Congress just saved your credit card rewards — for now



Sens. Dick Durbin (D-Ill.) and Roger Marshall (R-Kan.) just failed — again — in their bid to ram through the Credit Card Competition Act, a sweeping regulatory proposal that would overhaul the U.S. credit card system to resemble Europe’s heavy-handed financial regime. Their latest attempt to sneak the measure into a stablecoin bill collapsed under scrutiny, marking yet another setback for legislation that critics say would harm consumers, weaken data security, and empower retail giants.

This outcome is welcome but unsurprising. The bill is wildly unpopular with consumers — for good reason. As written, it’s a thinly veiled giveaway to big-box retailers at the expense of virtually everyone else. Its sponsors claim it would inject competition into a noncompetitive market.

Senate leadership clearly got the message. Americans don’t want to fix something that isn’t broken.

In reality, the CCCA would allow retailers to continue accepting name-brand credit cards while processing payments through lesser-known networks — all without consumer knowledge or consent. Lawmakers should stand firm against any future efforts to resurrect this awful proposal.

The central premise of the bill — that the credit card market lacks competition — is unfounded. As of 2025, 152 companies in the United States issue credit cards. Between 2020 and 2025, market entry has grown at an average annual rate of 8.1%. This kind of steady growth does not indicate a broken market, but rather a dynamic and competitive system that continues to serve consumers well.

Kiss rewards goodbye

If passed, the CCCA would jeopardize that progress. Fraud rates, already on the rise, would skyrocket. Unvetted payment processors would be handed vast troves of sensitive consumer data. The only beneficiaries of using these cheaper alternatives are the retailers, who lack a vested interest in cardholder safety. Meanwhile, smaller institutions — including community banks and credit unions — would see revenue streams dry up.

RELATED: SCARY: President of European Central Bank admits 'digital Euro' is ready for launch

dem10 via iStock/Getty Images

Retailers insist these alleged “cost savings” would trickle down to their customers. That’s about as likely as the claim that businesses absorb tariffs or taxes without raising prices. History suggests otherwise.

Worse still, the bill would also end the ability of banks and credit unions to operate popular credit card rewards programs. These programs are funded largely by the interchange fees charged by payment processors. When Durbin succeeded in passing his debit card price controls, consumers lost card benefits and experienced no savings. A Wall Street Journal article highlighted this history:

Debit-card rewards programs have nearly disappeared since the Durbin amendment, part of the 2010 Dodd-Frank law that cut retailers’ fees nearly in half. Stores didn’t pass the savings to customers, while the banks that issue the cards found other ways to recoup revenue.

A failed Trojan horse

Like a one-trick pony, Durbin and Marshall have not given up — despite the bill neither gaining traction nor receiving a committee markup. As they have done previously, the senators once again tried to tuck their proposal into a “must-pass” bill. Their first target in the 119th Congress was the GENIUS Act, a bipartisan bill focused on stablecoin regulations. Thankfully, Senate leadership saw right through this ploy.

Polling confirms that Americans are largely content with the current credit card marketplace. In fact, 77% of respondents trust credit card companies to handle key responsibilities, such as fraud prevention. Three-quarters of respondents trust that their private payment networks will handle the protection of personal data. The poll also showed that 79% of cardholders use rewards cards, and more than half (58%) use those rewards regularly. Rewards are a tool many families and businesses rely on to make purchases while also earning cash back.

Senate leadership clearly got the message. Americans don’t want to fix something that isn’t broken — which is why they rightly rejected the addition of Durbin’s credit card mandates to the GENIUS Act.

Consumers can breathe easier

It is a relief the bill didn’t slip in as an amendment with no opportunity for debate. Any legislation with sweeping financial implications deserves full congressional scrutiny — and the voices of constituents must be heard. Still, Durbin and Marshall are reportedly eyeing the National Defense Authorization Act as their next legislative vehicle.

Taxpayers must remain vigilant to hold their representatives accountable. Policymakers must also be vigilant in defending the interests of their constituents. But for now, millions of Americans can breathe a sigh of relief.

Chinese official avows Beijing is behind cyberattacks on US, identifies motive: Report



U.S. officials and tech companies have long understood that the communist regime in Beijing has orchestrated numerous significant cyberattacks on American institutions and critical infrastructure. In a secret December meeting, Chinese officials apparently admitted as much and identified a major reason for doing so: America's continued support for the island nation of Taiwan.

A pair of anonymous sources said to be familiar with the matter told the Wall Street Journal that Chinese officials met with elements of the outgoing Biden administration during a December summit in Geneva that was led by Nate Fick, the State Department's then-ambassador at large for cyberspace and digital policy.

Whereas previously, China has played off Volt Typhoon — its hacker outfit tasked with espionage and information gathering — as a criminal crew of rogue hackers or the product of Western fantasy, the Chinese delegation apparently acknowledged that it was indeed a state-backed enterprise.

According to Microsoft, Volt Typhoon has pursued "development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises."

Blaze News previously reported that Volt Typhoon — distinct from Salt Typhoon, the Chinese state-sponsored hacker group that recently compromised at least eight American telecommunications companies, enabling Beijing to spy on the Trump and Harris presidential campaigns — has hit critical infrastructure in Guam and other American regions, affecting communications, manufacturing, transportation, government, maritime, and other sectors.

The U.S. National Security Agency, the U.S. Cybersecurity and Infrastructure Security Agency, the FBI, and various allied cybersecurity agencies in the Anglosphere issued a joint advisory in 2023 highlighting "a recently discovered cluster of activity of interest" associated with the group. In their advisory, the cybersecurity groups noted that "one of [Volt Typhoon's] primary tactics, techniques, and procedures (TTPs) is living off the land, which uses built-in network administration tools to perform their objectives."

The New York Times reported at the time that while the Volt Typhoon attacks on the U.S. presently amount to a likely espionage campaign, "the Chinese could use the code, which is designed to pierce firewalls, to enable destructive attacks, if they choose."

In January 2024, the Department of Justice announced that it had disrupted certain efforts by Volt Typhoon to "target America's critical infrastructure using a botnet."

Former FBI Director Christopher Wray noted, "Volt Typhoon malware enabled China to hide as they targeted our communications, energy, transportation, and water sectors."

According to current and former U.S. officials, Wang Lei, a senior cyber official with China's ministry of foreign affairs, not only acknowledged the infrastructure hacks at the December 2024 summit but indicated that they were executed in response to the American military's backing of Taiwan.

Wang's comments were reportedly in response to American officials' suggestion that China's prepositioning in civilian infrastructure could be viewed as an act of war.

U.S. officials told the Journal that while the Chinese delegates at the summit did not explicitly state that Beijing was directly responsible for the group and its actions, "American officials present and others later briefed on the meeting perceived the comments as confirmation of Beijing's role and was intended to scare the U.S. from involving itself if a conflict erupts in the Taiwan Strait."

Dakota Cary, a China expert at the cybersecurity firm SentinelOne, told the Wall Street Journal that an official such as Wang would acknowledge the cyberattacks only if told to do so by Xi Jinping's regime and that doing so would likely serve to signal to the inbound Trump administration the stakes of America's involvement with Taiwan.

The State Department did not comment on the December meeting but told the Wall Street Journal that the Trump administration has made clear to Beijing that it will "take actions in response to Chinese malicious cyber activity."

The Chinese embassy in Washington apparently accused the U.S. of "using cybersecurity to smear and slander China" and spreading so-called disinformation.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

23andMe files for bankruptcy as founding CEO Anne Wojcicki seeks buyback for pennies on the dollar



DNA testing firm 23andMe has filed for bankruptcy in the United States following what was reported as weak demand since a catastrophic data breach in 2023.

As Reuters reported, founding CEO Anne Wojcicki announced her resignation but has quickly attempted to buy the company back at a much lower valuation than it had once peaked at.

Fortune originally reported that Wojcicki recently offered more than $74 million for the company, but soon updated its report with an SEC filing purporting to show an new purchase offer worth $42 million.

The recent valuations are light-years away from the $6 billion the company was reportedly worth after going public in 2021.

As Blaze News noted in early 2024, 23andMe's reputation took a massive hit when customers of the DNA-identifying company had their data breached, an infiltration that impacted 6.9 million account holders. This totaled nearly half of the company's users and resulted in dozens of lawsuits.

'Users negligently recycled and failed to update their passwords ...'

In a letter sent to users from a legal firm representing 23andMe, the company denied fault and shifted the blame onto users for using "recycled" passwords.

Cyber criminals used a method known as "credential stuffing," which involves hackers using login credentials taken from other hacks to attempt to log in to different online accounts belonging to the same person.

The 23andMe hack was accomplished through this method, with hackers gaining access to 14,000 user accounts, then using that access to gain further entry into the company's database of users who had opted into the website's DNA Relatives feature.

"As set forth in 23andMe's October 6, 2023 blog post, 23andMe believes that unauthorized actors managed to access certain user accounts in instances where users recycled their own login credentials — that is, users used the same usernames and passwords used on 23andMe.com as on other websites that had been subject to prior security breaches, and users negligently recycled and failed to update their passwords following these past security incidents, which are unrelated to 23andMe," the letter claimed.

Anne Wojcicki is the sister of recently deceased YouTube CEO Susan Wojcicki, who was not seen favorably by YouTube content creators due to ongoing censorship and monetization issues.

The family connections have resulted in users asking where their data went, how it has been used, and why the founding CEO wants to buy back a failing company.

23andMe has been unable to maintain its user base since the data breach, with marketing ploys like continued feedback and personalized wellness plans failing to acquire repeat customers.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

Encrypted apps urged by lawmakers amid major Chinese telecom breach



U.S. officials are imploring individuals and companies alike to use encrypted messaging apps in order to minimize the chances of the communist Chinese regime intercepting their communications.

The recommendations coincide with the confirmation by a top U.S. security official this week of a historic state-sponsored hacking campaign that compromised at least eight American telecommunications companies, including AT&T, T-Mobile, and Verizon.

Microsoft dubbed the Chinese group responsible Salt Typhoon. Salt Typhoon, which has been active since at least 3020, is also occasionally referred to as GhostEmperor, Earth Estries, UNC2286 or FamousSparrow.

The Wall Street Journal first reported on the Salt Typhoon attack in September, noting that the hackers penetrated numerous broadband providers earlier this year, affording them a foothold within the broadband infrastructure with which to access private data and possible launch a ruinous cyberattack.

While exponents of the Chinese regime have repeatedly denied its role in the attack, American officials aren't buying what they are selling.

'Encryption is your friend.'

The Cybersecurity and Infrastructure Security Agency and the FBI issued a joint statement last month indicating that the U.S. government's "continued investigation into the People's Republic of China (PRC) targeting of commercial telecommunications infrastructure has revealed a broad and significant cyber espionage campaign."

"Specifically, we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders," said the agencies.

Rep. Jake Auchincloss (D-Mass.) stated on Nov. 29, "Salt Typhoon is the worst telecom hack in American history, and demands both a proportionate response to the Chinese Communist Party and increased accountability for U.S. corporations to prevent these intrusions."

Auchincloss suggested to CNN that the hackers were especially brazen, re-asserting themselves in the networks after being discovered.

An unnamed senior FBI official and Jeff Greene, executive assistant director for cybersecurity at CISA, told NBC News Tuesday that Americans should use encrypted messaging apps.

"Our suggestion, what we have told folks internally, is not new here: Encryption is your friend, whether it's on text messaging or if you have the capacity to use encrypted voice communication. Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible," said Greene.

"People looking to further protect their mobile device communications would benefit from considering using a cellphone that automatically receives timely operating system updates, responsibly managed encryption and phishing resistant" multi-factor authentication for email, social media and collaboration tool accounts, said the FBI official.

Greene indicated the networks remained compromised and that intelligence agencies cannot presently "predict a time frame on when we'll have full eviction."

The FBI, CISA, and the National Security Agency published a joint guide Wednesday, titled "Enhanced Visibility and Hardening Guidance for Communications Infrastructure," detailing ways that network engineers and "defenders of communications infrastructure" can harden their network devices against further exploitation by Chinese hackers.

"The PRC-affiliated cyber activity poses a serious threat to critical infrastructure, government agencies, and businesses. This guide will help telecommunications and other organizations detect and prevent compromises by the PRC and other cyber actors," Greene said in a statement.

'It should never have happened.'

The Biden White House's deputy national security adviser, Anne Neuberger, told reporters this week that none of the impacted companies have "fully removed the Chinese actors from these networks," reported the Associated Press.

"So there is a risk of ongoing compromises to communications until U.S. companies address the cybersecurity gaps the Chinese are likely to maintain their access," added Neuberger.

Neuberger added, "We don't believe any classified communications has been compromised."

After intelligence officials briefed members of the U.S. Senate Wednesday, Sen. Rick Scott (R-Fla.) reportedly expressed frustration, noting, "They have not told us why they didn't catch it; what they could have done to prevent it."

Sen. Richard Blumenthal (D-Conn.) said, "The extent and depth and breadth of Chinese hacking is absolutely mind-boggling — that we would permit as much as has happened in just the last year is terrifying," reported Reuters.

The Federal Communications Commission announced Thursday that it is "taking decisive steps to address vulnerabilities in U.S. telecommunications networks following the Salt Typhoon cyberattack, a sophisticated intrusion linked to foreign state-sponsored actors. These measures aim to safeguard critical communications infrastructure and ensure national security, public safety, and economic resilience in the future."

FCC commissioner Brendan Carr tweeted, "The Salt Typhoon intrusion is a serious and unacceptable risk to our national security. It should never have happened. I will be working with national security agencies through the transition and next year in an effort to root out the threat and secure our networks."

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

Could a hacker blow up your EV remotely?



Pagers and walkie-talkies can be turned into remotely triggered bombs — so why not electric vehicles?

That was my first thought when I read about last month's coordinated attacks on Hezbollah — believed to have been orchestrated by Israel — in which pagers and walkie-talkies exploded across Lebanon, killing dozens and wounding thousands.

A thermal runaway event could be induced deliberately, even when the EV's 'ignition' is off — especially if a hacker gained access to the vehicle's battery management system.

While those devices appear to have been modified at some point during the supply chain, the principle behind turning them into deadly weapons is relatively simple: Heat the battery until it catches fire or explodes.

It could just as easily apply to EVs — as well as hybrids, plug-ins, or 48v cars, all of which use batteries much larger than in any handheld device.

Of course, these vehicles have a number of safety systems to prevent the battery from catching fire and overheating. But those safety systems run on software that can be hacked, especially since they are already years old by the time the vehicles are built and sold.

Roy Fridman, CEO and chief revenue officer for C2A Security, an Israel-based cybersecurity company focused on the automotive industry, recently said that one automaker told him that the software that controls a motor has two million lines of code. And that’s just the motor.

He stated, “You have hundreds of millions of lines of code inside a vehicle. If you were talking about autonomous vehicles, it's even more. But the number of lines of code in a vehicle is continuously growing.”

This code is vulnerable to exploitation thanks to wireless connections to the internet (for software updates) and to charging infrastructure. Vehicle-to-grid technology, which allows EV owners to sell their energy storage capacity to grid operators, requires connection to the electricity grid.

“The more communication protocols you have, the more lines of code you have, the more you are susceptible to [hacking],” Fridman said.

We already know the technology exists to disable cars remotely. Cybersecurity experts are also worried that EVs could be hacked to steal drivers' personal data.

As Fridman says, its plausible that someone could "create a battery overload and disable some of the protective mechanisms" within your car.

Lithium-ion batteries catch fire when they enter an uncontrolled, self-heating event called thermal runaway. Most often, it occurs due to damage or a defect in the battery. But such an event could be induced deliberately, even when the EV's "ignition" is off — especially if a hacker gained access to the vehicle's battery management system.

An overheated battery gives off toxic and flammable gases, which can cause an explosion. At the very least, it produces a smoldering, difficult-to-extinguish fire.

For more on this, see my video below:

Hackers push $460M crypto scam via soccer star’s X account — $1M lost in minutes



On Wednesday, hackers controlled soccer star Kylian Mbappe's X account and pushed a crypto scam on his 14 million followers.

ESPN reported that Mbappe is fresh off a transfer to Spanish soccer giant Real Madrid. The deal will see him make over $16 million per year in salary and receive a $166 million signing bonus spread out over the five years of his contract.

The soccer player hadn't made any posts on his X account for about two weeks until a hacker allegedly started sharing memes and statements to his 14.4 million fans.

'This person lost more than $1M in just 1 hour!'

The posts included mocking fellow soccer star Lionel Messi, trolling different professional teams, and even making political statements.

"F*** Israel," a post said with a clown emoji.

About six minutes later, the account made another post with four Palestinian flags, reading, "FREE PALESTINE."

Aside from the fun and games, the hacker promoted a crypto currency pump-and-dump scheme making off with a large sum of money.

With the stolen account, the hacker promoted the coin $MBAPPE, inflating its value by a reported 4,000%. According to Cointelegraph, the hacker's post boosted the coin's market cap to a whopping $460 million before it tanked to less than $100,000 in value.

The hacker made off with an alleged $100,000 profit in about an hour.

'Don’t fall for the $MBAPPE scam.'

However, some savvy investors, likely not involved in the scam, made some money by quickly buying and selling the coin.

One unknown person made a profit of about $125,000 when they bought shares worth $28 when the market cap was at just $80,000.

Other reports popped up about another investor losing around $1 million:

"Someone created a new wallet and spent [$1.03M] to buy ...$MBAPPE in a single transaction," the popular crypto page Lookonchain wrote.

"[It] is now only worth $9.2K. This person lost more than $1M in just 1 hour!"

The scam spread so rapidly that even popular trading platform Crypto.com warned its followers about falling for it.

"Don’t fall for the $MBAPPE scam," it wrote. "Scammers hacked Kyllian [sic] Mbappe's X account today to promote a scam," the attached image said.

Interestingly, the scam mirrors other schemes made by celebrities over recent years. Simply put, notable people can create a coin, buy a significant portion of it, and promote it to their followers as their latest project. Once the market cap is inflated, creators can sell off their shares for a profit. This may not rise to the level of criminal unless they recommend their followers buy-in.

According to Investopedia, a scheme becomes illegal when it makes promises/recommendations about a stock or security based on false, misleading, or greatly exaggerated statements.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

Hackers can steal your data through HDMI cords: 'Governments are worried about this'



A new technique to capture data through HDMI cables is becoming more accurate and easier to decipher.

This technique allows savvy data thieves to spy on your screens, monitors, and, of course, smart TVs if they are in the right area or can capture signals.

While it is not exactly a remote operation for a would-be hacker, individuals may be able to take passwords, data, or anything else transmitted to your screen through an HDMI cable, with greater accuracy than previously thought.

Uruguay's University of the Republic told TechSpot that this method is already being used and thatT governments are aware of it.

'A new avenue for governments and criminals to spy on your data.'

Hackers could potentially steal data from government sources by planting a discreet signal-capturing device within a building or target area to gather electromagnetic signals. Alternatively, a radio antenna could capture signals from HDMI cables outside a government installation.

The HDMI signals leak some electromagnetic radiation transmitted between the source and the display, and then hackers capture those signals, extract the data, and decipher it.

The Uruguayan research team trained an artificial intelligence model based on existing samples of electromagnetic radiation to decipher intercepted signals. This resulted in reconstructing the HDMI signals to 70% completion, which was reportedly good enough to read what was on the screen.

"Your HDMI being hacked is a new avenue for governments and criminals to spy on your data," said Return's managing editor, Peter Gietl. "Although it remains to be seen how effective this attack will be, there is a wide variety of ways for nefarious actors to access your private information. Unfortunately, if the NSA really wants your data, they will most likely be able to get to it."

Return has previously published "The ultimate Return guide to escaping the surveillance state" to give readers easy solutions to protect your privacy.

Believe it or not, it has historically been much easier to steal signals during the era of analog video. Video cables had even greater amounts of leakage in previous generations, but with the advent of HDMI, those signals became more contained and more difficult to decipher when captured.

Lead researcher Federico Larroca claimed "governments are worried about" HDMI data extraction but added that data-sensitive agencies likely already shield their facilities against such exploitations related to electromagnetic signals.

It's worth it, Larroca concluded, even if it comes with a significant cost.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

FACT CHECK: Did Joe Biden Say Account Was Hacked After He Dropped Out?

A post shared on social media purportedly shows a screenshot of a post from President Joe Biden claiming that his account was hacked and he did not suspend his campaign. 🚨🚨🚨 BREAKING!!! pic.twitter.com/L0VzkzIjpm — Rothmus 🏴 (@Rothmus) July 22, 2024 Verdict: False The claim is inaccurate, the tweet cannot be found on his official X account and […]

The China crisis is bigger than Biden's blunders



Contrary to what Joe Biden says, Russia is not the biggest threat facing the United States. The biggest national threat that we’re not talking about is the Chinese Communist Party.

The corporate media and our political leaders are too often stuck on Russia and alleged Russian disinformation. Not that Russia isn’t a problem or a threat. It certainly is both. But Russia’s efforts are almost amateur compared to the sophistication of the Chinese Communist Party in its escalating war against the United States. Our leaders and our media are obsessed with the wrong enemy.

The Chinese Communist Party must be in awe of how easy we’re making it for them.

Sure, individual incidents involving China get reported and discussed, but there is nowhere near the urgent, sustained focus that this threat requires. Every day now, China is probing and exploiting American vulnerabilities — vulnerabilities that are frequently the direct result of left-wing policies and leadership. And that’s absolutely what we’re engaged with. This is what Sun Tzu meant when he said that “the supreme art of war is to subdue the enemy without fighting.” They are rotting us from the inside.

Probing weaknesses

Consider how China exploits our open borders. The Chinese are in business with the drug cartels. They are actually the “big dog” in the illicit drug industry, and the Mexican drug cartels are the second in line. Most of the drugs that are coming over our border, particularly fentanyl, have been manufactured through ingredients and supplies that come from China.

The Chinese sell the equipment to press fentanyl into pills under the guise of Adderall or any other prescription drug so people will be fooled by it. Then the drug cartels are using this equipment to press pills of death that they send over our borders at the expense of our children’s lives. Why is nobody talking about that?

The same reason we must talk about that spy balloon. Remember the Chinese spy balloon last year? It was spotted by a reporter in Montana on February 1, then it was allowed to drift across the United States for three more days, soaring over major cities and military bases, before it was finally shot down by the U.S. Air Force off the coast of South Carolina. In December, U.S. intelligence officials revealed that the balloon used a U.S.-based internet service provider to navigate and send high-bandwidth collections of data back to China while it made its way across American airspace.

Last month, a Freedom of Information Act request by the Heritage Foundation’s Oversight Project found 14 instances since 2018 of Chinese nationals attempting to enter the U.S. military base at Pearl Harbor while also conducting surveillance, including flying drones over the base. In September, a Chinese man and woman were found taking photos and video near a Pearl Harbor security entrance before fleeing in a car with unidentified plates. There have been 100 similar incidents in recent years of Chinese nationals, often posing as tourists, who have tried to access military bases across the country.

Thanks to the Biden administration’s wide-open border policy, China has a much easier way to get these potential spies inside the United States. During Biden’s three years in office, more than 133,000 Chinese nationals have been encountered at the border, almost 30,000 of those just since last October. There are now more Chinese nationals crossing the border in San Diego than Mexican nationals.

Just last week, three Chinese nationals were arrested trying to cross the border into Maine from Canada in the middle of the night. A fourth, who was driving a car, was arrested on suspicion of attempting to assist the others. Last year, a Border Patrol memo identified 270 suspected properties in rural Maine that are used for illegal marijuana growing and operated by Chinese nationals. The massive profits are funneled back to China or used to finance other illegal activities, including drug and human trafficking.

Self-inflicted wounds

In San Francisco, U.S. sovereignty is being undermined in absurd ways, like a law passed in 2020 that eliminates the requirement to be a U.S. citizen to hold seats on city boards. San Francisco’s Board of Supervisors last month unanimously appointed Kelly Wong to the city’s Elections Commission. Wong is not an American citizen. She’s been in the United States since 2019 and is an immigrant rights activist from Hong Kong.

Wong may have absolutely nothing to do with the Chinese Communist Party. But what if someone in that position did? San Francisco now has someone who is not a U.S. citizen, and cannot legally vote, in charge of supervising its elections.

Regardless where Wong’s national loyalties lie, her political loyalty is apparently left-wing because she works for a group called Chinese for Affirmative Action. According to its most recently published annual report, it is funded by the Chan Zuckerberg Initiative, Google, and the Tides Foundation, among many other far-left groups.

And then there is one of the most immediately pressing threats to Americans – the Chinese government’s hacking operation.

Last year, the Chinese military hacked into around two dozen U.S. power and water utilities and communications and transportation systems. They breached a water utility in Hawaii, a major port on the West Coast, an oil and gas pipeline, and attempted to hack into the Texas power grid operator.

Despite these urgent threats, in 2022 the Biden administration shut down the “China Initiative” at the Department of Justice. It was a program started in 2018 to prosecute economic espionage and stop the stealing of intellectual property by Chinese government agents. Why did they shut it down? Because left-wing activists said the program allowed the FBI to target Asian Americans unfairly.

A bipartisan affliction

The CCP must be in awe of how easy we’re making it for them. China is flooding the U.S. with such a wide spectrum of attacks that they tend to blend into the background noise of our national chaos. Too few of these attacks get the sustained attention they deserve from our media and leaders.

Why is our administration not doing anything about the border? Why is California Governor Gavin Newsom visiting China and not talking about fentanyl? I believe these people have surrounded themselves with Chinese operatives and Chinese money. I don’t think these people want to answer any questions because their own corruption would be exposed.

So, what does all this mean? At the very minimum, it means that impeachment is probably not enough for this crime. But it’s not just the Democrats, and it’s not just the Bidens. It's the Republicans, too. No one is pointing the finger at China because it would land on their own complicity. Don’t be convinced that China is a lesser threat to America due to the media and political leaders’ inaction and lack of coverage. China is the greatest threat facing our country, and our leaders’ inaction speaks for itself.

Want more from Glenn Beck? Get Glenn's FREE email newsletter with his latest insights, top stories, show prep and more delivered to your inbox.