The People’s Republic of China (PRC) is conducting global, persistent, and strategic cyber and information operations. From breaching federal governments to exploiting supply chains and manipulating online discourse, its cyber operations are well documented and widely reported. What remains poorly understood is why China can act so broadly, effectively, and consistently—and how these operations add up.
That’s why we’re publishing Breaking Through: How to Predict, Prevent, and Prevail over the PRC Cyber Threat. This report explains how China converts individual operations into lasting advantage. It shows the force multipliers that give PRC cyber power its scale, how those methods are deployed across regions, and what actions the U.S. and its allies can take to contest and disrupt them.
In this report we:
- Unpack four ways the PRC scales its cyber power—abusing trusted relationships, exploiting edge devices, using AI for speed, and contesting attribution.
- Reveal how AI gives PRC operations an edge, from faster reconnaissance and exploit development to smarter targeting and data analysis.
- Show how China uses cyber operations to shape the playing field in East Asia, Europe, and beyond—limiting U.S. and allied options in both long-term competition and potential crises.
- Explain how China’s shift from denying to contesting attribution risks fragmenting allied response and helps it to control escalation.
- Offer a strategy for how the U.S. and its partners can move from reacting to intrusions toward actively shaping the environment to block PRC footholds.
This report is essential reading for anyone who wants to see the big picture about PRC cyber and information operations and understand how the U.S. can counter them.