China’s Aspirations to Weaponize Data to Advance its Military and Economic Ambitions Are Clear
The U.S. needs a clear agenda to halt this
It sounds like a headline ripped from the pages of a Marvel comic series. Super Soldiers
The data was allegedly collected through FocusCalm neuro feedback headbands, which athletes use to improve focus and performance. FocusCalm is developed by BrainCo, a Harvard-founded startup that later moved operations to China and received funding from organizations tie to China’s military-industrial complex.
It’s a potent example of how China’s military ambitions are moving beyond traditional espionage into the systematic exploitation of biometrics, commercial data, and other forms of intellectual property, and it helps explain why the U.S. Department of Defense (DoD) Foreign Ownership, Control, or Influence (FOCI) office considers China, as well as Russia, North Korea, and Iran, to be of great FOCI risk.
It also is among the reasons why the 2026 National Defense Authorization Act (NDAA) that is now making its way through the U.S. Congress introduces some of the most far-reaching vendor-vetting requirements in recent history. Chief among them is the Ernst amendment, which mandates stronger safeguards to stop secret spending and by preventing vendors with undisclosed ties to the Chinese Communist Party (CCP) and other foreign adversaries from entering the federal supply chain. Provisions of the act call for agencies and contractors to establish validated, end-to-end screening processes or face compliance and mission risks.
China's Data Collection: Weaponized Intelligence
China’s actions exemplify a new type of warfare, where FOCI must be detected to reinforce our national security defense posture as adversaries are curating data from channels and sources that are now ubiquitous and yet unexpected.
China's interest in personal data has evolved beyond surveillance of its own citizens into a global intelligence operation targeting individual peak performers. The recent exposure of the FocusCalm app reveals how Beijing's data collection now reaches into the far reaches of intimate cognitive patterns of Americans. In an era when privacy legislation such as GDPR empowers users to opt out of anonymized tracking, the exposure of such deeply personal information represents an unprecedented security vulnerability and breach of privacy.
This activity is in line with Beijing's well-documented domestic surveillance apparatus. From social credit scores to ubiquitous facial recognition, the Chinese government has perfected the measurement and monitoring of individual behavior. While authorities periodically announce moderation of these programs, evidence suggests their interest has shifted outward beyond China's borders and into the West.
Despite U.S. government bans on Huawei and ZTE equipment and others, which are designated as national security threats by the Federal Communications Commission, Chinese technology companies continue expanding their American footprint. Huawei's push to rival NVIDIA in semiconductor manufacturing means Chinese access now extends beyond smartphones into datacenters storing vast quantities of sensitive information. When artificial intelligence enters the equation, the value of this data multiplies exponentially.
Consider the convergence of threats. For example, past cyberattacks against hospitals could quietly transition to genetic data exploitation, and commercial AI-enabled genomics have enormous value. From cancer research to nationwide genetic databases, control of genetic insight translates directly into ownership of future gene therapies.
Whether through wearable devices, smartphones, gaming consoles, surveillance cameras, genomic data, and more, Beijing has demonstrated systematic interest in modeling individuals for AI-enabled applications. The potential military applications of these models present obvious concerns, elevating the discussion from one of individual privacy concerns to that of national security interest.
We are engaged in a new form of conflict. Along with other types of national security attacks, we must now confront the weaponization of personal information. If Beijing succeeds in normalizing pervasive data collection while Western nations remain mired in privacy debates, China will have won this phase of cognitive warfare.
Defending Against China’s Designs for Data Dominance
Each of us can fight back against data dominance. Individuals can start by making conscious choices about where personal data goes and be vigilant about privacy settings with an understanding of the risks around sharing personal information. Beyond this, consider product origins before purchasing; China doesn’t win unless we buy their products.
Businesses must scrutinize vendors and technology supply chains. The 2026 NDAA, when passed by the U.S. Congress and signed by the president, will require robust vendor vetting anyway. For example, organizations with AI-enabled operations and cloud-stored data are using technologies in the chip space where China seeks dominance. Users must know where and how chips are mined, built, packaged, and sold.
Government enforcement of trade policies, tariffs targeting surveillance technologies, and restrictions on Chinese technology companies remain necessary but insufficient. We must support domestic technology development, invest in non-Chinese algorithms and competitive technologies, and reshore key industries, including pharmaceuticals, manufacturing, semiconductors, to reduce dependence on Chinese infrastructure.
The U.S. needs clear intelligence on adversarial activity, and vendor vetting has become a frontline defense critical to free societies' future security. Detecting FOCI reinforces our national security posture.
China's exploitation of commercial platforms to harvest biometric and cognitive data represents a highly invasive military-civil fusion. Protecting sensitive data and maintaining operational integrity requires proactive measures now. By implementing thorough vendor vetting and end-to-end supply chain validation, organizations not only mitigate the security risks posed but also ensure timely compliance with the 2026 NDAA FOCI requirements, which can safeguard both mission effectiveness and national security.
Jessica Lewis McFate is Vice President Director of Intelligence Operations at Babel Street and a career intelligence professional, specializing in OSINT for national security. At the Institute for the Study of War, her research won acclaim for forecasting the rise of ISIS. She has authored over 50 publications, briefed top U.S. government agencies, appeared in print and broadcast media, and testified before Congress. A West Point graduate, she served as a U.S. Army officer with 34 months in country deployment in Iraq and Afghanistan supporting signals intelligence, human intelligence, and counter-corruption roles.