You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

For breaking news and daily updates, subscribe to our newsletter.
Advertisement

Trump administration announces $1bn offensive hacking operation spend

The Trump administration plans to spend US$1 billion (roughly AU$1.53 billion) on offensive cyber operations.

Trump administration announces US$1bn offensive hacking operation spend
expand image

Through the Department of Defence, the Pentagon will receive US$1 billion over four years to develop what are being called “offensive cyber operations”, according to provisions within Trump’s “Big Beautiful Bill”.

While the specifics of the operations have not been laid out, nor which software or tools would benefit from the money, the budget will be used to bolster US Indo-Pacific Command capabilities, suggesting that the Asia-Pacific region, specifically China, could be the target of some of these operations.

However, the move to a more offensive cyber stance has been critiqued by Democratic Senator and Senate intelligence committee member Ron Wyden, who said that the offensive strategy, combined with Trump and DOGE’s massive cuts to defensive cyber operations such as slashing the budget and the termination of staff from the US Cybersecurity and Infrastructure Security Agency (CISA), only invites retaliation from the US’ largest geopolitical rival.

 
 

“The Trump administration has slashed funding for cyber security and government technology and left our country wide open to attack by foreign hackers,” Wyden told TechCrunch.

“Vastly expanding US government hacking is going to invite retaliation – not just against federal agencies, but also rural hospitals, local governments and private companies who don’t stand a chance against nation-state hackers.”

Despite 130 CISA positions being restored after the terminations were deemed unlawful, the Trump administration’s cuts equated to around US$1 billion.

Staff were axed as part of sweeping staff cuts across agencies, resulting in 4 per cent of the agency’s staff being terminated.

Trump also rolled out a “Fork in the Road” program, which invited staff to resign from positions pre-emptively, but still maintain their role until a set date.

In an email dated 5 February, Bridget Bean – whose current title is senior official performing the duties of the director – confirmed that CISA employees were able to take up the Trump administration’s offer of deferred resignation, otherwise known as the Fork in the Road Program.

“I am writing to provide an update that CISA employees may participate in the deferred resignation program (‘Fork in the Road’),” Bean said.

“This is a deeply personal decision, and whichever decision you make, we support you.”

Jen Easterly, the CISA’s previous director, stepped down from the role on 20 January, the day of Donald Trump’s inauguration as the 47th President of the United States.

The initial offer to take part in the deferred resignation program was initially sent to government employees on 28 January and expires on 6 February. The letter outlined the four pillars under which government agencies would operate moving forward – return to office, performance culture, a more streamlined and flexible workforce, and enhanced standards of conduct – and offered employees the opportunity to resign.

“If you resign under this program, you will retain all pay and benefits regardless of your daily workload and will be exempted from all applicable in-person work requirements until September 30, 2025 (or earlier if you choose to accelerate your resignation for any reason),” the letter said.

Concerns were raised, however, that the program could be terminated at any time, given that employees are required to offer a pre-signed -written resignation letter by 6 February that states: “I understand my employing agency will likely make adjustments in response to my resignation including moving, eliminating, consolidating, reassigning my position and tasks, reducing my official duties, and/or placing me on paid administrative leave until my resignation date.”

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.