Start your day with intelligence. Get The OODA Daily Pulse.

China’s strategy for global dominance has gone digital, embedding itself in the systems we depend on and exploiting vulnerabilities to undermine U.S. national security. From compromised routers in American homes to cyber campaigns targeting critical infrastructure, Beijing’s methods are both subtle and devastating.

The U.S. learned this lesson the hard way with the Salt Typhoon campaign, where Chinese operatives breached broadband networks to surveil government and civilian communications. These hacks aren’t opportunistic—they’re systematic, exploiting the widespread use of low-cost routers manufactured by companies like TP-Link. These devices, marketed as affordable solutions, provide Beijing with a foothold in millions of American homes and small businesses.

The problem extends far beyond consumer products. China’s telecom giants, including Huawei and ZTE, have embedded themselves into the backbone of global networks. Despite efforts like the FCC ban on Huawei, these companies remain deeply entrenched, often financing infrastructure projects in developing nations with no-strings-attached loans. This is more than market competition; it’s a deliberate effort to control the flow of global communications and ensure that critical data flows through Beijing’s hands.

Consider the implications: telecommunications networks built on Chinese equipment aren’t just insecure—they’re compromised from the start. A recent report revealed that over 50 countries were affected by Chinese telecom hacking campaigns, targeting everything from private industry to governmental systems. Each compromised network becomes a node in a broader web of surveillance, one that extends far beyond China’s borders.

China’s dominance in the tech supply chain further amplifies the risk. It controls 98% of global gallium production, a critical resource for manufacturing semiconductors and other advanced technologies. While the U.S. has imposed restrictions on AI chip exports, Beijing has found ways to bypass these measures by rerouting supply chains through cooperative countries in Southeast Asia. This is globalization weaponized, with China leveraging its economic ties to undermine American restrictions and maintain its technological edge.

And it’s not just hardware. Chinese apps like TikTok continue to dominate the digital space, collecting vast amounts of user data under the guise of entertainment. The platform’s algorithms are designed not just to entertain but to influence, shaping narratives and trends in ways that align with Beijing’s strategic goals. The potential for misuse is staggering, especially in an era where information warfare is as potent as physical conflict.

The U.S. response so far has been reactive and piecemeal. Banning individual players like Kaspersky software or restricting Huawei’s access to government contracts is necessary but insufficient. The broader issue—China’s embedded presence in our technology ecosystems—remains largely unaddressed.

A comprehensive strategy is needed.

First, the U.S. must prioritize the systematic removal of Chinese-made routers, software, and other tech from critical networks. Incentives for companies to adopt secure alternatives, paired with stricter procurement standards for government agencies, are essential. Programs like the CHIPS Act should be expanded to support not just semiconductor production but also the development of secure telecommunications technologies.

Second, Washington must lead a coalition to counter Beijing’s technological expansion. The Belt and Road Initiative has made China a dominant force in global infrastructure, but it has also left many countries in debt and disillusioned. By offering transparent, mutually beneficial alternatives, the U.S. can weaken Beijing’s grip and rebuild trust in regions like Latin America and Africa.

Finally, the U.S. must take a proactive approach to cybersecurity. Encrypting sensitive communications, investing in cutting-edge cyber defenses, and fostering public-private partnerships to secure critical infrastructure are no longer optional—they’re imperative. At the same time, the federal government must actively audit and remove Chinese-linked technologies from domestic networks, ensuring that the vulnerabilities of today don’t become the crises of tomorrow.

China’s digital infiltration isn’t a distant threat; it’s happening now, in our homes, businesses, and government offices. Addressing it requires more than isolated bans and reactive measures. It demands a fundamental rethinking of how we approach technology, globalization, and security.

Tagged: China
Rick de la Torre

About the Author

Rick de la Torre

Senior Operations Officer CIA (Retired) US State Dept. Foreign Service Officer. Corporate Leader Skilled in Business Planning, Operations Management, Market Research, Risk Management. Strong community and social services professional with a Bachelor of Business Administration (BBA) focused in International Business from Florida International University.