Skip to main content
Mallory
Mallory

US Policy Debate on Countering Chinese Cyber Threats and Securing Telecom Networks

cybercom 2.0telecommunicationscritical infrastructureai-enabled intrusionssenate commerce committeelawful interceptdefense departmentespionageindustrial control systems
Updated January 31, 2026 at 03:02 AM2 sources
US Policy Debate on Countering Chinese Cyber Threats and Securing Telecom Networks

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

US national security commentary and Defense Department testimony emphasized that trust and cybersecurity are being positioned as strategic differentiators in competition with China, particularly as AI capabilities proliferate. One argument framed cybersecurity as a key factor in global adoption of US AI and cloud technologies, contrasting the US private-sector ecosystem with China’s more consolidated AI cloud market and linking security posture to international trust and influence.

Separately, senior DoD officials described CYBERCOM 2.0 as a new force-generation model intended to improve agility against intensified Chinese cyber activity, including attacks on critical infrastructure involving industrial control system (ICS) abuse and AI-enabled intrusions, and highlighted efforts to “close the loop” between offensive learning and defensive readiness. A related policy critique pointed to the Salt Typhoon espionage campaign against US telecommunications providers as evidence that China’s access was enabled by basic security failures (e.g., legacy equipment, weak passwords, unpatched systems) and argued for mandatory operational baselines and tighter controls around lawful intercept systems, noting that major carriers had not convincingly demonstrated full eviction of intruders per Senate Commerce Committee discussions.

Related Entities

Organizations

Sources

January 29, 2026 at 08:30 AM

Related Stories

US Officials Warn of Chinese Influence in Global Technology and Cyber Standards

National Cyber Director Sean Cairncross emphasized the urgent need for the United States to counter China's efforts to export surveillance technologies and promote a global "clean American tech stack." Speaking at the 2025 Meridian Summit, Cairncross highlighted concerns over Chinese cyber operations targeting critical US infrastructure and called for stronger messaging and engagement with international partners to deter such activities. He argued that the US has not sufficiently signaled to China that its cyber behavior is unacceptable and poses strategic risks to American interests. Simultaneously, analysis of international technical standards reveals that China has been actively shaping the protocols governing critical infrastructure worldwide by dominating standards bodies and committees. Chinese engineers and ministries have increased their influence in setting specifications for technologies such as 6G wireless, industrial automation, and port operations, giving Beijing significant leverage over global systems. This influence, combined with evidence of Chinese cyber campaigns targeting US infrastructure, underscores the strategic challenge posed by China's dual approach of technical standard-setting and cyber operations.

4 months ago
House hearing debates expanding US offensive cyber operations amid China-linked intrusions

House hearing debates expanding US offensive cyber operations amid China-linked intrusions

US lawmakers and expert witnesses used a House Homeland Security hearing to debate whether the United States should **expand offensive cyber operations** in response to **China-linked intrusions** into US critical infrastructure and telecom networks, including reported access to “lawful intercept” systems used for court-authorized surveillance. Witnesses argued for embedding offensive cyber thinking across government and integrating cyber more deeply into military doctrine, while also pointing to an emerging national cyber strategy expected to include an offensive-operations pillar and greater public-private collaboration. Several participants cautioned that expanding cyber offense without strengthening domestic resilience could increase escalation risk and leave US networks exposed, citing concerns such as **CISA’s reported loss of roughly one-third of its workforce** and the need to fund defensive modernization of federal systems. Separately published commentary about “gray zone” cyber disruption tied to Venezuela reflects the broader policy narrative around cyber-enabled coercion, but it does not add substantiated technical details about the hearing’s core issue or the China-linked intrusions driving the push for a more aggressive posture.

2 months ago
Munich Cyber Security Conference Highlights Shift Toward Deterrence, Supply-Chain Risk, and Critical Infrastructure Resilience

Munich Cyber Security Conference Highlights Shift Toward Deterrence, Supply-Chain Risk, and Critical Infrastructure Resilience

Senior officials from the **EU, NATO, the United States, Sweden, Estonia, and Taiwan** used the Munich Cyber Security Conference to warn that cyber and “hybrid” operations are now a persistent feature of geopolitical competition and are increasingly aimed at **critical infrastructure** (energy, health, government services, satellites, and military command networks). EU Executive Vice President **Henna Virkkunen** argued Europe cannot be “naive” about adversaries’ ability to disrupt essential services and pointed to proposed revisions to the **EU Cybersecurity Act** intended to strengthen the EU cybersecurity agency and reduce critical ICT supply-chain risk, including phasing out designated **high-risk suppliers**. NATO Deputy Secretary General **Radmila Shekerinska** said Russia and China are challenging the alliance in both physical and digital domains and cited attempted disruptions to Poland’s energy infrastructure as an example of the threat environment. U.S. officials signaled a shift from primarily defensive “resilience” toward **deterrence** by “imposing real costs” on malicious actors, while also emphasizing deeper cyber partnerships with allies and industry to send a coordinated message to adversaries; National Cyber Director **Sean Cairncross** said a forthcoming U.S. cyber strategy will align with broader national security strategy and rely on whole-of-government tools. Estonia’s intelligence chief **Kaupo Rosin** urged Europe to invest in **homegrown offensive cyber capabilities** to reduce reliance on non-European tools, while Swedish defense official **Lisa Gustafsson** said societies must be designed to function under sustained disruption under Sweden’s “total defense” model. Taiwan’s National Security Council adviser **Yuh-Jye Lee** warned China may be rehearsing a “digital siege,” referencing activity like **Volt Typhoon** and reporting on alleged Chinese training infrastructure (“**Expedition Cloud**”) designed to simulate foreign power grids and communications networks; separate reporting also underscored that much of the technology stack underpinning cyber defense is controlled by **U.S. firms**, complicating sovereignty and supply-chain decisions.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.