IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

The Differing Response to the Chinese Cyber Attack

A new approach and new partners joining the response.

The Russians hack us and we give them a verbal thrashing. Putin is called out as a repeat offender and we do all of this alone as the United States.

China commits a cyber attack on Microsoft Exchange server software that powers most professional organizations’ email systems and we respond differently. First, and quietly, we line up the international community to be part of the verbal response to the attack. This includes getting NATO to weigh in on the issue. Then, the president of the United States calls out China for the hacking, but does not call out the president of China by name.

There are differences between the attacks and the attackers. China in the past has concentrated more on trying to get intellectual secrets, while Russia is meddling in government systems and looking for pure intelligence. The economic connections between the nations involved are also different. Many, if not most, of the products we purchase in the United States come from or have components made in China. Russia, on the other hand, has caviar and their economy is about the size of California or Italy.

The Biden administration took a radically different approach to both nations when compared to the previous administration. First, they actually did call out Russia for hacking and addressed the issue in person in a face-to-face meeting, not accepting Putin’s assertion of “not me!” at face value.

For China, this is the first time I can recall us lining up international support to confront a foreign nation’s cyber attack. And it was great to see that Biden is drawing NATO into the mix. They have been muddled in planning for the last war, rather than thinking about a comprehensive approach to defending Europe that must include cybersecurity.

This “cyber thing” is not going away anytime soon. The best thing we can do individually and organizationally is go “shields up” and use all the protective tools and processes and procedures available. IT professionals — install the security patches as soon as you get them!
Eric Holdeman is a nationally known emergency manager. He has worked in emergency management at the federal, state and local government levels. Today he serves as the Director, Center for Regional Disaster Resilience (CRDR), which is part of the Pacific Northwest Economic Region (PNWER). The focus for his work there is engaging the public and private sectors to work collaboratively on issues of common interest, regionally and cross jurisdictionally.