
When Americans think about national security risks tied to China, they often picture ships in the South China Sea, semiconductor factories, or social media apps on their phones. Far less visible, but potentially just as consequential, is a quieter arena: who gets access to the United States’ most powerful computing infrastructure. Recent concerns raised by lawmakers about a National Science Foundation program reveal how easily strategic advantages can be diluted not by espionage dramas, but by overlooked policy design.
At the center of the issue is a federally funded initiative known as ACCESS, a nationwide ecosystem of high-performance computing resources made available to researchers. These supercomputing systems support cutting-edge work in artificial intelligence, advanced materials, cybersecurity, climate modeling, and other fields that increasingly define both economic competitiveness and military capability. They are paid for by American taxpayers and intended to strengthen U.S. science and innovation. Yet evidence suggests that Chinese institutions, including some linked to China’s military research apparatus, may be able to tap into this infrastructure through procedural loopholes.
The concern raised by congressional investigators is not abstract. ACCESS requires a U.S.-based researcher to act as the principal investigator for a computing allocation. Once approved, that researcher can add collaborators, including individuals and institutions located outside the United States. In practice, this means that Chinese researchers, and potentially Chinese state-linked universities, can gain remote access to U.S.-funded supercomputers without directly purchasing export-controlled hardware or applying for sensitive licenses. They may never touch an American data center physically, yet still benefit from its power.
This matters because high-performance computing is no longer a neutral academic tool. Supercomputers underpin modern artificial intelligence training, advanced weapons simulations, cryptography research, and next-generation materials design. The same computational capabilities used to model protein folding or climate systems can also be used to optimize missile trajectories, simulate nuclear reactions, or train surveillance algorithms. The line between civilian and military application is thin, and in China’s system, that line is often deliberately blurred.
China’s “civil-military fusion” strategy explicitly encourages the sharing of technology and research outputs between civilian institutions and the People’s Liberation Army. Universities and research centers that appear civilian on paper often play direct roles in military development. When such institutions gain access to foreign computing resources, the benefits do not remain confined to academic journals. They can flow quickly into state priorities that run counter to U.S. interests.
The troubling aspect of the ACCESS case is not that the United States lacks export controls or security awareness. On the contrary, Washington has spent years tightening restrictions on advanced chips, chipmaking equipment, and AI accelerators to prevent China from acquiring cutting-edge computing power. American companies have faced heavy compliance burdens, and global supply chains have been reshaped around these rules. Yet if Chinese entities can sidestep these barriers by remotely accessing U.S. supercomputers funded by American taxpayers, the strategic intent of those controls is weakened.
From the perspective of American researchers, the issue also raises questions of fairness and opportunity cost. Supercomputing resources are finite. Allocations are competitive, and U.S.-based scientists often wait months for access to the computing time they need. If foreign institutions are effectively sharing in those resources, it is reasonable to ask whether American innovation is being slowed while potential competitors accelerate. This is not a hypothetical concern. In fields like AI, speed matters. Training models earlier, running simulations faster, and iterating designs more quickly can translate directly into economic and strategic advantage.
The broader pattern should feel familiar. Time and again, well-intentioned openness has been leveraged by China to extract asymmetric benefits. In trade, market access agreements often favored Chinese firms while foreign companies faced informal barriers. In academia, open collaboration sometimes resulted in one-way knowledge transfer, with Chinese researchers absorbing techniques and data that could not be reciprocated. In technology, joint ventures and partnerships became channels for intellectual property leakage. The ACCESS loophole fits this pattern, not because of malice on the U.S. side, but because of a system designed for trust in a world where trust is increasingly exploited.
It is important to be precise about the nature of the risk. This is not about shutting down international science or demonizing individual researchers based on nationality. Scientific collaboration has long benefited humanity, and many Chinese scientists work independently of state agendas. The concern lies with institutional access, structural incentives, and the reality of how research outputs are used once they leave the lab. When institutions with known ties to China’s defense ecosystem appear on access lists for U.S.-funded supercomputing platforms, it is a governance problem, not a cultural one.
For the American public, this issue underscores a larger challenge: national security in the 21st century is increasingly shaped by administrative details. It is not only about laws passed by Congress or speeches by presidents. It is about how programs are implemented, who qualifies as a collaborator, how access lists are maintained, and how oversight keeps pace with evolving threats. A single checkbox or eligibility rule can open pathways that undermine years of strategic planning.
There is also an economic dimension that should not be overlooked. Advanced computing fuels entire industries. Artificial intelligence, advanced manufacturing, and biotechnology are projected to generate trillions of dollars in value over the coming decades. If U.S.-funded infrastructure accelerates China’s progress in these areas, American workers and companies may find themselves competing against capabilities their own tax dollars helped build. That is not a sustainable or politically defensible outcome.
Addressing this problem does not require panic, nor does it require abandoning America’s strengths. It requires clarity and resolve. Programs like ACCESS should be reviewed with the same rigor applied to physical exports of sensitive technology. Eligibility rules should reflect not only the location of a principal investigator, but the institutional affiliations and end-use risks of collaborators. Transparency about who is accessing resources and for what purpose should be the norm, not an afterthought. Oversight mechanisms must evolve as quickly as the technologies they govern.
The United States still enjoys profound advantages in computing, research talent, and innovation culture. American supercomputing centers remain among the world’s best. But those advantages are meaningful only if they are protected and aligned with national interests. Strategic competition with China is not about isolation, but about reciprocity, safeguards, and an honest assessment of how openness can be exploited.
For ordinary Americans, the takeaway is simple but sobering. National security is no longer confined to borders, bases, or battlefields. It lives in data centers, research grants, and collaboration policies. When lawmakers warn that Chinese institutions may be accessing U.S.-backed computing resources through loopholes, it is not bureaucratic nitpicking. It is a reminder that vigilance must extend to the quiet corners of policy where the future is being built line by line of code, simulation by simulation.
If the United States wants to remain a leader in technology and a secure society, it must ensure that its most powerful tools are not inadvertently strengthening those who seek to challenge it. The ACCESS issue is an opportunity to close a gap before it becomes a breach. Whether that opportunity is seized will say much about how seriously America takes the less visible fronts of global competition.