{"id":126607,"date":"2025-12-22T10:00:54","date_gmt":"2025-12-22T15:00:54","guid":{"rendered":"https:\/\/www.justsecurity.org\/?p=126607"},"modified":"2025-12-22T10:00:54","modified_gmt":"2025-12-22T15:00:54","slug":"us-indopacific-china-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/","title":{"rendered":"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security"},"content":{"rendered":"<p>On Dec. 3, the White House <a href=\"https:\/\/www.reuters.com\/world\/china\/us-halted-plans-sanction-chinese-spy-agency-maintain-trade-truce-ft-says-2025-12-04\/\">backed away<\/a> from sanctioning China\u2019s spy agency, the Ministry of State Security (MSS), that carried out one of the most <a href=\"https:\/\/www.justsecurity.org\/116896\/what-it-takes-stop-next-salt-typhoon\/\">extensive<\/a> hacking campaigns in U.S. history against critical infrastructure. The administration reportedly halted these sanctions to <a href=\"https:\/\/www.reuters.com\/world\/china\/us-halted-plans-sanction-chinese-spy-agency-maintain-trade-truce-ft-says-2025-12-04\/\">preserve<\/a> a trade truce that U.S. President Donald Trump and Chinese General Secretary Xi Jinping struck at the Busan summit in October.<\/p>\n<p>This sends the wrong message to Beijing, as well as to U.S. allies in the Indo-Pacific caught in China\u2019s cyber crosshairs. Trump\u2019s new <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2025\/12\/2025-National-Security-Strategy.pdf\">National Security Strategy<\/a> (NSS) explicitly calls for burden-sharing, arguing that allies must \u201cassume primary responsibility for their regions,\u201d while the United States serves as a \u201cconvener and supporter\u201d in regional defense. Backing away from sanctions after a major China-linked hacking campaign undercuts that logic: burden-sharing collapses if the United States is not willing to bear economic or political costs itself. If the world\u2019s largest economy will not confront China\u2019s cyber operations, how can it credibly ask Indo-Pacific allies \u2014 who have far less leverage over Beijing \u2014 to step up?<\/p>\n<p>There is still time to recalibrate. To counter Beijing\u2019s cyberattacks and operationalize burden-sharing, the United States must use its unique leverage to impose costs on China while enabling Indo-Pacific allies to lead cyber defense in the region.<\/p>\n<h2><b>Beijing Exploits Cyber Weakness Across the Indo-Pacific\u00a0<\/b><\/h2>\n<p>The U.S. intelligence community <a href=\"https:\/\/www.dni.gov\/files\/ODNI\/documents\/assessments\/ATA-2025-Unclassified-Report.pdf\">identifies<\/a> China as the most persistent and active cyber threat to U.S. networks. In 2024, the Chinese state-sponsored hacking group Salt Typhoon carried out one of the most severe <a href=\"https:\/\/www.justsecurity.org\/116896\/what-it-takes-stop-next-salt-typhoon\/\">breaches<\/a> of U.S. telecommunications companies. Just weeks before Trump met with Xi in October, the United States uncovered another major China state-backed cyber <a href=\"https:\/\/www.reuters.com\/technology\/breach-us-based-cybersecurity-provider-f5-blamed-china-bloomberg-news-reports-2025-10-16\/\">intrusion<\/a> of the cybersecurity vendor F5, <a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/ed-26-01-mitigate-vulnerabilities-f5-devices\">triggering <\/a>an emergency directive from the lead U.S cyber agency. Yet, the cyber threat to Washington extends far beyond the homeland. China\u2019s cyber operations have already <a href=\"https:\/\/cyberscoop.com\/china-critical-infrastructure-volt-typhoon\/\">infiltrated<\/a> <a href=\"https:\/\/www.newser.com\/story\/338635\/newly-revealed-chinese-cyberattack-on-japan-called-shockingly-bad.html\">networks<\/a> supporting U.S. forward deployed forces across the Indo-Pacific, targeted <a href=\"https:\/\/www.reuters.com\/sustainability\/boards-policy-regulation\/china-linked-hackers-target-taiwans-chip-industry-with-increasing-attacks-2025-07-16\/\">export controls<\/a> on critical technologies, and <a href=\"https:\/\/perryworldhouse.upenn.edu\/news-and-insight\/chinas-disinformation-narratives-in-the-philippines\/\">spread <\/a>disinformation campaigns designed to erode trust in U.S. alliances.<\/p>\n<p>U.S. regional partners also bear the full brunt of Beijing\u2019s cyber coercion. In Taiwan alone, China-linked hackers <a href=\"https:\/\/therecord.media\/taiwan-nsb-report-china-surge-cyberattacks-influence-operations\">target<\/a> critical infrastructure and government networks roughly 2.8 million times a day \u2014 a 17 percent jump from last year. Over the past five years, Chinese hacking groups have <a href=\"https:\/\/apnews.com\/article\/japan-police-cyberattack-china-government-68adcb293b2931da4c30ca0279720124\">targeted<\/a> Japan\u2019s national security and critical technology data over 200 times.<\/p>\n<p>Indo-Pacific cyber defenses are not keeping pace with threats from China. The region is experiencing rapid digitalization \u2014 often <a href=\"https:\/\/s3.us-east-1.amazonaws.com\/files.cnas.org\/documents\/Indo-Pacific-Cyber_JUNE-2025-final_2025-06-23-224311_elho.pdf\">without<\/a> matching investments in cybersecurity. In Southeast Asia alone, the <a href=\"https:\/\/www.weforum.org\/stories\/2023\/12\/how-southeast-asia-can-become-trillion-digital-economy\/\">digital economy<\/a> could reach up to $1 trillion in gross merchandise value by 2030. This surge in connectivity is fueling growth, but it also expands the attack surfaces that state-backed hackers, and other malign cyber actors, can exploit \u2014 underscoring the urgent need for collective investments in cyber defenses.<\/p>\n<p>The lack of cybersecurity personnel in the region emboldens Beijing\u2019s hackers. When breaches occur, scant cyber workforces struggle to root out China\u2019s hostile activity. Identifying the attackers takes weeks \u2014 if it happens at all \u2014 and allied cyber defense resources often arrive after the damage is done. The numbers are stark. There are <a href=\"https:\/\/www.cnas.org\/publications\/reports\/cyber-crossroads-in-the-indo-pacific\">only<\/a> around 200 highly certified cybersecurity professionals in the Philippines, and Japan\u2019s cyber workforce shortfall <a href=\"https:\/\/edge.sitecorecloud.io\/internationf173-xmc4e73-prodbc0f-9660\/media\/Project\/ISC2\/Main\/Media\/documents\/research\/ISC2_Cybersecurity_Workforce_Study_2023.pdf\">nearly doubled<\/a> between 2022-2023. At the same time, China operates a hacking program <a href=\"https:\/\/www.cisa.gov\/securebydesign\/dir-easterly-remarks-carnegie-mellon-university\">larger<\/a> than that of every major country combined.<\/p>\n<p>Beijing\u2019s economic leverage is also blunting efforts to counter China\u2019s cyber operations. For example, the Philippines made <a href=\"https:\/\/therecord.media\/philippines-army-confirms-hack\">no official attribution<\/a> statement against its largest trading partner, China, when Beijing-backed attackers <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2025-01-07\/chinese-hackers-target-philippine-president-steal-military-data\">infiltrated<\/a> the government and stole sensitive military data earlier this year. The <a href=\"https:\/\/www.cnas.org\/publications\/reports\/cyber-crossroads-in-the-indo-pacific\">same story<\/a> plays out in South Korea, Japan, and Taiwan \u2014 leaders condemn cyber espionage in vague terms but hesitate to call out Beijing specifically when trade is on the line.<\/p>\n<p>To counter Beijing\u2019s cyber operations across the Indo-Pacific, Washington should lead its treaty allies in building a new \u201c<a href=\"https:\/\/www.cnas.org\/publications\/reports\/cyber-crossroads-in-the-indo-pacific\">Cyber Shield<\/a>\u201d for the region. In this proposed framework, Washington would provide strategic capacity-building resources while allies commit to measurable investments in their own cyber defenses \u2014 enabling greater regional integration and capability to defend against cyber threats. This framework would also define options for a collective response to move away from ineffective, ad hoc reactions that only embolden China.<\/p>\n<h2><b>Toward an Indo-Pacific Cyber Shield<\/b><\/h2>\n<p>While an Indo-Pacific Cyber Shield will not stop Beijing\u2019s cyber aggression, it will certainly raise the cost for China. The recommendations below operationalize the proposed Cyber Shield across three pillars \u2014 joint resolve, joint resources, and joint response.<\/p>\n<h4><b><i>Joint Resolve<\/i><\/b><b>\u00a0<\/b><\/h4>\n<p>Countering Beijing&#8217;s cyber operations starts with conveying the joint resolve of the United States and its Indo-Pacific allies. Washington and its regional partners <a href=\"https:\/\/www.cnas.org\/publications\/reports\/cyber-crossroads-in-the-indo-pacific\">should<\/a> issue a joint statement condemning China\u2019s cyber activity and commit to a significant collective response if Beijing\u2019s cyber operations continue. Such a statement would undercut Beijing\u2019s denials of its cyber operations. It would also help signal resolve and bolster awareness by publicly highlighting Beijing\u2019s hostile cyber operations. A <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/cisa-and-partners-release-joint-advisory-countering-chinese-state-sponsored-actors-compromise\">joint advisory<\/a> \u2014 issued by the FBI and European allies in August \u2014 offers a model to replicate. The United States and its allies should increase the cadence of these alerts following major China-backed infiltrations.<\/p>\n<h4><b><i>Joint Resources<\/i><\/b><\/h4>\n<p>Increasing joint cyber defense capabilities will be the most critical component of countering China\u2019s cyber aggression. To operationalize the Cyber Shield, U.S. capacity building resources should scale with greater partner investments in cyber defenses. This reflects the National Security Strategy&#8217;s burden-sharing model in practice. Regional allies must improve the technical capacity to identify evidence of Chinese hacking when a breach occurs, quickly patch vulnerabilities, and bolster resilience of critical networks to thwart future intrusions. The United States is making important progress on cyber defense capacity building in the region. U.S. Cyber Command has <a href=\"https:\/\/www.cybercom.mil\/Media\/News\/Article\/4150133\/posture-statement-of-lieutenant-general-william-j-hartman\/\">deployed<\/a> more than 85 times to over 30 countries in partner-enabled missions to hunt for hostile activity on networks. The U.S. Cybersecurity and Infrastructure Security Agency has also conducted several capacity-building exercises, including with <a href=\"https:\/\/www.dhs.gov\/archive\/news\/2024\/08\/30\/dhs-partners-japanese-counterparts-strengthen-maritime-cybersecurity-cooperation\">Japan<\/a> in 2024 on maritime cybersecurity.<\/p>\n<p>For their part, Indo-Pacific allies and partners participate in multiple U.S.-led military exercises that have a cyber component, including the annual Cyber Flag <a href=\"https:\/\/ipdefenseforum.com\/2024\/03\/persistent-partnerships-in-cyberspace\/\">exercise<\/a> hosted by the U.S. Cyber Command. The United States has also prioritized negotiating an intelligence sharing agreement with the Philippines, and both countries approved a major intelligence sharing upgrade in <a href=\"https:\/\/www.reuters.com\/world\/philippines-united-states-sign-military-intelligence-sharing-deal-2024-11-18\/\">2024<\/a>. The United States should leverage these engagements to share cyber threat intelligence and provide a clear roadmap for how allies can receive greater cyber defense support from Washington.<\/p>\n<p>Critically, U.S. allies in the Indo-Pacific need to invest in their own cyber defenses. In exchange for access to U.S. cyber defense resources and information, allies should modernize military and intelligence cyber capabilities, upgrade and strengthen intelligence systems, and provide a clear legal pathway for <a href=\"https:\/\/www.960cyber.afrc.af.mil\/News\/Article-Display\/Article\/3219164\/cyber-101-hunt-forward-operations\/\">U.S. Hunt Forward operations<\/a> \u2014 defensive operations conducted by U.S. Cyber Command at the request of a host nation \u2014 to root out hostile activity on partner networks. Most importantly, allies should remove insecure ICT infrastructure, especially from companies like Huawei and ZTE, that pose a<a href=\"https:\/\/irp.fas.org\/congress\/2012_rpt\/huawei.pdf\"> significant cyber espionage risk<\/a>.<\/p>\n<h4><b><i>Joint Response<\/i><\/b><\/h4>\n<p>If a breach occurs, the United States and its regional allies must be ready to impose costs on Chinese state-backed hackers. In addition to bolstering domestic cyber defenses, the United States should develop a joint escalation ladder with its regional allies outlining a variety of responses to state-backed cyber aggression. The European Union\u2019s <a href=\"https:\/\/www.cyber-diplomacy-toolbox.com\/\">Cyber Diplomacy Toolbox<\/a> shows what a coordinated diplomatic response to malign cyber activity can look like. While U.S. Indo-Pacific allies are not as politically or institutionally integrated as the European Union, the region can apply similar tools while leveraging the multiple existing cyber coordination channels between the United States, <a href=\"https:\/\/www.mofa.go.jp\/press\/release\/pressite_000001_01381.html\">Japan<\/a>, <a href=\"https:\/\/www.pacom.mil\/Media\/News\/News-Article-View\/Article\/3739180\/joint-press-statement-for-the-24th-korea-us-integrated-defense-dialogue\/\">South Korea<\/a>, and the <a href=\"https:\/\/philippineembassy-dc.org\/joint-statement-on-the-united-states-philippines-cyber-digital-policy-dialogue\/\">Philippines<\/a>.<\/p>\n<p><a href=\"https:\/\/ccdcoe.org\/uploads\/2020\/12\/3-Cyberspace-Escalation-Ladders-or-Lattices_ebook.pdf\">Legal action<\/a> is an important but underutilized tool in the cyber context. The United States has<a href=\"https:\/\/www.politico.com\/story\/2018\/12\/20\/trump-administration-us-allies-condemn-china-for-brazen-cyberattacks-1070984\"> indicted<\/a> China-linked hackers multiple times, including two hackers linked to the Chinese Ministry of State Security in 2018, and <a href=\"https:\/\/www.justice.gov\/usao-sdny\/pr\/10-chinese-nationals-charged-large-scale-hacking-us-and-international-victims-behalf\">employees of i-Soon<\/a> \u2014 a company that carried out cyber operations on behalf of the Chinese government \u2014 last March. Indo-Pacific allies are beginning to take <a href=\"https:\/\/english.kyodonews.net\/news\/2021\/04\/45d26e5d5426-chinese-man-to-be-referred-to-prosecutors-over-cyberattacks-on-jaxa.html\">similar steps<\/a>, albeit less frequently. In 2021, for example, Japanese law enforcement <a href=\"https:\/\/english.kyodonews.net\/news\/2021\/04\/45d26e5d5426-chinese-man-to-be-referred-to-prosecutors-over-cyberattacks-on-jaxa.html\">investigated<\/a> a Chinese hacker over alleged involvement in cyberattacks on about 200 companies, including the Japan Aerospace Exploration Agency. The United States should work with Indo-Pacific allies to develop frameworks to prosecute China-linked hacking, especially for threat groups like Salt Typhoon, that target both the United States and the Indo-Pacific.<\/p>\n<p>The Cyber Shield framework would also encourage its members to levy economic sanctions against known Chinese cyber threat actors. Despite the reported White House walk-back, the United States has sanctioned China-backed hackers multiple times, including Zhou Shuai, a Shanghai-based <a href=\"https:\/\/www.state.gov\/sanctions-on-china-based-hacker-and-data-broker\/\">cyber actor<\/a>, last March. Similarly, the United States, Australia, and the United Kingdom <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy2041#:~:text=Ermakov%20is%20a%20Russian%20national,numbers%2C%20and%20sensitive%20medical%20information.\">jointly issued<\/a> sanctions against Aleksandr Ermakov, a Russian hacker who breached Australia\u2019s largest private health insurance provider, in January 2024. The United States should coordinate similar sanctions regimes with its Indo-Pacific allies after significant cyberattacks, especially if the threat actor targets multiple allied countries.<\/p>\n<p>Finally, the United States and its regional allies should prepare to respond with offensive cyber operations when necessary and legal to make China-backed hackers pay. Seoul and Tokyo are already honing their offensive cyber capabilities: South Korea\u2019s 2024 National Cybersecurity Strategy <a href=\"https:\/\/www.csis.org\/blogs\/strategic-technologies-blog\/south-koreas-2024-cyber-strategy-primer\">calls<\/a> for intelligence and military agencies to \u201cpreemptively and offensively respond to threats,\u201d while Japan\u2019s new active cyber defense legislation <a href=\"https:\/\/www.cybersecurityintelligence.com\/blog\/japan-enacts-landmark-cyber-defence-legislation-8463.html\">authorizes<\/a> the neutralization of adversary servers. This further aligns Indo-Pacific allies with Washington\u2019s Defend Forward cyber posture, which calls for <a href=\"https:\/\/www.cybercom.mil\/Media\/News\/Article\/3198878\/cyber-101-defend-forward-and-persistent-engagement\/\">disrupting<\/a> adversary cyber threats before they reach domestic networks. The United States should take advantage of this alignment in strategy by prioritizing the development of joint offensive cyber capabilities during military exercises like <a href=\"https:\/\/ipdefenseforum.com\/2024\/03\/persistent-partnerships-in-cyberspace\/\">Cyber Flags<\/a>.<\/p>\n<p style=\"text-align: center;\">* * *<\/p>\n<p>Without a new framework to counter China-backed cyber operations in the region, Beijing and other state-backed cyber groups will continue escalating their cyber operations to spy, steal, and sabotage with near impunity. A new Cyber Shield would translate the National Security Strategy\u2019s <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2025\/12\/2025-National-Security-Strategy.pdf\">burden-sharing<\/a> concept to Indo-Pacific cyber defense, enabling allies to take greater responsibility in countering state-backed cyber threats. A Cyber Shield will not eliminate Beijing\u2019s cyber intrusions, but it will finally enable the United States and its Indo-Pacific allies to act faster, coordinate responses, and impose costs on China.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A &#8220;Cyber Shield&#8221; would enable the United States and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.<\/p>\n","protected":false},"author":3279,"featured_media":126613,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43209,18783,43217,35],"tags":[389,2249,1004,13186,1720,2288,1308,2845,2295,38765,41465,2729,663],"coauthors":[43482],"class_list":["post-126607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-emerging-technology","category-cyber","category-intelligence-surveillance","category-pipeline-a","tag-china","tag-critical-infrastructure","tag-cyber","tag-cyber-espionage","tag-cyber-warfare","tag-cyberattacks","tag-cybersecurity","tag-japan","tag-philippines","tag-south-korea","tag-taiwan","tag-united-states","tag-white-house"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security<\/title>\n<meta name=\"description\" content=\"A &quot;Cyber Shield&quot; would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security\" \/>\n<meta property=\"og:description\" content=\"A &quot;Cyber Shield&quot; will enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Just Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/JSBlog\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-22T15:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-6535209501.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1023\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Morgan Peirce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"A &quot;Cyber Shield&quot; would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-6535209501.jpg?fit=1023%2C682&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@just_security\" \/>\n<meta name=\"twitter:site\" content=\"@just_security\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Peirce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\"},\"author\":{\"name\":\"Morgan Peirce\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/e60a4121f58b198ed7c33a4750e9f18c\"},\"headline\":\"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security\",\"datePublished\":\"2025-12-22T15:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\"},\"wordCount\":1738,\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1\",\"keywords\":[\"China\",\"Critical Infrastructure\",\"Cyber\",\"Cyber espionage\",\"Cyber Warfare\",\"Cyberattacks\",\"Cybersecurity\",\"Japan\",\"Philippines\",\"South Korea\",\"Taiwan\",\"United States (US)\",\"White House\"],\"articleSection\":[\"AI &amp; Emerging Technology\",\"Cyber\",\"Intelligence &amp; Surveillance\",\"International and Foreign\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\",\"url\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\",\"name\":\"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1\",\"datePublished\":\"2025-12-22T15:00:54+00:00\",\"description\":\"A \\\"Cyber Shield\\\" would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1\",\"width\":1920,\"height\":1280,\"caption\":\"A U.S. hacker sitting opposite of a Chinese hacker (via Getty Images)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.justsecurity.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.justsecurity.org\/#website\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"name\":\"Just Security\",\"description\":\"A Forum on Law, Rights, and U.S. National Security\",\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.justsecurity.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.justsecurity.org\/#organization\",\"name\":\"Just Security\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"width\":5371,\"height\":1757,\"caption\":\"Just Security\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/JSBlog\/\",\"https:\/\/x.com\/just_security\",\"https:\/\/www.linkedin.com\/company\/just-security-linkedin\/\",\"https:\/\/www.instagram.com\/justsecurityforum\/\",\"https:\/\/www.youtube.com\/@JustSecurityForum\",\"https:\/\/bsky.app\/profile\/justsecurity.org\"],\"description\":\"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.\",\"email\":\"info@justsecurity.org\",\"legalName\":\"Just Security\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/e60a4121f58b198ed7c33a4750e9f18c\",\"name\":\"Morgan Peirce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/fc51298723d2f26fd6c4c94cdc65340b\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8220af981a1bb9cf91bdedf11b72216a03b3116d471246b81c684de0b24ec53e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8220af981a1bb9cf91bdedf11b72216a03b3116d471246b81c684de0b24ec53e?s=96&d=mm&r=g\",\"caption\":\"Morgan Peirce\"},\"description\":\"Morgan Peirce (LinkedIn) is a research assistant for the Technology and National Security Program at the Center for a New American Security (CNAS), supporting the Center\u2019s research on quantum technology and cybersecurity. Before CNAS, Peirce was a fellow at the U.S. Indo-Pacific Command\u2019s Strategic Planning and Policy Directorate, where she focused on Northeast Asia. Morgan researched policy and technology at the Congressional-Executive Commission on China, the Center for Strategic and International Studies, and the National Committee on U.S.-China Relations. Previously, Peirce was a senior program associate on the China, Hong Kong, and Taiwan portfolios at the International Republican Institute. Morgan has published work in The Diplomat, The National Interest, and New Perspectives on Asia. She is currently a master's candidate at Georgetown\u2019s Asian Studies Program and holds a BA in government and East Asian languages from Smith College. Morgan lived and studied in China and has advanced Chinese language skills.\",\"url\":\"https:\/\/www.justsecurity.org\/author\/peircemorgan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security","description":"A \"Cyber Shield\" would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security","og_description":"A \"Cyber Shield\" will enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.","og_url":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/","og_site_name":"Just Security","article_publisher":"https:\/\/www.facebook.com\/JSBlog\/","article_published_time":"2025-12-22T15:00:54+00:00","og_image":[{"width":1023,"height":682,"url":"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-6535209501.jpg","type":"image\/jpeg"}],"author":"Morgan Peirce","twitter_card":"summary_large_image","twitter_description":"A \"Cyber Shield\" would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.","twitter_image":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-6535209501.jpg?fit=1023%2C682&ssl=1","twitter_creator":"@just_security","twitter_site":"@just_security","twitter_misc":{"Written by":"Morgan Peirce","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/"},"author":{"name":"Morgan Peirce","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/e60a4121f58b198ed7c33a4750e9f18c"},"headline":"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security","datePublished":"2025-12-22T15:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/"},"wordCount":1738,"publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"image":{"@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1","keywords":["China","Critical Infrastructure","Cyber","Cyber espionage","Cyber Warfare","Cyberattacks","Cybersecurity","Japan","Philippines","South Korea","Taiwan","United States (US)","White House"],"articleSection":["AI &amp; Emerging Technology","Cyber","Intelligence &amp; Surveillance","International and Foreign"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/","url":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/","name":"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1","datePublished":"2025-12-22T15:00:54+00:00","description":"A \"Cyber Shield\" would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing\u2019s cyber coercion.","breadcrumb":{"@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#primaryimage","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1","width":1920,"height":1280,"caption":"A U.S. hacker sitting opposite of a Chinese hacker (via Getty Images)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.justsecurity.org\/126607\/us-indopacific-china-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.justsecurity.org\/"},{"@type":"ListItem","position":2,"name":"America\u2019s Cyber Retreat Is Undermining Indo-Pacific Security"}]},{"@type":"WebSite","@id":"https:\/\/www.justsecurity.org\/#website","url":"https:\/\/www.justsecurity.org\/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.justsecurity.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.justsecurity.org\/#organization","name":"Just Security","url":"https:\/\/www.justsecurity.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/JSBlog\/","https:\/\/x.com\/just_security","https:\/\/www.linkedin.com\/company\/just-security-linkedin\/","https:\/\/www.instagram.com\/justsecurityforum\/","https:\/\/www.youtube.com\/@JustSecurityForum","https:\/\/bsky.app\/profile\/justsecurity.org"],"description":"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.","email":"info@justsecurity.org","legalName":"Just Security"},{"@type":"Person","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/e60a4121f58b198ed7c33a4750e9f18c","name":"Morgan Peirce","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/fc51298723d2f26fd6c4c94cdc65340b","url":"https:\/\/secure.gravatar.com\/avatar\/8220af981a1bb9cf91bdedf11b72216a03b3116d471246b81c684de0b24ec53e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8220af981a1bb9cf91bdedf11b72216a03b3116d471246b81c684de0b24ec53e?s=96&d=mm&r=g","caption":"Morgan Peirce"},"description":"Morgan Peirce (LinkedIn) is a research assistant for the Technology and National Security Program at the Center for a New American Security (CNAS), supporting the Center\u2019s research on quantum technology and cybersecurity. Before CNAS, Peirce was a fellow at the U.S. Indo-Pacific Command\u2019s Strategic Planning and Policy Directorate, where she focused on Northeast Asia. Morgan researched policy and technology at the Congressional-Executive Commission on China, the Center for Strategic and International Studies, and the National Committee on U.S.-China Relations. Previously, Peirce was a senior program associate on the China, Hong Kong, and Taiwan portfolios at the International Republican Institute. Morgan has published work in The Diplomat, The National Interest, and New Perspectives on Asia. She is currently a master's candidate at Georgetown\u2019s Asian Studies Program and holds a BA in government and East Asian languages from Smith College. Morgan lived and studied in China and has advanced Chinese language skills.","url":"https:\/\/www.justsecurity.org\/author\/peircemorgan\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/GettyImages-653520950.jpg?fit=1920%2C1280&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p5gGh3-wW3","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/126607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/users\/3279"}],"replies":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/comments?post=126607"}],"version-history":[{"count":7,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/126607\/revisions"}],"predecessor-version":[{"id":127876,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/126607\/revisions\/127876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media\/126613"}],"wp:attachment":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media?parent=126607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/categories?post=126607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/tags?post=126607"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/coauthors?post=126607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}