In the twenty-first century, power is no longer measured solely by military strength or economic dominance. Today, information is the most valuable currency of global influence. China has understood this reality earlier than most and it has built one of the most sophisticated cyber operations in the world. These digital strategies go far beyond hacking for profit; they are part of a broader effort to secure geopolitical dominance.
Cyber espionage is now one of the most pressing geopolitical threats from China. It represents a form of power projection that undermines Western economies, erodes trust in democratic systems and enables Beijing to expand its influence without resorting to traditional warfare. In my book, We Are Funding China’s Growth, I outline how our own economic decisions and policies have enabled China to strengthen its technological and financial infrastructure, giving it the tools to weaponize information on a global scale.
By understanding the scale and scope of China’s cyber ambitions, we can begin to see how free trade, political illusions and misinformation campaigns have left us dangerously exposed. The age of cyber espionage is not on the horizon; it is already here.
The Rise of China’s Cyber Power: From Imitator to Innovator
For decades, the West assumed China would remain a technological follower. In the 1990s and early 2000s, Beijing was widely regarded as dependent on foreign innovation, copying and reverse-engineering Western technologies. However, this assumption ignored a critical strategy: China’s deliberate, state-sponsored campaign to acquire technology through cyber espionage.
Today, China is no longer just an imitator; it has become an innovator. The Chinese state has invested billions into artificial intelligence, quantum computing and advanced surveillance systems, all while maintaining vast cyber units that target Western corporations, governments and research institutions. From intellectual property theft to the infiltration of critical infrastructure, these cyber campaigns give Beijing a significant strategic advantage.
This transformation demonstrates one of the central arguments in We Are Funding China’s Growth. Our capital flows, open markets and unguarded optimism allowed China to leapfrog into technological leadership. Every trade deal, every investment and every overlooked cyber breach has contributed to the build-up of capabilities now being deployed against us. The geopolitical threats from China are not accidental; they are the result of a carefully executed strategy spanning decades.
Cyber Espionage as a Tool of Statecraft
While Western nations often separate commerce, politics and military operations, China views them as interconnected instruments of national power. Cyber espionage serves not only as a tool for intelligence gathering but also as a means to support China’s broader political and economic ambitions.
One example is the targeting of critical supply chains. By infiltrating global companies, Chinese cyber units can gain access to sensitive data on logistics, resources and trade routes. This information gives Beijing leverage in negotiations and the ability to anticipate the vulnerabilities of its rivals. Similarly, attacks on infrastructure, such as energy grids or communication networks, create the potential to destabilize Western societies without firing a single shot.
Cyber espionage also plays a crucial role in shaping narratives. By manipulating data and influencing media platforms, China advances propaganda that downplays its aggression and amplifies divisions within Western democracies. These tactics extend beyond mere hacking; they are part of a calculated strategy to weaken rival nations from within. In this way, cyber espionage is not just a technical threat; it is a geopolitical weapon.
Economic Consequences of Digital Infiltration
The economic costs of China’s cyber operations are staggering. Studies estimate that intellectual property theft alone costs the U.S. economy hundreds of billions of dollars annually. For European companies, losses in innovation and competitiveness are equally severe. Every stolen design, blueprint or research breakthrough accelerates China’s technological growth while undermining Western industries.
Yet the consequences go beyond financial damage. When corporations lose trust in the security of their data, they hesitate to collaborate, innovate or invest. This erosion of confidence weakens entire industries, creating long-term strategic disadvantages. Meanwhile, China leverages stolen intellectual property to dominate global markets, producing cheaper alternatives and outmaneuvering Western competitors.
As I argue in We Are Funding China’s Growth, we have unknowingly subsidized this process. Our markets have financed Chinese companies, our trade policies have opened doors and our blind optimism has allowed cyber espionage to thrive with minimal resistance. The geopolitical threats from China are not only military or political; they are embedded in the very fabric of our economies.
The Human Factor: How Misinformation Shapes Perception
Cyber espionage is not limited to the theft of secrets. It is also about the manipulation of perception. For more than two decades, Beijing has conducted campaigns to influence Western public opinion, often disguised as academic research, think tank partnerships or media outreach. By spreading misinformation, China has led many to believe that it is a peaceful partner rather than a strategic rival.
This narrative manipulation has been one of the most effective geopolitical threats from China. It has delayed action, softened criticism and created divisions among Western policymakers. Too often, political leaders and respected publications have repeated Chinese talking points without recognizing their origin. The result has been a dangerous complacency that continues to undermine our ability to respond effectively.
In my book, I expose how these narratives have shaped our collective blindness. We celebrated free trade, overlooked structural risks and believed in China’s supposed path toward liberalization. Cyber operations amplified these illusions, allowing Beijing to pursue its agenda while the West remained distracted.
The Global Implications: A New Era of Hegemony
The question is not whether China poses geopolitical threats, but how far they will extend. Cyber espionage has already proven capable of destabilizing industries, shaping political debates and undermining trust in democratic institutions. Left unchecked, these operations will enable China to achieve a form of hegemony without direct confrontation.
Imagine a world where China controls not just global manufacturing but also the flow of information, the security of financial systems and the integrity of critical infrastructure. Such a scenario would give Beijing unprecedented leverage over Western societies, leaving us vulnerable to coercion and manipulation. This is not a distant possibility; it is the trajectory we are already on.
Recognizing these threats is the first step. But recognition must be followed by decisive action, including stronger cyber defenses, stricter trade policies and a renewed commitment to protecting intellectual property. Without these measures, the West risks becoming permanently dependent on a rival power whose goals are fundamentally at odds with our values.
Conclusion
The rise of China’s cyber power is not an isolated phenomenon. It is part of a broader geopolitical strategy aimed at reshaping the balance of global power. Cyber espionage has become one of the defining tools of this strategy and its consequences are felt across economics, politics and society.
In “We Are Funding China’s Growth,” I detail how our own actions, investments, policies and illusions have allowed this threat to emerge. The logic is inescapable: unless we acknowledge the scale of the challenge and take steps to address it, we will continue to fund the very forces that endanger our future.
The age of cyber espionage has made it clear that geopolitical threats from China are not only real but already transforming our world. The time to act is now.