Garrett Hinck
banner
garretthinck.bsky.social
Garrett Hinck
@garretthinck.bsky.social
PhD candidate at Columbia, studying security, nuclear weapons, space, cyber and intelligence. Formerly @ Carnegie Endow

Check out my writing here: https://strategicdefense.substack.com/
The USG needs to improve public comms about cyber espionage - and refrain from conflating it with offensive cyber operations. Further, it should think through how OCOs might impact crisis stability with China - particularly as China might seek to reveal such capabilities as tensions mount. /FIN
August 14, 2025 at 4:41 PM
One complicating factor in all this is that these hacks are playing out in public, which raises the bar for US government responses. It's difficult to clearly tell the public what the difference between "Salt" and "Volt" are.
August 14, 2025 at 4:41 PM
As @mikepoznanski.bsky.social and Erica Lonergan argued in War on the Rocks - cyber espionage and attacks on critical infrastructure are fundamentally different and require different responses. warontherocks.com/2025/02/a-ta...
A Tale of Two Typhoons: Properly Diagnosing Chinese Cyber Threats - War on the Rocks
How should the United States address the multiple cyber “typhoons” emanating from China? Over the past year, Chinese cyber threat actors have gained
warontherocks.com
August 14, 2025 at 4:41 PM
But the United States has (allegedly) conducted similar compromises of telecoms for intelligence purposes. See for instance: www.reuters.com/article/tech...
A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense
When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems <CSCO.O> swung into action.
www.reuters.com
August 14, 2025 at 4:41 PM
Like many US policymakers, Neuberger conflates China's Salt Typhoon (telecom espionage) with Volt Typhoon (pre-positioning in critical infrastructure). She suggests that compromises of telecoms could have been used to disrupt civilian and mil comms during a conflict.
August 14, 2025 at 4:41 PM
It’s night in Iran now - once the sun rises and if weather is clear, satellite imagery may give clues about the impact but info will be limited. Follow-on strikes could be based on subsequent intel. Likely next desired target would be fissile material through Iran but that is a difficult quarry.
June 22, 2025 at 1:14 AM
Check out the post to see more and consider subscribing if you're interested in the topic: strategicdefense.substack.com
Strategic Defense | Garrett Hinck | Substack
Thoughts on strategic issues related to nuclear weapons, space, cybersecurity, and other issues where technologies impact national security. Click to read Strategic Defense, by Garrett Hinck, a Substa...
strategicdefense.substack.com
January 29, 2025 at 1:46 PM
For instance, fielding interceptors in space raises new escalation risks - and means that the US would still need to rely on deterrence to protect its missile defenses!
January 29, 2025 at 1:46 PM
In my view, the EO adopts a strategy of "throw everything at the missile and hope something sticks" without considering some of the strategic trade-offs in these forms of missile defense.
January 29, 2025 at 1:46 PM