The United States is effectively engaged in a cold war with China, which, by its nature, is more complex than the one it fought for 45 years against the Soviet Union. This conflict unfolds across five main fronts: political, territorial, technological, cultural, and human.
Unlike the conflict with Russia, where the adversary was isolated from the Western world, interaction with China occurs through open channels: universities, investments, business networks, migrant communities, and supply chains. This interdependence acts as a psychological and political brake, as for decades, many corporate sectors benefited from production, markets, and returns in China.
The first channel of this modern 'infiltration' is the human factor. Hundreds of thousands of Chinese students study in U.S. universities, creating a structured risk for technology transfer. While official reports do not accuse all students, there is an understanding that even a small percentage engaged in information gathering can pose a significant operational threat.
The second channel is intellectual property theft and economic espionage, which in Washington is described as a persistent and large-scale threat. Unlike the Soviet case, the problem is not just identifying the adversary but admitting that the door was left open for decades out of convenience, naivety, or greed.
The third vector is political and cultural influence. Beijing combines methods: cyber intrusions, recruiting insiders, 'asymmetric' technological cooperation, and exploiting open environments. U.S. security assessments state that China deploys influence operations through party structures and affiliated networks.
The fourth front is territorial and logistical. In recent years, there have been growing alerts over land and asset purchases near strategic facilities, leading to stricter reviews and state-level lawsuits. The underlying argument in Washington is preventive: to prevent seemingly civilian assets from operating as platforms for observation, interference, or pressure on critical supply routes.
The fifth point is the technological dimension and supply chains. In U.S. official reports and public debates, the concern is not framed as an indiscriminate accusation against students but as a structural risk: in a large community, a small percentage involved in information gathering can translate into a significant operational volume.
In summary, the 'silent infiltration' attributed to China is not based on a single event but on an architecture that includes massive academic presence, economic interdependence, influence operations, pressure on institutions, and advances in critical technological areas.