The ongoing trial of at least two former United States Air Force fighter pilots accused of providing unauthorized training to Chinese aviators has sent shockwaves through the global defense community. Prosecuted by the US Justice Department, the case underscores growing concerns about the exposure of sensitive Western combat aviation tactics and operational doctrines to potential adversaries.
While the legal action has heightened awareness among current and former military personnel—particularly within elite aviation circles—it has not deterred foreign actors. Instead, it appears to have triggered an evolution in recruitment tactics. Intelligence and defense analysts now warn that China-linked networks are broadening their focus, targeting not only former air force pilots but also naval officers, army personnel, scholars, and journalists across multiple countries, including India.
Unlike earlier efforts that often required physical relocation or direct involvement in training programs within China—actions that attracted scrutiny—the new approach is far subtler. Targets are now approached with seemingly innocuous offers: writing articles, policy briefs, or research papers on geopolitics, defense procurement, and military strategy.
These offers are financially attractive. Payments typically range from USD 300 to 500 per article, with promises of long-term consultancy contracts and steady monthly retainers. At face value, such engagements resemble legitimate academic or think tank collaborations. However, beneath the surface lies a more concerning intent.
Recruiters often begin with broad, generic topics—regional geopolitics or international relations—but gradually steer contributors toward highly sensitive areas. These include military doctrines, weapons systems performance, procurement pipelines, joint exercises, and even human intelligence (HUMINT) insights such as troop deployments or operational readiness.
Perhaps most striking is the visibility of these operations. Recruitment no longer relies on covert channels or obscure networks. Instead, it unfolds openly on mainstream professional platforms such as LinkedIn, Indeed, and Naukri.com.
Posing as doctoral students, research interns, or representatives of think tanks, recruiters craft polished outreach messages. They often flatter targets, emphasizing their “unique expertise” and “analytical abilities” in defense and geopolitics. The tone is professional, the language persuasive, and the intent carefully obscured.
One such case involves Rear Admiral (Retd.) Girish Kumar Garg, a highly experienced officer with a distinguished career in the Indian Navy. Garg was approached on LinkedIn by two individuals claiming to be PhD students from the University of Hong Kong.
The individuals stated they were affiliated with an NGO focused on international relations and expressed a desire to collaborate with “prestigious experts.” Garg was invited to write an article on South Asian geopolitics, with assurances of payment exceeding USD 300 and the possibility of future consultancy work.

However, when Garg sought clarity on the nature of subsequent assignments, the responses were vague. The recruiters repeatedly emphasized his “predictive abilities” and domain expertise but avoided specifics. They later claimed affiliation with a firm called WTW Analysis, whose website, conveniently, was “under maintenance.”
Recognizing multiple red flags, Garg declined the offer. “Finding everything fishy, I told them that I am not interested and stonewalled all further attempts,” he said. Despite his refusal, the recruiters persisted, indicating no urgency and suggesting future collaboration remained open.
Given Garg’s background—including roles in sensitive operational commands, defense acquisition, and strategic deployments in the Andaman region—analysts believe the intent may have been to extract insights into India’s naval operations and vulnerabilities in the Indian Ocean Region.
Garg’s experience is far from isolated. A former Indian Army colonel, who requested anonymity, reported receiving a nearly identical proposal via LinkedIn. The focus, in his case, was on Indian Army combat doctrines.
Journalists have also been targeted. In one instance, a defense reporter was offered payment for articles but was explicitly instructed to avoid open-source intelligence (OSINT). Instead, the recruiter demanded “non-public” information—effectively encouraging the disclosure of insider knowledge on defense deals.
When the journalist refused, stating that any such information would be reported through legitimate editorial channels, the recruiter responded by offering higher compensation. The implication was clear: confidential information had monetary value.
The scale of these approaches has prompted concern at the highest levels of government in India. In January, the University Grants Commission issued a nationwide advisory titled “Sensitization of personnel regarding sharing of sensitive information.”
The advisory, based on inputs from the Ministry of Education, warned that foreign entities were actively attempting to gather sensitive data related to national security, defense infrastructure, and government operations. It highlighted the use of job portals and networking platforms to identify individuals with relevant expertise and engage them in seemingly legitimate research work.
Institutions were urged to disseminate the advisory widely and educate students and faculty about the risks. The warning was also circulated within the Indian Navy and veteran organizations, signaling the seriousness of the threat.
According to the advisory and corroborating accounts, the operational pattern is consistent:
- Target Identification: Individuals with defense, academic, or journalistic backgrounds are identified via public platforms.
- Initial Engagement: Recruiters establish credibility using academic or institutional affiliations.
- Gradual Escalation: Assignments evolve from generic topics to sensitive, classified domains.
- Financial Incentives: Payments are structured to encourage continued participation and deeper disclosure.
- Identity Obfuscation: Recruiters often hide their true affiliations, posing as intermediaries or consultants.
This model allows foreign actors to extract valuable intelligence without direct espionage activities, effectively outsourcing information gathering to unwitting participants.
One of the most dangerous aspects of this approach is its appearance of normalcy. Writing articles or research papers is a routine activity for academics, analysts, and retired officers. Many may believe they are contributing to global discourse or even enhancing their professional profiles.
However, the boundary between open analysis and classified insight is often blurred—especially for individuals with decades of operational experience. Even seemingly benign observations can reveal patterns, capabilities, or vulnerabilities when aggregated.
Experts argue that awareness is the first line of defense. While advisories have been issued, their reach remains limited relative to the scale of the threat. A broader communication strategy is needed—one that includes media professionals, independent analysts, and private sector consultants.
There is also a case for clearer guidelines on post-retirement engagement for defense personnel, particularly concerning foreign collaborations. Training programs on information security and counterintelligence awareness could help mitigate risks.
Ultimately, the issue reflects a broader shift in modern intelligence operations. The battlefield is no longer confined to physical domains; it extends into digital platforms, professional networks, and intellectual exchanges.
As the line between academic collaboration and strategic exploitation continues to blur, vigilance becomes imperative. What appears to be a harmless research opportunity may, in reality, be part of a sophisticated effort to map and exploit national security vulnerabilities.