Chinese hackers surface, U.S. officials are facing increasing scrutiny over their delayed response to cyber espionage activities targeting critical infrastructure and communications systems. Despite mounting evidence and numerous warnings from law enforcement and intelligence agencies, experts caution that the U.S. government has been too slow in addressing the scope of China’s cyber operations, which are increasingly infiltrating everything from private data to national security networks.
This week, the U.S. government issued one of its most urgent warnings yet, urging Americans, particularly government officials and other high-risk individuals, to strengthen their digital security to protect against eavesdropping and data theft. The warning follows reports of a potential security threat linked to routers manufactured by the Chinese company TP-Link, widely used by U.S. businesses, households, and government agencies.
In an effort to combat these growing threats, Congress has taken initial steps toward funding a program designed to purge Chinese technology from U.S. telecommunications systems. This “rip-and-replace” initiative targets equipment from Huawei and ZTE, two Chinese firms blacklisted for their potential to spy on U.S. communications infrastructure. The program’s funding, set at $3 billion, marks a long-awaited response to concerns raised over the safety of 5G technology.
While these actions signal a step in the right direction, cybersecurity experts warn that the U.S. government has been far too slow in responding to China’s persistent cyberattacks, which have been targeting everything from utility systems to government communications for years. Despite repeated alerts from agencies like the FBI, which has identified Chinese hackers as a critical threat to U.S. infrastructure, progress has been sluggish.
In January, FBI Director Christopher Wray testified before Congress, highlighting the widespread risks posed by Chinese cyber operations. He stated, “Chinese hackers are targeting our critical infrastructure — our water treatment plants, our electrical grid, our oil and natural gas pipelines, our transportation systems. The risks this poses to every American require urgent attention.”
Wray’s comments underscored a growing concern: the U.S. is significantly outmatched in the battle against Chinese cyber espionage. “If each one of the FBI’s cyber agents focused exclusively on the China threat, Chinese hackers would still outnumber FBI Cyber personnel by at least 50-to-1,” Wray said, illustrating the overwhelming challenge facing U.S. law enforcement.
Part of the issue, experts say, lies in the complexity of the problem. U.S.-China supply chains are deeply intertwined, and the increasing complexity of digital systems has created a multitude of potential vulnerabilities. Bill Drexel, a fellow at the Center for a New American Security, explained, “For four decades, we intertwined our supply chains very deeply with China, and our digital systems became more and more complex, allowing for more ways to be hacked.”
These vulnerabilities have created an environment where Chinese hackers can exploit gaps in U.S. security, operating with relative ease. Drexel noted that the public’s muted response to threats like the Salt Typhoon hack, which compromised mobile networks across the U.S., reflects a larger issue: “It’s hard to impress upon citizens the gravity of Chinese espionage when the threats are abstract and intangible,” he said.
This week, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning to Americans, emphasizing the need to adopt stronger security measures, particularly for individuals who are more likely to be targeted by Chinese hackers. According to CISA, “Chinese government-affiliated threat actors” have been involved in cyber espionage targeting U.S. telecommunications infrastructure, stealing sensitive customer data, and compromising private communications.
As part of the guidance, CISA advised Americans to switch to encrypted communication platforms such as Signal, which offer end-to-end encryption, making it nearly impossible for hackers to intercept messages. CISA also recommended switching from SMS-based two-factor authentication to more secure methods, such as authenticator apps or hardware security keys, to protect sensitive accounts.
The government is also investigating whether TP-Link routers, which dominate the U.S. market with nearly two-thirds of the share, are being used as an entry point for Chinese hackers. A recent report by Microsoft revealed that a Chinese hacking operation, known as CovertNetwork-1658, had exploited thousands of TP-Link routers to gain access to global computer networks. The Commerce Department is now considering a ban on the sale of these routers in the U.S., which could significantly impact the market for networking hardware.
As the U.S. grapples with this persistent threat, experts are urging quicker and more decisive action to protect critical infrastructure from further compromise. While recent measures to address Chinese tech influence are steps in the right direction, experts warn that the U.S. remains far behind in confronting this sophisticated and long-standing cyber threat.
Read more: