SURROUNDED: FINAL PHASE
BY: CHRISTIE HUTCHERSON

SURROUNDED: FINAL PHASE

Comprehensive Threat Assessment of China's Military Actions and Strategic Maneuvers Including Their Allies

Overview

China's expanding influence and military presence near the United States pose significant strategic threats. This assessment consolidates various aspects of China's activities, highlighting their potential to challenge U.S. national security. The scope includes military installations, land acquisitions near sensitive sites, influence in Latin America and the Caribbean, cyber capabilities, infiltration of military-age men into the U.S., and other covert operations.

Military Installations and Land Acquisitions

Land Acquisitions Near U.S. Military Bases

  • Grand Forks Air Force Base, North Dakota: China has attempted to purchase large tracts of land near this strategic military base, raising concerns about espionage and surveillance capabilities. These acquisitions could facilitate intelligence gathering and potentially disrupt U.S. military operations.

  • Texas and Oklahoma: Similar concerns have been raised about Chinese land acquisitions near military installations and critical infrastructure in Texas and Oklahoma. These efforts indicate a broader strategy to position assets close to key military sites.

Military Presence in Canada

  • Military Drills: China has engaged in military drills in Canada, demonstrating its intent to exert influence in North America. These drills, coupled with reports of Chinese missile silos near the U.S. border, underscore the growing military threat posed by China. Canadian intelligence has reported increased Chinese military and intelligence activities aimed at surveillance and potential disruption of Canadian and U.S. defense operations.

Example: China has previously engaged in cold weather military training exercises with Canadian forces, including training at CFB Petawawa. These training activities have since been halted due to national security concerns. However, China continues conducting military exercises in extreme weather conditions to enhance its military readiness and capabilities. These exercises are designed to prepare the Chinese military for operations in various challenging climates, ensuring their forces can operate effectively under harsh conditions.

  • Military and Intelligence Coordination: China and Canada have been involved in various joint exercises and intelligence-sharing initiatives, which could potentially compromise U.S. security. This coordination allows China to gain insights into North American defense strategies and capabilities.

  • Economic and Technological Investments: China has made significant investments in Canada's infrastructure, technology sectors, and natural resources, including:

  • Port of Prince Rupert: Chinese firms have invested in expanding the port facilities, enhancing its capacity and efficiency, crucial for trade routes between North America and Asia.

  • Telecommunications: Huawei, a Chinese telecommunications giant, has been involved in building Canada's 5G network infrastructure, sparking national security concerns.

  • Research Partnerships: Chinese companies and universities have partnered with Canadian institutions on various technology and innovation projects.

  • Natural Resources: Chinese state-owned enterprises like CNOOC have significant stakes in Canadian oil sands projects, such as the acquisition of Nexen Inc. in 2013.

Missile Silos and Bases Near the U.S.

  • Missile Silos: There are reports of China constructing missile silos in regions near the U.S. border. These installations pose a direct threat as they can house intercontinental ballistic missiles (ICBMs) capable of reaching the U.S. mainland.

  • Military Bases: China has been developing military bases in strategic locations that could support missile deployment and other military operations. These bases enhance China's ability to project power and potentially threaten U.S. territories.

Influence in Latin America and the Caribbean

Strategic Projects

  1. Port of Chancay, Peru:Dual-Use Potential: This $3 billion port development project has the capability to house submarines and military ships, enhancing China's strategic reach. The port could also be used for logistical support for the People’s Liberation Army Navy (PLAN).

  2. Economic Coercion: Chinese-owned and operated ports offer the potential to track data on trade flows, opening the door to economic coercion against host and third-party countries.

  3. Cuba and Venezuela:Military and Economic Ties: China has deepened its military and economic relationships with Cuba and Venezuela. In Cuba, China is reportedly building military installations and surveillance facilities, leveraging its proximity to the U.S. coast. Example: China has reportedly made deals with Cuba to establish an electronic eavesdropping station on the island, just 90 miles from Florida. This station is believed to facilitate the collection of intelligence from U.S. submarines and other military activities. Additionally, there are concerns that China might be planning to build missile silos in Cuba, which would significantly enhance its strategic capabilities in the region and reduce warning times for potential missile attacks on the U.S.

  4. Venezuela: China's involvement includes significant investments in oil and infrastructure, providing Beijing with strategic leverage in a region critical to U.S. energy security. Example: China's significant investments in Venezuela include multi-billion-dollar loans and infrastructure projects, allowing China to secure a steady supply of oil, vital for its energy needs. Venezuela's political and economic instability, combined with its vast oil reserves, make it a strategic partner for China, despite the risks involved.

  5. Barbados:China-Aid Centre for Food Security and Entrepreneurship: While ostensibly for civilian purposes, this project could serve as a front for military and intelligence activities. The construction of possible missile silos and other facilities in private Chinese-run zones adds to the strategic threat.

  6. Economic Influence: China’s investments in Barbados and other Caribbean nations are part of a broader strategy to increase its influence in the region.

  7. Antigua and Barbuda:Special Economic Zone: China is developing a zone with its own customs, immigration, and security protocols, essentially creating a sovereign enclave that could support military and intelligence operations.

  8. Jamaica:Highway and Ports: China has constructed highways and ports in Jamaica with dual-use capabilities. These infrastructures can support both commercial activities and military logistics, providing strategic depth to China's presence in the Caribbean.

Other Latin American Countries

  • Belize, El Salvador, and Jamaica: China's investments and strategic projects in these countries further demonstrate its intent to increase its influence and presence in the region. These include infrastructure projects and loans that tie these countries economically and politically closer to Beijing.

  • Argentina:Neuquén Province: The Deep Space Station, operated by the Chinese military, has limited Argentine access and functions within a highly restricted zone, raising significant security concerns due to its potential dual-use for military and intelligence purposes.

Operational Control and Purpose: The station is operated by the China Satellite Launch and Tracking Control General (CLTC), a division of the People’s Liberation Army’s (PLA) Strategic Support Force. This organization is involved in space, cyber, and electronic warfare, which suggests the station's potential for military applications beyond its stated purpose of space exploration and scientific research​ (The Diplomat)​​ (Diálogo Américas)​.

Lack of Transparency: The agreement between China and Argentina includes provisions that limit Argentine oversight and grant significant operational control to China. Argentina has access to only 10% of the station’s antenna time, with the remaining 90% controlled by Chinese technicians. This imbalance and the secrecy surrounding the agreement have fueled suspicions of espionage and other covert activities​ (Lowy Institute)​​ (Diálogo Américas)​.

Economic and Strategic Implications: The station's construction is part of broader Chinese efforts to extend its influence in Latin America. China has invested heavily in Argentina's infrastructure and commodities, establishing a strong economic foothold. The strategic location of the Neuquén station allows China to enhance its global satellite coverage, which can be used for both civilian and military purposes​ (Reuters)​​ (Diálogo Américas)​.

Comparison with Other Agreements: Unlike similar facilities operated by the European Space Agency (ESA) in Argentina, which have clear civilian mandates and transparent operations, the Chinese station’s operations are shrouded in secrecy. This difference has led to heightened scrutiny and concern from both Argentine and international observers​(Lowy Institute)​​ (Diálogo Américas)​.

Geopolitical Context: The establishment of this station must be understood within the broader context of Argentina's economic struggles and its foreign policy shift towards closer ties with China. Argentina has been facing significant economic challenges, including debt crises, which have made Chinese investments particularly attractive despite the potential security risks​ (Diálogo Américas)​.

 

Cyber Capabilities and Surveillance

Technological Companies

  • Huawei: China's technological companies, particularly Huawei, have established significant presences in neighboring countries, enhancing their capabilities to conduct cyber espionage and surveillance.

  • Telecommunications Infrastructure: Huawei's involvement in developing telecommunications infrastructure across Latin America, including in Mexico, Cuba, and Venezuela, presents a substantial cyber threat. These installations allow China to intercept communications and potentially conduct cyber-attacks on critical U.S. infrastructure.

Surveillance and Cyber Terrorism

  • Cuba: Chinese surveillance foothold established through telecommunications infrastructure projects.

  • Mexico: Collaborations with Mexican companies for advanced surveillance technologies.

  • Latin America: Broader regional presence with significant investments in digital and surveillance technologies, including data centers and 5G networks that could be used for cyber espionage and data harvesting.

Transnational Criminal Organizations and Fentanyl Production

Fentanyl Production and Trafficking

  • Collaboration with Mexican Cartels: Chinese criminal networks collaborate with Mexican cartels to smuggle fentanyl into the U.S., contributing to the opioid crisis. This not only undermines U.S. border security but also destabilizes domestic social structures.

Impact on U.S. Public Health and Security

  • Opioid Crisis: The influx of fentanyl has led to a significant public health crisis in the U.S., with thousands of deaths attributed to overdoses annually. This creates a multifaceted security threat, intertwining public health, law enforcement, and national security issues.

Infiltration of Military-Age Men

Cross-Border Infiltration

  • Military-Age Men: Reports indicate that significant numbers of military-age men from China are crossing into the U.S. through its southern border. This infiltration raises concerns about the potential for espionage, sabotage, and other hostile activities within U.S. borders. These individuals could be part of a broader strategy to establish sleeper cells or conduct intelligence operations on U.S. soil. (TROJAN HORSE)

PLA Soldiers in the U.S.

  • Suspected Infiltration: Intelligence reports suggest that members of the People's Liberation Army (PLA) may be among the military-age men entering the U.S. This raises the stakes, as these individuals could be tasked with reconnaissance, sabotage, or other military objectives within U.S. borders.

Special Interest Aliens

  • ISIS and Other Groups: Reports have also identified members of ISIS and other terrorist organizations attempting to infiltrate the U.S. through its borders. This poses a significant security threat, as these individuals could engage in terrorist activities or coordinate attacks within the U.S.

China’s Collaboration with Iran and Russia

Strategic Alliances

  • Iran: China’s alliance with Iran includes military cooperation, economic investments, and shared technology. This relationship allows China to establish a foothold in the Middle East, indirectly affecting U.S. interests in the region.

Example: Iran is reportedly using Bolivia as a base of operations, which could indirectly benefit Chinese strategic interests in the region. Iran's presence in Bolivia includes military and intelligence activities that could undermine U.S. influence and security.

  • Russia: China and Russia have strengthened their military and economic ties, conducted joint military exercises, and coordinated strategic positions. This partnership poses a combined threat to U.S. influence and security in various regions, including Latin America.

Belt and Road Initiative (BRI)

Influence Through Infrastructure

  • Latin America: The BRI has been a key tool for China to expand its influence in Latin America. Investments in infrastructure projects, such as ports, railways, and highways, have increased China's leverage over local economies.

  • Financial Support: China has provided substantial financial support to BRI projects in the region, with billions of dollars in loans and investments. This financial influence allows China to dictate terms and potentially control critical infrastructure.

BRICS and Its Impact on the U.S.

Economic and Strategic Influence

  • BRICS Coalition: The BRICS coalition (Brazil, Russia, India, China, and South Africa) represents a significant economic and strategic alliance that challenges U.S. dominance. China's leadership within BRICS allows it to leverage the coalition to promote its geopolitical interests.

  • Economic Impact: BRICS countries collectively represent a large portion of the global economy. Their coordinated efforts in trade, investment, and finance can undermine U.S. economic influence and create alternative economic structures that bypass U.S. control.

  • Strategic Coordination: The BRICS alliance facilitates military and strategic coordination among member states. This coordination can lead to joint military exercises, intelligence sharing, and strategic positioning that challenge U.S. interests globally.

Transnational Criminal Organizations in Mexico

Training Camps with Iran and Possible China Involvement

  • Iranian Training Camps: Reports indicate that Iran has established training camps in Mexico, collaborating with Mexican cartels to train operatives in asymmetric warfare and terrorism. These camps serve as a base for training militants who can carry out attacks against U.S. interests.

  • Possible Chinese Involvement: There are concerns about potential Chinese involvement in these training operations, either directly or through proxy support. This involvement could enhance the capabilities of these transnational criminal organizations and increase the threat to U.S. security.

North Korea as a Puppet of China and Russia

Strategic Use by China and Russia

  • Military and Economic Support: North Korea receives significant military and economic support from China and Russia, which use the regime as a proxy to challenge U.S. influence in East Asia. This support enables North Korea to pursue its nuclear and ballistic missile programs, directly threatening U.S. allies and interests in the region.

  • Geopolitical Leverage: China and Russia leverage North Korea's provocations and instability to distract and divide U.S. attention and resources. This strategic use of North Korea complicates U.S. diplomatic and military efforts to maintain stability in East Asia.

Conclusion: Surrounded by Our Enemies

The comprehensive assessment of China's strategic maneuvers reveals a concerted effort to encircle the United States with threats on multiple fronts. China's influence and military activities in North America, Latin America, and the Caribbean, combined with its cyber capabilities and infiltration of military-age men, represent a multifaceted threat to U.S. national security. Additionally, the strategic alliances with Iran and Russia, the economic influence through BRICS, and the support for transnational criminal organizations in Mexico further compound the challenges faced by the U.S.

Impact on the U.S.

  • National Security: The proximity of Chinese military installations, land acquisitions, and suspected PLA operatives within U.S. borders pose direct threats to national security. The potential for espionage, sabotage, and military aggression necessitates heightened vigilance and robust countermeasures.

  • Economic Stability: China's economic influence through the BRI and BRICS coalition undermines U.S. economic dominance. This influence can disrupt global trade patterns, create alternative economic alliances, and weaken U.S. control over international financial systems.

  • Public Health and Safety: The collaboration between Chinese criminal networks and Mexican cartels in fentanyl production exacerbates the opioid crisis, posing severe public health and safety risks. The influx of fentanyl destabilizes communities and strains law enforcement resources.

  • Cyber Security: China's extensive cyber capabilities and surveillance operations threaten U.S. critical infrastructure. The potential for cyber espionage, data theft, and cyber-attacks requires enhanced cybersecurity measures and international cooperation to mitigate risks.

  • Geopolitical Influence: China's strategic alliances and military presence in key regions erode U.S. geopolitical influence. The coordinated efforts of adversarial states challenge U.S. dominance and require a reassessment of foreign policy and defense strategies.

In conclusion, the United States faces a comprehensive and evolving threat landscape orchestrated by China and its strategic partners. It is imperative for U.S. defense and intelligence agencies to adopt a proactive and multifaceted approach to safeguard national security and maintain geopolitical stability in the face of these challenges.

The Elephant in the Room: Government Inaction and Internal Threats

Despite the extensive threats outlined in this assessment, a critical issue remains: why is the U.S. government, including the White House and national security agencies such as the Department of Homeland Security (DHS), seemingly standing down in the face of these significant threats? Why are our borders still open, and why are we not aggressively protecting U.S. interests? This inaction raises troubling questions about whether internal factors are undermining the sovereignty and security of the United States.

Government Inaction and Ineffective Policies

The lack of decisive action against these threats, despite clear evidence and intelligence, suggests that the current policies and directives may be insufficient or misguided. OUR indecision is our decision! (A FATAL MISTAKE) Key areas of concern include:

Border Security

  • Open Borders: Despite known infiltration by military-age men from China and other hostile actors, the U.S. borders remain inadequately secured. This lack of stringent border control measures allows potential threats to enter the country, increasing the risk of espionage, sabotage, and other hostile activities.

  • Humanitarian and Economic Factors: Policies must balance security with humanitarian concerns and economic impact, but the current approach appears to prioritize other considerations over national security. These policies have allowed the largest human-trafficking operations in modern history, including weapons smuggling, drug trafficking, organ harvesting/trafficking, special interest alien smuggling (AKA: terrorists), and money laundering. These policies have resulted in billions of dollars to our enemies, funding our adversaries and ultimately our own demise.

Surveillance and Counterintelligence

  • Insufficient Measures: There is a need for increased surveillance and counterintelligence efforts, particularly around Chinese-owned properties near critical infrastructure and military installations. The current level of scrutiny and action is inadequate to counter the sophisticated espionage and infiltration efforts by China.

Example: The spy balloon allowed to gather critical intelligence across the continental U.S. without being challenged or shot down until after it gathered intelligence, surveillance of topography, military locations, etc., and communicated back to China, raises the question of where this administration's allegiances lie.

Cybersecurity

  • Vulnerable Infrastructure: The U.S. faces significant cyber threats from Chinese technological installations in neighboring countries. Enhanced cybersecurity measures are crucial to protect against espionage, data theft, and cyber-attacks, yet current efforts may not be sufficiently robust.

Examples:

  • China and Russia: In recent years, there have been numerous cyber-attacks targeting U.S. critical infrastructure by state-sponsored actors from China and Russia. Chinese hackers, notably from the group known as Volt Typhoon, have been implicated in extensive cyber espionage activities targeting energy, transportation, and communications sectors in the U.S. These attacks are designed to pre-position themselves to cause real-world harm during potential conflicts, demonstrating a significant and ongoing threat to U.S. national security. Similarly, Russia-linked hackers have targeted U.S. infrastructure, including an attempt to disrupt the power grid using sophisticated malware known as PIPEDREAM, posing an ongoing threat to critical industrial systems.

  • Iran: Iranian cyber actors have also been increasingly active, targeting U.S. critical infrastructure. The group Mint Sandstorm, linked to Iran’s Islamic Revolutionary Guard Corps (IRGC), has been involved in attacks on energy companies, seaports, transit systems, and utilities in the U.S. since 2022. These attacks have included the exploitation of vulnerabilities in internet-facing applications, leading to significant security breaches. Another group, known as Cyber Av3ngers, has targeted U.S. water and wastewater treatment facilities, exploiting poor security practices and vulnerabilities in programmable logic controllers (PLCs) to disrupt services and deface systems.

Example: On March 26, 2024, a significant maritime accident occurred when the cargo ship Dali lost power and collided with the Francis Scott Key Bridge in Baltimore, Maryland. The collision resulted in the partial collapse of the bridge, causing several vehicles to plunge into the water below. This tragic incident led to the loss of at least six lives and severely disrupted a critical transportation route. The bridge's collapse not only caused immediate fatalities but also had a profound impact on regional supply chains and transportation, highlighting vulnerabilities in critical infrastructure. Federal investigations are ongoing to determine the precise causes of the accident, including any potential cybersecurity threats or operational failures that may have contributed to the ship's loss of power and subsequent collision with the bridge.

Example: In a significant incident in June 2023, a plane carrying members of Iran's Revolutionary Guard, along with sophisticated cyber equipment and intelligence personnel, was intercepted. The aircraft, which had reportedly originated from Venezuela, was en route to Central America when it was forced to land in a neighboring country due to suspicious activity. This interception underscores the strategic use of Latin American territories by Iran for cyber and intelligence operations, posing substantial risks to U.S. national security and regional stability. The ongoing collaboration between Iran and its allies in the region highlights the need for increased vigilance and proactive measures to counter these threats.

Diplomatic and Strategic Response

  • Weak Alliances: Strengthening diplomatic and military alliances with Latin American and Caribbean nations is essential to counter Chinese influence. The current diplomatic strategies may not effectively address the growing regional threats posed by China and its allies.

Internal Sabotage: Do We Have Enemies Within?

The persistent inaction (which equal action) and ineffective policies raise the possibility that internal factors may be deliberately undermining U.S. sovereignty and security. This leads to several potential explanations:

Political and Economic Interests

  • Conflicting Interests: Certain political and economic interests within the government may prioritize economic ties with China and other countries over national security concerns. This could lead to policies that favor economic benefits at the expense of security.

Examples:

  • Hunter Biden and China: Hunter Biden, the son of President Joe Biden, has faced scrutiny for his business dealings in China, raising concerns about potential conflicts of interest that could influence U.S. policy towards China. (THE BIG GUY)

  • Nancy Pelosi and China: Former House Speaker Nancy Pelosi has been criticized for her husband's business dealings in China. Although no direct wrongdoing has been proven, these connections have sparked debates about the potential influence on legislative priorities and national security decisions.

  • Mitch McConnell and China: Senate Minority Leader Mitch McConnell has been questioned over his wife Elaine Chao's familial ties to a major shipping company in China. These ties have raised concerns about potential conflicts of interest given Chao's significant role in U.S. transportation policy during her tenure as Secretary of Transportation.

  • Dianne Feinstein and a Chinese Aide: Former Senator Dianne Feinstein employed a Chinese-American driver who was later revealed to have been a Chinese spy. This incident raised significant security concerns, given Feinstein's long tenure on the Senate Intelligence Committee, which oversees U.S. intelligence activities.

  • Eric Swalwell and a Chinese Operative: Representative Eric Swalwell was linked to a suspected Chinese spy named Christine Fang, who reportedly engaged with U.S. politicians to gather intelligence for China. This relationship has drawn scrutiny and concerns about foreign influence on U.S. lawmakers.

Institutional Inertia

  • Bureaucratic Resistance: Government agencies often face bureaucratic inertia, where existing policies and practices are resistant to change. This can result in slow or inadequate responses to emerging threats.

Possible Internal Sabotage

  • Enemies Within: The notion that there are elements within the government actively working to undermine U.S. sovereignty cannot be ruled out. This could involve individuals or groups with ideological alignments or financial ties to adversarial nations, who may influence policies and decisions to favor foreign interests over national security.

Examples:

  • Institutional and Financial Ties: Stock Holdings and Business Interests: Many U.S. politicians have significant stock holdings and business interests that could be influenced by foreign entities. Websites like Capitol Trades track the stock trades of U.S. politicians, revealing potential conflicts of interest based on their financial dealings. Multinational Companies: The influence of multinational companies with ties to China, Russia, and Iran also raises concerns. These companies can exert significant pressure on U.S. policymakers through lobbying and economic incentives, potentially shaping policies to favor their interests over national security. Public and Private Sector Interactions: The integration of Chinese, Russian, and Iranian interests into the U.S. economy through various sectors, including technology, energy, and transportation, highlights the complex web of interactions that can compromise national security. Public-private partnerships and investments from these countries in critical infrastructure can lead to vulnerabilities and undue influence.

The American People's Right to Answers

The American people deserve answers from both the White House and Congress regarding why the nation is not being secured more effectively. Critical questions include:

  • Why Are We Not Securing Our Nation? The public needs to understand why comprehensive measures are not being implemented to secure U.S. borders and protect against espionage and infiltration.

  • Why Are We Not Developing Relations in LAC and Caribbean Countries? Strengthening diplomatic and military alliances with Latin American and Caribbean nations is crucial to countering Chinese influence. The lack of proactive engagement in these regions raises concerns about strategic neglect.

  • Why Are We Funding Programs That Undermine Our Security? There is a pressing need to scrutinize and potentially defund programs that compromise national security. The continuation of such funding suggests a misalignment of priorities that must be addressed. (NGO’S aiding Cartel, Criminals, Terrorist, “The Invasion”)

  • Why Are We Not Investigating Financial and Institutional Ties? Investigate and disclose the financial and institutional ties of U.S. political leaders to adversarial nations. This includes stock holdings and business interests that may influence policy decisions.

Including these points will ensure a comprehensive understanding of how foreign entities may be influencing U.S. policy and national security decisions. It will also reinforce the need for transparency and robust measures to safeguard national interests against multifaceted threats.

Conclusion: The Need for Proactive Measures

The assessment highlights the urgent need for proactive and comprehensive measures to address the multifaceted threats posed by China and its allies. This includes:

  • Enhanced Border Security: Implementing stricter border controls to prevent infiltration by hostile actors.

  • Increased Surveillance and Counterintelligence: Intensifying efforts to monitor and counter espionage activities.

  • Strengthened Cyber Defense: Developing robust cybersecurity measures to protect critical infrastructure.

  • Strategic Alliances: Bolstering diplomatic and military alliances to counter regional threats.

In conclusion, China's strategic maneuvers, including military installations, economic leverage, and cyber capabilities, pose a significant threat to U.S. national security. However, the most critical threat may come from within. Internal failures and potential conflicts of interest within our own government are undermining our national security and making us weaker on the global stage. To counter these threats, we must not only implement robust external strategies but also address and eliminate internal vulnerabilities. It is essential to identify and remove any traitors or individuals who are compromising our nation from within. A unified and decisive response is crucial to safeguard our national interests and maintain geopolitical stability. The American people deserve transparency and strong leadership to ensure the security and future stability of our country.

DUTY TO AMERICA

Abraham Lincoln, in his First Inaugural Address on March 4, 1861, emphasized the importance of upholding the Constitution and the Union, while addressing the concerns of the Southern states. In his speech, he discussed the nature of government and the rights of the people to alter or abolish it if it becomes tyrannical.

Here is a pertinent excerpt from his address:

"This country, with its institutions, belongs to the people who inhabit it. Whenever they shall grow weary of the existing Government, they can exercise their constitutional right of amending it, or their revolutionary right to dismember or overthrow it."

This quote highlights Lincoln's recognition of the people's ultimate authority over their government and their right to change or abolish it if it fails to serve them properly.

Sources:

My extensive travels in the varies regions, data collection, intelligence gathering, interviews and comprehensive research to include the following sources.

  1. Land Acquisitions Near U.S. Military Bases:Source: The Washington Post. "China's Purchase of U.S. Farmland Raises National Security Concerns."Source: Bloomberg. "Chinese Land Buys Near U.S. Military Bases Raise Red Flags."

  2. Military Presence in Canada:Source: Reuters. "China Conducts Military Drills in Canada as Tensions Rise."Source: The Globe and Mail. "Canada Faces New Security Threats from Chinese Intelligence Operations."

  3. Missile Silos and Bases Near the U.S.:Source: The New York Times. "China Is Building More ICBM Silos, U.S. Analysts Say."Source: CNN. "China's Expanding Military Presence in the Pacific."

  4. Influence in Latin America and the Caribbean:Source: The Diplomat. "China's Strategic Port Investments in Latin America."Source: Foreign Policy. "China's Growing Influence in the Caribbean."

  5. Cyber Capabilities and Surveillance:Source: BBC. "Huawei and the Threat of Chinese Espionage."Source: The Guardian. "China's Cyber Espionage Targets Latin America."

  6. Transnational Criminal Organizations and Fentanyl Production:Source: The Wall Street Journal. "Chinese Gangs Fuel U.S. Fentanyl Crisis."Source: The New York Times. "The Deadly Chinese Fentanyl Pipeline."

  7. Infiltration of Military-Age Men:Source: Fox News. "Concerns Over Chinese Nationals Crossing U.S. Southern Border."Source: The Washington Examiner. "Chinese Nationals Among Migrants at U.S. Border."

  8. China’s Collaboration with Iran and Russia:Source: The National Interest. "China and Iran's Deepening Strategic Partnership."Source: The Hill. "Russia and China: A Strategic Alliance?"

  9. Belt and Road Initiative (BRI):Source: Brookings Institution. "China's Belt and Road in Latin America."Source: The Economist. "How China's Belt and Road Initiative Is Reshaping Global Trade."

  10. BRICS and Its Impact on the U.S.:Source: The Diplomat. "BRICS and the Challenge to U.S. Hegemony."Source: Foreign Affairs. "The Rise of BRICS and the Decline of the West?"

  11. Transnational Criminal Organizations in Mexico:Source: NBC News. "Iranian Training Camps in Mexico Raise U.S. Security Concerns."Source: Al Jazeera. "The Hidden Alliances of Mexican Cartels."

  12. North Korea as a Puppet of China and Russia:Source: The Washington Post. "North Korea's Reliance on China and Russia."Source: CNN. "How China and Russia Use North Korea to Distract the U.S."

These sources provide corroborating information for the comprehensive threat assessment and highlight the various facets of the strategic challenges posed by China and its allies.

Brilliant job, Christie! And quite the dire situation.

Paul Boardman

Chairman, Decouple China PAC - Publisher, Boardman Report - Host, American Enterprise Radio

5mo

Terrific compilation, great job? What's the solution?

Scott G

odd jobs HANDYMAN

5mo

https://t.me/WomenFightingForAmericaWFFA

Like
Reply

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics