From staged AI spectacles at home to cybersecurity threats embedded in hospital devices, Beijing’s deception spans continents
When Beijing’s Innovation Showcase Turned Into a Scandal
China’s Spring Festival Gala is among the most-watched television productions on earth, reaching hundreds of millions of viewers simultaneously during the Lunar New Year celebration. This year, the gala’s organizers chose to feature what they promoted as a breathtaking demonstration of China’s AI and robotics supremacy: dozens of humanoid robots performing choreographed routines on stage, presented to the world as autonomous machines operating through cutting-edge artificial intelligence. The spectacle was designed to project an image of unstoppable technological progress under the Chinese Communist Party’s enlightened leadership. Within days, the illusion collapsed entirely.
The Truth Behind the Robot Show
Video footage that circulated online after the broadcast revealed the mechanics behind the miracle: every robot on that stage had a human operator standing nearby, manually controlling the machines like radio-controlled marionettes. The choreography acclaimed as evidence of artificial intelligence was in fact a series of pre-programmed sequences triggered by manual commands from operators positioned backstage. One widely shared clip showed a robot waving to the crowd while a man stood beside it, remote control device in hand. Reporting by Blue Whale News and coverage by Sri Lanka’s Daily Mirror highlighted what analysts described as a deep pattern of commercial and political deception in China’s robotics sector – companies assembling basic machines and marketing them as fully autonomous systems, then scaling those deceptions up to the level of a national television broadcast. The CCP, critics noted, has long used the Spring Festival Gala as a cultural megaphone to project images of national strength and technological prowess to domestic and international audiences. This year, the megaphone backfired.
From TV Deception to Cyber Intrusion: Texas Fights Back
While China was staging its robot spectacle for domestic audiences, a very different kind of Chinese technology was operating quietly inside American hospitals. In March 2026, Texas Governor Greg Abbott sent a letter to the heads of the state’s cyber command, health services department, and human services department, directing them to take immediate action against cybersecurity vulnerabilities in Chinese-manufactured patient monitoring devices. Abbott’s letter was blunt: “I will not let Communist China spy on Texans.” The directive flagged alerts previously issued by the Cybersecurity and Infrastructure Security Agency and the Food and Drug Administration warning of serious vulnerabilities in specific Chinese-made patient monitors – including the Contec CMS8000 and Epsimed MN-120 – that could allow unauthorized actors to access sensitive medical and personal information belonging to patients in state-owned medical facilities.
The Threat to Patient Privacy and National Security
The risks flagged by CISA and the FDA are not theoretical. The CISA advisory on the Contec CMS8000 identified an embedded backdoor function in the device firmware – a technical feature with no legitimate purpose beyond enabling unauthorized remote access to the device and any network it is connected to. In a hospital setting, such access could expose individual patient health data, disrupt medical monitoring, or provide a foothold for broader network penetration. For a hostile foreign government with demonstrated interest in stealing American healthcare data, biometric information, and medical research, such access would be extraordinarily valuable. Abbott’s order required state agencies to catalog all medical devices capable of transmitting data, review cybersecurity policies protecting personal health information, and ensure that any new devices comply with his 2024 executive order limiting the acquisition of technologies from adversarial nations. Agencies have until April 17, 2026 to demonstrate compliance.
A Pattern of Chinese Technology Threats at the State Level
Abbott’s directive is the latest in an accelerating series of Texas actions to address CCP-connected technology risks. Texas Attorney General Ken Paxton announced plans to file multiple lawsuits against Chinese companies, including an immediate action against TP-Link Systems – the American arm of a Chinese networking equipment maker whose routers have been flagged as cybersecurity risks. The state also operates a “hostile foreign adversaries unit” within the Department of Public Safety, created specifically to combat Chinese cybersecurity attacks and malign influence operations. Texas was also the first state in the nation to ban DeepSeek and RedNote apps from government-issued devices.
Two Deceptions, One Strategic Pattern
The robot show scandal and the patient monitoring device crisis are manifestations of the same underlying reality: the Chinese Communist Party deploys technology – real and fabricated – as instruments of propaganda, commercial fraud, and strategic penetration simultaneously. Where China’s robots are puppets pretending to be autonomous, its patient monitoring devices are autonomous in precisely the capabilities their buyers most fear. Both cases reflect a system in which the boundaries between state enterprise, military interest, and political propaganda are deliberately blurred. The FDA safety communication on patient monitors provides the technical detail that should inform every state health administrator in America. And the CISA China threat advisory portal offers the broader strategic context that makes individual device vulnerabilities comprehensible as part of a larger, coordinated campaign of digital penetration by a state-level adversary.
Jessica Lam
Politics & Diaspora Affairs Journalist, Apple Daily UK
Contact: jessica.lam@appledaily.uk
Jessica Lam is a politics and diaspora affairs journalist with specialized expertise in Hong Kong governance, overseas Chinese communities, and democratic movements. Educated at a leading UK journalism institution, she received advanced training in political reporting, international law basics, and source protection, equipping her for complex cross-border coverage.
Jessica has worked with Apple Daily and other liberal Chinese publications, reporting on electoral systems, civic participation, protest movements, and policy developments affecting the Chinese diaspora. Her work demonstrates strong command of political context and an ability to translate complex issues into accessible, fact-driven journalism.
She brings real-world newsroom experience in covering time-sensitive political developments while maintaining strict verification standards. Jessica regularly works with primary documents, expert interviews, and multiple independent sources to ensure balanced and accurate reporting.
Her authority is reinforced by consistent publication within established news organizations and by adherence to editorial review processes. She is known for transparent attribution and for distinguishing clearly between reporting and analysis.
Jessica Lam’s journalism reflects professional experience, subject-matter expertise, and a strong ethical foundation. At Apple Daily UK, she contributes trusted political coverage that serves readers seeking independent and credible information.
