June 10, 2025

Taiwanese President’s Security Personnel Used Phones to Steal Classified Documents for PRC

Four Taiwanese soldiers, including three from a security unit responsible for the president’s office, have been sentenced to prison terms ranging from five years and 10 months to seven years for espionage activities conducted on behalf of China. The soldiers used their personal smartphones to photograph sensitive military documents and transmit this confidential information to Chinese intelligence agents.

Inside the Security Breach

According to the Taipei district court ruling, the soldiers:

  • Used mobile phones to photograph classified military information
  • Transmitted this data to Chinese intelligence operatives
  • Accepted payments ranging from $7,850 to $20,000 for their actions
  • Conducted these espionage activities over several months between 2022 and 2024

“Their acts betrayed the country and endangered national security,” the court stated in its announcement.

Three of the convicted individuals worked in “extremely sensitive and important units” responsible for presidential security, while the fourth served in the defense ministry’s information and telecommunications command – positions that granted them privileged access to classified materials.

Taiwan Looks for Solutions to Government and Corporate Espionage

This is the second high-profile incident of mobile phone espionage to shake Taiwan in the past 6 months. In August 2024, a 10-person espionage ring within the Taiwanese military was sentenced for transferring classified intelligence about key military sites, and training and troop deployments to foreign intelligence within the People’s Republic of China. 7 current and former members of the Taiwanese military were convicted of stealing classified intelligence. The press release of the conviction highlights two of the cases, both of which involved mobile phone insider threats: Coln. Hsieh was given a mobile phone by his PRC handler, that contained an encrypted communications and payment app. Hsieh was instructed to use the device to steal and transfer classified national security information to his PRC contact. Additionally Major Ho Hsin-ju was instructed by his foreign intelligence contact to use his personal mobile phone to photograph and transfer classified documents pertaining to the Taiwanese military.  https://globaltaiwan.org/2024/09/recent-chinese-spy-cases-in-taiwan/

And these cases are on the rise: Taiwan’s intelligence agency reported that prosecutions for Chinese espionage have increased dramatically, with 64 cases in 2024 compared to just 10 in 2022.


The Taiwanese government has begun to take measures to respond to these growing threats. In 2022, Taiwan amended its National Security Act to combat a wave of “economic espionage” that its critical industries, including semiconductors, faced from China. The technology gap between Taiwan’s TSMC and Chinese competitors has rapidly closed. Taiwan has attributed many of these leaps in progress to China covertly recruiting insiders. Last week, Taiwan’s Ministry of Justice alleged that China’s SMIC used a sophisticated network to secretly recruit top TSMC talent, bringing the company’s trade secrets to China. 

In response to this most recent incident, President Lai Ching-te announced plans to reinstate military judges for military personnel to streamline espionage investigations. Announcing harsher prosecutions of already-committed espionage is likely intended to deter insider threats. However, the courts can only prosecute the cases an organization detects and only after the information theft has occurred. Cutting-edge technologies now exist that solve this problem by preventing these leaks before they happen.

The Rising Threat of Mobile-Based Espionage

These breaches demonstrate how wireless devices have transformed insider threat and espionage risks. They enable:

  1. Easy capture of classified information through built-in cameras
  2. Immediate transmission of data via cellular networks that bypass traditional network security
  3. Direct exfiltration of information that evades standard perimeter security controls
  4. Creation of covert communications channels outside organizational monitoring

Espionage used to require tradecraft, but now it just requires a pocket.

Protecting Against Mobile Device Insider Threats

Bastille Networks has developed a first-of-its-kind approach to detect and prevent insider threats from personal mobile devices and other wireless attacks before they happen. Organizations handling sensitive information should deploy Bastille’s Wireless Airspace Defense platform to establish:

  • AI-powered continuous monitoring of wireless device threats in sensitive areas
  • Real-time precise location alerts when unauthorized devices enter restricted zones
  • Fully integrated wireless threat visibility into existing SIEM, SOAR, or XDR solutions
  • Implement comprehensive monitoring of all wireless protocols beyond just Wi-Fi, including cellular, Bluetooth, and IoT devices
  • Classify and control all wireless devices, distinguishing between authorized and unauthorized devices
  • Enforcement of strict device policies with technical controls rather than policy alone
  • Ensure full-spectrum visibility across the organization’s entire airspace

As this case demonstrates, the threat of wireless device exploitation for espionage, data exfiltration, and insider threats continues to grow. Organizations must adapt their security strategies to address these evolving challenges by implementing technologies that detect, locate, and respond to unauthorized wireless devices before sensitive information can be compromised.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.