According to Israel Soong, director for East Asia and Pacific Cyber Policy at the National Security Council (NSC), this cyber campaign appears to be part of a wider effort by the CCP to prepare attacks on critical infrastructure. In the event of a conflict, Beijing intended to use its cyber access to "cripple" critical systems – including power grids and communications platforms.
"What is public, but is less well known, is that the [People's Republic of China] has been doing the same propositioning to many other countries around the globe, including some who are our allies," Soong said during a July 16 speech at the conservative think tank Hudson Institute. He added that the CCP could "persistently and aggressively maintain this cyber access for years on end."
Soong pointed out that the CCP had developed a strategy to "actively and intentionally dominate these areas." He continued: "Beijing sees cyber and emerging technology as critical to the strategy to reshape the U.S.-led international order to be more favorable to the priorities of the CCP."
The NSC official added that while CCP efforts to prepare for the sabotage of critical infrastructure were alarming, they were unlikely to be leveraged absent a major conflict between Beijing and Washington. That’s because an attack on U.S. infrastructure that resulted in American casualties would be considered an outright attack.
Soong's remarks appeared to reference a malicious cyber-campaign acknowledged by the Cybersecurity and Infrastructure Security Agency (CISA) in February. According to a statement at the time, CISA said CCP-backed hackers were "seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure."
Intelligence leaders told Congress that the February intrusion was first detected in December 2023 and malware was removed from 600 government systems. However, the threat persisted in many infrastructure systems run by private companies.
Eric Goldstein, CISA executive assistant director for cybersecurity, said the operation only targeted a fraction of the Chinese malware that seeks to infiltrate U.S. systems every day. "This threat is not theoretical," he remarked. "It is based on confirmed intrusions to U.S. critical infrastructure, and we know that what we have found is the tip of the iceberg."
Back in May, Director of National Intelligence Avril Haines testified before Congress on the matter. She told lawmakers that most China-based cyberattacks against the U.S. targeted health care and industrial control systems, as well as defense, energy, transportation and food and water supplies.
The previous month, Federal Bureau of Investigation (FBI) Director Christopher Wray said the CCP was "sparing no expense in its attempt to hack, lie, cheat and steal its way to the top as a global superpower." He added that Chinese state-backed hackers "outnumber FBI cyber personnel at least 50 to 1."
"U.S. and allied governments have faced difficulties effectively countering the Chinese regime’s massive cybercrime apparatus, partly because of a much smaller pool of leverageable cybersecurity professionals," NTD News pointed out.
Head over to CommunistChina.news for similar stories.
Watch this video about CCP hackers targeting the U.S. elections.
This video is from the GalacticStorm channel on Brighteon.com.
"They" will do anything to win.
China is two years away from deploying KILLER ROBOTS on the battlefield.
X user: FBI and Secret Service were complicit in Trump assassination attempt.
Cyber extortion: AT&T agreed to pay hacker about $400,000 to erase stolen sensitive data.
EMP preparedness: How to protect your electronics.
Sources include: