The Chinese Communist Party (CCP) has for decades used a comprehensive strategy to steal from the U.S. economy, with tools including espionage, currency manipulation, cybertheft, and intellectual property theft.
“Technology is probably the most important part of our economy,” said U.S. Trade Representative Robert E. Lighthizer before the Senate finance committee on March 22.
“We concluded that, in fact, China does have a policy of forced technology transfer; of requiring licensing at less than economic value; of state capitalism, wherein they go in and buy technology in the United States in noneconomic ways; and then, finally, of cybertheft,” he said.
Over the years, the CCP has started initiatives and created new tools for theft. Its push made global headlines in 2014, when a group of its military hackers were indicted for breaching the networks of private companies in the United States and stealing their intellectual property for the benefit of the CCP.
Rather than stopping after its hacker army was exposed, however, the CCP merely changed its tactics. It reduced the number of cyberattacks, but its hackers became more focused. It also passed additional laws that force foreign companies to hand over their data, and by early 2016 it had launched a new strategy for acquisitions and investment to gain control of targeted foreign markets.
On March 22, however, President Donald Trump put into motion an initiative to stop the CCP’s economic theft and to begin repairing trade with China.
The actions follow a U.S. trade representative investigation into the CCP’s theft of intellectual property (IP). The trade representative will soon release a list of 1,300 products that have been targeted. Trump is also considering placing restrictions on Chinese investment, which the CCP has weaponized for economic warfare.
Any actions to end the CCP’s economic theft and trade imbalances will need to take into consideration the full picture of the regime and its actions. (See the Epoch Times infographic on how the CCP’s broader systems and strategies work.)
One complicating factor is the CCP’s nationalization of otherwise benign institutions to carry out its operations. In China, the lines between private companies, the CCP, and its military are blurred. Any company with more than 50 employees is required to have a Communist Party liaison, and the regime uses tight regulations and data policies to ensure it maintains access and control.
Also, unlike the CCP’s military hackers, who were illegally breaching company networks and stealing technology, the CCP in many cases uses legal loopholes to take advantage of the open system of the United States.
In its latest push, the CCP has mobilized investors, regulating where their money can or cannot go so as to fulfill the regime’s broader interests. It is targeting startup companies, establishing and funding research conferences in order to gain access to frontier findings, and partnering with or leveraging existing ties with universities to access cutting-edge research.
The goal of the CCP today remains the same as when it began Project 863: It aims to replace the United States as the world’s leading power and to spread globally its “China model.” Based on communist totalitarianism, the China model lacks the basic principles of human rights and freedom of belief that are at the foundations of the West.