The Silent Game: How China Strategizes America's Fall — and the Countermove Begins

The concept of China attempting to "destroy America from within" is explored in various books and analyses, notably Plan Red: China's Project to Destroy America by Gordon G. Chang and Unrestricted Warfare: China's Master Plan to Destroy America by Qiao Liang and Wang Xiangsui. These works, along with other sources, outline strategies that China might employ to undermine the United States through non-military means. Here's a synthesized overview of the key themes:

1. Unrestricted Warfare: Beyond the Battlefield

In Unrestricted Warfare, two People's Liberation Army (PLA) colonels argue that modern conflicts extend beyond traditional military engagements. They propose that nations can achieve strategic objectives through various non-military tactics, including:

  • Economic Warfare: Manipulating trade relations and financial systems to weaken adversaries.

  • Cyber Attacks: Targeting critical infrastructure and stealing intellectual property.Wikipedia

  • Legal Warfare (Lawfare): Using international and domestic laws to constrain opponents' actions.

  • Media and Psychological Operations: Influencing public opinion and sowing discord within societies.

2. Plan Red: A Contemporary Perspective

Gordon G. Chang's Plan Red contends that China's leadership, under Xi Jinping, is actively pursuing strategies to undermine the United States. Chang emphasizes that these efforts are not limited to military confrontations but encompass a broad spectrum of activities aimed at weakening American society, economy, and political institutions.

3. Information and Influence Operations

China has been reported to engage in extensive information campaigns to shape narratives and influence public opinion in the U.S. This includes the use of state-sponsored media, social media platforms, and educational institutions to promote favorable views and suppress dissenting perspectives.

4. Cyber and Technological Espionage

Chinese entities have been implicated in cyber-espionage activities targeting U.S. government agencies and private companies. These operations aim to acquire sensitive information, intellectual property, and technological advancements to bolster China's strategic position.

5. Economic Leverage and Supply Chain Dependencies

China's significant role in global supply chains provides it with economic leverage. Concerns have been raised about dependencies on Chinese-manufactured components in critical infrastructure, such as reports of hidden "kill switches" in solar inverters that could potentially disrupt power grids.

6. Exploitation of Open Societies

The Chinese government has been accused of exploiting the openness of democratic societies to further its interests. This includes establishing front organizations, influencing academic institutions, and engaging in lobbying efforts to sway policy decisions in its favor.

How the U.S. Should Counter These Tactics

1. Strengthen Domestic Resilience

  • Secure infrastructure: Invest in cybersecurity and replace vulnerable Chinese hardware in power, telecom, and defense systems.

  • Reshore key industries: Rebuild U.S. manufacturing for critical goods (e.g., medicine, semiconductors, solar panels).

  • Control foreign investment: Screen acquisitions in sensitive sectors (e.g., tech, agriculture).

2. Combat Propaganda and Disinformation

  • Regulate foreign media: Require disclosures for Chinese state-run media.

  • Dismantle influence networks: Monitor and restrict front groups and Confucius Institutes.

  • Educate the public: Launch public awareness campaigns about CCP influence tactics.

3. Enforce IP and Cybersecurity

  • Prosecute IP theft: Treat technology espionage as a national security threat.

  • Strengthen cybersecurity partnerships: Enhance cooperation between private sector and government.

  • Develop tech alternatives: Invest in 5G, AI, quantum computing to stay ahead.

4. Reform Legal Loopholes

  • Modernize FARA: Strengthen enforcement of the Foreign Agents Registration Act.

  • Tighten academic exchanges: Vet funding sources and sensitive research access.

5. Invest in National Unity and Education

  • Civics education: Rebuild trust in American democracy and its institutions.

  • Counter social division: Promote bipartisan public service campaigns.

  • Resist cancel culture and division tactics: Undermine identity-based tribalism that foreign powers exploit.

6. Build Strategic Alliances

  • Global tech and security alliances: Partner with Japan, India, Taiwan, and EU allies to counter CCP influence.

  • Support Indo-Pacific allies: Bolster democracies vulnerable to Chinese pressure.

Conclusion:
China's strategy to undermine the U.S. from within relies not just on overt aggression, but on subverting American society, economy, and values. The response must be multidimensional—blending strong national defense, domestic education, resilient infrastructure, legal safeguards, and international alliances to preserve America’s sovereignty and democratic ideals.

References:

  1. Unrestricted Warfare
    Qiao Liang & Wang Xiangsui (1999)
    A foundational Chinese military treatise proposing non-military strategies to weaken adversaries, including economic, cyber, and legal warfare.
    ISBN: 9781626543065

  2. Plan Red: China's Project to Destroy America
    Gordon G. Chang (2023)
    Analyzes China’s long-term plan to subvert U.S. society, economy, and political will from within.
    Publisher: IndiePubs – Plan Red on IndiePubs

  3. The China Threat: How the People's Republic Targets America
    Bill Gertz (2002)
    Details espionage, influence operations, and the broader military buildup aimed at U.S. vulnerability.
    ISBN: 9780895261879

  4. China’s Cyber Espionage and Theft of U.S. IP
    U.S. National Counterintelligence and Security Center (2022)
    Official reports documenting large-scale cyber operations and intellectual property theft.

  5. China’s Influence & Propaganda in the U.S.
    New York Post Editorial Board (2024)
    "China is abusing the freedoms allowed in the U.S. to run a massive propaganda operation."
    Link

  6. The Times (UK): Solar Panel Espionage Threats
    “China's solar panels may contain kill switches that threaten U.S. power grid.”
    Link

  7. U.S.–China Economic and Security Review Commission Reports
    Annual reports to Congress highlighting China's multidimensional threats.
    https://www.uscc.gov/

Previous
Previous

Turning the Tide: KNU and KNLA Reclaim Ground — Now Is the Time to Unite with KTLA and Reject Corruption for Lasting Liberation

Next
Next

Stranded Abroad? The Hidden Risk of Traveling Without a U.S. Passport