
Sign up to save your podcasts
Or
The U.S. military has a vested interest in the security of the nation’s critical transportation infrastructure. During a conflict, America’s adversaries are likely to attack U.S. critical infrastructure in an attempt to constrain Washington’s policy options, including its capacity to mobilize the armed forces. Over the past year, the intelligence community has revealed how deeply Chinese hackers known as Volt Typhoon penetrated U.S. transportation, energy, and water systems. Meanwhile, other Chinese Communist Party (CCP) malicious cyber operations, including Flax Typhoon, hijacked cameras and routers. Salt Typhoon burrowed deep into U.S. telecommunications networks; Silk Typhoon compromised U.S. Treasury networks.
These hacks have uncovered a dangerous truth: the cybersecurity of the critical air, rail, and maritime infrastructure that underpins U.S. military mobility is insufficient. In addition to enabling disruption, compromising critical infrastructure would allow U.S. adversaries to amass information about the movement of goods and military equipment – and impede America’s ability to deploy, supply, and sustain large forces.
To explore these themes and more, the Foundation for Defense of Democracies hosts Gen. (Ret.) Mike Minihan, former commander, Air Mobility Command; RADM (Ret.) Mark Montgomery, senior director, FDD’s Center on Cyber and Technology Innovation; and Annie Fixler, director and research fellow, FDD’s Center on Cyber and Technology Innovation. The conversation is moderated by Bradley Bowman, senior director, FDD’s Center on Military and Political Power.
For more, check out: https://www.fdd.org/events/2025/04/17/persistent-access-persistent-threat-ensuring-military-mobility-against-malicious-cyber-actors/
4.9
6161 ratings
The U.S. military has a vested interest in the security of the nation’s critical transportation infrastructure. During a conflict, America’s adversaries are likely to attack U.S. critical infrastructure in an attempt to constrain Washington’s policy options, including its capacity to mobilize the armed forces. Over the past year, the intelligence community has revealed how deeply Chinese hackers known as Volt Typhoon penetrated U.S. transportation, energy, and water systems. Meanwhile, other Chinese Communist Party (CCP) malicious cyber operations, including Flax Typhoon, hijacked cameras and routers. Salt Typhoon burrowed deep into U.S. telecommunications networks; Silk Typhoon compromised U.S. Treasury networks.
These hacks have uncovered a dangerous truth: the cybersecurity of the critical air, rail, and maritime infrastructure that underpins U.S. military mobility is insufficient. In addition to enabling disruption, compromising critical infrastructure would allow U.S. adversaries to amass information about the movement of goods and military equipment – and impede America’s ability to deploy, supply, and sustain large forces.
To explore these themes and more, the Foundation for Defense of Democracies hosts Gen. (Ret.) Mike Minihan, former commander, Air Mobility Command; RADM (Ret.) Mark Montgomery, senior director, FDD’s Center on Cyber and Technology Innovation; and Annie Fixler, director and research fellow, FDD’s Center on Cyber and Technology Innovation. The conversation is moderated by Bradley Bowman, senior director, FDD’s Center on Military and Political Power.
For more, check out: https://www.fdd.org/events/2025/04/17/persistent-access-persistent-threat-ensuring-military-mobility-against-malicious-cyber-actors/
604 Listeners
46 Listeners
4,802 Listeners
175 Listeners
178 Listeners
368 Listeners
1,063 Listeners
2,827 Listeners
982 Listeners
178 Listeners
397 Listeners
206 Listeners
8 Listeners
97 Listeners
374 Listeners
308 Listeners
40 Listeners
451 Listeners
18 Listeners