China is a Cockroach Infestation
Segment #581
Scott Bessent, U.S. Treasury secretary stated Trump’s strategy with respect to China not as a decoupling but as a de-risk policy. The risk in allowing the Chinese access is profound and worthy of a more comprehensive study. The news provides us bits and pieces of our interaction with the Chinese. It is important on a basic level to look at this relationship holistically to appreciate the risk Bessent was addressing. Even if you skim this you will be better informed than our voting population.
A Comprehensive Assessment of the People's Republic of China's Influence and Infiltration of the United States
Executive Summary
The People's Republic of China (PRC) has adopted a multi-faceted and synergistic approach to influence the United States, targeting American society at every level. This strategy extends beyond conventional intelligence gathering to include economic coercion, political cultivation, academic manipulation, and media operations. These efforts are not isolated, but are part of a unified strategic framework, often linked to the PRC's "Military-Civil Fusion" (MCF) doctrine.1 This report differentiates between benign public diplomacy and the coercive, corrupting, and clandestine activities that pose a direct threat to U.S. national security and societal integrity.3
The findings of this report indicate that the financial cost of intellectual property theft is staggering, reaching into the hundreds of billions of dollars annually.4 This economic assault is complemented by strategic foreign direct investment and corporate acquisitions designed to acquire cutting-edge technologies and gain leverage in strategic industries.1 Politically, Beijing has shifted its focus from direct federal-level engagement to cultivating relationships with aspiring politicians and business elites at the state and local levels, viewing them as potential "weak links".5 In the academic sphere, organizations like Confucius Institutes and Chinese Students and Scholars Associations (CSSAs) have been criticized for suppressing academic freedom and surveilling students, even as they provide language and cultural programs.6 Concurrently, modern information warfare tactics, including the use of AI-generated content, are deployed to shape public opinion and undermine trust in American institutions.9 The overarching objective of these influence operations is to strengthen the PRC's geopolitical standing by undermining U.S. economic and military advantages, shaping policy, and creating an environment where U.S. decisions are favorable to Beijing's interests.
Section 1: The Strategic Framework of PRC Influence Operations
1.1 Defining "Infiltration" and "Influence"
To properly analyze the scope of Chinese activities in the United States, it is critical to establish a clear definitional framework. The term "influence" can encompass a wide range of activities, from legitimate public diplomacy—such as cultural exchange programs and lobbying efforts common to all nations—to operations that are coercive, corrupting, or covert.3 This report focuses on the latter category, as these are the activities that actively interfere in the functioning of American civil and political life.3 While the PRC has not been found to interfere in national elections to the same extent as Russia, its efforts have collectively created a worrisome state of imbalance and antagonism in the bilateral relationship.3 The PRC's authoritarian values, which view American ideals of freedom of speech, press, and assembly as direct challenges, fundamentally underscore the nature of these influence operations.3
1.2 The Ideological and Doctrinal Drivers
The foundational doctrine driving many of the PRC's seemingly disparate influence efforts is its "Military-Civil Fusion" (MCF) strategy.10 MCF is an aggressive national strategy designed to eliminate barriers between China's civilian and military sectors, ensuring that new innovations simultaneously advance both economic and military development.10 This strategy is of such paramount importance that PRC President and CCP General Secretary Xi Jinping personally oversees its implementation through a dedicated committee.10 A key tenet of MCF is the systematic reorganization of China's science and technology enterprise to achieve military dominance, particularly in areas like AI, quantum computing, semiconductors, 5G, and aerospace technology.10 The PRC specifically seeks to exploit the inherent "dual-use" nature of these technologies, which have both civilian and military applications.2 This is accomplished through both licit and illicit means, including investment in private industries, talent recruitment programs, and outright theft.10
The coordination of these activities is largely attributed to the Chinese Communist Party's (CCP) United Front Work Department (UFWD), which serves as a primary agency for influence operations.3 The UFWD leverages a wide range of party, state, and non-state actors—including academia, media, corporations, and civil society groups—to advance the state's interests.3 This demonstrates a top-down, centralized, and persistent effort to exert control and influence well beyond the country's borders, a core theme that links the diverse tactics discussed in the following sections.
Section 2: Economic and Technological Dimensions
2.1 Cyber Espionage and Intellectual Property (IP) Theft
The scale of Chinese espionage against the United States is extensive. Since 2000, 224 reported instances of Chinese spying have been documented.12 U.S. law enforcement officials have identified the PRC as the most active foreign power involved in the illegal acquisition of American technology.13 The FBI opens a new counterintelligence investigation related to China every 12 hours, and according to the U.S. Department of Justice, 80 percent of its economic espionage cases involve the PRC.4 The financial toll is immense, with a U.S. congressional estimate placing the yearly cost of Chinese intellectual property infringement at a staggering $225 to $600 billion.4 According to a CNBC survey, one in five corporations reported that China had stolen intellectual property within the previous year.4
The methods of espionage have evolved, shifting from traditional human intelligence gathering to massive and indiscriminate cyber-hacks.4 These cyber intrusions target a wide array of U.S. entities, from businesses and research institutions to government agencies.13 The People's Liberation Army (PLA) has been linked to data breaches targeting the personal data of U.S. citizens, including the 2015 Office of Personnel Management data breach.12 Classified information on U.S. military technology, including multiple Minuteman and Trident ICBMs and SLBMs, has also been stolen.13 This is not merely opportunistic theft; it is a systematic and sophisticated cyber program that, as the FBI's deputy director has stated, conducts more cyber intrusions than all other nations in the world combined.4
A joint Cybersecurity Advisory from the National Security Agency (NSA) and other U.S. agencies has detailed how PRC state-sponsored cyber threat actors are targeting critical infrastructure networks worldwide.15 These groups, identified by names such as Salt Typhoon, OPERATOR PANDA, and GhostEmperor, focus on large backbone routers of major telecommunications providers, as well as transportation, government, and military networks.15 They exploit publicly known vulnerabilities, modify routers to maintain persistent access, and use compromised devices to pivot into other networks.15 The data collected from these operations, which includes communications and movement patterns, can ultimately be used to identify and track targets for Chinese intelligence services.15
Table 1: Select Cases of Chinese Economic Espionage and IP Theft
Case/ActorTargetAlleged Stolen InformationStrategic SignificancePeople's Liberation Army (PLA)US agencies and corporationsPersonal data of US citizensFacilitates intelligence gathering, identity theft, and blackmail.Chi Mak, Gwo-Bao Min, etc.US military and commercial entitiesMilitary technology and trade secretsSupports China's long-term military and commercial development.APT 4130+ multinational corporationsIntellectual property valued in trillions of dollarsProvides a foundation for leapfrogging costly R&D phases.Huawei (indicted)US counterpartsDecade-long operation to steal U.S. trade secretsPositions Chinese firms to undercut global competitors by avoiding R&D costs.
2.2 Foreign Direct Investment and Corporate Acquisition
The PRC's use of foreign direct investment (FDI) is a strategic element of its broader influence campaign. Beijing does not view FDI merely as a financial transaction but as a means to systematically acquire cutting-edge technologies, intellectual property, and leverage in strategic industries.1 This approach is a direct and practical application of the Military-Civil Fusion (MCF) strategy, which leverages the open and transparent nature of global business to build up the PRC's military capabilities.1 In contrast, the PRC does not permit U.S. companies to acquire its own critical infrastructure.1 The targeted sectors are considered "crown jewels" of the U.S. economy, including technology, food supplies, farmland, and critical infrastructure like ports and shipping terminals.1
Over the past two decades, Chinese companies have quietly acquired stakes in numerous U.S. businesses, often with strategic implications. In the technology and manufacturing sectors, for example, the acquisition of Cirrus Aircraft gave China a rare window into American general aviation.17 Similarly, Lenovo's purchase of Motorola Mobility and IBM's PC division shifted strategic control of these brands to Beijing, allowing the company to emerge as a global PC manufacturer.17 In the automotive industry, the acquisition of Nexteer Automotive and Karma Automotive gave Chinese firms access to steering systems and electric vehicle technology.17
Beyond technology, these acquisitions have touched sectors vital to American society. In food and agriculture, China's WH Group acquired Smithfield Foods, America's largest pork producer, in a $4.7 billion deal that included 146,000 acres of farmland.17 This is part of a broader trend where foreign entities and individuals hold approximately 43 million acres of U.S. agricultural land, with China owning over 350,000 acres across 27 states.2 In the entertainment industry, Wanda Group's acquisitions of AMC Theatres and Legendary Entertainment gave it influence over a major movie chain and Hollywood productions, shifting the focus toward international sales and co-productions.17
Table 2: Key Acquisitions of US Companies by Chinese Firms
Acquired U.S. CompanyAcquiring Chinese FirmYearStrategic SignificanceSmithfield FoodsWH Group2013Gained ownership of America's largest pork producer and 146,000 acres of farmland.Cirrus AircraftAVIC2011Gained insight into American general aviation technology.GE AppliancesHaier Group2016Shifted strategic decisions of a major U.S. appliance brand to Beijing.Waldorf AstoriaAnbang Insurance Group2014Gained a landmark property, sparking national security concerns.Motorola MobilityLenovo2014Gained access to smartphone patents and technologies.AMC TheatresWanda Group2012Gained majority ownership of the world's largest movie theater chain.Riot GamesTencent2015Gained full ownership of a major gaming and esports company.IBM's PC DivisionLenovo2005Enabled Lenovo to become a global leader in PC manufacturing.
2.3 Supply Chain Dominance and Vulnerability
China's influence efforts also extend to establishing dominance over critical supply chains. This is best exemplified by the rare earth elements market, where the PRC has historically controlled the global supply.19 This dominance has enabled Beijing to use a de facto embargo as a geopolitical weapon, as demonstrated by its actions against Japan.19 The U.S. and its allies are now taking decisive steps to counter this vulnerability, with the Trump Administration making a key intervention in 2025 to create a complete mine-to-magnet rare earths value chain, including a guaranteed floor price for a critical input, neodymium-praseodymium (NdPr).19 This policy aims to de-risk rare earths and move permanent magnet production outside of China.19
In the semiconductor industry, U.S. export controls on advanced chips and manufacturing tools have intensified, primarily to stifle China's access to cutting-edge AI and military technologies.20 These restrictions, however, present a complex paradox. On one hand, they have limited the output of Chinese firms in high-end AI chips, but on the other, they have accelerated China's drive for self-sufficiency.20 Chinese manufacturers are now building production lines with a significant percentage of domestic tooling and are doubling down on 7nm chip production and HBM3 products to challenge international giants.20 This demonstrates how U.S. efforts to constrain China can, in the long term, inadvertently fuel Beijing's domestic innovation and its "tech decoupling" strategy.
Section 3: Political and Sub-national Engagement
3.1 A History of Political Influence
The PRC's attempts to influence U.S. politics are not a recent phenomenon. The 1996 United States campaign finance controversy, often referred to as "Chinagate," provides a historical precedent for Beijing's methods.21 Intelligence information revealed that the Chinese embassy in Washington, D.C., was allegedly used to coordinate contributions to the Democratic National Committee (DNC), in violation of U.S. law forbidding foreign nationals from making political donations.21 The campaign plan targeted both presidential and congressional elections, with the goal of improving China's image and increasing its influence on U.S. policy, particularly in Congress.21
Specific cases that emerged from the controversy, such as those of James Riady and Johnny Chung, illustrate the tactics used. James Riady pleaded guilty to conspiring to reimburse campaign donors with foreign corporate funds to influence U.S. foreign policy.21 Among the goals of his actions were to gain Most Favored Nation trade status for China and promote open trade policies with Indonesia.24 Another fundraiser, Johnny Chung, told federal investigators that $35,000 of the money he donated to the DNC came from Chinese military intelligence.21 The "Chinagate" scandal demonstrated that the PRC was willing to use private citizens and companies to exploit loopholes in U.S. regulations to directly influence policy decisions.
3.2 Targeting State and Local Governments
In a modern evolution of this strategy, the PRC has increasingly shifted its focus to state and local governments, which it views as "weak links" in the U.S. political system.5 Beijing's influence operations at this sub-national level are considered to surpass those of previous geopolitical rivals, including Nazi Germany and the Soviet Union.5 The strategy is patient and long-term: Chinese agents cultivate relationships with aspiring politicians, business elites, and academics early in their careers, using these connections to influence policymaking decades later, often without the victims' awareness.5 This approach is designed to build a network of influence that can be leveraged if these individuals rise to the national stage.
A Chinese government-affiliated think tank, for example, created a report on the "friendliness" of different U.S. governors toward China, a document that informs Beijing's outreach strategy.5 Specific examples of this influence include a Chinese consulate emailing a Wisconsin state senator to urge him to pass a resolution praising China's COVID-19 response and Chinese embassy letters to U.S. corporate executives instructing them to lobby Members of Congress to drop bills deemed unfriendly to China.5 Sister city and sister state relationships, of which there are 234 and 50 respectively, are also used as a vector for influence.5 While such partnerships are not inherently negative, a key distinction is that Chinese sub-national governments and the organizations they control are not autonomous actors but are instead agents of Beijing, whose ultimate objective is to displace U.S. global leadership.5
Section 4: Influence in American Academia and Research
4.1 Academic and Research Talent Programs
The PRC has a series of state-run initiatives aimed at leveraging the American academic and research system for its own gain. The "Thousand Talents Program" (TTP), for instance, is designed to recruit Chinese researchers in the United States to return to China, offering them significant financial incentives.25 Law enforcement and counterintelligence agencies have raised concerns about the TTP as a vector for intellectual property theft and espionage, with a 2018 report from the National Intelligence Council stating that a core motivation of the program is to "facilitate the legal and illicit transfer of US technology".26 Investigations have revealed numerous cases against TTP members for IP theft, fraud, and failure to disclose their ties to the Chinese government.26 One TTP member was found to have stolen proprietary defense information on U.S. military jet engines.26
4.2 The Role of Confucius Institutes and CSSAs
The PRC's influence in American academia is also facilitated through organizations like Confucius Institutes (CIs) and Chinese Students and Scholars Associations (CSSAs). A nuanced understanding of these groups requires acknowledging their dual nature. CIs, which number over 100 in the U.S., provide Chinese language and cultural programs and are seen by some as a benign form of public diplomacy.3 Similarly, CSSAs often serve as a social and cultural support network for Chinese students and scholars, facilitating communication and academic exchange.8
However, U.S. officials and academics have raised serious concerns about these organizations' connections to the CCP. CIs have been criticized for censorship, stifling academic freedom, and their lack of transparency and autonomy from the Chinese government.6 In 2014, the American Association of University Professors (AAUP) called on universities to end their partnerships with CIs unless the arrangements met specific conditions related to academic freedom and managerial control.6 Examples exist of PRC officials pressuring faculty, administrators, or guests to avoid public statements or events on topics sensitive to Beijing, such as the Dalai Lama.7
CSSAs have been described by the U.S. Department of State as "government-organized non-governmental organizations" used to monitor Chinese students and mobilize them against views that dissent from the CCP's stance.3 They receive guidance and funding from Chinese embassies and consulates, and in some cases, the local consulate must approve CSSA presidential candidates.8 CSSAs have allegedly pressured host universities to cancel talks related to Tibet, Taiwan, Uyghurs, the Hong Kong protests, and Falun Gong.8 The coordination with the Chinese consulate led to the Wayne State University chapter of the CSSA having its student organization status revoked.8
Table 3: Overview of Key Academic Influence Programs
ProgramStated ObjectiveControversy/AllegationsCurrent StatusConfucius InstitutesPromote Chinese language and culture; facilitate cultural exchange.Censorship, stifling academic freedom, lack of transparency, ties to CCP.Numerous universities have ended contracts; controversy continues.Chinese Students and Scholars Associations (CSSAs)Provide social/cultural support; promote Chinese culture.Surveillance of students/faculty, pressure to cancel events on sensitive topics, funding from Chinese consulates.Described as "government-organized non-governmental organizations."Thousand Talents Program (TTP)Recruit top Chinese researchers to return to China.Vector for intellectual property theft and economic espionage; members have been investigated for fraud and non-disclosure.The FBI and other agencies have raised national security concerns.
4.3 The U.S. Response and Its Consequences
In response to these threats, the Department of Justice (DOJ) launched the "China Initiative" in 2018 with the goal of prosecuting Chinese spies in American research and industry.30 While ostensibly designed to combat economic espionage, the program quickly became highly controversial.31 Critics alleged that it devolved into a campaign of racial profiling and fearmongering that disproportionately targeted academics of Chinese and Asian descent.31 The FBI's own analysis found that 88 percent of the people charged had Chinese ancestry.31
Many of the high-profile cases did not involve espionage or intellectual property theft but rather minor administrative errors, such as failing to disclose Chinese ties on grant applications.30 High-profile cases against academics like Gang Chen and Anming Hu were dismissed or ended in acquittal, revealing "prosecutorial overzealousness" and a lack of evidence of genuine spying.14 The DOJ formally ended the initiative in February 2022, citing the "harmful perception" that it unfairly painted Chinese Americans as disloyal.14 However, the program's legacy remains significant. It created a "climate of fear and anxiety" in the academic community, causing a decline in joint publications by U.S. and Chinese scientists and making many researchers of Chinese and Asian descent unwilling to apply for federal grants.30 This has harmed American scientific advancement and its ability to attract and retain top foreign talent.31
Section 5: Media and Information Operations
The PRC's information operations are a critical component of its influence strategy. Beijing has systematically worked to shape the media landscape in the U.S. and abroad, largely eliminating independent Chinese-language media and establishing its own state-run outlets to gain a foothold in the English-language market across print, radio, and television.3 These efforts are designed to ensure that the PRC's official narrative is disseminated and that critical voices are marginalized or silenced.
Modern propaganda tactics have become increasingly sophisticated. The PRC has utilized AI-generated videos and memes to mock Americans, portraying them as unhealthy and their cities as a dystopian wasteland.9 A key propaganda theme is the portrayal of the U.S. as a hypocritical power on issues of rights and freedoms.35 This narrative is amplified by U.S. political events, such as when the Trump administration's threats against media outlets and use of force against protestors were framed as evidence of American democratic decay and authoritarian overreach.35 Such actions provide "fresh ammunition" for Beijing's narrative, paradoxically allowing an authoritarian regime to weaponize the vulnerabilities of an open society against itself.35
Beyond state-run media, Beijing also seeks to influence and coerce individuals within the Chinese American community and other critics in the U.S..3 This is often achieved by pressuring individuals and their relatives in China, thereby silencing voices critical of the PRC or supportive of Taiwan.3 Beijing presumes that the Chinese American community, as part of a global diaspora, retains a cultural or political allegiance to the "Motherland," and it uses these coercive tactics to enforce its will and interfere with the freedom of speech.3
Section 6: Synthesis and Nuanced Analysis
The vectors of influence discussed throughout this report—economic, political, academic, and informational—are not isolated but form a synergistic and mutually reinforcing ecosystem. This report's analysis reveals a patient, strategic approach to undermining U.S. economic and technological advantages, shaping policy, and controlling the narrative in the global arena.
A core dynamic is the transformation of intellectual property theft into strategic leverage. The PRC conducts massive, state-sponsored cyber espionage and IP theft, with annual costs to the U.S. in the hundreds of billions of dollars.4 This stolen technology and intellectual property, including classified military data on ICBMs, feeds directly into China's military and commercial sectors, enhancing its capabilities in a way that is central to the Military-Civil Fusion (MCF) strategy.10 This is complemented by strategic acquisitions of U.S. companies and control over critical supply chains, which provide the PRC with not only economic gains but also intelligence insights and strategic leverage.1 This creates a self-reinforcing cycle: influence operations enable the acquisition of dual-use technologies, which enhances military and economic power, which in turn fuels more ambitious influence operations with the ultimate goal of achieving strategic and technological dominance.
Another significant dynamic is the PRC's response to increased U.S. federal vigilance. As the U.S. government has become more assertive in countering direct influence at the federal level—for example, through measures like the Committee on Foreign Investment in the United States (CFIUS) and initiatives to counter economic espionage 1—the PRC has pragmatically shifted its focus. It now systematically targets state and local governments, which are seen as "weak links" that are often unprepared for the magnitude and persistence of these operations.5 By cultivating relationships with aspiring politicians and business elites at this level, Beijing is playing a long-term game, patiently building a network of long-standing relationships that can be leveraged for influence in the future.5 This approach exploits a vulnerability in the decentralized nature of the U.S. political system, demonstrating a highly adaptable strategy.
Furthermore, U.S. countermeasures, while necessary, have not been without their own negative consequences. The DOJ's "China Initiative," for example, was designed to combat intellectual property theft and espionage.30 However, the program was widely criticized for targeting academics of Chinese and Asian descent for minor administrative errors, and several high-profile cases were dismissed due to a lack of evidence of espionage.31 The initiative created a "climate of fear and anxiety" that has damaged the U.S.'s ability to attract and retain top scientific talent and has made researchers hesitant to collaborate on joint projects.31 This represents a significant unintended consequence: in an effort to secure its technological edge, the U.S. response risked undermining the very academic ecosystem that drives American innovation.
Finally, the PRC's media influence efforts highlight a paradox inherent in the competition between an authoritarian state and an open society. The PRC's external propaganda, which often positions the U.S. as a declining and hypocritical power, is given legitimacy and factual weight by U.S. events, particularly those involving political and social instability.35 A free and critical media has historically been a source of American strength, as it allows for accountability and open discourse.35 However, when U.S. political rhetoric and actions threaten these fundamental freedoms, it provides an authoritarian regime with "fresh ammunition" for its narrative.35 In this way, Beijing is able to weaponize the vulnerabilities of an open society against itself.
Section 7: Conclusion
The PRC's influence efforts against the United States are comprehensive, deeply integrated, and guided by a long-term, strategic vision. They represent a fundamental challenge to U.S. economic, technological, and political leadership, and are a core pillar of Beijing's long-term geopolitical ambitions to reshape the global order. The report concludes that a reactive, siloed approach to each individual threat is insufficient. A more holistic and proactive strategy is required to counter the PRC's synergistic influence campaign effectively.
Based on this analysis, several high-level recommendations are provided for policymakers and institutions:
Implement Smarter Counter-espionage Measures: The U.S. must adopt a more targeted approach to counter-espionage and intellectual property theft that focuses on genuine threats while rebuilding trust with the academic and scientific communities. Rebuilding confidence and avoiding the pitfalls of initiatives like the "China Initiative" is critical to preserving the U.S. as a global hub for scientific research and innovation.
Strengthen Legal and Regulatory Frameworks: Legal instruments such as the CFIUS should be strengthened to scrutinize strategic acquisitions of U.S. assets in critical sectors. This process must be robust enough to identify transactions linked to the Military-Civil Fusion strategy while maintaining a welcoming environment for legitimate foreign investment that benefits the American economy.
Empower State and Local Governments: The U.S. federal government should provide resources, training, and intelligence to state and local policymakers to help them identify and resist influence operations. This will help to close the "weak link" in the political system that the PRC has been exploiting.
Support Independent Media and Open Discourse: Countering state-sponsored propaganda requires more than simply exposing it. The U.S. should actively support independent journalism and cultural exchange that provides a robust and honest counter-narrative to Beijing's messaging. This involves leveraging the strengths of an open society—including freedom of the press and expression—to highlight the value of transparent and democratic governance.