Skip to main content

Analysis | The Cybersecurity 202: China is poised to lead in 5G. That's partly Washington's fault, Sen. Warner says.

By Joseph Marks

PowerPost Analysis
Analysis Interpretation of the news based on evidence, including data, as well as anticipating how events might unfold based on past events


Sen. Mark Warner. (Alex Brandon/AP)
The U.S. government has been too slow to respond to China’s technological rise and aggression in cyberspace — and it could pay a big price.
That's according to Sen. Mark Warner (D-Va.), who blasted congressional dysfunction and mismanagement by both the Trump and Obama administrations for a complacency that allowed Chinese companies to get ahead in next-generation 5G wireless networks.
The risks are big: Intelligence officials fret Beijing could use that position to spy on Americans or sabotage U.S. companies. And if things don’t change, China could also control artificial intelligence, quantum computing and a host of emerging technologies that are vital to U.S. cybersecurity, the ranking Democrat on the Senate Intelligence Committee said.
“China will not only lead, it will dominate,” Warner warned during a speech at the Council on Foreign Relations.
To change this fate, Washington must take action, Warner said. He is calling for a slew of policy changes, including increasing government investing in cybersecurity and technology research and investing in digital protections that make U.S. innovations more difficult to steal.
The executive branch must also throw its diplomatic weight into setting rules of the road in technology and cybersecurity that are a check on Chinese dominance, he said.
And Warner has been urging the intelligence community to share more information about Chinese hacking threats with companies so they can better protect themselves, he said.
“We are not doing our job if we don’t find ways to declassify more of this information and get it out to American business, American policymakers, American academia," he said.
But Warner also warned that those efforts could be derailed by partisan bickering that has made it difficult to pass major cybersecurity changes.
“It didn’t start with Donald Trump, but it’s gotten even worse because Congress has become even more inefficient and the ability of this administration to build international coalitions has become greatly diminished,” he said.
And Warner slammed Trump for suggesting last week he might walk back harsh restrictions aimed at reducing the role of the Chinese telecom Huawei in global 5G networks to gain an advantage in U.S.-China trade negotiations.
That trial balloon came as U.S. officials were “finally starting to make some progress” after months trying to convince allies that Huawei-built 5G networks would create an unmanageable risk of Chinese government spying or sabotage, Warner said.
“If that were to be traded away as a trading chip, the ability for our intelligence community, the ability for our technology community to have any credibility on a going-forward basis would be incredibly diminished,” he said.
Warner also lashed out at Trump for suggesting last week that he might listen to hacked information about his Democratic opponents provided by a foreign adversary.
Those comments, Warner charged, damaged the White House’s credibility and hurt relations between congressional Democrats and Republicans – many of whom want to work with Democrats on cybersecurity but are wary of crossing the president.
The polarization, he said, “can only be turned around if Americans of goodwill of both political parties say that our democracy, and the integrity of that democracy, is more important than the feelings and sensibilities of the current occupant of the White House."
You are reading The Cybersecurity 202, our must-read newsletter on cybersecurity policy news.
Not a regular subscriber?


Cars wait in a line to cross the border between Mexicali and Calexico in Mexicali, Mexico in April. (Carlos Jasso/REUTERS)
PINGED: At least 50,000 American license plate numbers that were hacked and stolen from a U.S. Customs and Border Protection contractor are available on the dark web, CNN’s Kevin Collier reported.
A least some of those images came originally from a CBP database, though it’s not clear how many, Collier reported. Others probably came from other customers of the hacked contractor Perceptics, Collier reported.
Perceptics probably shouldn’t have had those license plate images in the first place because CBP “does not authorize contractors to hold license plate data on non-CBP systems,” an agency representative told CNN.
CBP earlier acknowledged the contractors’ breach but said none of the data was available on the dark web — a semi-lawless portion of the Internet that’s not accessible on the World Wide Web.

A worker stands on the pipeline at Bovanenkovo gas field in Russia's Yamal Peninsula in June 2018 (Yuri Kozyrev/NOOR)
PATCHED: The Russian government “has uncovered and thwarted” U.S. attempts to hack its critical infrastructure, an unnamed official told Russian state media, according to a Reuters report. The comments follow a New York Times report claiming that U.S. Cyber Command had seeded Russia’s electric grid with malicious software that it might one day use to shut off portions of its adversary’s power.
The official responded to that claim with bravado, saying, “We see and note such attempts. However, we manage to neutralize these actions.”
Kremlin spokesman Dmitry Peskov earlier told Reuters the Times report “ shows the hypothetical possibility . . . of cyber war and military cyber action against the Russian Federation,” Reuters reported.  
Trump again disputed the Times report in a tweet last night:
The story in the @nytimes about the U.S. escalating attacks on Russia’s power grid is Fake News, and the Failing New York Times knows it. They should immediately release their sources which, if they exist at all, which I doubt, are phony. Times must be held fully accountable!
— Donald J. Trump (@realDonaldTrump) June 18, 2019

Police watch an Assange supporter wearing a mask and protesting at Westminster Magistrates Court in London one June 14. (Frank Augstein/AP)
PWNED: Justice Department investigators plan to question a Swedish programmer who’s close to WikiLeaks founder Julian Assange and was arrested the same day Assange was expelled from the Ecuadoran Embassy in London, the Associated Press’s Joshua Goodman and Eric Tucker report.
The investigators didn’t explain why they’re interested in the Swedish programmer, Ola Bini, though he could be a witness in the Assange prosecution, Goodman and Tucker reported.
Bini was arrested in Quito on suspicion of hacking, but various advocacy groups say that his two-month imprisonment rests on a on a thin case. .
“Authorities have asked the U.S. government for assistance from code experts in analyzing more than 30 electronic storage devices that Bini was carrying when he was arrested,” the AP reports.
Cybersecurity news from the public sector:

Senate GOP resistance is building over Democratic measures to bolster security around US elections, setting the stage for a partisan clash with the House over imposing tougher safeguards ahead of 2020.

Florida Gov. Ron DeSantis announced that county elections departments will retain more than $2 million in unspent grant money aimed at stopping cyber-attacks on the state’s voting system
Associated Press

Homeland Security’s cyber agency says it has tested a working exploit for the BlueKeep vulnerability, capable of achieving remote code execution on a vulnerable device.

House Minority Whip Steve Scalise (R-La.) in an interview that aired Sunday responded to a report that the Defense Department is ramping up digital attacks on Russia by saying he is glad the Trump administration is getting aggressive on cybersecur
The Hill
Cybersecurity news from the private sector:

Motherboard previously reported how hackers were holding high-profile Instagram accounts for ransom, and how some influencers had to turn to white-hat hackers for help.

If you’re looking to strengthen the Wi-Fi signal in your home or business, be sure the equipment you use doesn’t have a vulnerability that could give free rein to hackers.

If you have banking or e-commerce apps you haven’t opened in months, it’s a good time to make sure no one else is using them, either.
Cybersecurity news from abroad:

Iran said on Monday it had exposed a large cyber espionage network it alleged was run by U.S. Central Intelligence Agency (CIA).
  • On Tuesday, the Senate Committee on Foreign Relations will host a hearing on regional security in Ukraine.
Coming up:
  • Wednesday: The Senate Homeland Security and Governmental Affairs Committee will consider a host of cybersecurity bills, including the IoT Cybersecurity Improvement Act of 2019.
  • Thursday: The House Judiciary Committee hosts "Lessons from the Mueller Report, Part II: Bipartisan Perspectives"
Source: The Washington Post


Popular posts from this blog

Analysis | The Cybersecurity 202: How the shutdown could make it harder for the government to retain cybersecurity talent

By Joseph Marks 13-17 minutes THE KEY President Trump delivers an address about border security amid a partial government shutdown on Jan. 8. (Carolyn Kaster/AP) The partial government shutdown that's now in its 18th day is putting key cyber policy priorities on hold and leaving vital operations to a bare bones staff. But the far greater long-term danger may be the blow to government cyber defenders' morale, former officials warn. With the prospect of better pay and greater job security in the private sector, more government cyber operators are likely to decamp to industry, those former officials tell me, and the smartest cybersecurity graduates will look to industry rather than government to hone their skills. That’s especially dangerous, they say, considering the government’s struggle to recruit and retain skilled workers amid a nationwide shortage of cybersecurity talent. About 20 percent of staffers are furloughed at the De

Democrats call for investigation into Trump’s iPhone use after a report that China is listening:Analysis | The Daily 202 I The Washington Post. By James Hohmann _________________________________________________________________________________ President Trump and Chinese President Xi Jinping visit the Great Hall of the People in Beijing last November. (Andrew Harnik/AP) With Breanne Deppisch and Joanie Greve THE BIG IDEA: If Democrats win the House in two weeks, it’s a safe bet that one of the oversight hearings they schedule for early next year would focus on President Trump’s use of unsecured cellphones. The matter would not likely be pursued with anywhere near the gusto that congressional Republicans investigated Hillary Clinton’s use of a private email server during her time as secretary of state. Leaders of the minority party have higher priorities . But Democratic lawmakers made clear Thursday morning that they will not ignore a New York Times report that Trump has refused to stop using iPhones in the White House, despite repeated warnings from U.S. intelligence offici

RTTNews: Morning Market Briefing.-Weekly Jobless Claims Edge Down To 444,000. May 13th 2010

Morning Market Briefing Thu May 13 09:01 2010   Commentary May 13, 2010 Stocks Poised For Lackluster Open Amid Mixed Market Sentiment - U.S. Commentary Stocks are on pace for a mixed start to Thursday's session, as a mostly upbeat jobs report continued to relieve the markets while some consternation regarding the European debt crisis remained on traders' minds. The major index futures are little changed, with the Dow futures down by 4 points. Full Article Economic News May 13, 2010 Weekly Jobless Claims Edge Down To 444,000 First-time claims for unemployment benefits showed another modest decrease in the week ended May 8th, according to a report released by the Labor Department on Thursday, although the number of claims exceeded estimates due to an upward revision to the previous week's data. Full Article May 13, 2010 Malaysia's Decade High Growth Triggers Policy Tightening Malaysia's economy grew at the fastest pace in a decade in