Unconventional conflict: Cyber-attacks, drug networks, and the United States–China rivalry
Recent federal indictments in the United States have intensified discussion about the true nature of strategic competition between Washington and Beijing. Increasingly, this competition is not defined only by military strength or visible confrontation. Instead, it appears to be shaped by a wide range of indirect methods, including cyber operations, economic pressure, technological competition, and transnational criminal activity. These developments suggest that modern rivalry between major powers is evolving into a more complex and less visible form of contest, where influence is exercised across multiple domains at the same time.
One of the most significant cases involves a Chinese national accused of participating in cyber intrusions targeting United States universities during the early stages of the Covid 19 pandemic. According to prosecutors, the purpose of these activities was to gain unauthorized access to sensitive research on vaccines, treatments, and testing methods. At that moment in history, scientific knowledge was one of the most valuable resources in the world. Countries that could develop effective responses to the virus more quickly were better positioned to protect their populations, stabilize their economies, and enhance their global standing.
This case highlights the central role of intellectual property in modern geopolitical competition. Scientific innovation is no longer just an academic pursuit; it is a strategic asset. Nations invest heavily in research and development because breakthroughs in fields such as biotechnology, artificial intelligence, and medicine can translate into long term economic growth and political influence. As a result, research institutions, universities, and laboratories have become targets for cyber espionage.
Another important feature of this case is the alleged involvement of individuals connected to private companies rather than formal government agencies. This reflects a broader operational model often associated with Chinese cyber activities. Instead of relying exclusively on official state units, authorities may work with contractors, technology firms, or independent specialists. This approach increases operational flexibility and expands the scale of activity. At the same time, it creates a layer of separation that can make it harder to directly attribute actions to the........
