Headlines

How Ukraine’s Information Sharing Strategy Can Help Counter China: Insights from a Top Cyber Official

How Ukraine's Information Sharing Strategy Can Help Counter China: Insights from a Top Cyber Officialcybersecurity,informationsharing,Ukraine,China,strategy,cyberofficial

Intelligence Sharing Modelled on Ukraine‘s Approach for Countering China

The Director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, has called for a shift in approach to counter threats to US critical infrastructure posed by China. She suggested that intelligence sharing methods employed in the run-up to Russia’s invasion of Ukraine should be used to stop Chinese hacking groups. Easterly praised the declassification of sensitive information about Russia’s cyber operations in Ukraine and efforts targeted at reducing the risks to U.S. targets. The process helped intelligence agencies to ensure that both sources and methods were protected while also providing information to those who needed it.

The Call for Transparency and Radical Sharing

The model, according to Easterly, sets a good precedent for dealing with the threats posed by China. To further emphasize the need for transparency, Rep. Raja Krishnamoorthi, D-Ill. echoed Easterly’s call for Ukraine’s “radical disclosure and radical sharing” approach during the invasion. The ranking member of the House Select Committee on Strategic Competition between the United States and the Chinese Communist Party emphasized that such an attitude should be adopted towards adversarial regimes. Adopting the same approach would empower intelligence agencies to handle potential security risks efficiently.

Shields Up Campaign and Secure Code Development

During the invasion, CISA created a “Ukraine tensions plan” and carried out an exercise alongside critical infrastructure owners and operators on how to respond and communicate with the private sector during an attack on US soil. The aim of the exercise was to make U.S. information sharing more proactive. CISA launched the “Shields Up” campaign to encourage U.S. businesses and institutions to improve their cybersecurity posture and defend against potential Russian attacks during the invasion. Easterly urged the government to use its purchasing power to persuade critical infrastructure to develop secure-by-design code. Ultimately, “we’ll see a Shields Up campaign extended to what we see from China” Easterly says.

The Threat Posed by China

In addition to Easterly’s call for a focus on the threat posed by China, Microsoft and U.S. intelligence agencies have revealed that a Chinese-linked hacking group dubbed “Volt Typhoon” targeted critical infrastructure in the United States, including telecommunications infrastructure in Guam. The ultimate goal of the campaign was to give China the ability to disrupt communications between the United States and Asia in the event of a crisis. Easterly posits that the Chinese operations are increasingly focused on disruptive and destructive impacts, similar to Russian operations.

Building Resilience against Cyber Threats

Given the potential for China to induce societal panic during conflicts, Easterly urges building resilience against the threat and preparing for it. Societal resilience has been lost, as seen in reactions to events such as the Colonial Pipeline ransomware attack in 2021 as well as the Chinese spy balloon that drifted over US territory earlier this year. Therefore, Easterly calls for greater preparation and a shift in mindset towards better resilience and preparation for potential cyber offenses.

Editorial

Efforts to counter risks to US national infrastructure require a shift in approach and mindset. Easterly’s call for transparency, radical sharing, and radical transparency are excellent approaches to deal with adversarial regimes like China and Russia. Adopting a proactive rather than reactive stance, as demonstrated during the “Shields Up” campaign, would go a long way in boosting resilience. The call to leverage the purchasing power of the government to persuade critical infrastructure to develop secure code software will help to put the country on a good footing towards countering cyber threats. It is time to build a resilient infrastructure that minimizes the risk posed by cyber threats.

Advice

Individuals and organizations are advised to adopt a proactive stance towards cybersecurity threats. It would help to mitigate potential cybersecurity risks posed by adversarial governments such as China and Russia. For organizations, it is essential to adopt secure-by-design code and secure all critical infrastructure. Organizations should also take steps to improve cybersecurity and information sharing by running drills and exercises on response efforts in the event of an attack. Engagement with government cybersecurity agencies, including CISA, on improving cybersecurity posture is also critical. In all, a shift in the mindset towards greater resiliency is necessary to mitigate cybersecurity threats.

Cybersecuritycybersecurity,informationsharing,Ukraine,China,strategy,cyberofficial


How Ukraine
<< photo by Thomas Evans >>

You might want to read !