American Thought Leaders - How the CCP Infiltrated America’s Critical Infrastructure: Michael Lucci
Episode Date: March 23, 2025Michael Lucci is the founder, CEO, and chairman of State Armor. He helps states enact policies and solutions that protect their assets from foreign adversaries like communist China.“They’re trying... to invade our homeland, and they likely have developed the capacity to make life very difficult, to create crises within the United States—whether it’s power, whether it’s wastewater treatment, whether it’s telecommunications,” he says. “They have laws that require those companies to engage in espionage. So why are we letting them sell connected devices of any type into the United States?”In this episode, we dive deep into how the Chinese regime has managed to infiltrate our critical infrastructure and communications systems at the local, state, and federal levels.“It’s the largest military buildup since World War Two is what China is doing right now,” says Lucci. “If they’re just in our back doors, listening, reading, following everything we’re doing, following the pattern of life for important officials across the country, that’s a pretty deep problem.”Views expressed in this video are opinions of the host and the guest, and do not necessarily reflect the views of The Epoch Times.
Transcript
Discussion (0)
They're trying to invade our homeland and they're trying to develop the capacity, and
they likely have developed the capacity, to make life very difficult, to create crises
within the United States, whether it's power, whether it's wastewater treatment, whether
it's telecommunications.
Michael Lucci is the founder and CEO of State Armor.
He helps states enact policies to protect themselves from Communist China.
They have laws that require those companies to engage in espionage, so why are we letting
them sell connected devices of any type into the United States?
In this episode, we dive deep into how the Chinese Communist Party has compromised our
critical infrastructure and communication systems at the local, state, and federal levels.
It's the largest military buildup since World War II, is what China is doing right now.
This is American Thought Leaders, and I'm Jan Jekielek.
Michael Lucey, such a pleasure to have you on American Thought Leaders.
Wonderful to be on. Great to meet you.
You recently issued a comprehensive threat assessment of Communist China. Give me a
rundown of what you found. What we found is that the state governments, state and local governments,
face unique threats from Communist China. And that was our target. I run an organization,
State Armor. We're working with state lawmakers, some local lawmakers, on countering Communist
China.
And so the rundown looks at first the risk of war.
So this is kind of the existential threat.
Not just what happens in the first island chain, you know, if they go to take Taiwan,
maybe it's something with the Philippines.
It's not just what happens there.
It's then what happens here.
So the risk of war over there is also very much a
right here problem because of China's infiltration of, say, critical infrastructure. They've been
developing the capacity to turn off critical infrastructure. We've heard this on and off from
the federal government related to water, related to power, related to things that we depend on
every day, related to our communication system.
When we talk about this, we say,
imagine COVID disruptions times 10, times 20.
That's the type of threat we're talking about.
But then breaking that down,
what is China getting into?
What are they doing?
They're accessing critical infrastructure
through routers and through other attack modes.
They're embedding in there. They're sort of living off the land, they say. They're just sort
of laying low and waiting for some day to do something. The difference on these
hackers now is previously when China would subject the United States to cyber
attacks, there was an economic incentive. They wanted to take something, you know,
intellectual property, whatever, take it back to China, build a business. That's
not what we're seeing now.
They are coming in and just waiting for something.
Now you could go further down threats
that face state and local governments.
When they procure Chinese technologies,
the safe thing to assume would be at some point
that data's going back to Beijing.
State and local governments, not just them,
the federal government procures routers
that have known security risks.
They procure drones.
I mean, we're deeply dependent on drones
that are sanctioned by our federal government
in multiple ways.
Getting out of the hardware and software,
some of the threats that are very important
are about political warfare,
human intelligence and political warfare
at the state and local level.
In 2022, the director of national intelligence
issued a memo that every state leader should really look at.
It's here's what China's trying to do
with what they call the sub-national level,
state and local level.
They're trying to co-opt officials
that they could leverage later,
collect data, personal data sometimes,
develop economic dependencies,
gain investment dollars for China,
which they've been doing quite well.
So they're trying to exploit our system
and the seams and cracks in our system,
seams and cracks being between the federal government,
state and local governments, they try to get in there,
they try to convince state governments to do some things
that perhaps the federal government would think
to be a very bad idea.
So this is the threat assessment we looked at is,
first the risk
of a conflict that they would start and what would that mean here and how do you start
mitigating that. But set that conflict aside, the technological dependence, the espionage
that that allows, the political warfare that they conduct at the state and local level,
all of those problems also have to be sussed out, regardless of whether there's a conflict. Give me an example of some of the concretely for people on the street, everyday folks,
how that might manifest in their lives. What kind of technologies are we talking about?
Outside of the routers, outside of the drones, basically computers that come from a Chinese
company. Let me take a step back. China has a national intelligence law. It's their 2017 national intelligence law. You must engage in espionage on behalf of the
party state when asked to do so. So any Chinese company that's involved in work
here, collecting data here, maybe they're putting cameras on critical infrastructure.
We just heard from DHS that there are 12,000 Chinese cameras on critical
infrastructure across the United States. DHS that there are 12,000 Chinese cameras on critical infrastructure across the United States.
DHS notified us of this because they're worried
about the espionage risk.
They're worried about that data being sent back to China.
There are batteries being connected to cars
in critical infrastructure.
There are laser sensors.
Many of these products are actually sanctioned
or blacklisted in some way by our federal government.
There are DNA sequencing devices. These are all being sold and used in hospital
facilities, research facilities, state and local governments. Even though the federal
government's saying there's some bad stuff going on here, they just keep
conducting business selling that product in through what we call brute force
economics, where they overproduce a product in order
to wipe out American and allied competitors for that product.
One thing that comes to mind are patient monitors. So tell me about that.
Yeah, so for someone who's in this every day, looking at these technological risks,
this headline even shocked me. So this was put out two or three weeks ago by our FDA
and our cybersecurity agency at the federal level.
The headline itself is quite scary.
It just says, contact has a back door.
Contact is a provider of patient monitors.
So it's the health care monitor that
might sit next to a hospital bed with your blood pressure,
with your pulse, your oxygenation levels.
And according to our federal government
in this release, that data is all going back to one place in China. Who knows how
many health care data privacy laws that violates in itself, but furthermore that
they can execute code on those devices, meaning they can make your blood
pressure say something that it's not. So if you're at 125 over 80, they might execute code
to make it say 160 over 110, and all of a sudden,
your emergency room physician thinks that he or she's dealing
with a very different situation because they're getting poor
information on your vital signs.
So that headline, which came out of our federal government,
is extraordinary shocking.
That they would be selling anything
that we care about into the health care system is a problem.
But really, we shouldn't be allowing
them to sell anything into the United States that
connects to the internet.
They have laws that require those companies
to engage in espionage.
So why are we letting them sell connected devices of any type
into the United States? I want to touch on a few pieces of critical technology to engage in espionage, so why are we letting them sell connected devices of any type into
the United States?
I want to touch on a few pieces of critical technology that I've covered on the show before.
For example, these large high-voltage transformers, which from what I understand are only produced
in China now and are installed all across the US grid, creating vulnerabilities. What's
the status of that?
Well, in 2020, I believe it was, President Trump's team intercepted one of these transformers
and began inspecting it. My best understanding is that they did find some things that they
don't like. Now, power producers and distributors have been trying to get off of that Chinese
transformer, but they're still coming in, is my understanding. And there are very few global competitors
for producing power transformers.
So we have a deep dependence on technologies like that
that we rely on for everyday life,
that if they install back doors into those pieces
of technology like they've done with port cranes,
like they've done with drones, healthcare monitors,
they can make life very difficult
all across the country, all of a sudden.
And so this is an economic strategy for them
that really has military undertones to it.
They could do military work in the Pacific
and just wreak havoc here in the United States. And so that
makes it difficult for us to project power anywhere. So the homeland security,
the homeland needs to be secured. We have to have strategic space here in the
United States in our hemisphere. If we're under pressure here, then we're not able
to project power to help free countries elsewhere. They're trying to invade our
homeland and they're trying to develop our homeland. And they're trying to develop
the capacity, and they likely have developed the capacity, to make life very difficult,
to create crises within the United States, whether it's power, whether it's wastewater
treatment, whether it's telecommunications, they want the capacity to create problems
here, if and when they decide to go attack Taiwan.
Some years ago, I had—who's now the FCC Commissioner, Brendan Carr, on the show talking
about exactly this issue, there were rip and replace laws that were passed. But in the end,
it took a long time. And in some cases, I don't think they were actually ever replaced,
because there wasn't a plan to actually complete the project in the first place. Are you
aware of this situation? There's one place where it's about getting done. That's the state of
Nebraska. That's because state lawmakers and the governors came together and said, this stuff needs
to get out immediately. So yes, President Trump in his first term started sanctioning Huawei,
the company, and then they created this
rip and replace program. It is going very slowly to say the least. Now in some
areas of the country this is really a crisis and the reason why Nebraska moved
on this, Governor Pillin and Senator Elliott Boe star you know have teamed up
to lead on a lot of these issues. That equipment surrounds our nuclear missile silos
in Western Nebraska, also in Eastern Colorado,
Southeast Wyoming.
We have a fleet of nuclear missile silos out there.
They're surrounded by Huawei equipment.
If you go on Google Earth and you
can zoom in on where the missile silos are,
you can go not very far and find Huawei radio transponders.
There was some data released, information released
in a report in 2022 where our intelligence agencies assessed
that they could likely disrupt the communications
around our nuclear missile silos.
There's also strategic command in Nebraska,
very sensitive information being transmitted there.
And so that's why the Nebraska team came together
and said that needs to come out immediately. And they've really pushed the pedal down to try to get that equipment
out. Most of the rest of the country is just coming along pretty slowly. And in most of the
rest of the country, it's not clear what sensitive assets are surrounded by that Huawei equipment.
You've used Nebraska as a bit of a model state. So this isn't the only area
where Nebraska has committed itself to basically removing the Chinese Communist Party's technologies
and perhaps other areas of influence. Can you describe that to me a little more?
So Nebraska, what's really unique here is you have this tremendous Democrat leader and a tremendous Republican leader
being the governor who came together and just pushed hard into these issues.
What I just described on getting the Huawei equipment out of the state of Nebraska, state
armor didn't exist when they were executing on that really critical problem.
We actually adopted what they did and we started taking it to other states in various forms. But it was obviously a signal in this state these folks are very serious
about taking on these problems. And so you know we just started meeting. I
actually met Senator Boe star testifying in Nebraska on tax policy and sort of
got to know him through that. It was only later that I saw he was doing these
great things on combating the Chinese Communist Party.
So Senator Boehrstar won our Lawmaker of the Year award for 2024.
He enacted what we call Pacific Conflict Stress Test, which is an audit of critical infrastructure.
It's an audit of state supply chains.
It's an audit of state financial holdings.
And it asked the question, if China goes to attack Taiwan, what is going to happen here
in the state of Nebraska?
How do we mitigate that today?
How do we get our pensions out of China?
How do we get our supply chains to be less dependent on their technologies or not dependent
on their technologies?
How do we harden critical infrastructure before that day comes?
And they're already executing on some of it on the telecommunications, but they're moving the ball forward on other areas of that.
They're blocking procurement of Chinese technologies.
They're kicking China off their land.
They did that all in 2024.
They're blocking their laser sensors.
So they did all that type of work.
And they're coming back for, I guess, a trilogy this year.
They have this huge package of awesome legislation.
They want to register foreign agents
from the bad guy
countries, from the foreign adversaries.
They want to punish crimes that are
done on behalf of foreign governments
differently than how we punish if it's
just a couple of Americans.
And they want to get China's genomic sequencing devices out
of the state of Nebraska entirely.
They also say no tax credits for foreign adversary companies
and they're fixing some other problems as well.
It looks like they want to do a broader pension
investment this year as well.
So you have this team in Nebraska,
Governor Pill and Senator Boehrstarr,
and they just keep pushing the best solutions.
Now, as states go, you know, this inspires competition.
And so we're seeing other states look at what Nebraska's
doing and saying, I want to match that. I want better that. And that's what we love to see.
Well, most recently, I'm thinking about Governor Huckabee with a big announcement, right?
Governor Huckabee is rolling out just an awesome agenda, dealing with China's influence in higher
education. Some of their espionage as well, some of the technologies that they sell into the state
of Arkansas, Sister City agreements, which are often a vector for espionage that China uses. So she rolled out
this huge agenda. It should be noted that Governor Huckabee was the first governor, first leader in
the United States to actually kick China off the land. So a Chinese company owned land in Arkansas.
Arkansas passed a law to say you can't do that.
That company kind of waited around for a while
and the governor and lawmakers there
forced them off the land.
The company ended up having to cut a check
to the state of Arkansas, if I recall correctly,
because they'd overstayed their welcome basically.
There was a timeline when they were supposed to get out.
They didn't meet that timeline.
So they had to leave and they had to cut a check to the state of Arkansas. So she was the first one to actually
kick them off Arkansas land. I'm excited to look at this supply chain audit that Nebraska has done.
It's very interesting because I'm aware again on this show, we've covered all sorts of things,
certain rare earths, certain medical precursors, which are exclusively made
in China. Can you give me a picture of some of these raw material areas of threat or dependency?
Raw materials, minerals that go into batteries for electric vehicles, but also batteries that
are going into our power grid in various ways. A lot of that is sourced from China. As you
mentioned, the power transformers, a lot of that is sourced from China. And then the precursors, the molecule
precursors for a lot of generic drugs that we depend on for everyday life, a lot of that
comes from China. And so that's the idea of a supply chain audit is what would the state
not be able to buy? So rewind back to the coronavirus,
when China sort of clamped down on supply chains related
to PPE and other things that they want to sort of hoard
within China, we felt the effects of that here.
This time around, they will do it intentionally.
If they start a conflict over Taiwan,
they will intentionally cut all those supply chains.
So we ought to know what that looks like going in. We ought to be able to start mitigating that
before they would take action. You're painting this picture, which is
frankly, deeply disturbing, right? On the one hand, you're saying that there's all these hackers that
are coming in and just kind of lurking, in effect, waiting for the right moment. I'd love to know a
little more about how we know that. But on the one side, on the other hand, there's all these vulnerabilities. And so
you can imagine this kind of perfect storm, which could be executed from outside at a
time when it's most inopportune for the United States or perhaps the whole West.
I think that what they would like to do is develop the capacity, one, to win a kinetic fight on the battlefield,
you know, over Taiwan with the United States Navy with Marines over there. So they want the capacity to do that.
And they've been militarizing. It's the largest military buildup since World War II, is what China's doing right now.
At the same time, they want to have sort of a co-equal capacity
to just cause total destruction here within the United States.
And they want the capacity to maybe punish allies
that might help the United States.
They want to develop all these capacities so that on some day,
maybe their leader decides he wants
to execute a certain contingency to blockade Taiwan or
full on invade Taiwan or do something else.
We're going to have to think deeply and profoundly about what it means to defend Taiwan.
I think you need to be in the president's seat and seeing all of the intelligence that
he's going to see to be able to make that decision.
Where we take a position is the president should have that optionality. And he will
not have that optionality in some dystopian world where China could just literally just
turn off everything in the United States. The president doesn't have the ability to
make those types of decisions.
And I know that the new president, President Trump, I'm sure his team is working out these
problems within the United States. State officials need to be doing a huge part of that as well. the new president, President Trump, I'm sure his team is working out these problems
within the United States.
State officials need to be doing
a huge part of that as well.
And so that is the kind of situation
they want to be able to execute on is,
if they have a blockade or an invasion of Taiwan,
the Chinese ideal would be,
we just don't have the ability to respond.
Because maybe they closed down the Panama Canal,
they closed down our ports because a lot of those
ship to shore cranes can likely be controlled by China.
They can threaten to turn on or off power systems,
water systems that we depend upon.
And so they want to sort of cripple us into saying like,
just the fight to get to the fight would be too big.
And so maybe we just back off.
And so the position that State Armor takes is
we want our leaders to have as much optionality as possible,
decide whatever they think's best for the country.
That's what needs to be solved at the state level,
the sub-national level, whether they do the fixing
on their own or they partner with the federal government
to fix these problems so that the president,
military leaders, and everyone can make the decisions that are best for the country without having to worry about
the $400 billion of investments that get vaporized as soon as we defend Taiwan because we have
too much money over there in China. So those are the kind of things that we want fixed.
I don't think I've had anyone explain the depth and gravity of the volt typhoon hack in the US? Am I wondering if you
could do that right now? I'll give you one slice of that. When we were operating in our first year
in multiple state houses, we were giving warnings about terrible things we thought China could do.
warnings about terrible things we thought China could do. And ironically, President Biden's administration kept releasing information, letters, et cetera,
that made us seem quite reasonable in the warnings that we were delivering.
So we would deliver warnings about things they could do with cars, water systems, or
whatever.
And just a couple of weeks later, just coincidentally, there'd be this release from the National
Security Advisor.
So I'll give you one example. The previous National Security Advisor sent a letter to every governor in March of 2024,
saying that China is developing and likely has the capacity to shut down water treatment facilities in your state.
They're actively probing and are developing the ability to do so. In a state like Texas, where we live, in Arizona, where it's not exactly a water-rich state,
if you can knock out water treatment, that could have a really crippling effect on state
and local government, on the energy industry in Texas.
So it's a low-cost way for the Chinese side to take out something that could cause massive
amounts of problems on our side. That's one example. They're doing that
through various vectors of access, some of it's through routers, some of it's through
modems, some of it's through other forms of cyber attack. They're probably doing that
through human sources, Chinese nationals working in these companies, and they're
doing that through other pieces of hardware that are attached to these important systems within the United States.
Now, water is one example. My understanding is that they have such sabotage set up across other systems, or they are trying to create the ability to do so.
You could think of pipelines that they might want to shut down. You could think, as we mentioned, ports, power grids, transportation facilities that they would want to shut down
or just throw into havoc in a crisis.
And what about the hacks that have to do with listening in on both government communications
and also just the rest of us?
I might have answered one typhoon rather than the other.
So Volt typhoon is where they're hacking into critical infrastructure.
Salt typhoon is when they're directly into our communication systems.
So we put back doors into our communication systems after 9-11, right or wrong, to allow
the federal government to tap in and look at what some bad actors
are doing.
They got into that.
And so they're into, I think, at least the eight largest telecommunications providers
in the United States.
They have the capacity to listen in on calls, read messages.
Our government has never been super enthusiastic about Americans using encrypted messaging systems.
But if you look late last year, our government started putting out memos saying,
start using encrypted messaging systems unless you want China reading it, was the undertone of it.
So when you look at our government, they have their own interest to do surveillance.
But if they're telling us, use encrypted messaging systems, you know that we have their own interest to do surveillance. But if they're telling us use encrypted messaging systems,
you know that we have a really serious problem.
There were stories about President Trump's team
having their phones tapped, likely,
maybe the vice president team, maybe Kamala Harris's team
as well.
It's bad enough when their radio transponders can
be corrupted in various ways.
But if they're just in our back doors,
listening, reading,
following everything we're doing, following pattern of life for important officials across
the country, it's a pretty deep problem. And it's really a deep failure that they haven't
been kicked out by the previous administration.
Explain to me why it's a problem for gene sequencing technology developed in China for running care?
Gene sequencing technology has a lot of important uses. Some of the uses that normal folks like
my family use would be finding out your ethnicity, right? Family connections you didn't know you
had. Other important uses are to create pharmaceutical solution. So if you're
looking at enough genetic information, you could find certain genetic
vulnerabilities to certain diseases or syndromes and you can start working on a
pharmaceutical solution for that. So these are really important things that
you could do with gene sequencing. What the Chinese side says they're interested
in doing is creating weapons that kill or incapacitate based upon ethnicity. And so this is one of these really surreal
instances where the Chinese side pretty openly says what they're doing, it's
horrific, it's on the American side to start acting. So the general who ran
their National Defense University wrote in 2017 in a book that he published, basically what I said,
the best weapons in the era of biotechnology
are the ones that can kill or sterilize
or lower the intelligence of certain groups of people
based on their ethnicity
while leaving other ethnic groups unscathed,
which of course they'd be thinking of Han Chinese for that.
They're likely moving
very aggressively on developing those type of weapons.
And so it's on us to say this company shouldn't be operating in the country.
And you're increasingly seeing states pass legislation that says in our state, a medical
facility or research facility cannot use these genetic sequencers that are controlled
by the Chinese Communist Party.
Notably, the companies involved on the Chinese side are blacklisted by our Department of
Defense for working with China's military on creating these weapons.
They're also sanctioned by the Department of Commerce for human rights abuses.
So it's curious that they're even allowed to be here at all.
The federal government's been working on a solution in bits and starts. What states are able to do is really quickly say, you got to get out
here. We don't want this communist technology. We don't want the People's Liberation Army's
favorite DNA sequencer collecting data on our citizens. Because it could very easily be just
sent back to China, to the giant database of all Americans. And actually,
that's something that's worth talking about, the psych and genetic profiles of every American. A
lot of people don't understand that this is something that's happening over there.
You take TikTok as one example here. They're able to collect intense amounts of data about whoever's
using that application. They're storing it away. They're, you know, they're gonna
save that for a day when they want to use it on that person or those groups
of people. When you have tools that are coming out with large language models,
that's going to make it easier to synthesize and analyze all of that
information. They want to be and analyze all of that information.
They want to be at the forefront of that.
They want to be at the forefront of understanding how to impact somebody's health.
That's why they're looking at people's genetic information,
they're looking at your healthcare monitor,
they're collecting information all these ways,
they're always hacking hospital records and things like this.
They want to collect all sorts of information.
They'll figure out later
what to use it for. They might have an intent in mind right now, or they're just saying,
this is sensitive personal information. We'll figure out a way to use it later.
They're collecting on as many people as they can, certainly federal employees. They've been really
intent on hacking into federal systems and getting information on federal employees, but it applies for all Americans.
I get the sense you don't think Americans should have TikTok on their phones.
I don't think Americans should have TikTok on their phones, nor should Americans have
the replacement applications Little Red Note, which notably is named after a book, a communist propaganda book written by Mao Zedong,
Mao's Little Red Book.
So when the application is named after a communist propaganda
book, and that was the move.
When TikTok was sort of at risk of being shut down,
they were trying to move people over to Little Red Note.
The application DeepSeek, if you're putting that on your phone,
I mean, we know DeepSeek that that data is going back
to certain companies in China that were fighting
for other reasons.
So any application, any keystroke you make on your device,
if it has a Chinese application on it,
you have to assume it's going out.
As I said earlier, their laws require this.
So their
2017 national intelligence law requires that data to go back to Beijing. The safe thing to do is to
assume that's what's happening. Isn't it kind of the case in point that all these people are
rushing over to Red Note based on prompts from TikTok, that it's not just a collection system,
it's an influence system? And if they can do that,
and if there can be young people talking about how they've discovered, my goodness,
it's so good in China, everyone has housing. I don't know if you watched any of these videos,
I did. It was just kind of stunning what people could be led to believe with the right kind of
push at a time where an app like TikTok feels a bit of an existential threat and being shut down. Your thoughts?
I think you're right that there was a push. There was an interesting effect on both sides.
So the American side, as normal, received a lot of propaganda.
And this is, you know, Xi Jinping describes these tools, these applications, short video devices,
and others as tools
to win the smokeless battlefield of ideology.
But I do want to also point out an interesting side effect.
So you have a lot of communist propaganda on these apps.
But there was some interaction between Americans and Chinese.
And some of it was quite humorous,
like when the Chinese would ask the Americans what
their salaries were.
And the Chinese side couldn't believe what the salaries were, and the Chinese side couldn't believe
what the Americans were saying.
And so, you know, that was interesting.
But then we saw that the regulators in China
started really wanting to rapidly hire up sensors
that were really good at English
because they had to filter out this information.
They didn't want the Americans
sending that information into China.
They didn't want Americans sending information about civil liberties into China.
They just want one-way information control where communist propaganda comes towards us,
but we don't send information back in.
So that's how they approach these things.
And it's notable that as soon as they're potentially losing one vector, they have a couple of replacements.
That shows you how important it is to them to be able to propagandize Americans and collect data on Americans. And I think that that tell
should compel more action from us to more rapidly shut these things down. You've seen
a lot of state governors cutting off these applications on state devices.
Could you just explain to me why a Chinese electric car might be a bad idea to have?
So if you recall a couple of years ago,
there was a spy balloon floating across the country slowly,
way up in the air,
but probably collecting sensitive information.
And Americans were rightly riled up.
Imagine that spy balloon was down at street level
with the most sensitive laser sensing devices known
to man with connectivity to the internet with all sorts of other monitoring devices.
And it's just rolling around American streets all over the country at the scale of a couple
million per year.
So they're just mapping everything everywhere.
Those cars would be able to interact with other
connected devices, whether it's traffic control signals or otherwise. They're
able to map out to the nanometer everything within the United States.
This is the capacity they would love to have. So we have likely already taken the
step to block the Chinese cars themselves from coming into the country,
and American Auto loves that. What American Auto should take the note on
is that the devices that make that car dangerous
should not be going into your car either.
So there are laser sensor devices, as I mentioned,
internet connectivity devices that allow for remote access,
command control, exfiltrating data.
Actually, President Biden started looking at this
and the capacities that they said could be engendered
in these devices going into American cars
are really dystopian capacities.
At key stroke, they could say,
safe distance between cars is not 40 feet,
it's now four inches, all sorts of things like this.
And it's a massive mistake if we allow those to go into American cars.
Now, more recently, just in the last couple of days,
there are some headlines coming out
that American auto companies are interested
in putting DeepSeek, the Chinese AI tool,
into integrating that into the automobile system.
So not only is all this connected technology
coming from China into some of these cars. They're going to use a
Chinese AI to be integrating all these technologies. This is a disastrous idea. Federal lawmakers,
state lawmakers need to tell American auto companies, you're not going in this direction.
You've advocated for a whole of country or-nation approach to respond to this. You described
communist China as an existential threat. But this whole-of-government approach is something
that many Americans are a bit suspicious of these days. How do you square that?
That's a very real challenge. I mean, we face that challenge. I'll give you one example.
There's a certain state in the United States
where we were working on legislation.
The legislation mentioned the cybersecurity agency, CISA,
and basically it was saying if there's a company
that's on a list maintained by CISA for being a bad company,
they shouldn't be able to sell products into this state.
CISA was involved in censorship of Americans as well.
And so this has created this really fractured intelligence
and trust system.
I believe that President Trump's team is actually
going to fix a lot of this stuff.
But they have to put a lot of pieces back together again,
because you have state lawmakers,
I'm watching in real time, not trusting information
that they're getting from federal agencies.
And we work with them.
We say, look, we understand they did bad things over here,
but there is still some good information over here.
But that's not the argument we want to be making.
We want to be able to say, you could trust what these intelligence agencies are doing.
You could trust their work.
And President Trump's team has a lot of work cut out for them to fix those problems.
Some of the headlines we've seen in the last couple of days are really unbelievable, what
was happening in some of these.
If you would have asked me, what's the craziest thing you think is happening in the Intel
agencies, I would not have guessed some of the things
we've seen in the headlines in the last couple days.
So a lot of that needs to be fixed,
not just because that's our ability to collect information
around the world, but because Americans
need to be able to trust what those agencies are saying.
Down to the grassroots level, down
to the level of Americans being told that
they should do encrypted messaging, they might automatically be suspicious. Why does my government
want me in encrypted messaging? It's actually for a good reason in this case. But they need
to rebuild trust because if state officials aren't trusting what they're saying, certainly
the average family in America is probably suspicious about what they're saying.
What do you think the most important piece of legislation that every state should have right
now is? What I think is the most important piece of legislation is probably the more difficult
piece that we do, and it's broad critical infrastructure protection. This is the near-term
potential crisis point where states could have an impact, which is get their connected technologies off of critical infrastructure.
Don't allow Chinese companies to be directly accessing critical infrastructure.
And make sure that critical infrastructure companies are not giving direct access to foreign adversary individuals.
That's a pretty complicated matter.
So we have to be intensely involved in a state to succeed on that.
But they're easy. I mean, the other one I would say is get your pension out of China immediately.
It should have been out 10 years ago. It wasn't out 10 years ago.
Get your pension dollars out of China right now.
Think about this. If China invades Taiwan and the president is making a decision,
Xi Jinping can sit there and say,
if you decide to defend Taiwan,
your people are gonna lose about a trillion dollars
table stakes, because Americans have roughly
a trillion dollars in various forms,
one to two trillion invested in China,
and we'll just turn that off immediately.
The state and local governments pensions
probably have between one and $200 billion
invested in China. That all disappears immediately. So now you have these pension systems going broke.
You could fix that with a keystroke. Sell this index that has all this Chinese stuff, move to
this index that doesn't have this Chinese stuff. That's a simple solution every state should do
immediately. The more complex side, the critical infrastructure protections, getting in there, figuring out where you have
risks and mitigating those risks because that's where China is going to hit states.
If you're a state legislator watching this show or perhaps a constituent that wants to
call attention to everything that you're doing. Where do they find out more? We're at statearmor.org.
The State Armor is also our Twitter handle
and mine is Michael Luchey is my name on Twitter.
And the one thing we would encourage state lawmakers to do
is make confronting and countering communist China
an every year policy item, just like education is,
just like law enforcement is. Make it an every year policy item, just like education is, just like law enforcement is.
Make it an every year policy item
where you're always improving
on what you did in the previous year,
building out new capacities,
building out new powers to confront
and combat communist China.
That's why it's a little bit of a challenge at first,
because they've never confronted these foreign threats.
It's been generations since they've thought about this. So put this in. Every year you should be passing legislation, doing executive
orders, doing regulatory rulings, having attorney generals take action to counter Communist China
every single year. Well, Michael Lucey, it's such a pleasure to have had you on. Thank you,
Jan. Thank you all for joining Michael Lucey and Jan. This episode of American Thought Leaders,
I'm your host Jan Jekielek.