top of page

China’s Recurring Pattern in Responding to Foreign Attribution

  • Writer: CRC
    CRC
  • Aug 21, 2025
  • 3 min read
Futuristic library tunnel with glowing lights and bookshelves. Text on left: "China’s Recurring Pattern in Responding to Foreign Attribution."


Beijing appears to have established a recurring pattern in its responses to foreign attribution of Chinese information operations (IO). A recent example is the response by the Ministry of State Security (MSS), China’s main civilian intelligence agency.[i] After Australia publicly accused China of espionage, the MSS responded using its well-known rhetorical triad:

 

  • Deny – China categorically denies engaging in any form of espionage.

  • Deflect – The accusation is turned around: the other country, such as Australia, is itself accused of spying on China.

  • Display – Alleged evidence of the other country’s activities is presented, whether genuine or fabricated.

 

Deny:


Text excerpt about Australia's intelligence agency's speech on espionage claims involving China, criticized as sensational and unfounded.

Figure 1 - Courtesy of Global Times[ii]

  

Deflect:


Text discusses Australia's alleged negative actions towards China, including making baseless complaints, with no impact on China's image.

Figure 2 - Courtesy of Global Times[iii]


Display (Alleging that the accusing country engages in similar activities):


Text discussing espionage claims between Chinese and Australian intelligence, highlighting disputes over accusations and perceived threats.

Figure 3 - Courtesy of Global Times[iv]

 

This form of communication is not limited to the Ministry of State Security (MSS). The Ministry of Public Security (MPS) – responsible for internal security and policing – as well as the National Computer Virus Emergency Response Center (CVERC), a state-controlled body for reporting cybersecurity vulnerabilities, also regularly rely on this pattern.


This observation aligns with our recent analysis on this blog in the context of Singapore (find the post here).


[Footnotes]


[i] Global Times, 2025. China’s Ministry of State Security issues commentary article warning Australian intelligence agencies not to exaggerate their actions. [online] Published 15 August 2025. Available at: https://web.archive.org/web/20250815154027/https://www.globaltimes.cn/page/202508/1340931.shtml

[ii] Global Times, 2025. China’s Ministry of State Security issues commentary article warning Australian intelligence agencies not to exaggerate their actions. [online] Published 15 August 2025. Available at: https://web.archive.org/web/20250815154027/https://www.globaltimes.cn/page/202508/1340931.shtml

[iii] Global Times, 2025. China’s Ministry of State Security issues commentary article warning Australian intelligence agencies not to exaggerate their actions. [online] Published 15 August 2025. Available at: https://web.archive.org/web/20250815154027/https://www.globaltimes.cn/page/202508/1340931.shtml

[iv] Global Times, 2025. China’s Ministry of State Security issues commentary article warning Australian intelligence agencies not to exaggerate their actions. [online] Published 15 August 2025. Available at: https://web.archive.org/web/20250815154027/https://www.globaltimes.cn/page/202508/1340931.shtml


DISCLAIMER


Copyright and License of Product 

This report (the "Product") is the property of Cyfluence Research Center gGmbH ("Cyfluence") and is protected by German and international copyright laws. The User is granted a limited, non-transferable license to use the Product solely for internal purposes. Reproduction, redistribution, or disclosure of the Product, in whole or in part, without prior written consent from Cyfluence is strictly prohibited. All copyright, trademark, and proprietary notices must be maintained.


Disclaimer of Warranties

The Product is provided "as is" without warranties of any kind, express or implied, including but not limited to warranties of merchantability or fitness for a particular purpose. Although Cyfluence takes reasonable measures to screen for viruses and harmful code, it cannot guarantee the Product is free from such risks.


Accuracy of Information 

The information in the Product has been obtained from sources believed to be reliable. However, Cyfluence does not guarantee the information's accuracy, completeness, or adequacy. The User assumes full responsibility for how they use and interpret the Product. Cyfluence is not liable for errors or omissions; opinions may change without notice.


Limitation of Liability

To the fullest extent permitted by law, Cyfluence shall not be liable for any direct, indirect, incidental, or consequential damages, including lost profits or data, arising from the use of or inability to use the Product, even if advised of such possibilities. Liability for intent or gross negligence remains unaffected under German law.


Indemnification

The User agrees to indemnify and hold harmless Cyfluence, its affiliates, licensors, and employees from any claims or damages arising from the User’s use of the Product or violation of these terms.


Third-Party Rights

The provisions regarding Disclaimer of Warranties, Limitation of Liability, and Indemnification extend to Cyfluence, its affiliates, licensors, and their agents, who have the right to enforce these terms.


Governing Law and Jurisdiction 

This Agreement is governed by German law, and any disputes shall be resolved exclusively in the courts of Berlin. If any provision is found invalid, the remaining terms remain in full effect.

 
 
bottom of page