{"id":6118,"date":"2022-01-13T01:59:18","date_gmt":"2022-01-13T01:59:18","guid":{"rendered":"https:\/\/blackopspartners.com\/?p=6118"},"modified":"2022-01-13T01:59:19","modified_gmt":"2022-01-13T01:59:19","slug":"us-companies-are-supercharging-the-chinese-communist-party","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/us-companies-are-supercharging-the-chinese-communist-party\/","title":{"rendered":"US Companies Are Supercharging the Chinese Communist Party"},"content":{"rendered":"\n
<\/p>\n\n\n\n
Originally published by The Epoch Times<\/a><\/em><\/p>\n\n\n\n <\/p>\n\n\n\n In the skies, a Chinese fighter pilot swipes his hand across a touch screen, and the automated target-recognition software detects his target in seconds. In Xinjiang, China, giant servers that power an immense array of repressive surveillance technologies come to life. In Shanghai, smart city\u00a0technology<\/a>connects residents as never before, even as authorities tighten their control over every action of the city\u2019s residents.<\/p>\n\n\n\n All these technologies and more were made possible through the continued involvement of U.S. companies with subsidiaries of the Chinese Communist Party (CCP<\/a>).<\/p>\n\n\n\n Technologies developed by U.S. companies are supercharging the Chinese regime<\/a> and its military<\/a> development even as the CCP directs and facilitates the systematic investment in and acquisition of U.S. companies and their assets to generate a large-scale technology transfer<\/a>.<\/p>\n\n\n\n Michael Sekora knows something about the process. He headed Project Socrates, a Reagan<\/a>-era Defense Intelligence Agency program designed to lead the United States to victory during the Cold War<\/a>.<\/p>\n\n\n\n The purpose of that project was twofold: to comprehend why the United States was declining in competitiveness with the Soviet Union<\/a> and to use that knowledge to rebuild the nation\u2019s competitive advantage.<\/p>\n\n\n\n Sekora now believes that the lessons learned from Project Socrates hold the key to understanding\u2014and reversing\u2014the trend of a declining United States.<\/p>\n\n\n\n \u201cChina<\/a> understands that exploiting technology<\/a> more effectively than the competition is the foundation of all competitive advantage,\u201d he said.<\/p>\n\n\n\n The problem, he said, is that instead of meaningfully maneuvering and exploiting critical technologies, the United States has fallen back on what Sekora calls \u201cfinance planning,\u201d and has allowed the Chinese regime to co-opt and exploit technology to its advantage at every turn.<\/p>\n\n\n\n While China is on the move, the United States is merely loosening the reins on businesses<\/a> and throwing money at the problem under the assumption that increased funding for research and development will somehow translate into the creation and deployment of the precise technologies that the nation needs when it needs them.<\/p>\n\n\n\n According to Sekora, this is a sorely mistaken premise.<\/p>\n\n\n\n \u201cThe only way to effectively counter a technology strategy is with a more effective technology strategy,\u201d he said. \u201cExecuting anything else is just pissing into the wind.\u201d<\/p>\n\n\n\n Sekora isn\u2019t alone. His sentiments follow warnings from top U.S. military<\/a>officials that Chinese military technology will advance beyond that of the United States if serious changes aren\u2019t made to the development and acquisition process.<\/p>\n\n\n\n \u201cThe pace [China is] moving and the trajectory that they\u2019re on will surpass Russia and the United States if we don\u2019t do something to change it,\u201d John Hyten, then-vice chair of the Joint Chiefs of Staff, said in October. \u201cIt will happen.\u201d<\/p>\n\n\n\n Despite such warnings, the overarching U.S. strategy for competition with China has remained relatively unchanged. Though more than 400 Chinese entities have been put on a U.S. trade blacklist, the CCP\u2019s strategy of quickly reforming, renaming, and replacing these entities is muddling the effectiveness of such measures and increasing the complexity of the ties that bind the Chinese military with the U.S. business community.<\/p>\n\n\n\n As a result, theft and quasi-legal acquisitions of key U.S. technologies by the Chinese regime continue to rise<\/a>.<\/p>\n\n\n\n To understand why, it\u2019s necessary to unpack how Chinese laws facilitate\u00a0technology transfer<\/a>, how they were explicitly designed to do so, and how U.S. corporations are continuing to feed the dragon.<\/p>\n\n\n\nAn Old Threat, New Again<\/strong><\/h2>\n\n\n\n