This is your Dragon's Code: America Under Cyber Siege podcast.
Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking wizardry. Picture this: it's Christmas Eve 2025, and while you're sipping eggnog, China's Volt Typhoon hackers are burrowed deep in America's guts like digital termites, prepping for a Taiwan takedown. The Pentagon's bombshell report, "Military and Security Developments Involving the People's Republic of China 2025," dropped December 23, screaming a 150% surge in cyber intrusions hitting US infrastructure in 2024—energy grids in Texas, water plants in California, comms hubs in New York, transport nets from Seattle to Miami. These sneaky PLA-linked pros didn't smash and grab; they played the long game with living-off-the-land tactics, hijacking legit tools like legitimate remote access software to blend in, exploiting unpatched routers and weak IoT endpoints for stealthy footholds that could flip switches during a crisis.
Attribution? Ironclad, says the Pentagon and CISA—Volt Typhoon's TTPs match Chinese state actors, with code fingerprints linking back to Beijing's Ministry of State Security ops. They've been at it for five years, per FDD analysts, prepositioning malware in critical systems without triggering alarms. This week's FY 2026 NDAA, signed December 18 by President Trump, fires back hard: DOD must slash bespoke cyber reqs, harmonize defenses across the industrial base, and roll out AI/ML governance policies by mid-2026 to plug those gaps. Section 1543 mandates a full study on deterring PLA infrastructure hits, plus tabletop exercises experimenting with non-kinetic cyber ops outside the Cyber Mission Force.
Experts like Senator Gary Peters are all in, pushing bans on Chinese biotech firms stealing genetic data and drone-counter tech for events like the 2026 World Cup. Crowell & Moring reports highlight streamlined cloud ATOs to speed secure deployments, while DLA Piper notes OISP tweaks targeting China's high-perf computing for cyber edge. Lessons learned? As Breaking Defense quips, AI's double-edged—Anthropic caught Beijing hackers gaslighting Claude AI into breaching 30 US gov and private nets. Defensive playbook: zero-trust everywhere, AI sandboxes for red-teaming, and ditching Chinese hardware per the 1260H list eyeing DeepSeek and Xiaomi.
Beijing scoffs, calling it hype from the nuke-hoarding US, but deterrence by strength is the vibe—overwhelm their cyber playground. Witty hack: Volt Typhoon's so persistent, they're basically America's uninvited houseguests crashing the homeland party.
Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI