Cybersecurity Expert Christensen Visits Taiwan, Warning of Infrastructure Resilience and Deepfake Threats
US cybersecurity expert Guillermo Christensen visited Taiwan to highlight infrastructure resilience and the threat of deepfakes. Drawing on lessons from the Russia-Ukraine war, he stressed Taiwan's need to guard against AI-generated deepfakes and misinformation, emphasizing preparedness for hybrid warfare.
📋 Article Processing Timeline
- 📰 Published: April 17, 2026 at 20:11
- 🔍 Collected: April 17, 2026 at 20:31 (20 min after Published)
- 🤖 AI Analyzed: April 18, 2026 at 21:50 (25h 18m after Collected)
Kaohsiung, April 17 (CNA) -- U.S. cybersecurity expert Guillermo Christensen, invited to Taiwan to share insights on cybersecurity, emphasized the crucial importance of infrastructure resilience based on experiences from the Russia-Ukraine war. He also cautioned Taiwan to be vigilant against AI-generated deepfake technology and misinformation attacks.
Christensen visited Taiwan from April 14 to 17 at the invitation of the American Institute in Taiwan (AIT) Kaohsiung Branch (AITK). He engaged with Taiwan's Digital Development Ministry, and the city governments of Tainan, Kaohsiung, and Pingtung to discuss cybersecurity importance. He delivered a presentation titled "Cybersecurity Lessons Learned from Ukraine and Iran" at the Digital Development Ministry and participated in a tabletop exercise at the Kaohsiung City Government today, exploring how governments should prepare for escalating cyber threats.
Speaking to the media at AITK this afternoon, Christensen shared his experiences from the trip. He stated that the Russia-Ukraine war provided significant lessons for global cybersecurity defense. Although Ukraine suffered large-scale attacks on its power and communication networks on the eve of the war, it managed to maintain social operations amidst the conflict due to close intelligence exchange between the government and private enterprises, and by transferring data to cloud backups.
Christensen noted that both Taiwan and Ukraine are situated on geopolitical frontlines, facing high risks of cyber intrusion. He described the current global situation as "hybrid warfare" combining military and cyber attacks. While hoping it wouldn't happen in Taiwan, he acknowledged that Taiwan is highly likely to face such threats.
He cited the 2022 Russia-Ukraine war as an example, where Russia launched frequent and severe cyberattacks before initiating formal military operations. If Taiwan observes an increase in the frequency of cyberattacks from China, it could signify that more threatening actions are brewing.
Christensen stated that critical infrastructure, whether in Ukraine, Iran, or the United States, always remains the primary target for various forms of attacks.
Regarding the tabletop exercise at the Kaohsiung City Government today, he explained that it used real-life scenarios as a background to simulate the decision-making process of various agencies under extreme pressure and tight deadlines.
Christensen said the main purpose of the exercise was not to find weaknesses but to allow for mistakes and discussions during practice, thereby avoiding wrong decisions during a real crisis. He emphasized that the biggest lack during a crisis is time, but pre-event thinking and discussion can buy more decision-making time.
Christensen also mentioned that current cyberattacks differ from ransomware attacks; they are often quiet, silent, and difficult to assess in scope. He referenced the U.S. codenames for Chinese hackers as "Salt Typhoon" or "Volt Typhoon," noting that these hackers might lie dormant for years before being discovered.
Concerning the rapidly evolving AI technology in recent years, Christensen believes attackers are leveraging generative AI to create highly realistic deepfake images and audio. While AI is a double-edged sword that can aid defenders, it also assists attackers. "Currently, AI development leans more towards benefiting attackers," he said, as attackers can exploit AI to find system vulnerabilities and infiltrate them, while defenders must deploy vast resources to protect extensive systems. (Edited by Hsieh Ya-chu) April 17, 115
Choose to stand with facts. Your sponsorship is the power to protect news freedom.
Download CNA's 'One-Minute News' app for instant updates.
Text, images, and videos on this website may not be reproduced, broadcast, or transmitted without authorization.
Christensen visited Taiwan from April 14 to 17 at the invitation of the American Institute in Taiwan (AIT) Kaohsiung Branch (AITK). He engaged with Taiwan's Digital Development Ministry, and the city governments of Tainan, Kaohsiung, and Pingtung to discuss cybersecurity importance. He delivered a presentation titled "Cybersecurity Lessons Learned from Ukraine and Iran" at the Digital Development Ministry and participated in a tabletop exercise at the Kaohsiung City Government today, exploring how governments should prepare for escalating cyber threats.
Speaking to the media at AITK this afternoon, Christensen shared his experiences from the trip. He stated that the Russia-Ukraine war provided significant lessons for global cybersecurity defense. Although Ukraine suffered large-scale attacks on its power and communication networks on the eve of the war, it managed to maintain social operations amidst the conflict due to close intelligence exchange between the government and private enterprises, and by transferring data to cloud backups.
Christensen noted that both Taiwan and Ukraine are situated on geopolitical frontlines, facing high risks of cyber intrusion. He described the current global situation as "hybrid warfare" combining military and cyber attacks. While hoping it wouldn't happen in Taiwan, he acknowledged that Taiwan is highly likely to face such threats.
He cited the 2022 Russia-Ukraine war as an example, where Russia launched frequent and severe cyberattacks before initiating formal military operations. If Taiwan observes an increase in the frequency of cyberattacks from China, it could signify that more threatening actions are brewing.
Christensen stated that critical infrastructure, whether in Ukraine, Iran, or the United States, always remains the primary target for various forms of attacks.
Regarding the tabletop exercise at the Kaohsiung City Government today, he explained that it used real-life scenarios as a background to simulate the decision-making process of various agencies under extreme pressure and tight deadlines.
Christensen said the main purpose of the exercise was not to find weaknesses but to allow for mistakes and discussions during practice, thereby avoiding wrong decisions during a real crisis. He emphasized that the biggest lack during a crisis is time, but pre-event thinking and discussion can buy more decision-making time.
Christensen also mentioned that current cyberattacks differ from ransomware attacks; they are often quiet, silent, and difficult to assess in scope. He referenced the U.S. codenames for Chinese hackers as "Salt Typhoon" or "Volt Typhoon," noting that these hackers might lie dormant for years before being discovered.
Concerning the rapidly evolving AI technology in recent years, Christensen believes attackers are leveraging generative AI to create highly realistic deepfake images and audio. While AI is a double-edged sword that can aid defenders, it also assists attackers. "Currently, AI development leans more towards benefiting attackers," he said, as attackers can exploit AI to find system vulnerabilities and infiltrate them, while defenders must deploy vast resources to protect extensive systems. (Edited by Hsieh Ya-chu) April 17, 115
Choose to stand with facts. Your sponsorship is the power to protect news freedom.
Download CNA's 'One-Minute News' app for instant updates.
Text, images, and videos on this website may not be reproduced, broadcast, or transmitted without authorization.