Exclusive—Fred Fleitz: We Must Stop China from Stealing Our Military Secrets
Share this @internewscast.com

In the wake of the Trump administration’s successful operation to detain Venezuelan leader Nicolás Maduro, there has been a surge of discussion regarding his collaboration with China. This partnership has spanned intelligence sharing, military access, and technology transfers within the Western Hemisphere, prompting many to justify the U.S. government’s decisive action against him.

While much attention is given to China’s expanding influence globally, there has been less focus on how the Chinese Communist Party can easily obtain sensitive information domestically. A significant factor contributing to this vulnerability is the lack of stringent enforcement of regulations governing the use of electronic devices within secure U.S. facilities.

Ken Calvert, who chairs the House Appropriations Subcommittee on Defense, highlights that at the end of the Cold War, the United States possessed unparalleled military strength, with no apparent rival in sight.

Yet, in the span of just three decades, China has almost achieved parity. The nation has developed the world’s second-largest economy, leveraging this economic might to fuel an unprecedented and rapid military expansion.

China’s meteoric rise is not solely due to its own innovations. The country has systematically acquired U.S. commercial and defense secrets, bolstering both its economic and military sectors.

Creating new designs, compiling data, developing production systems, and generating intellectual property are processes that require substantial investment and time. By appropriating these advancements from others, China has accelerated its progress, focusing primarily on production. This strategy has been particularly effective over the past decade, facilitated by advancements in digital technology, notably through the use of cell phones.

Twenty years ago, espionage centered on stealing a handful of documents. Today it involves the theft and transmission of massive files, complete weapons manuals, and thousands of photographs of U.S. military equipment in use on American bases and ships, making it far easier for China to jump directly to production.

In 2025 alone, there were at least ten public cases of individuals charged or convicted of spying for China using their cell phones. Those cases are only the tip of the iceberg. Many more are resolved quietly when classified material is involved, to avoid exposing sensitive information in open court.

As cell phones become more powerful and ubiquitous, enforcement against their presence in sensitive facilities has not kept pace. Many government locations display signs stating, “No unauthorized electronic devices allowed.”

Unfortunately, those policies are often treated the same way speed limits are treated on America’s highways: respected only when enforcement is visible. In facilities without real enforcement mechanisms, people bring in phones with impunity, assuming it is acceptable because they lack malicious intent. Few consider that their devices could be compromised or that widespread noncompliance provides cover for someone who does have hostile intent.

According to retired CIA executive Rodney Alto, fewer than 10 percent of intelligence community facilities that prohibit electronic devices have any mechanism to detect them. Where detection systems do exist, experience shows that people still attempt to bring in unauthorized devices, proving that facilities without protection are likely admitting thousands of compromising devices without ever knowing it.

This helps explain how China has been able to catch up so quickly. As the United States develops new weapons and defense systems, China learns from stolen copies of our work and races to keep pace.

This must be corrected — and now.

China’s military modernization is accelerating as its claims against Taiwan intensify. Taiwan produces nearly all of the world’s most advanced semiconductor chips, supplying companies such as NVIDIA, Intel, IBM, and others, placing the center of advanced computing just 115 miles from mainland China.

At the same time, the United States is preparing the largest buildup of military intellectual property in history. Programs such as Golden Dome, the Columbia-class submarine, the B-21 Raider, nuclear triad modernization, and hypersonic weapons rely on technologies that do not yet exist. That gives us a rare opportunity to protect these secrets before they are created, and before they can be stolen.

We know extraordinary technologies are coming. Now is the time to enforce a government-wide ban on unauthorized electronic devices in sensitive facilities, backed by mandatory detection systems, real penalties for violations, and sustained oversight by Congress. It’s the only way to make sure we don’t continue to build China’s blueprints for them.

Fred Fleitz is a former Chief of Staff to the Trump National Security Council and a former CIA analyst. He is currently Vice Chair of the America First Policy Institute Center for American Security.

Share this @internewscast.com
You May Also Like
Artist fumes after tribute honoring slain Iryna Zarutska gets scrubbed amid woke blowback

Outrage Erupts as Tribute to Slain Artist Iryna Zarutska Faces ‘Woke’ Controversy

In Providence, Rhode Island, an artist tasked with creating a mural in…
‘Cereal’ offender busted for sneaky shoplifting trick at grocery store checkout

Clever Shoplifter Caught Using Unusual Tactic at Grocery Checkout

He failed to dash away with breakfast in hand. A daring thief…
Military continues urgent search for F-15 co-pilot behind enemy lines in Iran

Military Intensifies Critical Search for F-15 Co-Pilot in Iran’s Hostile Territory

The search for an American pilot, who went missing behind enemy lines…
Gavin Newsom to spend $19M in taxpayer funds on New York PR firm to help polish California’s image

California Invests $19M in New York PR Firm to Enhance State’s National Image, Announces Governor Newsom

In a bid to enhance California’s national reputation, Governor Gavin Newsom is…
Easter Sunday services, Chicago: Daley Plaza hosts Sunrise Service; Fourth Presbyterian Church to worship Catholic holiday

Chicago’s Daley Plaza and Fourth Presbyterian Church Celebrate Easter Sunday with Unique Sunrise and Worship Services

CHICAGO (WLS) — Downtown Chicago was alive with early morning Easter festivities…
‘Squad’ Member Ayanna Pressley Calls Eviction ' Act of Violence'

Rep. Ayanna Pressley Labels Evictions as ‘Acts of Violence’ – A Bold Stand Against Housing Injustice

Representative Ayanna Pressley (D-MA) has introduced the “HELP Act,” which she claims…
Trump blasts LA homeless agency's 'abysmal record' in plan to slash nearly $400M in federal funds

Trump Criticizes LA Homeless Agency’s Performance Amid Proposal to Cut $400M in Federal Funding

In a significant move, the Trump administration has announced plans to reduce…
Art heist targeting million-dollar masterpieces exposes blind spots in museum defenses, expert warns

Unveiling Museum Vulnerabilities: Expert Insights on the Million-Dollar Art Heist

An audacious art heist in Europe has captured global attention, sparking discussion…
Palmdale Street shooting on Jacksonville's Northwest side leaves man dead

Shooting Erupts During Dice Game on Jacksonville’s Northside, Man Injured: JSO Reports

In the aftermath of a shooting incident at a Jacksonville motel, both…
Hail Mary to save beloved Queens church rotting in a cemetery

Community Rallies to Restore Historic Queens Church Facing Decay

A neighborhood in Queens is hoping for a $6 million miracle to…
Idaho Domino's pizza driver Dan Simpson's kind gesture leads to $40K in tips after viral video

Idaho Domino’s Driver’s Heartwarming Act Sparks Viral Sensation, Rakes in $40K in Tips!

What began as a quick pit stop evolved into a significant windfall…
Pope Leo marks first Easter as pontiff with call for hope amid global conflicts

Pope Leo’s Inaugural Easter Message: A Beacon of Hope in Troubled Times

Pope Leo marked his inaugural Easter Mass as pontiff with a heartfelt…