06/15/2023 / By Laura Harris
A senior U.S. cybersecurity official has warned that Chinese hackers will disrupt vital American infrastructures, such as pipelines and railways, in the event of a conflict between China and the United States.
Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency (CISA), called for heightened preparedness and resilience to counter Beijing’s investments in developing its capability to sabotage U.S. infrastructure. She expressed concern about the possibility of Chinese hackers breaching American defenses and causing physical damage in the real world.
“We must recognize this as the true threat we need to address, focus on, and fortify ourselves against,” Easterly emphasized during her speech, urging the nation to remain vigilant. (Related: Investigative journalist: China has been creating gene-edited SUPER SOLDIERS and brain-controlled military weapons.)
The warning aligns with concerns previously voiced by the U.S. intelligence community. In its annual threat assessment released earlier this year, the intelligence community asserted that if Chinese decision-makers perceived an imminent major confrontation with the U.S., Beijing “certainly would consider undertaking aggressive cyber operations against U.S. homeland critical infrastructure,” as well as military targets.
“Given the formidable nature of the threat from Chinese state actors, given the size of their capability, given how much resources and effort they’re putting into it, it’s going to be very, very difficult for us to prevent disruptions from happening,” Easterly said.
As the U.S. discussed its plan against the “potential cyberattack,” China continued to do its thing: routinely targeting American entities.
For instance, Guam, a U.S. territory and home to an American air base crucial for potential military responses to conflicts in the region, has been hit by a cyberattack conducted by Chinese hackers. The attack has raised alarm bells as it compromised critical telecommunications systems in Guam.
Despite China’s denial of involvement in the hacking allegations, the breach highlighted the persistent cyber threat posed by the communist nation, including its ability to infiltrate sensitive military networks. The air base stationed in Guam is crucial to any American military response to a potential invasion or blockade of Taiwan.
According to reports, the Chinese hackers responsible for the Guam breach have been engaged in long-term surveillance of the U.S. military, indicating an ongoing and sophisticated operation. Additionally, the hackers have targeted political parties in several U.S. states, highlighting the breadth of their cyber espionage activities.
In line with these cyberattacks, Federal Bureau of Investigation Director Christopher Wray emphasized the alarming asymmetry in cyber capabilities during a congressional hearing in April. He revealed during the hearing that Chinese hackers outnumbered his agency’s cyber personnel 50 to 1. China’s advanced cyber infiltration techniques enable them to infiltrate government and business networks undetected for years.
Pundits expressed their concerns about the country’s ability to defend itself against foreign cyberattacks. “Now that cyberattacks have become a routine part of the 21st century, the West is obliged to defend itself daily,” Max Hastings wrote in an article published by Bloomberg.
Read more news about communist China at CommunistChina.news.
Watch this video that talks about someone predicting a cyberattack.
This video is from the Covid Times channel on Brighteon.com.
Nine nations are rehearsing their intentions to attack the United States.
CCP has been creating spy balloons for YEARS out of a heavily guarded naval base in southern China.
Sources include:
Tagged Under:
big government, CCP, China, Chinese Communist Party, communism, computing, conspiracy, cyber war, cyberattack, Cybercrime, dangerous, espionage, Glitch, insurgency, invasion usa, national security, privacy watch, spy gate, surveillance, World War III, Xi Jinping
This article may contain statements that reflect the opinion of the author
COPYRIGHT © 2017 PRIVACY WATCH NEWS