How Insider Threat Programs and Vendor Vetting Can Stop Foreign Influence in Government Positions

Lessons from the Eileen Wang Case

In an era of heightened geopolitical tension, foreign adversaries are increasingly targeting local and state governments to exert influence. A recent case out of Arcadia, California, perfectly illustrates the risks when individuals with questionable backgrounds or undisclosed foreign ties gain positions of public authority.

The Case: A Mayor Acting as an Agent of China

According to a BBC investigation, Eileen Wang, 58, was elected to the Arcadia City Council in November 2022 and later became mayor. Alongside an associate, she operated a website called US News Center targeting Chinese-American readers in the Los Angeles area. U.S. authorities allege that Wang took direction from Chinese government officials via WeChat, publishing pre-written articles that promoted Beijing’s narrative—such as denying forced labor and human rights abuses in Xinjiang—without registering as a foreign agent under U.S. law.

Wang has agreed to plead guilty to acting as an illegal agent of a foreign government. She faces up to 10 years in prison, has resigned from office, and the city’s internal review found no evidence she misused official resources or influenced city decisions during her brief tenure. Her defense described the actions as “personal mistakes.”

This case, while resolved without apparent damage to city governance, highlights a broader pattern: adversarial nations attempting to place sympathetic or directed individuals into positions where they can shape narratives, build networks, and potentially influence policy over time.

Read the full BBC article here: Eileen Wang: US mayor pleads guilty to acting as Chinese agent

The Real Risk: Undetected Access to Power

Even when overt actions stop upon taking office, the damage potential is significant. Individuals in governmental roles—whether elected, appointed, or supporting contractors—gain access to:

  • Local decision-making networks
  • Inter-agency coordination
  • Sensitive (though not always classified) information
  • Platforms to influence public opinion

Standard background checks and elections often miss hidden relationships, dual loyalties, or post-hire changes in behavior. This creates both insider threats (risks from within the organization) and supply chain vulnerabilities (risks from vendors and partners who embed personnel).

How Companies Like TMPC Prevent and Detect These Threats

Organizations like TMPC INC specialize in exactly this challenge. As an SBA-certified 8(a) and Service-Disabled Veteran-Owned Small Business (SDVOSB), TMPC delivers insider threat detection, user activity monitoring, and vendor risk mitigation programs to federal, defense, and intelligence agencies. Their dual approach—inward-facing and outward-facing—provides a robust defense-in-depth strategy.

  1. Inward-Facing: Insider Threat and User Activity Monitoring

TMPC designs and operates comprehensive insider threat programs that treat employees, contractors, and embedded personnel as potential vectors of risk.

Key Capabilities That Would Catch Cases Like Wang’s:

  • Behavioral Analytics & Anomaly Detection: Continuous monitoring of communications (including enterprise chat tools), web activity, file access, and external contacts. Red flags might include repeated interactions with foreign officials or the distribution of externally supplied content.
  • Espionage and Foreign Influence Indicators: Specialized detection of recruitment signals, hidden affiliations, or influence operations.
  • Holistic Data Correlation: Combining HR records, security data, travel, financials, and digital footprints to spot discrepancies that initial vetting missed.
  • Real-Time Alerts and Rapid Response: Enabling swift investigation and mitigation before minor issues escalate.

Even if someone slips through initial screening, an active insider threat program shifts the posture from reactive (waiting for an indictment) to proactive detection and deterrence.

  1. Outward-Facing: Vendor Vetting and Third-Party Risk Mitigation

Many governmental roles and functions are supported through contractors and vendors. TMPC’s vendor threat mitigation services rigorously screen these external partners before they gain access.

Preventive Power:

  • Enhanced Due Diligence: Deep background checks, foreign affiliation screening, open-source intelligence, media analysis, and financial reviews on companies and their key personnel.
  • Ongoing Monitoring: Not a one-time check—vendor personnel and activities are continuously assessed using the same analytics tools as the insider program.
  • Supply Chain Hardening: Ensures that vendors supporting government operations don’t introduce hidden risks, aligning with FOCI mitigation, CMMC, and insider threat compliance standards.

By vetting vendors upfront and monitoring them afterward, agencies can prevent adversarial-linked individuals from embedding in the first place.

The Winning Strategy: Layered Defense

The most effective approach combines both inward and outward programs into a closed-loop system. Vendor vetting reduces inbound risk, while insider threat monitoring catches anything that still slips through. Together, they create early warning, deterrence, and rapid response capabilities that protect democratic institutions from foreign influence.

Cases like Eileen Wang’s show that the threat is real and often operates at the local level before scaling. Government agencies and contractors that partner with specialists like TMPC are far better positioned to safeguard public trust and national security.