
U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the country’s critical infrastructure . During a hearing of the House Homeland Security Committee, participants emphasized that the current threat level requires a reconsideration of approaches, including the active use of offensive operations against foreign groups.
The discussion has been fueled by increased activity by hackers linked to China. Experts estimate that in recent months they have penetrated key infrastructure not linked to the military . This could indicate preparations for potential actions in the event of an escalation, for example in the Taiwan region . Chinese groups have also gained access to interception systems used by US law enforcement for court-ordered wiretaps.
Among the speakers, the director of an institute at Auburn University emphasized that cyberspace has already become a realm of military conflict and must be integrated into strategy at all levels . Without this, he argued, the United States will be unable to effectively counter threats.
The head of a private company specializing in offensive cyber operations added that the current strategy fails to deter adversaries. He noted that Chinese groups’ attacks are constant, automated, and aimed at creating the conditions for a crisis, not simply stealing data. Furthermore, he believes that US restraint only encourages further escalation.
He proposed industrializing offensive capabilities , transforming professional cyberattack techniques into tools capable of operating automatically under human control . This transformation, he believes, will allow the United States to respond to external threats more quickly and effectively.
The discussion also included the need to create a separate cyber unit within the armed forces, a long-debated topic in expert circles. A representative of the think tank, who previously worked for the CIA, emphasized that the country has yet to build a digital deterrent mechanism and is ceding the initiative to other states.
At the same time, despite the general sentiment in favor of more proactive action, some participants cautioned against hasty measures. Drew Bagley, a representative of CrowdStrike, a major American cybersecurity firm, warned that retaliatory attacks could cause repeated damage to companies, disrupt investigations, and have unpredictable consequences on the international scene.
According to Bagley, any offensive measures should remain in the hands of authorized government agencies, operate according to established procedures, and be monitored.
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
