The Times Australia
Google AI
The Times World News

.

As China expands its cyber espionage and sabotage operations, how will the Trump administration respond?

  • Written by William A. Stoltz, Lecturer and expert Associate, National Security College, Australian National University



US President-elect Donald Trump has named most of the members of his proposed cabinet. However, he’s yet to reveal key appointees to America’s powerful cyber warfare and intelligence institutions.

These include positions like national cyber director[1], director of the Cybersecurity and Infrastructure Security Agency[2] (CISA), and National Security Council cyber lead. These figures will be vital in securing America’s cyber security at a crucial time.

We believe there are three flashpoints that could be particularly troublesome for the incoming administration:

  • how Trump will balance his economic and security priorities
  • how his administration can effectively deter Chinese digital disruption
  • how it will address the suspicions among some MAGA supporters of the powers of the intelligence “deep state”.

Intensifying Chinese cyber espionage

Chinese electronic surveillance and espionage activities against the US have reached an all-time high in terms of level of effort and, most importantly, effectiveness.

These espionage activities have been successfully targeting:

  • the key intellectual property that provides the US with an economic and national security advantage
  • the personal communications of senior US government and military officials, and
  • the personal data of tens of millions of Americans.

As has recently been reported[3], the Chinese government has exploited vulnerabilities in America’s ageing telecommunications infrastructure to target secret government systems.

Hackers from the group “Salt Typhoon[4]” were able to access the personal communications of high-ranking officials (including Trump) and expose the identities of US intelligence targets and sources in the US and overseas.

Salt Typhoon also appears to have extracted US telecommunications companies’ call data records. These detail the call history and associated phone numbers of all users of the network.

These sophisticated breaches follow years[5] of brazen cyber operations to steal US intellectual property and state secrets concerning strategically significant technologies. These include artificial intelligence, next-generation aircraft, biotechnology and energy systems.

Indeed, researchers have found[6] the majority of Chinese espionage activities against the US since 2000 have focused on stealing commercial technologies and information.

Alongside this, the US government believes Beijing is seeking to expand its ability to capture digital information on Americans.

The Biden administration responded to this threat with a number of measures to harden America’s technology ecosystem against Chinese-made devices and software that may contain backdoors or hidden surveillance features. The response included bans and restrictions[7] on products made by Hikvision, Dahua and Hytera, as well as the social media platform Tiktok.

Dahua security camera.
A Dahua brand security camera in Sydney, Australia, in 2023. Mark Baker/AP

This all sets the scene for showdowns between Trump and China, as well as between Trump and America’s tech sector.

For example, the Trump administration will almost certainly have to compel telecommunications giants AT&T, Verizon, T-Mobile and others to address longtime deficiencies[8] in their infrastructure. This includes the persistent use of unshielded components dating back to the 1970–80s.

Simultaneously, the personal targeting of Trump, his Cabinet, and senior government officials and their sources will require a forceful response to deter future operations.

But how much will the Trump administration be prepared to do in response to Chinese aggression?

President Joe Biden has hit back[9] against China by targeting its semiconductor industry[10] and curtailing its access to other strategic technologies. In any negotiations between Trump and Chinese leader Xi Jinping over trade and tariffs, Beijing is likely to seek to have these measures removed.

If it does, Trump’s desire for a better economic “deal” with China may come into conflict with national security concerns.

Chinese and American flags.
While Trump threatens tariffs on Chinese goods, Beijing is prepared to take retaliatory measures. Andy Wong/AP

Cyber sabotage on critical infrastructure

Chinese agencies have also been infiltrating[11] American and allied critical infrastructure (including the cyber security centres in the “Five Eyes” partners) for the purposes of sabotage.

The aim is to pre-position themselves in target networks, installing sophisticated malware that can be activated to disrupt and degrade essential systems. This includes in a time of war.

The most noteworthy of these efforts has come from Volt Typhoon[12], a Chinese state-sponsored hacker group.

These efforts to infiltrate and cripple vital infrastructure are consistent with China’s long-standing doctrine[13] of covert action intended to “win without fighting”.

These sabotage efforts are widely expected to intensify as we approach 2027. This is the crucial window[14] when China’s People’s Liberation Army is expected to reach military readiness to attempt an invasion of Taiwan.

The greatest risk of this digital sabotage campaign is a possible escalation into a military conflict between the US and China.

If Chinese malware is used to target the celebrations for America’s 250th birthday[15] in 2026 or the Los Angeles Olympics in 2028, for example, how much restraint would Trump have?

Renewing America’s cyber espionage law

The final flashpoint will be a legislative one.

The Foreign Intelligence Surveillance Act (FISA) has long been the subject of passionate debate in the US. Most of this centres on Section 702[16], the basis for much of America’s cyber intelligence collection efforts on foreign targets.

This section allows US intelligence agencies to intercept phone calls, emails and other digital communications on non-Americans outside the US.

Congress has mandated these agencies to “minimise[17]” the collateral collection of data on Americans. In practice, however, this has been difficult to achieve in the age of digital anonymity and transnational threats.

Bipartisan supporters of FISA consider it essential to national security agencies that are fighting to keep America and its allies safe. The MAGA-aligned House Freedom Caucus, however, has cast the act in a different light. They believe it empowers an unaccountable deep state[18] intent on surveilling ordinary citizens.

Trump has at times aligned himself with this view. In April of this year, he posted[19] that Congress should “kill FISA” due to allegations it enabled spying of his 2020 presidential campaign.

Section 702 will lapse[20] in April 2026 unless Congress votes to authorise it again. While both houses of Congress will have Republican majorities, the disparate views within the party do not guarantee passage.

Raising the stakes further are the intensifying national security threats a second Trump administration will face.

Intelligence officials will argue the demand for FISA-sourced intelligence has never been higher. However, outsiders like Tulsi Gabbard[21] (presumptive director of national intelligence), Kash Patel[22] (presumptive FBI director), Pam Bondi (presumptive attorney-general) and Kristi Noem[23] (presumptive secretary of homeland security) may oppose re-authorising the legislation.

Furthermore, America’s allies rely heavily on intelligence shared by US agencies using FISA warrants. Just as Trump looks set to demand NATO and other allies pay more for their own defence, he may well insist that Five Eyes and other intelligence partners do more of their own surveillance operations, too.

References

  1. ^ national cyber director (cybermagazine.com)
  2. ^ Cybersecurity and Infrastructure Security Agency (www.forbes.com)
  3. ^ recently been reported (www.nytimes.com)
  4. ^ Salt Typhoon (www.reuters.com)
  5. ^ follow years (www.csis.org)
  6. ^ have found (www.csis.org)
  7. ^ bans and restrictions (www.securityinfowatch.com)
  8. ^ address longtime deficiencies (urgentcomm.com)
  9. ^ hit back (www.nytimes.com)
  10. ^ semiconductor industry (www.theguardian.com)
  11. ^ infiltrating (www.cisa.gov)
  12. ^ Volt Typhoon (theconversation.com)
  13. ^ long-standing doctrine (www.irsem.fr)
  14. ^ crucial window (media.defense.gov)
  15. ^ America’s 250th birthday (www.newsweek.com)
  16. ^ Section 702 (www.intel.gov)
  17. ^ minimise (www.brennancenter.org)
  18. ^ unaccountable deep state (www.cato.org)
  19. ^ posted (www.cato.org)
  20. ^ lapse (cdt.org)
  21. ^ Tulsi Gabbard (apnews.com)
  22. ^ Kash Patel (abcnews.go.com)
  23. ^ Kristi Noem (edition.cnn.com)

Read more https://theconversation.com/as-china-expands-its-cyber-espionage-and-sabotage-operations-how-will-the-trump-administration-respond-244738

Times Magazine

Epson launches ELPCS01 mobile projector cart

Designed for the EB-810E[1] projector and provides easy setup for portable displays in flexible ...

Governance Models for Headless CMS in Large Organizations

Where headless CMS is adopted by large enterprises, governance is the single most crucial factor d...

Narwal Freo Z10 Robotic Vacuum and Mop Cleaner

Narwal Freo Z10 Robotic Vacuum and Mop Cleaner  Rating: ★★★★☆ (4.4/5) Category: Premium Robot ...

Shark launches SteamSpot - the shortcut for everyday floor mess

Shark introduces the Shark SteamSpot Steam Mop, a lightweight steam mop designed to make everyda...

Game Together, Stay Together: Logitech G Reveals Gaming Couples Enjoy Higher Relationship Satisfaction

With Valentine’s Day right around the corner, many lovebirds across Australia are planning for the m...

AI threatens to eat business software – and it could change the way we work

In recent weeks, a range of large “software-as-a-service” companies, including Salesforce[1], Se...

The Times Features

Should I take vitamin C to ward off colds, lower blood pressure or reduce cancer risk?

Vitamin C is one of the most iconic nutrients in popular health culture, often credited with pre...

To Make Your Home & Garden Stand Out In Moorabbin – Try These Excellent Ideas.

We shouldn’t always be ‘trying to keep up with the Joneses’, but it is a common human trait to wan...

Travel Trends: Where Are Australians Going in 2026?

For Australians, travel has always been more than just a holiday. It is a cultural habit, a reward...

Applications Open for TasPorts Industry Support Program

TasPorts has opened applications for its 2026 Industry Support Program, offering $100,000 in f...

STATEMENT FROM DEPUTY LEADER OF THE NATIONALS DARREN CHESTER

I'm incredibly honoured to have been elected Deputy Leader of The Nationals Federal Parliamentary ...

Grill'd Oscar Piastri's burger just landed at Coles

Grill’d is putting the pedal down with the launch of an all-new Oscar Piastri Burger on 10 Febru...

Tasmanian MP Andrew Wilkie has issued a statement regard Robodebt

 A STATEMENT ON NACC ROBODEBT FINDINGS - Andrew Wilkie The National Anti-Corruption Commission h...

Can exercise reduce period pain? And what kind is best?

Having your period can be a painful experience. Period pain, also known as dysmenorrhea, is a...

Tasmania in 2026: Opportunity, Pressure and the Island State’s Defining Moment

Tasmania has long held a unique place in the Australian story. It is a state known for natural b...