China Presents The Top Cyber & Military Challenge

China is the top military and cyber threat to the United States, according to a new report by The Office of National US Intelligence published on 18th March 2025. The report says that China has the ability to hit the US with conventional weapons and the US infrastructure through cyber-attacks, as well as seeking to displace the US as the top AI power by 2030.

In addition to China, the assessment analysed threats to the United States posed by Russia, North Korea, Iran and “non-state transnational criminals”, including Mexican drug cartels and Islamic extremist groups.

Russia seeks to challenge the US through deliberate campaigns to gain an advantage, with Moscow’s war in Ukraine having afforded it a “wealth of lessons regarding combat against western weapons and intelligence in a large-scale war”, said the report.

Released ahead of testimony before the Senate intelligence committee by Donald Trump’s intelligence chiefs, the report said China’s People’s Liberation Army (PLA) probably planned to use large cyber language models to create fake news, imitate personas and enable attack networks. China’s military is fielding advanced capabilities, including hypersonic weapons, stealth aircraft, advanced submarines, stronger space and cyberwarfare assets and a larger arsenal of nuclear weapons,” the director of national intelligence, Tulsi Gabbard, told the committee, labelling Beijing Washington’s “most capable strategic competitor”.

“China almost certainly has a multifaceted, national-level strategy designed to displace the United States as the world’s most influential AI power by 2030,” the report said.

The release coincided with the Chinese publication of a report by the China Cybersecurity Industry Alliance, accusing US intelligence agencies of “large scale and long-term” phone and online network hacking. The report described incidents stretching back over a decade, but was pushed out widely by state media and government agencies. China's Foreign ministry spokesperson, Guo Jiakun, expressed “grave concern” at a regular press briefing recently. “Over the years, the US has been accustomed to crying ‘stop thief’ on supply chain security issues, manipulating double standards, and vigorously hyping the so-called ‘5G supply chain security issues’, while cooperating with major internet companies or equipment suppliers in its own country to pre-install back doors in global information equipment products, serving its own network attack activities,” Guo said.

The CIA Director, John Ratcliffe, told the Senate committee that China had made only “intermittent” efforts to curtail the flow of precursor chemicals fuelling the US fentanyl crisis due to its reluctance to crack down on lucrative Chinese businesses. 

As punishment, President Trump has raised the tariffs on all Chinese imports by 20% to for what he says is its failure to halt shipments of chemicals used to make the powerful narcotic, fentanyl. 

US concerns about China dominated about a third of the 32-page report, which said it was set to increase military and economic coercion toward Taiwan, the democratically governed island China claims as its territory. “The PLA probably is making steady but uneven progress on capabilities it would use in an attempt to seize Taiwan and deter, and if necessary, defeat, US military intervention,” the report says.

However, the analysis is balanced by the recognition that  China faces “daunting” domestic challenges, including corruption, demographic imbalances, and fiscal and economic headwinds that could impair the ruling Communist party’s legitimacy at home.

China’s economic growth probably will continue to slow because of low consumer and investor confidence, and Chinese officials appear to be bracing for more economic friction with the US, the report concludes.

DNI   |  Guardian   |   Reuters   |   NDTV   |   MSN   |   Bangkok Post   

Image: Ideogram 

You Might Also Read: 

Geopolitics, Nation-State Hackers & Cyberwar:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




 

« BlackLock Hackers Hacked
Beyond MFA: A Multi-Layered Cybersecurity Strategy Is Essential »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Materna Radar Cyber Security

Materna Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

Health Sector Cybersecurity Coordination Center (HC3) - USA

Health Sector Cybersecurity Coordination Center (HC3) - USA

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

Syntura

Syntura

Syntura is your trusted partner for advisory, infrastructure and managed services.