Why China Is Building an AI Hackers’ Army

The video explains how China has developed a vast, state-sponsored cyber hacking program aimed at economic espionage and preparing for potential military conflicts by targeting critical US infrastructure such as power, water, and telecommunications. Through extensive investment in cyber education, controlled hacking competitions, and stringent vulnerability reporting laws, China has built a sophisticated cyber force that conducts large-scale attacks and intelligence operations, posing significant national security threats to the United States.

The video features John Demers, the Assistant Attorney General for National Security at the US Department of Justice, discussing China’s extensive cyber espionage and hacking activities targeting the United States. Since the 1990s, China has been responsible for 80% of the economic espionage cases charged by the US, with ongoing investigations revealing Chinese state-sponsored hackers infiltrating major telecommunications companies and critical infrastructure. Despite the scale of these operations, a definitive “smoking gun” has remained elusive. The Chinese cyber strategy extends beyond economic theft, aiming to provide military leadership with options to disrupt essential systems like power and water in the event of conflict.

China’s cyber espionage efforts date back to the early 2000s, with Pentagon reports indicating that a significant portion of intrusion attempts into US military networks originated from Chinese servers. The sectors most affected include energy and telecommunications, highlighting Beijing’s preparation for unconventional warfare scenarios. The rise of Xi Jinping in 2013 marked a shift toward a more explicit cyber strategy, especially after Edward Snowden’s leaks revealed US offensive cyber capabilities. China perceived control over cyberspace as critical to regime stability, prompting increased internet restrictions and a focus on cyber defense and offense.

Between 2015 and 2017, China invested heavily in cyber security education, reforming over 200 universities and boosting enrollment in related fields by 70%. Chinese teams excelled in international hacking competitions, demonstrating advanced technical skills by quickly discovering critical vulnerabilities. However, in 2018, the government restricted participation in international contests, creating the state-controlled Tianfu Cup instead. Unlike international events where vulnerabilities are disclosed to manufacturers, the Tianfu Cup funneled exploits directly to Chinese intelligence, facilitating enhanced digital surveillance and control.

China’s 2021 regulation on software vulnerability management mandated that companies report security flaws within 48 hours, effectively granting the government rapid access to global vulnerabilities. This law turned foreign companies operating in China into involuntary intelligence sources. State-funded hacking competitions, such as the Wang Ding Cup, have attracted tens of thousands of participants, serving as talent pools for intelligence agencies and state contractors. Leaked documents from the Chinese company ISUN in 2024 exposed large-scale cyber attacks orchestrated by government agencies, targeting foreign governments, companies, and critical infrastructure, with local police departments also implicated in espionage operations.

The US has responded with formal accusations against Chinese hackers and officials, while Beijing denies involvement. Cybersecurity agencies report thousands of intrusion attempts linked to China targeting US power, water, and telecommunications networks, many aimed at mapping vulnerabilities for potential military use. Notable incidents include attacks on US territories like Guam, which hosts a key military base near Taiwan, raising concerns about China’s intent to disrupt US military response capabilities. Overall, China’s cyber operations are the largest globally, surpassing all other nations combined, with objectives extending beyond espionage to the potential paralysis of vital infrastructure in wartime.