{"id":28892,"date":"2026-05-21T09:17:55","date_gmt":"2026-05-21T09:17:55","guid":{"rendered":"https:\/\/biblelon.com\/?p=28892"},"modified":"2026-05-21T09:17:55","modified_gmt":"2026-05-21T09:17:55","slug":"lawmakers-warn-chinese-tech-could-cripple-americas-infrastructure","status":"publish","type":"post","link":"https:\/\/biblelon.com\/?p=28892","title":{"rendered":"Lawmakers Warn Chinese Tech Could Cripple America\u2019s Infrastructure"},"content":{"rendered":"<p>\n              <span class=\"span-reading-time rt-reading-time\"><span class=\"rt-label rt-prefix\">Reading Time:<\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><\/p>\n<p data-start=\"0\" data-end=\"441\">As concerns grow over Chinese cyber threats and foreign influence in America\u2019s critical infrastructure, lawmakers are warning that the United States may be dangerously vulnerable to attacks targeting ports, energy systems, communications networks, and transportation infrastructure. A new bipartisan effort in Congress seeks to identify and eliminate Chinese technology embedded throughout key American systems before a future crisis erupts.\n<\/p>\n<h4 data-start=\"0\" data-end=\"441\">Have you taken your place on the wall?<\/h4>\n<p>\u00a0<\/p>\n<p data-start=\"443\" data-end=\"460\">From Just the News:\n<\/p>\n<p data-start=\"462\" data-end=\"758\">A pair of senators are making a bipartisan argument for launching a nationwide campaign to identify Chinese components in vulnerable critical infrastructure across the United States, especially in the U.S. maritime industry after unusual components were found in port cranes imported from China.\n<\/p>\n<p data-start=\"760\" data-end=\"1006\">Sen. Rick Scott, R-Fla., told Just the News on Tuesday that if the United States remains dependent on components from China for running any critical sector in American infrastructure, it could give China the capability to shut them down at will.\n<\/p>\n<p data-start=\"1008\" data-end=\"1368\">\u201cWhat would happen if they shut down our electrical grid tomorrow? What would happen \u2026 if they shut down our ports tomorrow? Right? If we\u2019re buying Chinese products or we are allowing their infrastructure to be part of ours, they\u2019re going to have the ability to do that,\u201d Scott said on the Just the News, No Noise TV show.\n<\/p>\n<p data-start=\"1008\" data-end=\"1368\">\n<p data-start=\"1370\" data-end=\"1804\">The legislation introduced by Senators Rick Scott and Andy Kim would require yearly assessments of vulnerabilities within America\u2019s maritime transportation systems and broader infrastructure networks. The effort comes after congressional investigations uncovered undocumented Chinese communication devices hidden inside cargo cranes operating at U.S. ports \u2014 devices lawmakers fear could potentially be used for espionage or sabotage.\n<\/p>\n<p data-start=\"1806\" data-end=\"2259\">According to investigators, Chinese state-backed manufacturer Shanghai Zhenhua Heavy Industries currently accounts for roughly 80 percent of ship-to-shore cranes used at American ports. Intelligence officials and cybersecurity experts have warned that Chinese state-sponsored hacking groups have already infiltrated critical U.S. infrastructure systems and may be positioning themselves for future attacks during a major conflict or geopolitical crisis.\n<\/p>\n<p data-start=\"2261\" data-end=\"2688\">The concerns extend far beyond ports. Federal agencies have warned that Chinese cyber groups like Volt Typhoon, Salt Typhoon, and Flax Typhoon have targeted communications systems, water utilities, transportation infrastructure, and power grids throughout the United States. Officials fear these intrusions are designed to give China the ability to disrupt American society if tensions between the two nations escalate further.\n<\/p>\n<p data-start=\"2690\" data-end=\"3188\">In response, lawmakers and federal agencies are pushing new efforts to strengthen America\u2019s cyber defenses, remove vulnerable foreign-made technology, and improve coordination between government agencies and private operators. Earlier this year, the Federal Communications Commission also moved to restrict foreign-manufactured internet routers over fears that Chinese companies could be compelled by the Chinese Communist Party to facilitate surveillance or cyberattacks against the United States.\n<\/p>\n<p data-start=\"3190\" data-end=\"3604\">This story is a reminder that national security today extends far beyond traditional warfare. Cyber warfare, infrastructure sabotage, and digital espionage have become major battlegrounds in an increasingly unstable world. We should pray for wisdom and discernment for America\u2019s leaders, protection over our nation\u2019s infrastructure, and truth to be exposed wherever vulnerabilities and threats exist.\n<\/p>\n<p data-start=\"3190\" data-end=\"3604\">\n<h4 data-start=\"3606\" data-end=\"3735\">How are you praying for America\u2019s security and protection against growing cyber threats? Share your prayers and scriptures below.<\/h4>\n<p>(Excerpt from Just the News. Photo Credit: FLY:D on Unsplash)<br \/>\n&#13;\n            <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reading Time: 3 minutes As concerns grow over Chinese cyber threats and foreign influence in America\u2019s critical infrastructure, lawmakers are warning that the United States may be dangerously vulnerable to attacks targeting ports, energy systems, communications networks, and transportation infrastructure. A new bipartisan effort in Congress seeks to identify and eliminate Chinese technology embedded throughout<\/p>\n","protected":false},"author":1,"featured_media":22157,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[1349,1290,8901,8401,1300,2575,1334],"class_list":["post-28892","post","type-post","status-publish","format-standard","has-post-thumbnail","category-prayer","tag-americas","tag-chinese","tag-cripple","tag-infrastructure","tag-lawmakers","tag-tech","tag-warn"],"_links":{"self":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/posts\/28892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28892"}],"version-history":[{"count":0,"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/posts\/28892\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/media\/22157"}],"wp:attachment":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}