SlideShare a Scribd company logo
1 of 12
U.S. National Security
 ... AND THE RISING CHINESE THREAT




               Elias Lopez
Rising Threats
• Measuring the Size of
  China’s Economy
• Purchasing Power & GDP
  Size
• Implications for China
  and U.S. – China
  Economic Ties
• U.S. – Chinese
  Economies: Will China
  overtake the U.S.
  Economy?
• Chinese Takeovers of
  U.S. Companies
COMPREHENSIVE   • Modernization preparing for conflict in
                   Taiwan Straight, including possibility of U.S.
TRANSFORMATION     intervention



                 • Enhancing China’s Strategic Strike Capabilities
NUCLEAR FORCE
MODERNIZATION
                 • Anti-access/Area Denial Capabilities                 Video No Longer
                 • Direct-ascent Anti-Satellite weapon
                                                                           Functional

BALLISTIC AND    • Advanced Technology Acquisition
   CRUISE        • Land attack, Supersonic – Anti-ship, & guided
                   missile destroyers
  MISSILES
                                                                     THE PEOPLES LIBERATION
                 • PRC Computer Network Intrusions                           ARMY
CYBERWARFARE     • Gathering political, military, corporate-
 CAPABILITIES      strategic & scientific information to close
                   technological gaps



  ADVANCED       • ICE Initiated 400 + Investigations between
                   2000 – 2006 for illicit export of arms and
TECHNOLOGIES       technologies
ACQUISITIONS     • ICE Identified PRC as leading espionage threat
Nuclear and Missile Technology Sales


       Chemical Sales to Iran


 North Korea’s Missile and Nuclear
        Weapons Program
11 JANUARY 2007: 5:25PM EST
Increase Risk to
PRC Intentional
                       Increased Space     U.S. Satellites &
   Satellite
                         Debris in LEO         over 700
 Destruction
                                             Spacecrafts

                          Tracking &        DoD Est. by 2010
                           Targeting        ASAT production
Capability to attack
                        Capabilities by      able to destroy
  U.S. satellites
                        Military & Intel   most U.S. satellites
                           Satellites            in LEO


    Develop                                 Unilateral
                          Satellite
     Stealth                               Agreement to
                          Defense
    Satellite                                 Space
                          Systems
   Technology                              Weaponization
POSSIBLE “SELF CONFIDENCE” TEST
• Countering U.S. Forces in possible Taiwan dispute
• Weapons challenge U.S. Space Dominance




2006 U.S. NATIONAL SPACE POLICY RESPONSE
• Denial of space to adversaries “hostile” to U.S. Interests
• Before U.S. Space Policy PRC conducted 3 ASAT test and ground based
  laser to illuminate a U.S. satellite in “blinding” tests



PRODING THE UNITED STATES IN ARMS CONTROL?
• Analysts cited PRC’s “peaceful motive was to prompt U.S. to engage in
  space arms control
• In Dec 2006, U.S. solely voted against UN Res. on “Prevention of Arms
  Race In Outer Space” - PAROS
Sovereignty Over Taiwan


PRC Use of Force Against Taiwan


Democracy versus Independence
Economic Security

 WMD Proliferation

Rising Military Power

Anti-Satellite Weapons

China – U.S. Relations

  One China Policy
Questions?

More Related Content

Similar to The rising chinese threat

Similar to The rising chinese threat (7)

Effective presentations
Effective presentationsEffective presentations
Effective presentations
 
Lessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxLessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptx
 
How Military sector change the GIS world
How Military sector change the GIS world How Military sector change the GIS world
How Military sector change the GIS world
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
 
Webinar Slides June 2022 Richard Baker.pptx
Webinar Slides June 2022 Richard Baker.pptxWebinar Slides June 2022 Richard Baker.pptx
Webinar Slides June 2022 Richard Baker.pptx
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
Tether anthony[1]
Tether anthony[1]Tether anthony[1]
Tether anthony[1]
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

The rising chinese threat

  • 1.
  • 2. U.S. National Security ... AND THE RISING CHINESE THREAT Elias Lopez
  • 4. • Measuring the Size of China’s Economy • Purchasing Power & GDP Size • Implications for China and U.S. – China Economic Ties • U.S. – Chinese Economies: Will China overtake the U.S. Economy? • Chinese Takeovers of U.S. Companies
  • 5. COMPREHENSIVE • Modernization preparing for conflict in Taiwan Straight, including possibility of U.S. TRANSFORMATION intervention • Enhancing China’s Strategic Strike Capabilities NUCLEAR FORCE MODERNIZATION • Anti-access/Area Denial Capabilities Video No Longer • Direct-ascent Anti-Satellite weapon Functional BALLISTIC AND • Advanced Technology Acquisition CRUISE • Land attack, Supersonic – Anti-ship, & guided missile destroyers MISSILES THE PEOPLES LIBERATION • PRC Computer Network Intrusions ARMY CYBERWARFARE • Gathering political, military, corporate- CAPABILITIES strategic & scientific information to close technological gaps ADVANCED • ICE Initiated 400 + Investigations between 2000 – 2006 for illicit export of arms and TECHNOLOGIES technologies ACQUISITIONS • ICE Identified PRC as leading espionage threat
  • 6. Nuclear and Missile Technology Sales Chemical Sales to Iran North Korea’s Missile and Nuclear Weapons Program
  • 7. 11 JANUARY 2007: 5:25PM EST
  • 8. Increase Risk to PRC Intentional Increased Space U.S. Satellites & Satellite Debris in LEO over 700 Destruction Spacecrafts Tracking & DoD Est. by 2010 Targeting ASAT production Capability to attack Capabilities by able to destroy U.S. satellites Military & Intel most U.S. satellites Satellites in LEO Develop Unilateral Satellite Stealth Agreement to Defense Satellite Space Systems Technology Weaponization
  • 9. POSSIBLE “SELF CONFIDENCE” TEST • Countering U.S. Forces in possible Taiwan dispute • Weapons challenge U.S. Space Dominance 2006 U.S. NATIONAL SPACE POLICY RESPONSE • Denial of space to adversaries “hostile” to U.S. Interests • Before U.S. Space Policy PRC conducted 3 ASAT test and ground based laser to illuminate a U.S. satellite in “blinding” tests PRODING THE UNITED STATES IN ARMS CONTROL? • Analysts cited PRC’s “peaceful motive was to prompt U.S. to engage in space arms control • In Dec 2006, U.S. solely voted against UN Res. on “Prevention of Arms Race In Outer Space” - PAROS
  • 10. Sovereignty Over Taiwan PRC Use of Force Against Taiwan Democracy versus Independence
  • 11. Economic Security WMD Proliferation Rising Military Power Anti-Satellite Weapons China – U.S. Relations One China Policy