Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

America Must Fight China's All-Out Cyber Warfare
American Thinker ^ | 20 Mar, 2026 | Janet Levy

Posted on 03/20/2026 5:48:18 AM PDT by MtnClimber

Cyber espionage is one of the unconventional methods recommended for achieving global dominance in the 1999 book Unrestricted Warfare by People’s Liberation Army (PLA) colonels Qiao Liang and Wang Xiangsui. They state that America, though far more powerful than China, is vulnerable to asymmetric warfare, which has “greater destructive force” than military action.

Like other asymmetric strategies, cyber warfare blurs the boundaries between war and peace as well as between military and civilian domains. Consequently, covert attacks continue without formal declarations of war: research and technology are stolen from universities, corporations, and leading institutions; sensitive networks and grids, both military and civilian, are hacked; critical infrastructure is compromised with bugged Chinese-made components.

These efforts have been ongoing for decades as China seeks to cheat its way into dominating key industries in the 21st century, especially artificial intelligence and machine learning. No other country has targeted our government, military, and corporations to seize intellectual property as aggressively as China has.

Take the Made in China 2025 initiative, for example, which aims to comprehensively upgrade both traditional and advanced sectors of Chinese industry. The goal is to position China as a leading player in global supply chains; additionally, it emphasizes increasing the use of domestic components from 40% to 70%. To achieve this, Chinese agents have engaged in outright theft: estimates suggest that one in five American companies has had its patents and trade secrets stolen.

Data centers are another target for Chinese hackers. Generative AI, which can produce original images, text, and code, and conceptualize designs, depends on access to large data sets for learning. By attacking data centers and corrupting data sets, Chinese hackers slow down the progress of this advanced technology toward reliability. Additionally, companies that unknowingly use contaminated data for analysis and projections end up with unusable results.

(Excerpt) Read more at americanthinker.com ...


TOPICS: Business/Economy; Military/Veterans; Society
KEYWORDS: foreignpolicy

Click here: to donate by Credit Card

Or here: to donate by PayPal

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794

Thank you very much and God bless you.


1 posted on 03/20/2026 5:48:18 AM PDT by MtnClimber
[ Post Reply | Private Reply | View Replies]

To: MtnClimber

We should make sure China downloads bad data.


2 posted on 03/20/2026 5:48:55 AM PDT by MtnClimber (For photos of scenery, wildlife and climbing, click on my screen name for my FR home page.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MtnClimber; All

Agree with the article!

So President Trump explain to me again how all these PRC\China students here on visas and all these “Art of the Deal” deals with China are increasing our cyber security? Or helping us in any other way?


3 posted on 03/20/2026 6:02:12 AM PDT by Reily
[ Post Reply | Private Reply | To 1 | View Replies]

To: MtnClimber
Then there’s Volt Typhoon, which is believed to be operated by the PLA Cyberspace Force and has been active since 2021. It targets critical infrastructure—both government and private—by exploiting vulnerabilities in internet service providers. In 2023, the White House, the Defense Department, and other agencies stated that its goal is to slow down any potential military mobilization that the U.S. might initiate if China invades Taiwan.

The internet is important but it is useless without a power grid.

The US has not built large power transformers in 20 years or more. We import all of them from China.

All new transformers are Hi Tech, digitally controlled through the Internet.

Although these transformers are supposed to be checked for imbedded malware, it is highly probable in my opinion that China can shut down our grid whenever they want.

Having our transformer source off shore is a big strategic blunder. Having that source be a hostile foe is unforgivable.

The lead time for a new large transformer is also 3+ years. A lot can happen in three years.

We very much need to On Shore our Electric Transformer manufacturing as a strategic imperative. We can't trust the Chinese with this critical infrastructure supply.

4 posted on 03/20/2026 6:12:09 AM PDT by Pontiac (The welfare state must fail because it is contrary to human nature and diminishes the human spirit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MtnClimber

For those not familiar...almost every server on the planet nearly had a “secure shell” backdoor enabled.

https://www.youtube.com/watch?v=MllrK4XSJxc

This was probably a “nation state” operation, most likely China. I’d also assert that AI was heavily leveraged to figure this out. It took years of work and almost went unnoticed, but for some curious developer noticing a small timing change in the shell login timing.


5 posted on 03/20/2026 6:18:58 AM PDT by fuzzylogic (welfare state = sharing of poor moral choices among everybody)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MtnClimber
Perhaps the author of the book knew our stealth aircraft days would be over someday?


https://www.youtube.com/watch?v=phCbUco_RMM

.


6 posted on 03/20/2026 7:22:12 AM PDT by Karl Spooner
[ Post Reply | Private Reply | To 1 | View Replies]

To: MtnClimber

In February, hacker group Sparrow Strike One stole 10 petabytes of data from the National Supercomputing Center of Tianjin. This is scientific and engineering data on aircraft structural strength, aerodynamic information, hypersonic weapons research information, and nuclear weapons data. This weapons characterization compilations and engineering simulation data are the crown jewels of the PLA.


7 posted on 03/20/2026 7:26:18 AM PDT by Chad_the_Impaler
[ Post Reply | Private Reply | To 1 | View Replies]

To: MtnClimber

I just heard in the last day or so that China had its central data center hacked.

The hacker downloaded all the data and put it online for sale.


8 posted on 03/20/2026 7:38:19 AM PDT by ckilmer (`61)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Reily; MtnClimber
Also agree 100%.

I have read two specific books on this that finally made me understand just exactly what Communist China is up to: Stealth War: How China Took Over While America's Elite Slept by Gen. Robert Spalding (Ret.) and Unrestricted Warfare co-written by two Colonels in the People's Liberation Army, Qiao Liang and Wang Xiangsui.

General Spalding's book was eminently readable, though a bit gut wrenching. But knew of what he wrote. (General Spalding was relieved of his post in the NSC because of his strident, unrepentant, and finally, public warnings about allowing Communist China to design and build 5G networks in the USA. His open statement to the press was what got him fired.)

And General Spalding also mentioned that when he went to Communist China openly as an Air Force Major who had been flying B-2 Bombers) to get his Masters in Business at the behest of the USAF, he thought it was the purest and most aggressive form of capitalism he had ever seen. He studied there and got his degree, and learned about the Chinese culture, up close and personal. He even thought of going over there after he retired. But after he got his degree, he said he would never go back there. So he understood.

I had far more difficulty reading Unrestricted Warfare, but what impressed me about that was how they weren't even trying to hide their goals in it. I didn't enjoy reading it, as it was not very approachable, but the message was unmistakeable.

They clearly believe they can bring our country down via non-kinetic warfare. Further, I got the unmistakeable impression that they discouraged the approach of building up their military as the Soviet Union did to challenge us, but instead were advocating that they build just enough to make the world believe they were following the path of the Soviet Union in order to make us build ourselves up and bankrupt ourselves, as the Soviet Union did.

That said, in General Spalding's book, he described a hack into an American company. It wasn't IBM or anything like that. It was a small company that had not gone public yet...they were unknown and obscure. They made a new, environmentally safe industrial solvent.

But they were preparing to go public. But they began having problems. Orders were going out incorrectly, where a customer would order 100 units and only get 10 (so it looked like someone fat-fingered the order) or the order would get lost. The guys who owned the company fired their sales manager and overhauled the team and the order systems, but the customer service errors persisted and they began to hemorrhage customers.

When they were preparing to do an IPO, they got an offer from a Chinese company to buy them out. When they looked at the offer, there were proprietary elements that the Chinese company offered that were not known outside the leadership of the company. They got suspicious, and hired a team to do an analysis of their systems, and found that they had been hacked, and the origin of the hacks had been Communist China.

They had wormed their way into the order software, and were changing orders deliberately to make the company seem inept. They had hacked into the email, and were deleting email-based orders so they never got filled.

All in an effort to drive the value of the company down before they offered to buy them out.

And this was just one small, unknown company. But the CCP apparently knew of them. How many companies have had damage like this done to them? Subtle, behind the scenes.

9 posted on 03/20/2026 8:07:27 AM PDT by rlmorel (Factio Communistica Sinensis Delenda Est)
[ Post Reply | Private Reply | To 3 | View Replies]

To: MtnClimber

Yup. We’ve seen the mischief Iranian and North Korean hackers can do. Assume that they’re JV amateurs compared to the Chinese.


10 posted on 03/20/2026 8:09:55 AM PDT by misterdarcey (Abandon all nuance, ye who enter here.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel

China wants hegemony not direct control. They want subordinate complacent compliant customers. It’s actually a form of economic colonialism, similar to what they experienced from the West.


11 posted on 03/20/2026 8:34:07 AM PDT by Reily
[ Post Reply | Private Reply | To 9 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson