The epoch times

Senator calls for stronger cyberdefense against Chinese hacking: ‘Bring the fight to their front door’.

The‌ Pentagon’s Cyberwarfare Unit Urged to Take Offensive Action Against Chinese Hackers

According ⁢to Senator Eric Schmitt (R-Mo.), the Pentagon’s ⁢cyberwarfare unit should no longer rely solely on defense and instead go on the offense against hostile foreign hacking‍ groups. This comes in response to a recent state-sponsored cyberattack by China, which successfully infiltrated top U.S. agencies and stole tens of thousands of emails from officials.‌ Senator Schmitt emphasized the need for ⁤forceful deterrence in cyberspace, stating that without it, state-sponsored actors will continue to operate without fear of retaliation.

Related ⁢Stories

  • ‘Unprecedented in Human History’: Five⁣ Eyes Intelligence ‌Chiefs Sound Alarm on China’s Technology Theft

    10/24/2023

  • House Committee Urges Navy Exchange to Stop Selling ‌Chinese-Linked Computers

    10/6/2023

Several weeks ago, State Department officials briefed Senate ​officials about a⁣ Chinese cyberattack that targeted Microsoft systems in May. The attack compromised the email accounts of 25 organizations, including senior officials from the State and Commerce Departments. The briefing revealed that the hackers, known as Storm-0558, gained access to 60,000 emails from State Department accounts alone.

Senator Schmitt highlighted the ⁢sophisticated methods used by the Chinese hackers to ⁣gain access to sensitive information ⁣related to⁣ U.S. government efforts to contain China. He emphasized that⁣ these attacks cannot go unanswered​ and called for the United States⁤ to use all available tools to discourage and deter state-sponsored hacking groups. It is time for the U.S. to take the fight to the malicious actors instead of solely focusing on patching vulnerabilities.

Among the ‍individuals whose email accounts were infiltrated are ​Commerce Secretary Gina‌ Raimondo, Assistant Secretary of State for‍ East Asia Daniel Kritenbrink, U.S. Ambassador to China Nicholas Burns, Rep. Don Bacon (R-Neb.), and Nina Shea, senior fellow and director for the⁤ Center for Religious Freedom at Hudson Institute.

Senator Schmitt, a member of the Armed Services Committee, has requested a briefing from the Cyber Command on⁤ their plans to‌ disrupt‌ Storm-0558. The Cyber Command has ‌acknowledged receiving his letter.

The concern goes beyond Storm-0558, as the Chinese Communist Party deploys a ​large number of hackers against other nations. ​FBI Director Christopher Wray has stated that Chinese hackers greatly outnumber his⁣ bureau’s personnel. The threat posed by ⁢the CCP‌ has reached critical ‌levels, according to Senator Schmitt.

Recently, the Pentagon⁤ issued a‌ report warning ‍that China currently possesses 500 ⁤operational nuclear warheads, with the potential to have over 1,000 by 2030.

What are the ⁣concerns raised by‍ the‍ recent cyberattack ⁣on U.S. agencies, and what ⁣implications does it have for national security?

Ent officials discovered a massive cyberattack on U.S. agencies, including top-tier institutions such as the Department of ⁤Defense, the Department of‌ State,⁣ and the Department of ⁢Commerce. The attack, believed to be orchestrated by the Chinese government, resulted in the​ theft ⁢of tens of thousands⁣ of sensitive emails and information.​ This alarming incident has‍ sparked widespread concerns about the vulnerability of the United States’ cybersecurity infrastructure and the need for⁢ a more proactive approach.

In response to this state-sponsored cyberattack, Senator Eric Schmitt (R-Mo.) has‌ called upon the Pentagon’s cyberwarfare ​unit to shift its ‌focus from ⁢solely defensive​ strategies to offensive actions ‍against hostile foreign‌ hacking⁢ groups. Senator‌ Schmitt stresses⁤ that conventional defense tactics,​ while necessary, are no longer enough to combat ⁤the increasingly sophisticated cyber threats that the United States faces today.

The senator argues that adopting a more aggressive approach is vital to⁢ ensure ‍that there are significant consequences⁢ for those who engage in ​state-sponsored hacking. Currently, these hostile actors operate without fear of retaliation,‌ emboldened ⁣by the relative lack of response from their intended targets. Without forceful deterrence in cyberspace, they will‍ continue to exploit vulnerabilities and compromise critical‍ U.S. institutions.

This call⁣ for action aligns with the growing concerns about China’s technology ​theft and its⁢ implications for national security. ⁣Just last week, Five ⁤Eyes intelligence chiefs expressed their alarm over China’s unprecedented ⁣levels⁤ of intellectual property theft. ⁤The theft of advanced technology not ⁤only poses a threat to economic stability but also ⁣jeopardizes the United States’ military capabilities. Urgent measures are needed to counteract this threat and safeguard American ‍interests.

Moreover, the House Committee’s recent urging ‍for Navy Exchange to⁤ stop selling Chinese-linked computers highlights the broader concerns surrounding ⁣potential cybersecurity risks associated with Chinese technology products. As more aspects of our daily lives become interconnected and dependent on technology, the consequences of ‍a cyberattack could be catastrophic. It is crucial that the United‍ States takes prompt​ and decisive action to protect its critical infrastructure.

However, it is‌ also important to approach offensive cyber actions ‍with caution. Any offensive operations⁤ must ‌adhere to strict principles of proportionality,⁤ necessity, and legality. The use⁤ of offensive cyber capabilities should only ⁣be employed when all other options have been ⁤exhausted and in response⁤ to clear⁤ and specific threats. Adhering to these guidelines will⁤ help prevent ‌unnecessary escalations and ensure ‌that actions taken are justifiable under international law.

In conclusion, the recent cyberattack on U.S. agencies orchestrated by the Chinese government highlights the urgent need for the Pentagon’s cyberwarfare unit‍ to adopt a proactive and offensive ‍approach. ⁢It is crucial that the United ​States ‌demonstrates forceful deterrence to dissuade state-sponsored actors from engaging in‌ cyberattacks. However, any offensive⁣ actions must be carefully planned and executed within the boundaries set by international law. Only by taking these steps can the‍ United States effectively protect ‌its national security interests and ensure the ​integrity of its cybersecurity infrastructure.



" Conservative News Daily does not always share or support the views and opinions expressed here; they are just those of the writer."
*As an Amazon Associate I earn from qualifying purchases

Related Articles

Sponsored Content
Back to top button
Available for Amazon Prime
Close

Adblock Detected

Please consider supporting us by disabling your ad blocker