Briefing: China’s Potential for Remote Access and Manipulation of Systemic Infrastructure
Examining the Growing Threat to America from Chinese Remote Control of Critical Infrastructure
Overview
On November 15th, 2024, thousands of solar inverters manufactured by the Chinese company Deye were remotely disabled across the United States and several other countries. Owners of these inverters suddenly found their systems inoperable, with error messages indicating their devices were not authorized for use in certain regions. The shutdown was executed via Deye’s cloud management platform, with no warning or recourse for affected users. Although the company claimed this action was to enforce distribution agreements, the incident has raised serious concerns and prompted analysis suggesting that China may possess the technical capability to remotely access and potentially manipulate foreign infrastructure on a large scale.
Key Threats and Capabilities
1. November 15th, 2024: A Proof of Concept?
Remote Disabling: The Deye incident demonstrated that remote control over critical infrastructure is technically feasible, at least in the context of civilian enforcement actions.
Dual-Use Implications: While not confirmed as a deliberate offensive act, the event suggests that similar remote access could be exploited for more strategic or hostile purposes.
2. Civil-Military Fusion (CMF) Doctrine
Legal Mandates: China’s 2017 National Intelligence Law obligates companies to assist with state intelligence work, raising concerns about potential state leverage over commercial technology.
State-Private Sector Integration: The CMF strategy encourages collaboration between private tech firms and the military, increasing the risk that civilian technologies could be repurposed for offensive operations.
3. Vulnerable Systems and Products
4. Offensive Scenarios (Analytical Possibilities)
Economic Coercion: Remote disabling of infrastructure as a tool for diplomatic or economic leverage.
Pre-War Sabotage: Disruption of energy, communications, or transportation prior to or during conflict.
Deniable Attacks: Use of civilian technology as a proxy for state-directed interference, complicating attribution.
5. Potential Outcomes for the United States if Capabilities Are Used Offensively
Widespread Power Outages: Targeted shutdowns of solar inverters, batteries, or grid management systems could result in large-scale blackouts, crippling emergency services, hospitals, and daily economic activity.
Telecommunications Disruption: Remote manipulation or sabotage of telecom infrastructure could sever internet, phone, and data services, impeding government operations, financial markets, and critical communications.
Supply Chain Paralysis: Disabling transportation networks, including EV batteries and rail signaling, would disrupt the movement of goods and people, causing shortages of food, medicine, and industrial supplies.
Loss of Military Readiness: Compromised logistics, communications, or semiconductor supply chains could delay or degrade military response capabilities during a crisis.
Economic Losses and Instability: Prolonged outages or disruptions would result in billions of dollars in direct losses, undermine public confidence, and potentially trigger market instability.
Erosion of Public Trust: Repeated or large-scale attacks would undermine faith in the reliability and security of critical infrastructure, with long-term impacts on governance and social cohesion.
Conclusion
While there is no definitive proof that China has systematically embedded offensive remote access or “kill switch” capabilities in all exported infrastructure, the Deye inverter incident demonstrates that such technical control is possible. Analysis strongly suggests that, given China’s legal framework, civil-military fusion policies, and the widespread use of Chinese technology in critical sectors, there is a credible risk that these capabilities could be leveraged for offensive purposes.
Resources
Deye Inverter Remote Shutdown Incident:
China’s National Intelligence Law:
Civil-Military Fusion (CMF) Doctrine:
Risks in Critical Infrastructure and Supply Chain:
Potential Outcomes and Impact of Offensive Use:
(Note: this piece was written with the assistance of artificial intelligence)
Looks like the STUXNET chickens have come home to roost 🤣 It's a fact that China will not fight the war USA is planning for. Expect to lose satellites, ELF comms with submarines, sabotage of DOD food, water and POL stocks before ships leave port, infrastructure shut-down and "accidents", defence industry sabotage, civil provocations..good luck with all that.
Remember when USA used to supply china with IBM pc with back doors? Intel CPU with backdoors? Remember ? "Bullets exchanged don't hurt"