The evolution of China's cyberespionage tactics.

CISA Director Easterly states that China's cybersecurity espionage is the primary danger to America's infrastructure.

The evolution of China's cyberespionage tactics.
The evolution of China's cyberespionage tactics.

The Cybersecurity and Infrastructure Security Agency (CISA) states that while China remains the most active and persistent cyberthreat to American critical infrastructure, the nature of the threat has evolved over the past two decades.

Cris Thomas, also known as Space Rogue, stated during testimony before the Governmental Affairs Committee on May 19, 1998, that while it may not be possible to create a completely foolproof system, the objective should be to make it extremely difficult to breach.

L0pht Heavy Industries was among the first groups to testify in Congress about cybersecurity threats. They warned that it was possible to bring down the internet in just 30 minutes and that creating a completely secure defense system was nearly impossible. Additionally, they faced challenges in tracing the origins of cyber threats.

""Reverse hacking and backtracking can be challenging due to the outdated protocols being used. Since there is limited information on the origin of these protocols, it is difficult to determine where things came from, only that they did," stated Peiter Zatko, also known as "Mudge," during his testimony."

China Xi Jinping
China's President Xi Jinping attends a meeting with Brazil's President Luiz Inacio Lula da Silva, in Brasilia, Brazil, Nov. 20, 2024.  (Reuters/Adriano Machado)

The U.S. government became aware of Chinese espionage targeting government entities in the early 2000s. One string of operations known as Titan Rain started as early as 2003 and included hacks on the U.S. departments of State, Homeland Security and Energy. The public became aware of the attacks several years later.

At that point, the CISA Director, Jen Easterly, was dispatched to Iraq to probe into the use of advanced technology by terrorists.

Easterly began his career in counterterrorism and was deployed to Iraq, where he witnessed terrorists utilizing communications technologies for recruitment, radicalization, and operationalizing improvised explosive devices.

jen easterly smiles during interview
CISA Director Jen Easterly (The Associated Press)

The U.S. government shifted its focus from investing in cyberwarfare to adopting a more defensive stance that prioritized protecting against attacks, after officials raised concerns about the potential harm caused by computer network attacks.

"Easterly stated that when he was part of the Army's first cyber Battalion and helped establish U.S. Cyber Command, the focus was on nation-state adversaries, particularly China, who posed an espionage threat."

Jen Easterly next to men during deployment
Jen Easterly, left, was previously deployed to Iraq to study how terrorists used new communications technology for recruitment.  (Jen Easterly)

In the early 2000s, China's cyber operations primarily involved spying on government agencies.

In 2007, Sen. Kit Bond, R-Mo., warned that China's aggressive and extensive espionage poses the greatest threat to U.S. technology.

Since China has a history of spying on U.S. innovation and using it to replicate its own infrastructure, in 2009, Chinese hackers were suspected of stealing information from Lockheed Martin’s Joint Strike Fighter Program. Over the years, China has debuted fighter jets that look and operate like U.S. planes.

"Easterly stated that China is the greatest danger to the U.S. and that their primary focus is on identifying and eliminating Chinese activity, as well as safeguarding critical infrastructure from Chinese cyber actors."

In 2010, China shifted its focus to the public sector and began targeting telecommunications companies. In 2011, Operation Aurora was a series of cyberattacks in which actors conducted phishing campaigns and compromised the networks of companies like Yahoo, Morgan Stanley, Google, and dozens more. Google left China after the hacks and has yet to return its operations to the country. By the end of the decade, evidence emerged that China was also spying on critical infrastructure in the U.S. and abroad.

jen easterly speaking during conference meeting
Easterly said the U.S. is focused on doing everything possible to identify Chinese espionage.  (CISA)

Easterly stated that he was surprised to see the campaign as a threat to conduct disruptive and destructive operations in the U.S., which is an evolution he was not tracking.

In the past decade, Taiwan has been a favorite target of China's frequent attacks on trade and military operations in the South China Sea, as revealed by the Council on Foreign Relations Cyber Operation Tracker.

"Easterly stated that the actors we have observed are digging deep into our critical infrastructure, not for the purpose of espionage or data theft, but rather to prepare for disruptive or destructive attacks in the event of a crisis in the Taiwan Strait."

All companies in the semiconductor supply chain from mining to producers have been spied on by China, as shown by data.

The potential consequences of a war in Asia on American lives are alarming. Pipelines could explode, trains could derail, and water could become polluted. This is part of China's plan to create chaos and hinder our military capabilities. Easterly believes this is the most serious threat he has encountered in his career.

In contrast to the U.S., where partnerships are crucial for defense, China's public and private sectors are closely linked through regulation.

Easterly stated that although it is a team sport, they collaborate closely with their intelligence community and military partners at U.S. Cyber Command to ensure they are utilizing all government tools and working with private sector partners.

"The private sector owns the vast majority of our critical infrastructure and is on the front lines of it. Therefore, it is crucial to have robust operational collaboration with the private sector to ensure the safety and security of cyberspace."

by Bret Baier,Amy Munneke

politics

The next Ohio senator, who identifies as a "fiscal conservative," intends to "minimize government intervention in people's lives."

The next Ohio senator, who identifies as a "fiscal conservative," intends to "minimize government intervention in people's lives."

politics
The Treasury Department recovers $31 million in erroneous payments made to deceased individuals by the government.

The Treasury Department recovers $31 million in erroneous payments made to deceased individuals by the government.

politics
Legal experts criticize Biden's last-minute constitutional change as "cynical and irrelevant."

Legal experts criticize Biden's last-minute constitutional change as "cynical and irrelevant."

politics
Michelle Obama celebrates her birthday with her husband, who avoids key public events.

Michelle Obama celebrates her birthday with her husband, who avoids key public events.

politics
A methane emissions fee is being challenged by 23 state attorneys general who have filed a lawsuit against the EPA.

A methane emissions fee is being challenged by 23 state attorneys general who have filed a lawsuit against the EPA.

politics
Trump plans to make changes at the State Department without Senate confirmation, according to a source.

Trump plans to make changes at the State Department without Senate confirmation, according to a source.

politics
Sources reveal that DOGE co-leader Ramaswamy is considering a 2026 run for governor in Ohio.

Sources reveal that DOGE co-leader Ramaswamy is considering a 2026 run for governor in Ohio.

politics
Biden's official Twitter account faces criticism for referencing a non-existent constitutional amendment.

Biden's official Twitter account faces criticism for referencing a non-existent constitutional amendment.

politics
If Laken Riley were DHS secretary, she would still be alive, according to freshman senator Mayorkas.

If Laken Riley were DHS secretary, she would still be alive, according to freshman senator Mayorkas.

politics
Gov. Sanders reveals strategy to enable parents to take legal action against Big Tech for contributing to adolescent mental health emergency.

Gov. Sanders reveals strategy to enable parents to take legal action against Big Tech for contributing to adolescent mental health emergency.

politics
The last indoor inauguration ceremony took place in 1985, during the presidency of Ronald Reagan.

The last indoor inauguration ceremony took place in 1985, during the presidency of Ronald Reagan.

politics
Trump may avoid inaugural crowd size controversy by moving the swearing-in indoors.

Trump may avoid inaugural crowd size controversy by moving the swearing-in indoors.

politics
Under Biden, DOJ has been politicized; Ted Cruz believes Pam Bondi will reverse it.

Under Biden, DOJ has been politicized; Ted Cruz believes Pam Bondi will reverse it.

politics
On 'day one,' Trump's DHS nominee Noem vows to abolish contentious migrant app.

On 'day one,' Trump's DHS nominee Noem vows to abolish contentious migrant app.

politics
SCOTUS TikTok ban receives mixed reactions from privacy groups, experts, and parents.

SCOTUS TikTok ban receives mixed reactions from privacy groups, experts, and parents.

politics
Activist Forcibly Removed from Blinken's Last Press Conference: "I'm Being Hurt!"

Activist Forcibly Removed from Blinken's Last Press Conference: "I'm Being Hurt!"

politics
Trump may take action on TikTok ban in 'not too distant future' after reviewing SCOTUS decision.

Trump may take action on TikTok ban in 'not too distant future' after reviewing SCOTUS decision.

politics
The governor's first major act saw the elimination of the DEI department in a Midwest state.

The governor's first major act saw the elimination of the DEI department in a Midwest state.

politics