
Sign up to save your podcasts
Or
The U.S. military has a vested interest in the security of the nation’s critical transportation infrastructure. During a conflict, America’s adversaries are likely to attack U.S. critical infrastructure in an attempt to constrain Washington’s policy options, including its capacity to mobilize the armed forces. Over the past year, the intelligence community has revealed how deeply Chinese hackers known as Volt Typhoon penetrated U.S. transportation, energy, and water systems. Meanwhile, other Chinese Communist Party (CCP) malicious cyber operations, including Flax Typhoon, hijacked cameras and routers. Salt Typhoon burrowed deep into U.S. telecommunications networks; Silk Typhoon compromised U.S. Treasury networks.
These hacks have uncovered a dangerous truth: the cybersecurity of the critical air, rail, and maritime infrastructure that underpins U.S. military mobility is insufficient. In addition to enabling disruption, compromising critical infrastructure would allow U.S. adversaries to amass information about the movement of goods and military equipment – and impede America’s ability to deploy, supply, and sustain large forces.
To explore these themes and more, the Foundation for Defense of Democracies hosts Gen. (Ret.) Mike Minihan, former commander, Air Mobility Command; RADM (Ret.) Mark Montgomery, senior director, FDD’s Center on Cyber and Technology Innovation; and Annie Fixler, director and research fellow, FDD’s Center on Cyber and Technology Innovation. The conversation is moderated by Bradley Bowman, senior director, FDD’s Center on Military and Political Power.
For more, check out: https://www.fdd.org/events/2025/04/17/persistent-access-persistent-threat-ensuring-military-mobility-against-malicious-cyber-actors/
4.9
6464 ratings
The U.S. military has a vested interest in the security of the nation’s critical transportation infrastructure. During a conflict, America’s adversaries are likely to attack U.S. critical infrastructure in an attempt to constrain Washington’s policy options, including its capacity to mobilize the armed forces. Over the past year, the intelligence community has revealed how deeply Chinese hackers known as Volt Typhoon penetrated U.S. transportation, energy, and water systems. Meanwhile, other Chinese Communist Party (CCP) malicious cyber operations, including Flax Typhoon, hijacked cameras and routers. Salt Typhoon burrowed deep into U.S. telecommunications networks; Silk Typhoon compromised U.S. Treasury networks.
These hacks have uncovered a dangerous truth: the cybersecurity of the critical air, rail, and maritime infrastructure that underpins U.S. military mobility is insufficient. In addition to enabling disruption, compromising critical infrastructure would allow U.S. adversaries to amass information about the movement of goods and military equipment – and impede America’s ability to deploy, supply, and sustain large forces.
To explore these themes and more, the Foundation for Defense of Democracies hosts Gen. (Ret.) Mike Minihan, former commander, Air Mobility Command; RADM (Ret.) Mark Montgomery, senior director, FDD’s Center on Cyber and Technology Innovation; and Annie Fixler, director and research fellow, FDD’s Center on Cyber and Technology Innovation. The conversation is moderated by Bradley Bowman, senior director, FDD’s Center on Military and Political Power.
For more, check out: https://www.fdd.org/events/2025/04/17/persistent-access-persistent-threat-ensuring-military-mobility-against-malicious-cyber-actors/
614 Listeners
327 Listeners
5,120 Listeners
31 Listeners
439 Listeners
1,138 Listeners
3,155 Listeners
1,065 Listeners
31 Listeners
411 Listeners
18 Listeners
382 Listeners
71 Listeners
308 Listeners
70 Listeners
658 Listeners
34 Listeners
87 Listeners