camps. Not just camps. Even airports, seaports, and fuel depots.”
Deng and the two Filipinos were charged with espionage and for violating Republic Act No. 10175, or the Cybercrime Prevention Act of 2012.
Deng was caught based on information from the Navy’s Intelligence and Security office that a group of Chinese nationals were doing surveillance work that could compromise the country’s national defense.
However, Deng’s wife denied that her husband was a spy and could be working for Beijing’s People Liberation Army (PLA), China’s armed forces.
“He surveys roads for self-driving cars,” Deng’s wife, Noemi, said. “Based on my understanding, they are like Waze. They survey the roads where the cars go.”
She and Deng had met online in 2013.
A Chinese-Filipino civic leader, Teresita Ang See, helping the Deng couple, has asked for an impartial investigation. She also claimed Deng was not a spy.
She said Deng did not attend a PLA university and finished a technical education at a vocational school.
The two women said Deng was a contractor for a Chinese company that had contracts with US-based companies.
The burden of proving that Deng was a spy lies on the government. The Armed Forces of the Philippines and the National Bureau of Investigation have to present evidence in court that the information gathered by Deng was sensitive and classified which could compromise the nation’s security.
The evidence must clearly show the information that was collected was highly classified and not available online.
Some people observed that the equipment seized from Deng’s vehicle was not sophisticated and was openly available in the online shopping app Lazada or Shopee.
They also said Deng need not map military camps and other critical infrastructure because these are readily available in Google Earth maps, including the exact coordinates.
The defense and military establishments had hardened government infrastructure to prevent unauthorized personnel from gaining entry into the secured facility.
It was a condition set by Washington before it agreed to sign an intelligence-sharing agreement with Manila in November – the General Security on Military Information Agreement (GSOMIA).
Foreign intelligence agents usually gather information through human contacts and interaction (HUMINT), technical intelligence (TECHINT), and intercepting signals and communications.
They also break into and hack computer systems to steal valuable information, databases, and internal communications.
China’s hackers could be working with state security apparatus to steal information and could sabotage foreign government emails and websites.
The US and other Western states have complained about China’s espionage activities, aware that they were on the hunt for technological data and designs for advanced weaponry, like missiles, submarines, and aircraft.
The Philippines could be a potential target because it has close military ties with the United States. The country’s cyber security is weak as evidenced by frequent attacks and data breaches by unknown foreign actors.
The Philippine government must zealously guard against data breaches and malicious attacks on its computer systems rather than worry about physical surveillance.
These are low-level monitoring activities with very limited information gained unlike when a computer network is breached.
There is a need for the Philippines to strengthen its cyber security if it wants to guard against the prying eyes of cyber spies.
Perhaps, the US, Japan, and Australia start training and focusing more activities to harden Philippine cyber networks and avoid exposing state secrets to hostile actors, like China.
Deng’s activities would be child’s play compared to those done by Chinese hackers and cyber spies.
The views expressed by the columnist do not necessarily reflect that of the media organization.
Our Privacy Commitment
TV5 Network Inc. values and respects your privacy. We are committed to safeguarding your personal data in compliance with Republic Act No. 10173 or the Data Privacy Act of 2012 and its implementing rules and regulations.
We have developed a Privacy Policy that adopts and observes appropriate standards for personal data protection. While our Privacy Policy sets out the general principles governing the collection, use, and disclosure of our users’ personal information, our Privacy Commitment seeks to inform you more about TV5’s privacy practices.
Why do we collect your personal information (as applicable)?
We may collect and maintain basic information about you as site user of TV5 sites for the following purposes:
Where do we get your personal information?
There are several ways we collect your personal information.
Information that you personally provided.
Most of the personal information we have are those that you have provided us when you:
Information we collect during your engagement with us
We also collect information as you use our products and services, like:
Information we collect from other sources
Other means of collection of information may be through:
When do we disclose personal information?
There may be instances when we are required to share the information you provided us. In such cases, we ensure that your personal information will be disclosed on a confidential manner, through secure channels and in compliance with the Data Privacy Act and other privacy laws.
We will never share, rent, or sell your personal information to third parties outside of TV5 except in special cases where you have given consent, and in cases described in our privacy policy.
In some instances, we may be required to disclose your personal information to our agents, subsidiaries, affiliates, business partners and other third-party agencies and service providers as part of our regular business operations and for the provision of our programs and services. This means we might share your information with our service providers, contractors, and professional advisers who help us provide our services.
How we protect your personal information
The integrity, confidentiality, and security of your information is important to us. We have implemented technical, organizational, and physical security measures that are designed to protect your information from unauthorized or fraudulent access, alteration, disclosure, misuse, and other unlawful activities.
We also put in effect the following safeguards:
TV5 will not collect, use, or disclose your personal information for any purpose other than the purpose that you may have given your consent for.
What are your choices?
We make sure that we have your consent to continue to collect, use, and disclose your personal information for the purposes that we have identified. We want you to know that you may object or withdraw your consent and/or edit your consent preferences at any time.
If you wish to have access to the personal information in our custody or if you think that the personal information you provided is incomplete, or otherwise inaccurate, you may get in touch with our Data Protection Officer through the contact details provided below. In some instances, we may request for supporting documents or proof before we effect requested changes.
Data Protection Officer
TV5 Network Inc.
Reliance corner Sheridan Streets
Mandaluyong City
tv5dataprivacy@tv5.com.ph
What happens when there are changes in our Policy?
From time to time, we may update our privacy policy and practices to comply with changes in applicable laws and regulatory requirements, adapt to new technologies and protocols, and align with the best practices of the industry.
You will be provided notices if the changes are significant and, if we are required by law, we will obtain your updated consent.