American Thought Leaders - How the CCP Infiltrated America’s Critical Infrastructure: Michael Lucci

Episode Date: March 23, 2025

Michael Lucci is the founder, CEO, and chairman of State Armor. He helps states enact policies and solutions that protect their assets from foreign adversaries like communist China.“They’re trying... to invade our homeland, and they likely have developed the capacity to make life very difficult, to create crises within the United States—whether it’s power, whether it’s wastewater treatment, whether it’s telecommunications,” he says. “They have laws that require those companies to engage in espionage. So why are we letting them sell connected devices of any type into the United States?”In this episode, we dive deep into how the Chinese regime has managed to infiltrate our critical infrastructure and communications systems at the local, state, and federal levels.“It’s the largest military buildup since World War Two is what China is doing right now,” says Lucci. “If they’re just in our back doors, listening, reading, following everything we’re doing, following the pattern of life for important officials across the country, that’s a pretty deep problem.”Views expressed in this video are opinions of the host and the guest, and do not necessarily reflect the views of The Epoch Times.

Transcript
Discussion (0)
Starting point is 00:00:00 They're trying to invade our homeland and they're trying to develop the capacity, and they likely have developed the capacity, to make life very difficult, to create crises within the United States, whether it's power, whether it's wastewater treatment, whether it's telecommunications. Michael Lucci is the founder and CEO of State Armor. He helps states enact policies to protect themselves from Communist China. They have laws that require those companies to engage in espionage, so why are we letting them sell connected devices of any type into the United States?
Starting point is 00:00:33 In this episode, we dive deep into how the Chinese Communist Party has compromised our critical infrastructure and communication systems at the local, state, and federal levels. It's the largest military buildup since World War II, is what China is doing right now. This is American Thought Leaders, and I'm Jan Jekielek. Michael Lucey, such a pleasure to have you on American Thought Leaders. Wonderful to be on. Great to meet you. You recently issued a comprehensive threat assessment of Communist China. Give me a rundown of what you found. What we found is that the state governments, state and local governments,
Starting point is 00:01:14 face unique threats from Communist China. And that was our target. I run an organization, State Armor. We're working with state lawmakers, some local lawmakers, on countering Communist China. And so the rundown looks at first the risk of war. So this is kind of the existential threat. Not just what happens in the first island chain, you know, if they go to take Taiwan, maybe it's something with the Philippines. It's not just what happens there.
Starting point is 00:01:41 It's then what happens here. So the risk of war over there is also very much a right here problem because of China's infiltration of, say, critical infrastructure. They've been developing the capacity to turn off critical infrastructure. We've heard this on and off from the federal government related to water, related to power, related to things that we depend on every day, related to our communication system. When we talk about this, we say, imagine COVID disruptions times 10, times 20.
Starting point is 00:02:12 That's the type of threat we're talking about. But then breaking that down, what is China getting into? What are they doing? They're accessing critical infrastructure through routers and through other attack modes. They're embedding in there. They're sort of living off the land, they say. They're just sort of laying low and waiting for some day to do something. The difference on these
Starting point is 00:02:32 hackers now is previously when China would subject the United States to cyber attacks, there was an economic incentive. They wanted to take something, you know, intellectual property, whatever, take it back to China, build a business. That's not what we're seeing now. They are coming in and just waiting for something. Now you could go further down threats that face state and local governments. When they procure Chinese technologies,
Starting point is 00:02:55 the safe thing to assume would be at some point that data's going back to Beijing. State and local governments, not just them, the federal government procures routers that have known security risks. They procure drones. I mean, we're deeply dependent on drones that are sanctioned by our federal government
Starting point is 00:03:12 in multiple ways. Getting out of the hardware and software, some of the threats that are very important are about political warfare, human intelligence and political warfare at the state and local level. In 2022, the director of national intelligence issued a memo that every state leader should really look at.
Starting point is 00:03:29 It's here's what China's trying to do with what they call the sub-national level, state and local level. They're trying to co-opt officials that they could leverage later, collect data, personal data sometimes, develop economic dependencies, gain investment dollars for China,
Starting point is 00:03:44 which they've been doing quite well. So they're trying to exploit our system and the seams and cracks in our system, seams and cracks being between the federal government, state and local governments, they try to get in there, they try to convince state governments to do some things that perhaps the federal government would think to be a very bad idea.
Starting point is 00:04:01 So this is the threat assessment we looked at is, first the risk of a conflict that they would start and what would that mean here and how do you start mitigating that. But set that conflict aside, the technological dependence, the espionage that that allows, the political warfare that they conduct at the state and local level, all of those problems also have to be sussed out, regardless of whether there's a conflict. Give me an example of some of the concretely for people on the street, everyday folks, how that might manifest in their lives. What kind of technologies are we talking about? Outside of the routers, outside of the drones, basically computers that come from a Chinese
Starting point is 00:04:40 company. Let me take a step back. China has a national intelligence law. It's their 2017 national intelligence law. You must engage in espionage on behalf of the party state when asked to do so. So any Chinese company that's involved in work here, collecting data here, maybe they're putting cameras on critical infrastructure. We just heard from DHS that there are 12,000 Chinese cameras on critical infrastructure across the United States. DHS that there are 12,000 Chinese cameras on critical infrastructure across the United States. DHS notified us of this because they're worried about the espionage risk. They're worried about that data being sent back to China.
Starting point is 00:05:13 There are batteries being connected to cars in critical infrastructure. There are laser sensors. Many of these products are actually sanctioned or blacklisted in some way by our federal government. There are DNA sequencing devices. These are all being sold and used in hospital facilities, research facilities, state and local governments. Even though the federal government's saying there's some bad stuff going on here, they just keep
Starting point is 00:05:37 conducting business selling that product in through what we call brute force economics, where they overproduce a product in order to wipe out American and allied competitors for that product. One thing that comes to mind are patient monitors. So tell me about that. Yeah, so for someone who's in this every day, looking at these technological risks, this headline even shocked me. So this was put out two or three weeks ago by our FDA and our cybersecurity agency at the federal level. The headline itself is quite scary.
Starting point is 00:06:09 It just says, contact has a back door. Contact is a provider of patient monitors. So it's the health care monitor that might sit next to a hospital bed with your blood pressure, with your pulse, your oxygenation levels. And according to our federal government in this release, that data is all going back to one place in China. Who knows how many health care data privacy laws that violates in itself, but furthermore that
Starting point is 00:06:37 they can execute code on those devices, meaning they can make your blood pressure say something that it's not. So if you're at 125 over 80, they might execute code to make it say 160 over 110, and all of a sudden, your emergency room physician thinks that he or she's dealing with a very different situation because they're getting poor information on your vital signs. So that headline, which came out of our federal government, is extraordinary shocking.
Starting point is 00:07:06 That they would be selling anything that we care about into the health care system is a problem. But really, we shouldn't be allowing them to sell anything into the United States that connects to the internet. They have laws that require those companies to engage in espionage. So why are we letting them sell connected devices of any type
Starting point is 00:07:24 into the United States? I want to touch on a few pieces of critical technology to engage in espionage, so why are we letting them sell connected devices of any type into the United States? I want to touch on a few pieces of critical technology that I've covered on the show before. For example, these large high-voltage transformers, which from what I understand are only produced in China now and are installed all across the US grid, creating vulnerabilities. What's the status of that? Well, in 2020, I believe it was, President Trump's team intercepted one of these transformers and began inspecting it. My best understanding is that they did find some things that they
Starting point is 00:07:53 don't like. Now, power producers and distributors have been trying to get off of that Chinese transformer, but they're still coming in, is my understanding. And there are very few global competitors for producing power transformers. So we have a deep dependence on technologies like that that we rely on for everyday life, that if they install back doors into those pieces of technology like they've done with port cranes, like they've done with drones, healthcare monitors,
Starting point is 00:08:24 they can make life very difficult all across the country, all of a sudden. And so this is an economic strategy for them that really has military undertones to it. They could do military work in the Pacific and just wreak havoc here in the United States. And so that makes it difficult for us to project power anywhere. So the homeland security, the homeland needs to be secured. We have to have strategic space here in the
Starting point is 00:08:54 United States in our hemisphere. If we're under pressure here, then we're not able to project power to help free countries elsewhere. They're trying to invade our homeland and they're trying to develop our homeland. And they're trying to develop the capacity, and they likely have developed the capacity, to make life very difficult, to create crises within the United States, whether it's power, whether it's wastewater treatment, whether it's telecommunications, they want the capacity to create problems here, if and when they decide to go attack Taiwan. Some years ago, I had—who's now the FCC Commissioner, Brendan Carr, on the show talking
Starting point is 00:09:29 about exactly this issue, there were rip and replace laws that were passed. But in the end, it took a long time. And in some cases, I don't think they were actually ever replaced, because there wasn't a plan to actually complete the project in the first place. Are you aware of this situation? There's one place where it's about getting done. That's the state of Nebraska. That's because state lawmakers and the governors came together and said, this stuff needs to get out immediately. So yes, President Trump in his first term started sanctioning Huawei, the company, and then they created this rip and replace program. It is going very slowly to say the least. Now in some
Starting point is 00:10:11 areas of the country this is really a crisis and the reason why Nebraska moved on this, Governor Pillin and Senator Elliott Boe star you know have teamed up to lead on a lot of these issues. That equipment surrounds our nuclear missile silos in Western Nebraska, also in Eastern Colorado, Southeast Wyoming. We have a fleet of nuclear missile silos out there. They're surrounded by Huawei equipment. If you go on Google Earth and you
Starting point is 00:10:38 can zoom in on where the missile silos are, you can go not very far and find Huawei radio transponders. There was some data released, information released in a report in 2022 where our intelligence agencies assessed that they could likely disrupt the communications around our nuclear missile silos. There's also strategic command in Nebraska, very sensitive information being transmitted there.
Starting point is 00:11:02 And so that's why the Nebraska team came together and said that needs to come out immediately. And they've really pushed the pedal down to try to get that equipment out. Most of the rest of the country is just coming along pretty slowly. And in most of the rest of the country, it's not clear what sensitive assets are surrounded by that Huawei equipment. You've used Nebraska as a bit of a model state. So this isn't the only area where Nebraska has committed itself to basically removing the Chinese Communist Party's technologies and perhaps other areas of influence. Can you describe that to me a little more? So Nebraska, what's really unique here is you have this tremendous Democrat leader and a tremendous Republican leader
Starting point is 00:11:45 being the governor who came together and just pushed hard into these issues. What I just described on getting the Huawei equipment out of the state of Nebraska, state armor didn't exist when they were executing on that really critical problem. We actually adopted what they did and we started taking it to other states in various forms. But it was obviously a signal in this state these folks are very serious about taking on these problems. And so you know we just started meeting. I actually met Senator Boe star testifying in Nebraska on tax policy and sort of got to know him through that. It was only later that I saw he was doing these great things on combating the Chinese Communist Party.
Starting point is 00:12:26 So Senator Boehrstar won our Lawmaker of the Year award for 2024. He enacted what we call Pacific Conflict Stress Test, which is an audit of critical infrastructure. It's an audit of state supply chains. It's an audit of state financial holdings. And it asked the question, if China goes to attack Taiwan, what is going to happen here in the state of Nebraska? How do we mitigate that today? How do we get our pensions out of China?
Starting point is 00:12:52 How do we get our supply chains to be less dependent on their technologies or not dependent on their technologies? How do we harden critical infrastructure before that day comes? And they're already executing on some of it on the telecommunications, but they're moving the ball forward on other areas of that. They're blocking procurement of Chinese technologies. They're kicking China off their land. They did that all in 2024. They're blocking their laser sensors.
Starting point is 00:13:15 So they did all that type of work. And they're coming back for, I guess, a trilogy this year. They have this huge package of awesome legislation. They want to register foreign agents from the bad guy countries, from the foreign adversaries. They want to punish crimes that are done on behalf of foreign governments
Starting point is 00:13:31 differently than how we punish if it's just a couple of Americans. And they want to get China's genomic sequencing devices out of the state of Nebraska entirely. They also say no tax credits for foreign adversary companies and they're fixing some other problems as well. It looks like they want to do a broader pension investment this year as well.
Starting point is 00:13:49 So you have this team in Nebraska, Governor Pill and Senator Boehrstarr, and they just keep pushing the best solutions. Now, as states go, you know, this inspires competition. And so we're seeing other states look at what Nebraska's doing and saying, I want to match that. I want better that. And that's what we love to see. Well, most recently, I'm thinking about Governor Huckabee with a big announcement, right? Governor Huckabee is rolling out just an awesome agenda, dealing with China's influence in higher
Starting point is 00:14:18 education. Some of their espionage as well, some of the technologies that they sell into the state of Arkansas, Sister City agreements, which are often a vector for espionage that China uses. So she rolled out this huge agenda. It should be noted that Governor Huckabee was the first governor, first leader in the United States to actually kick China off the land. So a Chinese company owned land in Arkansas. Arkansas passed a law to say you can't do that. That company kind of waited around for a while and the governor and lawmakers there forced them off the land.
Starting point is 00:14:52 The company ended up having to cut a check to the state of Arkansas, if I recall correctly, because they'd overstayed their welcome basically. There was a timeline when they were supposed to get out. They didn't meet that timeline. So they had to leave and they had to cut a check to the state of Arkansas. So she was the first one to actually kick them off Arkansas land. I'm excited to look at this supply chain audit that Nebraska has done. It's very interesting because I'm aware again on this show, we've covered all sorts of things,
Starting point is 00:15:20 certain rare earths, certain medical precursors, which are exclusively made in China. Can you give me a picture of some of these raw material areas of threat or dependency? Raw materials, minerals that go into batteries for electric vehicles, but also batteries that are going into our power grid in various ways. A lot of that is sourced from China. As you mentioned, the power transformers, a lot of that is sourced from China. And then the precursors, the molecule precursors for a lot of generic drugs that we depend on for everyday life, a lot of that comes from China. And so that's the idea of a supply chain audit is what would the state not be able to buy? So rewind back to the coronavirus,
Starting point is 00:16:06 when China sort of clamped down on supply chains related to PPE and other things that they want to sort of hoard within China, we felt the effects of that here. This time around, they will do it intentionally. If they start a conflict over Taiwan, they will intentionally cut all those supply chains. So we ought to know what that looks like going in. We ought to be able to start mitigating that before they would take action. You're painting this picture, which is
Starting point is 00:16:32 frankly, deeply disturbing, right? On the one hand, you're saying that there's all these hackers that are coming in and just kind of lurking, in effect, waiting for the right moment. I'd love to know a little more about how we know that. But on the one side, on the other hand, there's all these vulnerabilities. And so you can imagine this kind of perfect storm, which could be executed from outside at a time when it's most inopportune for the United States or perhaps the whole West. I think that what they would like to do is develop the capacity, one, to win a kinetic fight on the battlefield, you know, over Taiwan with the United States Navy with Marines over there. So they want the capacity to do that. And they've been militarizing. It's the largest military buildup since World War II, is what China's doing right now.
Starting point is 00:17:20 At the same time, they want to have sort of a co-equal capacity to just cause total destruction here within the United States. And they want the capacity to maybe punish allies that might help the United States. They want to develop all these capacities so that on some day, maybe their leader decides he wants to execute a certain contingency to blockade Taiwan or full on invade Taiwan or do something else.
Starting point is 00:17:50 We're going to have to think deeply and profoundly about what it means to defend Taiwan. I think you need to be in the president's seat and seeing all of the intelligence that he's going to see to be able to make that decision. Where we take a position is the president should have that optionality. And he will not have that optionality in some dystopian world where China could just literally just turn off everything in the United States. The president doesn't have the ability to make those types of decisions. And I know that the new president, President Trump, I'm sure his team is working out these
Starting point is 00:18:24 problems within the United States. State officials need to be doing a huge part of that as well. the new president, President Trump, I'm sure his team is working out these problems within the United States. State officials need to be doing a huge part of that as well. And so that is the kind of situation they want to be able to execute on is, if they have a blockade or an invasion of Taiwan, the Chinese ideal would be,
Starting point is 00:18:39 we just don't have the ability to respond. Because maybe they closed down the Panama Canal, they closed down our ports because a lot of those ship to shore cranes can likely be controlled by China. They can threaten to turn on or off power systems, water systems that we depend upon. And so they want to sort of cripple us into saying like, just the fight to get to the fight would be too big.
Starting point is 00:19:01 And so maybe we just back off. And so the position that State Armor takes is we want our leaders to have as much optionality as possible, decide whatever they think's best for the country. That's what needs to be solved at the state level, the sub-national level, whether they do the fixing on their own or they partner with the federal government to fix these problems so that the president,
Starting point is 00:19:23 military leaders, and everyone can make the decisions that are best for the country without having to worry about the $400 billion of investments that get vaporized as soon as we defend Taiwan because we have too much money over there in China. So those are the kind of things that we want fixed. I don't think I've had anyone explain the depth and gravity of the volt typhoon hack in the US? Am I wondering if you could do that right now? I'll give you one slice of that. When we were operating in our first year in multiple state houses, we were giving warnings about terrible things we thought China could do. warnings about terrible things we thought China could do. And ironically, President Biden's administration kept releasing information, letters, et cetera, that made us seem quite reasonable in the warnings that we were delivering.
Starting point is 00:20:15 So we would deliver warnings about things they could do with cars, water systems, or whatever. And just a couple of weeks later, just coincidentally, there'd be this release from the National Security Advisor. So I'll give you one example. The previous National Security Advisor sent a letter to every governor in March of 2024, saying that China is developing and likely has the capacity to shut down water treatment facilities in your state. They're actively probing and are developing the ability to do so. In a state like Texas, where we live, in Arizona, where it's not exactly a water-rich state, if you can knock out water treatment, that could have a really crippling effect on state
Starting point is 00:20:55 and local government, on the energy industry in Texas. So it's a low-cost way for the Chinese side to take out something that could cause massive amounts of problems on our side. That's one example. They're doing that through various vectors of access, some of it's through routers, some of it's through modems, some of it's through other forms of cyber attack. They're probably doing that through human sources, Chinese nationals working in these companies, and they're doing that through other pieces of hardware that are attached to these important systems within the United States. Now, water is one example. My understanding is that they have such sabotage set up across other systems, or they are trying to create the ability to do so.
Starting point is 00:21:40 You could think of pipelines that they might want to shut down. You could think, as we mentioned, ports, power grids, transportation facilities that they would want to shut down or just throw into havoc in a crisis. And what about the hacks that have to do with listening in on both government communications and also just the rest of us? I might have answered one typhoon rather than the other. So Volt typhoon is where they're hacking into critical infrastructure. Salt typhoon is when they're directly into our communication systems. So we put back doors into our communication systems after 9-11, right or wrong, to allow
Starting point is 00:22:21 the federal government to tap in and look at what some bad actors are doing. They got into that. And so they're into, I think, at least the eight largest telecommunications providers in the United States. They have the capacity to listen in on calls, read messages. Our government has never been super enthusiastic about Americans using encrypted messaging systems. But if you look late last year, our government started putting out memos saying,
Starting point is 00:22:51 start using encrypted messaging systems unless you want China reading it, was the undertone of it. So when you look at our government, they have their own interest to do surveillance. But if they're telling us, use encrypted messaging systems, you know that we have their own interest to do surveillance. But if they're telling us use encrypted messaging systems, you know that we have a really serious problem. There were stories about President Trump's team having their phones tapped, likely, maybe the vice president team, maybe Kamala Harris's team as well.
Starting point is 00:23:17 It's bad enough when their radio transponders can be corrupted in various ways. But if they're just in our back doors, listening, reading, following everything we're doing, following pattern of life for important officials across the country, it's a pretty deep problem. And it's really a deep failure that they haven't been kicked out by the previous administration. Explain to me why it's a problem for gene sequencing technology developed in China for running care?
Starting point is 00:23:49 Gene sequencing technology has a lot of important uses. Some of the uses that normal folks like my family use would be finding out your ethnicity, right? Family connections you didn't know you had. Other important uses are to create pharmaceutical solution. So if you're looking at enough genetic information, you could find certain genetic vulnerabilities to certain diseases or syndromes and you can start working on a pharmaceutical solution for that. So these are really important things that you could do with gene sequencing. What the Chinese side says they're interested in doing is creating weapons that kill or incapacitate based upon ethnicity. And so this is one of these really surreal
Starting point is 00:24:30 instances where the Chinese side pretty openly says what they're doing, it's horrific, it's on the American side to start acting. So the general who ran their National Defense University wrote in 2017 in a book that he published, basically what I said, the best weapons in the era of biotechnology are the ones that can kill or sterilize or lower the intelligence of certain groups of people based on their ethnicity while leaving other ethnic groups unscathed,
Starting point is 00:25:00 which of course they'd be thinking of Han Chinese for that. They're likely moving very aggressively on developing those type of weapons. And so it's on us to say this company shouldn't be operating in the country. And you're increasingly seeing states pass legislation that says in our state, a medical facility or research facility cannot use these genetic sequencers that are controlled by the Chinese Communist Party. Notably, the companies involved on the Chinese side are blacklisted by our Department of
Starting point is 00:25:31 Defense for working with China's military on creating these weapons. They're also sanctioned by the Department of Commerce for human rights abuses. So it's curious that they're even allowed to be here at all. The federal government's been working on a solution in bits and starts. What states are able to do is really quickly say, you got to get out here. We don't want this communist technology. We don't want the People's Liberation Army's favorite DNA sequencer collecting data on our citizens. Because it could very easily be just sent back to China, to the giant database of all Americans. And actually, that's something that's worth talking about, the psych and genetic profiles of every American. A
Starting point is 00:26:12 lot of people don't understand that this is something that's happening over there. You take TikTok as one example here. They're able to collect intense amounts of data about whoever's using that application. They're storing it away. They're, you know, they're gonna save that for a day when they want to use it on that person or those groups of people. When you have tools that are coming out with large language models, that's going to make it easier to synthesize and analyze all of that information. They want to be and analyze all of that information. They want to be at the forefront of that.
Starting point is 00:26:47 They want to be at the forefront of understanding how to impact somebody's health. That's why they're looking at people's genetic information, they're looking at your healthcare monitor, they're collecting information all these ways, they're always hacking hospital records and things like this. They want to collect all sorts of information. They'll figure out later what to use it for. They might have an intent in mind right now, or they're just saying,
Starting point is 00:27:10 this is sensitive personal information. We'll figure out a way to use it later. They're collecting on as many people as they can, certainly federal employees. They've been really intent on hacking into federal systems and getting information on federal employees, but it applies for all Americans. I get the sense you don't think Americans should have TikTok on their phones. I don't think Americans should have TikTok on their phones, nor should Americans have the replacement applications Little Red Note, which notably is named after a book, a communist propaganda book written by Mao Zedong, Mao's Little Red Book. So when the application is named after a communist propaganda
Starting point is 00:27:53 book, and that was the move. When TikTok was sort of at risk of being shut down, they were trying to move people over to Little Red Note. The application DeepSeek, if you're putting that on your phone, I mean, we know DeepSeek that that data is going back to certain companies in China that were fighting for other reasons. So any application, any keystroke you make on your device,
Starting point is 00:28:18 if it has a Chinese application on it, you have to assume it's going out. As I said earlier, their laws require this. So their 2017 national intelligence law requires that data to go back to Beijing. The safe thing to do is to assume that's what's happening. Isn't it kind of the case in point that all these people are rushing over to Red Note based on prompts from TikTok, that it's not just a collection system, it's an influence system? And if they can do that,
Starting point is 00:28:45 and if there can be young people talking about how they've discovered, my goodness, it's so good in China, everyone has housing. I don't know if you watched any of these videos, I did. It was just kind of stunning what people could be led to believe with the right kind of push at a time where an app like TikTok feels a bit of an existential threat and being shut down. Your thoughts? I think you're right that there was a push. There was an interesting effect on both sides. So the American side, as normal, received a lot of propaganda. And this is, you know, Xi Jinping describes these tools, these applications, short video devices, and others as tools
Starting point is 00:29:26 to win the smokeless battlefield of ideology. But I do want to also point out an interesting side effect. So you have a lot of communist propaganda on these apps. But there was some interaction between Americans and Chinese. And some of it was quite humorous, like when the Chinese would ask the Americans what their salaries were. And the Chinese side couldn't believe what the salaries were, and the Chinese side couldn't believe
Starting point is 00:29:45 what the Americans were saying. And so, you know, that was interesting. But then we saw that the regulators in China started really wanting to rapidly hire up sensors that were really good at English because they had to filter out this information. They didn't want the Americans sending that information into China.
Starting point is 00:30:03 They didn't want Americans sending information about civil liberties into China. They just want one-way information control where communist propaganda comes towards us, but we don't send information back in. So that's how they approach these things. And it's notable that as soon as they're potentially losing one vector, they have a couple of replacements. That shows you how important it is to them to be able to propagandize Americans and collect data on Americans. And I think that that tell should compel more action from us to more rapidly shut these things down. You've seen a lot of state governors cutting off these applications on state devices.
Starting point is 00:30:40 Could you just explain to me why a Chinese electric car might be a bad idea to have? So if you recall a couple of years ago, there was a spy balloon floating across the country slowly, way up in the air, but probably collecting sensitive information. And Americans were rightly riled up. Imagine that spy balloon was down at street level with the most sensitive laser sensing devices known
Starting point is 00:31:06 to man with connectivity to the internet with all sorts of other monitoring devices. And it's just rolling around American streets all over the country at the scale of a couple million per year. So they're just mapping everything everywhere. Those cars would be able to interact with other connected devices, whether it's traffic control signals or otherwise. They're able to map out to the nanometer everything within the United States. This is the capacity they would love to have. So we have likely already taken the
Starting point is 00:31:37 step to block the Chinese cars themselves from coming into the country, and American Auto loves that. What American Auto should take the note on is that the devices that make that car dangerous should not be going into your car either. So there are laser sensor devices, as I mentioned, internet connectivity devices that allow for remote access, command control, exfiltrating data. Actually, President Biden started looking at this
Starting point is 00:32:06 and the capacities that they said could be engendered in these devices going into American cars are really dystopian capacities. At key stroke, they could say, safe distance between cars is not 40 feet, it's now four inches, all sorts of things like this. And it's a massive mistake if we allow those to go into American cars. Now, more recently, just in the last couple of days,
Starting point is 00:32:29 there are some headlines coming out that American auto companies are interested in putting DeepSeek, the Chinese AI tool, into integrating that into the automobile system. So not only is all this connected technology coming from China into some of these cars. They're going to use a Chinese AI to be integrating all these technologies. This is a disastrous idea. Federal lawmakers, state lawmakers need to tell American auto companies, you're not going in this direction.
Starting point is 00:32:57 You've advocated for a whole of country or-nation approach to respond to this. You described communist China as an existential threat. But this whole-of-government approach is something that many Americans are a bit suspicious of these days. How do you square that? That's a very real challenge. I mean, we face that challenge. I'll give you one example. There's a certain state in the United States where we were working on legislation. The legislation mentioned the cybersecurity agency, CISA, and basically it was saying if there's a company
Starting point is 00:33:38 that's on a list maintained by CISA for being a bad company, they shouldn't be able to sell products into this state. CISA was involved in censorship of Americans as well. And so this has created this really fractured intelligence and trust system. I believe that President Trump's team is actually going to fix a lot of this stuff. But they have to put a lot of pieces back together again,
Starting point is 00:34:05 because you have state lawmakers, I'm watching in real time, not trusting information that they're getting from federal agencies. And we work with them. We say, look, we understand they did bad things over here, but there is still some good information over here. But that's not the argument we want to be making. We want to be able to say, you could trust what these intelligence agencies are doing.
Starting point is 00:34:28 You could trust their work. And President Trump's team has a lot of work cut out for them to fix those problems. Some of the headlines we've seen in the last couple of days are really unbelievable, what was happening in some of these. If you would have asked me, what's the craziest thing you think is happening in the Intel agencies, I would not have guessed some of the things we've seen in the headlines in the last couple days. So a lot of that needs to be fixed,
Starting point is 00:34:51 not just because that's our ability to collect information around the world, but because Americans need to be able to trust what those agencies are saying. Down to the grassroots level, down to the level of Americans being told that they should do encrypted messaging, they might automatically be suspicious. Why does my government want me in encrypted messaging? It's actually for a good reason in this case. But they need to rebuild trust because if state officials aren't trusting what they're saying, certainly
Starting point is 00:35:21 the average family in America is probably suspicious about what they're saying. What do you think the most important piece of legislation that every state should have right now is? What I think is the most important piece of legislation is probably the more difficult piece that we do, and it's broad critical infrastructure protection. This is the near-term potential crisis point where states could have an impact, which is get their connected technologies off of critical infrastructure. Don't allow Chinese companies to be directly accessing critical infrastructure. And make sure that critical infrastructure companies are not giving direct access to foreign adversary individuals. That's a pretty complicated matter.
Starting point is 00:36:02 So we have to be intensely involved in a state to succeed on that. But they're easy. I mean, the other one I would say is get your pension out of China immediately. It should have been out 10 years ago. It wasn't out 10 years ago. Get your pension dollars out of China right now. Think about this. If China invades Taiwan and the president is making a decision, Xi Jinping can sit there and say, if you decide to defend Taiwan, your people are gonna lose about a trillion dollars
Starting point is 00:36:31 table stakes, because Americans have roughly a trillion dollars in various forms, one to two trillion invested in China, and we'll just turn that off immediately. The state and local governments pensions probably have between one and $200 billion invested in China. That all disappears immediately. So now you have these pension systems going broke. You could fix that with a keystroke. Sell this index that has all this Chinese stuff, move to
Starting point is 00:36:58 this index that doesn't have this Chinese stuff. That's a simple solution every state should do immediately. The more complex side, the critical infrastructure protections, getting in there, figuring out where you have risks and mitigating those risks because that's where China is going to hit states. If you're a state legislator watching this show or perhaps a constituent that wants to call attention to everything that you're doing. Where do they find out more? We're at statearmor.org. The State Armor is also our Twitter handle and mine is Michael Luchey is my name on Twitter. And the one thing we would encourage state lawmakers to do
Starting point is 00:37:36 is make confronting and countering communist China an every year policy item, just like education is, just like law enforcement is. Make it an every year policy item, just like education is, just like law enforcement is. Make it an every year policy item where you're always improving on what you did in the previous year, building out new capacities, building out new powers to confront
Starting point is 00:37:55 and combat communist China. That's why it's a little bit of a challenge at first, because they've never confronted these foreign threats. It's been generations since they've thought about this. So put this in. Every year you should be passing legislation, doing executive orders, doing regulatory rulings, having attorney generals take action to counter Communist China every single year. Well, Michael Lucey, it's such a pleasure to have had you on. Thank you, Jan. Thank you all for joining Michael Lucey and Jan. This episode of American Thought Leaders, I'm your host Jan Jekielek.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.