“They want to be the agents, not the victims, of history. They identify with God’s power and believe they are godlike. That is their basic madness. They are overcome by some archetype; their egos have expanded psychotically so that they cannot tell where they begin and the godhead leaves off. It is not hubris, not pride; it is inflation of the ego to its ultimate—confusion between him who worships and that which is worshipped. Man has not eaten God; God has eaten man.”  -The Man in the High Castle, Phillip K. Dick

The end. Wait. That’s not right. We’ve only just started. So let’s recap and make sure we’ve beat this dead horse appropriately. In “A Strategy 20 years in the Making,” I outlined the origins of the People’s Republic of China’s (PRC) strategy and covered the breadth of the nation’s efforts to use lawfare to undermine our efforts around the world. We then discussed in “Artifacts” how the Chinese use information technology as a two-sided strategy for controlling its people and attacking the U.S. to extract data and sabotage our critical infrastructure.

Remember, “In China, win-win means China wins twice.” As part of this discussion on strategy, I have walked with you here. So the question you might ask yourself now is, “What does a Chinese command-driven dual-purpose telecommunications network look like?” Funny you should ask. Because in the PRC, two is a lucky number.