Episode Summary: The Tudor Dixon Podcast: Enemies Within: China’s Quiet Invasion with Gordon Chang
Release Date: May 28, 2025
Host: Tudor Dixon
Guest: Gordon Chang, Gatestone Institute Senior Fellow and author of Plan China's Project to Destroy America
1. Introduction and Context
Timestamp: [03:14]
Tudor Dixon opens the episode by welcoming Gordon Chang, emphasizing the urgency of discussing China's growing influence and its covert strategies to undermine the United States. Dixon highlights the prevalence of tariffs on Chinese goods, particularly affecting industries like automotive manufacturing in Michigan, and sets the stage for a deep dive into China's multifaceted invasion strategies.
2. Economic Warfare: Tariffs and Trade Imbalance
Timestamp: [03:45 - 04:13]
Dixon brings up the topic of tariffs imposed on Chinese products, questioning why they are higher compared to other countries. Gordon Chang responds by reframing the situation, stating, “most Americans assume this is peacetime. ... we should consider ourselves not in peace, but at war” (04:13).
Chang explains that China has declared a "people's war" on the U.S., justifying the use of tariffs as necessary measures to protect American society. He acknowledges that while tariffs may be unpopular and economically painful, they are essential sacrifices to counter China's aggressive strategies.
3. Intellectual Property Theft and Technological Espionage
Timestamp: [06:21 - 07:15]
Chang delves into China's rampant intellectual property (IP) theft, estimating losses to the U.S. at around half a trillion dollars annually, as per former Director of National Intelligence John Ratcliffe (06:21). He emphasizes the importance of protecting IP to maintain the incentive for American innovation, arguing, “we've got to protect it because the reason why we have it is because inventors feel that they have protection for their work” (06:45).
Chang criticizes technological companies' desire to utilize others' IP without proper safeguards and advocates for strengthening IP laws to prevent further economic exploitation by China.
4. The Risk of Cyber Attacks and Physical Infrastructure Vulnerabilities
Timestamp: [07:15 - 09:33]
Dixon raises concerns about China's capacity to disrupt U.S. infrastructure through technology, citing incidents where Chinese-made power inverters were remotely disabled in the U.S. (08:07). Chang confirms this vulnerability, explaining, “China's been able to do this” and elaborates on how components like modems in cranes at U.S. ports can be exploited to cause significant damage (08:26).
He warns of the potential for larger-scale cyberattacks that could target critical infrastructure such as energy grids and ports, effectively crippling the nation’s functionality.
5. Biological Weapons and the COVID-19 Pandemic
Timestamp: [09:33 - 15:35]
The conversation shifts to biological threats, with Dixon referencing an incident in Reedley, California, where a Chinese biological weapons facility was discovered (12:27). Chang discusses the dangers of genetically engineered pathogens, mentioning, “Ebola has a natural fatality rate of 50%... if the Chinese can figure out how to make it more transmissible, more contagious, then they will have a weapon that will be able to kill more massive numbers of Americans” (12:27).
Chang asserts that the Wuhan Institute of Virology may have been a military facility and suggests that the COVID-19 pandemic was either a result of negligence or a deliberate act by Xi Jinping to weaken global powers by spreading the virus beyond China’s borders.
6. U.S. Policies and Responses to Chinese Aggression
Timestamp: [15:35 - 22:34]
Dixon criticizes the Biden administration for not holding China accountable for the pandemic and other misdeeds, contrasting it with former President Trump's more aggressive stance against China. Chang agrees, pointing out that the U.S. rejoined the World Health Organization (WHO) under Biden, which he argues facilitated the spread of COVID-19 (15:11).
Chang contends that Trump’s withdrawal from the WHO was a strategic move to prevent China from manipulating global health responses to their advantage. He calls for stronger measures and possible reparations to deter China from future biological and cyber threats.
7. The Role of Chinese Students and Espionage
Timestamp: [32:25 - 34:43]
The discussion turns to the presence of Chinese students in U.S. educational institutions. Chang highlights that a significant portion of these students may be involved in espionage, compelled by Chinese laws like the 2017 National Intelligence Law, which mandates espionage activities if ordered by the Chinese government (34:44). He mentions that approximately 13% of the 277,000 Chinese students in the U.S. are estimated to engage in espionage.
Chang emphasizes the need for the U.S. to dismantle Chinese surveillance and coercion networks within educational institutions to prevent intellectual and technological theft.
8. Cultural Challenges and Societal Responses in the U.S.
Timestamp: [40:40 - 47:18]
Dixon expresses concern over the American cultural resistance to acknowledging and combating espionage and infiltration, citing the risk of racism accusations when targeting Chinese nationals. Chang responds by clarifying that combating Chinese espionage is a matter of national security, not racism. He states, “We have dangerous elements in our country, and we have to either imprison or expel them because ... they can create the worst outcomes for us” (36:00).
Chang argues that China exploits American values of inclusivity and freedom to mask its espionage activities, urging Americans to overcome cultural biases to effectively protect the nation.
9. Conclusion and Takeaways
Timestamp: [47:18 - 48:22]
In the concluding segment, Dixon and Chang discuss the broader implications of China’s strategies on American society and global stability. Chang warns that without decisive actions, such as imposing hefty penalties on China and strengthening national defenses against biological and cyber threats, the U.S. remains vulnerable to further invasions.
Chang reiterates the urgency of the situation, stating, “we’re going to lose our country” if the U.S. fails to address these threats head-on (41:37).
Dixon underscores the cultural and political challenges in implementing these measures but acknowledges the necessity of confronting hard truths to safeguard national security.
Notable Quote:
“We should consider ourselves not in peace, but at war. And in war we have to take extraordinary measures to protect our society.”
— Gordon Chang, 04:13
Key Insights and Conclusions
- China’s Multifaceted Invasion: Beyond economic measures, China employs intellectual property theft, cyberattacks, and biological threats to undermine the U.S.
- Economic Impact: Tariffs, while economically painful, are viewed as necessary wartime measures to protect American industries and technological innovations.
- Cyber and Physical Vulnerabilities: Chinese-manufactured components in critical infrastructure present significant risks of remote sabotage and large-scale disruptions.
- Biological Warfare Concerns: The COVID-19 pandemic is framed as either a result of negligence or deliberate actions by China to weaken global powers, with potential for more dangerous biological threats in the future.
- Espionage and Infiltration: A notable portion of Chinese students in the U.S. may be involved in espionage activities, necessitating stronger countermeasures within educational institutions.
- Cultural and Political Barriers: American values of inclusivity and fear of racism pose challenges to effectively combating Chinese infiltration and espionage.
- Urgency for Action: Without decisive and possibly drastic measures, the U.S. risks further destabilization and loss of national security.
This episode provides a comprehensive analysis of China's strategic maneuvers to weaken the United States from within, highlighting the urgent need for robust countermeasures and a re-evaluation of U.S. policies towards China. Through Gordon Chang’s expert insights, listeners gain a deeper understanding of the covert threats posed by China and the critical importance of addressing them to preserve national integrity and security.
