The People’s Republic of China (PRC) has been relentless in its cyberattacks, trade manipulation, and war threats against the U.S.. Yet, many Americans still hesitate to recognize China as the enemy it truly is. While the majority of Americans hold a negative opinion of China, only 40% identify it as an enemy. This perspective needs to change.
Unlike allies such as the UK and Canada, which neither cyberattack nor threaten the U.S., China consistently engages in aggressive and harmful actions. It is time for Americans to realign their understanding of China’s intentions and push the administration to adopt policies that reflect this reality. Failure to act decisively will allow China to win.
The PRC has been linked to one of the largest cyber espionage incidents in history. According to a recent report by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA), actors affiliated with the People’s Republic of China (PRC) have conducted a widespread espionage campaign targeting U.S. telecommunications networks.
The breaches infiltrated eight U.S. telecom companies and impacted dozens of other countries over a period of at least two years. This operation, labeled “Salt Typhoon,” compromised private communications and customer call records, primarily targeting government and political figures, including President Trump. Additionally, the hackers copied information that had been requested by U.S. law enforcement through court orders, and the breach may have also accessed the communications of everyday Americans. Despite ongoing efforts to address the attack, the breaches remain active in U.S. telecom networks.
Deputy National Security Adviser Anne Neuberger emphasized the need for U.S. companies to address cybersecurity gaps to prevent further Chinese access. The administration has formed a unified coordination group to respond to the hack and has been working closely with telecom CEOs and cybersecurity experts to strengthen defenses. Although classified communications appear to be unaffected, the risk of additional breaches remains high.
The incident highlights China’s continued cyberespionage efforts, with similar campaigns previously targeting Europe and the Indo-Pacific. In response, agencies, including CISA, the NSA, and international partners, have released guidance to bolster communication infrastructure security.
Chinese hackers have been implicated in a long history of cyberattacks targeting U.S. government entities, critical infrastructure, and private companies. Recent breaches in U.S. telecommunications providers underscore China’s evolving cyber strategy, which has shifted from espionage to preparing for potentially disruptive or destructive attacks, particularly in the event of a crisis over Taiwan.
CISA Director Jen Easterly highlighted that Chinese cyber campaigns initially focused on stealing intellectual property and spying on government agencies, have intensified over the decades. Notable attacks include the 2009 breach of Lockheed Martin’s Joint Strike Fighter Program and Operation Aurora, which targeted major U.S. companies like Google and Morgan Stanley.
More recently, China has been found embedding itself in critical infrastructure, such as pipelines, water systems, and transportation networks, with the capability to launch attacks designed to incite societal panic and disrupt U.S. military operations.
FCC Chairwoman Jessica Rosenworcel has proposed new cybersecurity regulations for U.S. telecommunications companies in response to the “Salt Typhoon” attacks. Under the Communications Assistance for Law Enforcement Act (CALEA) the FCC has the authority to mandate annual cybersecurity risk management certifications from telecom providers. Companies failing to meet cybersecurity standards could face fines or criminal penalties.
The plan has enjoyed bipartisan support at the FCC, including from incoming Chairman Brendan Carr, a vocal critic of China’s influence. The proposed measures aim to address gaps in voluntary cybersecurity efforts, which have proven insufficient against increasing threats from Chinese hackers.
One of the main reasons the U.S. has been unable to stop Chinese hacking is that it does not officially regard China as an enemy. Instead of cutting off China’s access to U.S. markets and technology, the Biden administration has repeatedly pursued a variety of failed Band-Aid solutions. It shouldn’t take more than one of the major breaches mentioned in this article for the U.S. to wake up to the reality that China is an enemy and that friendly relations with a country that wishes you harm are impossible.
Experts warn that China’s hacking activities are part of a broader geopolitical strategy aimed at undermining U.S. resilience in the event of conflict, particularly in the Taiwan Strait. Taiwan, as the world’s largest semiconductor producer, is a key target for Chinese cyber espionage.
Xi Jinping has set milestones for China in 2027, 2035, and 2049, by which he aims to position China as the world’s dominant political, military, and economic power, with the capture of Taiwan as a critical goal. Hacking allows China to accelerate its timeline by stealing U.S. technology, gaining technological and economic advantages over the United States.
The post Massive PRC Hack Targets Political Figures, Including Trump appeared first on The Gateway Pundit.