US-China CyberPulse: Defense Updates

Carr Calls Out Sneaky Sea Snakes While DoJ Regs Ramp Up and Blockchain is Back Baby


Listen Later

This is your US-China CyberPulse: Defense Updates podcast.

Alright, listeners, Ting here—your cyber-sleuth with just enough sass to keep tech talk interesting. Let’s plug straight into this week’s charged circuit of US-China CyberPulse: Defense Updates. The past few days in cyberland have been about as chill as a motherboard running Crysis at max settings—so let’s download the highlights.

Let’s start deep underwater—literally. FCC chief Brendan Carr just announced that submarine internet cables are officially on notice. These sea snakes, built with Chinese gear from players like Huawei and ZTE, carry 99% of our internet traffic. After the “rip and replace” crackdown on Chinese tech in 5G networks, now we’re talking “Rip and Replace 2.0,” but with subsea cables. Why? Fresh memories of China’s Volt Typhoon operation—think cyber ninjas sneaking into US critical infrastructure for not just snooping, but actual sabotage. Carr wants to keep adversary eyes—and backdoors—out of our data streams, even if swapping out those cables feels like doing heart surgery at the bottom of the ocean.

Headquarters in the cloud? Microsoft just axed Chinese engineers from supporting Pentagon tech after a ProPublica exposé showed they could patch Defense Department cloud systems, monitored only by “digital escorts”—US citizens with clearances but sometimes left copy-pasting arcane code they couldn’t decipher. That’s like letting someone rewire your house blindfolded because they promise they’re good at guessing. Senator Tom Cotton freaked, Defense Secretary Pete Hegseth kicked off a full probe, and Microsoft scrambled to re-route all support to US-based staff. Yes, it’ll cost more, but letting foreign adversaries peek behind the green curtain is way pricier—just ask anyone still cleaning up after the SolarWinds mess.

Keeping cyber armor shiny, the Department of Justice’s new data flows rule came into effect this spring. The aim? Preventing the sale, licensing, or even employment contracts that could give China—or Russia, Cuba, you name it—access to Americans’ sensitive data or the keys to powerful AI training sets. If your company touches a million US person records or more, welcome to compliance boot camp: audits, internal reviews, rigorous record-keeping. It’s not just about “data brokers” anymore—it’s the whole business ecosystem getting a digital pat-down.

In the private sector, blockchain is having a comeback moment. The Deploying American Blockchains Act of 2025 just breezed through Congress, pushing for a national blockchain strategy led by Commerce Secretary (take a bow, whoever you are). The idea? Fortify critical infrastructure, not just digital assets, and give private companies the foundation—and the code—for keeping up with China in this cryptographically charged arms race.

Meanwhile, international cooperation just took its own spin in July. US and Chinese officials eased up on AI chip export bans and ultra-sensitive design software, trading rare earths for chips at the negotiation table—so, at least for now, the “chip wars” are on ice. Don’t get too cozy, though; suspicion still runs hotter than a GPU mining for Dogecoin.

All of this, listeners, underlines one point: the attack surface is only getting broader, the regulations sharper, and the tech stakes higher. If you don’t want your data—or your grid—commandeered by the next Volt Typhoon, now’s the time to patch up, lock down, and maybe double-check who’s patching your clouds.

That’s it for US-China CyberPulse this week. Thanks for tuning in! Don’t forget to subscribe for your weekly byte of real talk. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta
...more
View all episodesView all episodes
Download on the App Store

US-China CyberPulse: Defense UpdatesBy Quiet. Please