Exclusive: U.S. Faces Sustained Cyber Invasion by Nation-State Actors, Former Pentagon CIO Warns
Leslie A. Beavers, who oversaw the Pentagon’s global networks as acting chief information officer, says adversaries from China, Russia, Iran and North Korea are embedded in critical U.S. systems.
Subscribe to HELLO FUTURE: iHeart | iTunes | Spotify | Amazon | Pandora
By Kevin Cirilli
meetthefuture.substack.com
May 5, 2026
WASHINGTON — The United States is under a persistent, large-scale cyber invasion by nation-state adversaries, according to Leslie A. Beavers, the retired U.S. Air Force Reserve brigadier general who served as the Pentagon’s acting chief information officer and principal deputy CIO.
—> Listen to the full episode HERE.
Beavers, who was responsible for the Defense Department’s worldwide IT infrastructure until December — including satellite communications, undersea cables and cloud systems — said in an exclusive interview that the attacks follow a disciplined military playbook known as the cyber kill chain: reconnaissance, initial access, persistence, lateral movement and, ultimately, data exfiltration or disruption.
“This isn’t sporadic hacking,” Beavers told iHeart Media’s HELLO FUTURE with Kevin Cirilli. “This is sustained, state-sponsored activity happening inside our networks every single day.”
The Scale of the Threat
The economic toll is enormous. Beavers cited estimates that nation-state actors are stealing U.S. intellectual property at a rate of approximately $100 million per day. High-profile campaigns such as Salt Typhoon, which targeted U.S. telecommunications providers and critical infrastructure, represent only the visible edge of a far broader operation.

Many breaches go unreported. Private-sector companies often choose silence to protect their reputations and stock prices, leaving the full scope of the invasion hidden from public view. Small and mid-sized businesses, hospitals, banks and local utilities — frequently the least defended links in the chain — have become favorite entry points for adversaries seeking to pivot into larger targets.
Pentagon Response: Zero Trust and Mandatory Standards
The Defense Department has responded by accelerating its shift to a “Zero Trust” architecture, which assumes that adversaries are already inside the network and requires continuous verification of every user, device and transaction.
Full implementation across the Pentagon is targeted for fiscal year 2027. Federal contractors are already being held to the Cybersecurity Maturity Model Certification (CMMC) program, which aligns with National Institute of Standards and Technology (NIST) guidelines and ties compliance directly to contract eligibility.
Beavers described the transition as overdue but necessary. “Perimeter defenses are no longer sufficient,” he said. “We have to operate as if the breach has already occurred.”
Call for a National Cyber Commission
Beyond technical fixes, Beavers is urging the creation of a bipartisan Cyber Invasion Defense Commission to coordinate policy across the federal government, Congress and the private sector.
“Fragmented efforts create exploitable seams,” he said. “We need unified leadership that treats cyber as a core strategic imperative, not just another line item in the budget.”
Meet the future
In the near term, Beavers expects faster rollout of Zero Trust tools inside the Defense Department and among its suppliers, along with expanded CMMC enforcement. He also anticipates growing pressure on commercial critical infrastructure to adopt similar standards.
Longer term, he warned that the United States faces a binary choice: build a mature national cyber-defense framework by the early 2030s or continue to absorb cascading disruptions from adversaries who are already inside the wire.
Beavers now advises major corporations and policymakers on cyber strategy after retiring from government service. His message is blunt: the invasion is not coming. It is already here.
Kevin Cirilli is the founder of meetthefuture (mtf.tv) and host of the HELLO FUTURE podcast on iHeart Media. He has covered technology, national security and the intersection of policy and innovation for more than a decade.
Listen to the full exclusive interview with Leslie A. Beavers:
https://mtf.tv/cyber-invasion



