Breaking Through: How to Predict, Prevent, and Prevail Over the PRC Cyber Threat

Predict, Prevent, and Prevail Over the PRC Cyber Threat

Frequently Asked Questions

What new value will I get from reading this report?

Most cyber reporting stops at individual incidents. This report connects the dots, showing how China’s operations add up to a broader strategy. It explains the methods and infrastructure that give the PRC scale and persistence, and it sets out concrete steps the U.S. and its allies can take to disrupt these efforts and protect their freedom of action.

If everyone is using AI, why is the PRC’s use so concerning?

The report examines how the PRC’s intelligence and military agencies are using AI to overcome structural bottlenecks that have limited the reach, scale, and speed of their operations. For example, AI enables them to break through professed language and cultural barriers with tailored, automated, and scaled influence operations.

What’s the difference between cyber operations and information operations?

Cyber operations target technology. They gain access to networks, steal or corrupt data, and sometimes preposition in critical systems. Information operations target people and institutions. They shape perception and decision-making through narratives, persona networks, and selective leaks. Together, they reinforce each other: Cyber access provides material and leverage, while information campaigns turn that material and leverage into pressure and influence.

1 - 4 of 8