Hainan State Security Department | |
Type: | department |
Preceding1: | Hainan Public Security Bureau counterintelligence |
Jurisdiction: | Hainan province |
Headquarters: | No. 176 Nanhai Avenue, Xiuying District, Haikou, Hainan, China |
Employees: | Classified |
Budget: | Classified |
Chief1 Position: | Director |
Parent Agency: | Ministry of State Security |
Parent Agency Type: | ministry |
The Hainan State Security Department (HSSD;) is a provincial department of the Chinese Ministry of State Security responsible for national security and secret policing in the contiguous island province of Hainan, headquartered in Haikou. Members of the Hainan SSD have badge numbers with prefixes beginning with "46xxxx".[1] The HSSD operates advanced persistent threat (APT) number 40.
See main article: APT40. The Hainan State Security Department is behind the advanced persistent threat known as APT40.[2] [3] [4]
In May 2021, a US federal grand jury in San Diego, California, returned an indictment against four hackers of the Hainan SSD for hacking attributed to the Hainan Xiandun Technology Development Co., Ltd. (海南仙盾) (Hainan Xiandun), a since disbanded front company, to operate out of Haikou, Hainan Province.[5] [6]
The two-count indictment alleged that Ding Xiaoyang, Cheng Qingmin and Zhu Yunmin, were HSSD officers responsible for coordinating, facilitating and managing computer hackers and linguists at Hainan Xiandun and other MSS front companies to conduct hacking for the benefit of China and its state-owned and sponsored instrumentalities. The indictment alleges that Wu Shurong was a computer hacker who, as part of his job duties at Hainan Xiandun, created malware, hacked into computer systems operated by foreign governments, companies and universities, and supervised other Hainan Xiandun hackers.
APT40's campaigns have targeted a range of victims originating in the United States, Austria, Cambodia, Canada, Germany, Indonesia, Malaysia, Norway, Saudi Arabia, South Africa, Switzerland and the United Kingdom. Targeted industries included, among others, aviation, defense, education, government, healthcare, biopharmaceuticals and maritime.
Stolen trade secrets and confidential business information included, among other things, sensitive technologies used for submersibles and autonomous vehicles, specialty chemical formulas, commercial aircraft servicing, proprietary genetic-sequencing technology and data, and foreign information to support China’s efforts to secure contracts for state-owned enterprises within the targeted country (e.g., large-scale high-speed railway development projects).
In the most concerning instances, hackers from the Hainan SSD targeted research on highly pathogenic biological agents including Ebola, MERS, HIV/AIDS, Marburg and tularemia, several of which have been historically weaponized as biological warfare agents.[7]
The indictment charged the Hainan MSS officers with coordinating intelligence requirements with academics at universities in Hainan and elsewhere in China. Not only did such universities assist the MSS in identifying and recruiting hackers and linguists to penetrate and steal from the computer networks of targeted entities, including peers at many foreign universities, but personnel at one identified Hainan-based university also helped support and manage Hainan Xiandun as a front company, including through payroll, benefits and a mailing address.
Name | Entered office | Left office | Time in office | ref. | |
---|---|---|---|---|---|
Xiong Fangming (熊方明) | February 29, 2008 | 2013 | 5 years | [8] | |
Unknown | 2013 | March 31, 2015 | 2 years | ||
Chen Haijun (陈海军) | March 31, 2015 | Unknown | Unknown |