How to Defeat China’s Hacker Army: Lessons from a Former NSA Director

0
6

Key Takeaways

  • Federal support is essential for states and localities to afford and maintain robust cyber defenses for electric, water, and other critical utilities.
  • Innovation—both technical and organizational—requires partnership between Washington, states, universities, and industry to layer defenses and close vulnerabilities, especially with emerging AI tools.
  • The United States must issue a clear, public deterrent message to China and other nations that attacks on American infrastructure will incur tangible consequences.
  • Publicly naming the specific Chinese officials who authorize cyberattacks, backed by evidence, is a powerful lever to alter Beijing’s cost‑benefit calculus.
  • Beyond naming, U.S. intelligence, law enforcement, and relevant agencies should actively disrupt Chinese cyber campaigns using sanctions, indictments, and regulatory actions in coordination with allies.
  • Congressional funding increases for U.S. Cyber Command are a step forward but remain far below the level needed for this strategic competition; sustained resourcing is critical.
  • The claim that America is outmatched in cyberspace is unfounded; defensive capability resides across industry, government, and academia and can be formidable when properly aligned.
  • Effective national cyber defense hinges on integrating the unique visibility of private firms, the authorities of government agencies, and the research prowess of academic institutions.

Federal Assistance for Utility Cyber Defenses
State and local governments often lack the financial resources to purchase and sustain advanced cybersecurity measures for essential services such as electricity and water supplies. The passage argues that Congress and the federal government should step in to help these entities acquire and deploy the best available cyber defenses. By providing grants, subsidies, or shared‑service models, Washington can reduce the disparity between well‑funded federal agencies and cash‑strapped local utilities, thereby strengthening the overall resilience of the nation’s critical infrastructure.

Innovation and Collaboration Across Sectors
Defending utilities is not solely a matter of buying existing tools; it also demands continuous innovation. The text highlights that technical advances—such as AI‑driven threat detection—and organizational reforms are needed to stay ahead of adversaries. Realizing these advances will require concerted effort from federal agencies, state governments, universities, and private industry. Partnerships can foster research, develop new defensive architectures, and create pipelines for talent and technology that keep defenses current.

Clear Deterrence Messaging to Adversaries
A core component of cyber strategy is signaling that hostile actions will not be tolerated. The passage notes that the United States has, until now, delivered a muted message to China and other nations regarding attacks on its economy and infrastructure. To be effective, Washington must articulate this stance plainly and consistently, making it clear that any cyber intrusion will provoke a proportional response. A transparent deterrent posture can discourage adversaries from initiating or escalating hostile cyber operations.

Public Attribution and Naming of Chinese Leaders
One of the most potent tools for changing an adversary’s behavior is public attribution. The United States possesses the intelligence capability to pinpoint which Chinese officials authorize specific cyber campaigns. By naming those individuals—supported by verifiable evidence—the U.S. can raise the personal and political costs for Beijing’s leadership, thereby shifting their risk‑reward calculus. The text observes that this approach has been used sparingly and should be employed more frequently to maximize its impact.

Active Disruption and Use of Sanctions
Beyond naming perpetrators, the U.S. government should leverage its full suite of authorities to actively disrupt Chinese cyber operations. This includes imposing sanctions, issuing indictments, conducting network disruptions, and enacting regulatory changes against identified bad actors. The passage emphasizes that such measures are not novel but have been applied only episodically; a more systematic and coordinated approach—working alongside allies—would increase pressure on China’s cyber apparatus and impede its ability to sustain campaigns.

Resourcing U.S. Cyber Command Adequately
Effective defense also hinges on the capacity of U.S. Cyber Command to match the tempo of China’s investments. Although recent congressional budget increases are welcomed, they currently represent roughly only one percent of the total defense budget—a proportion deemed insufficient for what the passage describes as one of the era’s most consequential strategic competitions. Sustained, larger allocations are necessary to ensure Cyber Command can develop, field, and sustain the advanced capabilities required to defend national networks.

Debunking the Notion of U.S. Cyberspace Inferiority
The claim that the United States is technically, organizationally, or intellectually outmatched in cyberspace is rejected. The text argues that American defensive prowess is already distributed across the nation’s industry, government, and academia. Private firms possess unparalleled visibility into adversary tactics, while government agencies hold unique authorities and intelligence that industry lacks. When these strengths are properly aligned and legally enabled, the resulting defensive posture is formidable and increasingly vital.

Integrated National Defense Leveraging Industry, Government, Academia
Realizing the full potential of U.S. cyber defense requires integrating the distinct advantages of each sector. Industry’s situational awareness, government’s legal and operational authorities, and academia’s research and innovation capabilities must be combined through clear legal frameworks and collaborative mechanisms. Such integration enables rapid sharing of threat intelligence, joint development of countermeasures, and a unified response that maximizes the nation’s ability to identify, mitigate, and recover from cyber threats.

Author Bio and Closing Notes
The piece concludes with a brief note on General Timothy D. Haugh, a distinguished fellow at Yale and Georgetown, former commander of U.S. Cyber Command, and former director of the NSA, who retired as a four‑star general in 2025. It also includes the New York Times’ invitation for letters to the editor, providing contact information and social‑media links for readers wishing to engage with the opinion section. This closing material situates the argument within the broader public discourse and encourages further conversation.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here