Transform Your Living Room with These Must-Have Oscar Viewing Party Decorations

Note: Localish participates in various affiliate marketing programs, meaning we earn commissions on certain purchases. Refer to the complete disclaimer below for more details. The...
HomeNewsProtecting Our Defense: Strategies to Halt China's Infiltration of Military Secrets

Protecting Our Defense: Strategies to Halt China’s Infiltration of Military Secrets

Share and Follow

The Trump administration’s successful apprehension of Nicolás Maduro has sparked extensive discussion regarding the Venezuelan leader’s ties with China. This relationship extends from intelligence exchanges to military collaborations and technology transfers within the Western Hemisphere, underscoring why the Trump administration deemed it necessary to take action against him.

While analysts often zero in on China’s global influence, they frequently overlook a pressing issue closer to home: the Chinese Communist Party’s alarming ease of accessing sensitive information within the United States. This vulnerability often stems from lax enforcement of our own regulations concerning electronic devices in secure facilities.

Ken Calvert, who chairs the House Appropriations Subcommittee on Defense, reflects on the U.S.’s position post-Cold War. Back then, the U.S. stood as the world’s unmatched military power, seemingly insurmountable by any nation. Yet, within a mere three decades, China has emerged as a formidable contender. The nation has rapidly developed the world’s second-largest economy, channeling this economic might into a swift and sophisticated military expansion unlike anything previously observed.

China’s meteoric rise isn’t purely a product of innovation. Its economic and military advancements have been significantly bolstered by the systematic appropriation of U.S. commercial and defense secrets. This strategic exploitation has propelled China to its current status, posing a complex challenge to U.S. national security and economic interests.

China’s rise has not come from innovation alone. Both economically and militarily, it has been built on the systematic theft of U.S. commercial and defense secrets.

Developing designs, gathering data, building production systems, and creating intellectual property is expensive and time-consuming. A country can move much faster if it can “borrow” that work from others and focus only on production. That is what China has done for decades, and its ability to do so has only increased over the last ten years with digital technology, especially cell phones.

Twenty years ago, espionage centered on stealing a handful of documents. Today it involves the theft and transmission of massive files, complete weapons manuals, and thousands of photographs of U.S. military equipment in use on American bases and ships, making it far easier for China to jump directly to production.

In 2025 alone, there were at least ten public cases of individuals charged or convicted of spying for China using their cell phones. Those cases are only the tip of the iceberg. Many more are resolved quietly when classified material is involved, to avoid exposing sensitive information in open court.

As cell phones become more powerful and ubiquitous, enforcement against their presence in sensitive facilities has not kept pace. Many government locations display signs stating, “No unauthorized electronic devices allowed.”

Unfortunately, those policies are often treated the same way speed limits are treated on America’s highways: respected only when enforcement is visible. In facilities without real enforcement mechanisms, people bring in phones with impunity, assuming it is acceptable because they lack malicious intent. Few consider that their devices could be compromised or that widespread noncompliance provides cover for someone who does have hostile intent.

According to retired CIA executive Rodney Alto, fewer than 10 percent of intelligence community facilities that prohibit electronic devices have any mechanism to detect them. Where detection systems do exist, experience shows that people still attempt to bring in unauthorized devices, proving that facilities without protection are likely admitting thousands of compromising devices without ever knowing it.

This helps explain how China has been able to catch up so quickly. As the United States develops new weapons and defense systems, China learns from stolen copies of our work and races to keep pace.

This must be corrected — and now.

China’s military modernization is accelerating as its claims against Taiwan intensify. Taiwan produces nearly all of the world’s most advanced semiconductor chips, supplying companies such as NVIDIA, Intel, IBM, and others, placing the center of advanced computing just 115 miles from mainland China.

At the same time, the United States is preparing the largest buildup of military intellectual property in history. Programs such as Golden Dome, the Columbia-class submarine, the B-21 Raider, nuclear triad modernization, and hypersonic weapons rely on technologies that do not yet exist. That gives us a rare opportunity to protect these secrets before they are created, and before they can be stolen.

We know extraordinary technologies are coming. Now is the time to enforce a government-wide ban on unauthorized electronic devices in sensitive facilities, backed by mandatory detection systems, real penalties for violations, and sustained oversight by Congress. It’s the only way to make sure we don’t continue to build China’s blueprints for them.

Fred Fleitz is a former Chief of Staff to the Trump National Security Council and a former CIA analyst. He is currently Vice Chair of the America First Policy Institute Center for American Security.

Share and Follow