US-China CyberPulse: Defense Updates

Drones, Data Heists, and Google Sheets Gone Rogue: China's Cyber Mess Gets Messy


Listen Later

This is your US-China CyberPulse: Defense Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks and digital showdowns. Buckle up for this week's US-China CyberPulse—it's been a wild ride of drone dodges, diplomat arm-twists, and sneaky Sheet exploits, all unfolding right up to today, February 25th.

Picture this: I'm hunkered down in my virtual war room, caffeine-fueled, dissecting the latest salvos. First off, the Pentagon's going full throttle on ditching Chinese drone dominance. Secretary of Defense Pete Hegseth kicked off the Drone Dominance Program back in July 2025, and now they're fast-tracking the Blue UAS List—54 drones cleared for training, 29 for ops, like Shield AI's V-Bat and Skydio's whirlybirds. No more relying on that 90% Chinese-controlled market; they're vetting for supply chain purity to avoid Beijing yanking motors mid-conflict. DoD's dropping over a billion bucks to field hundreds of thousands of cheap, one-way attackers by 2027, with Gauntlet tests at Fort Benning pitting 25 companies, including Ukrainian upstarts, against each other. Smart move—iterative buys in months, not years.

Meanwhile, Trump's team is flexing diplomatic muscle. Secretary of State Marco Rubio signed a February 18 State Department cable ordering envoys to battle foreign data sovereignty laws, calling out China's data grabs and Europe's GDPR as AI killers. It's a push for free-flow data via the Global Cross-Border Privacy Rules Forum with Mexico, Canada, Australia, and Japan. Why? China's bundling Belt and Road infra with surveillance hooks, and this counters that geopolitical chess.

Private sector's not sleeping—Google's Threat Intelligence Group and Mandiant just dropped a bombshell on UNC2814, a China-linked crew breaching 53 telecoms and gov agencies across 42 countries. These pros hid malware in Google Sheets since 2017, using API calls for C2 that looked totally legit. They reconned hosts, exfiltrated via cell V1, then Google axed their cloud projects, sinkholed domains, and armed defenders with IOCs. Prolific? A decade of grind, but now disrupted.

On the intel front, Georgia Tech's Brenden Kuerbis warns China's January ban on US and Israeli security software is fracturing global threat sharing. His fix? Provenance-encoded TI data so everyone—from Kaspersky fans to Chinese ops—can filter sans trust issues. Institutional hurdles, sure, but operationally genius.

And sanctions keep biting: State Department's nailing one individual and two entities under the Protecting American Intellectual Property Act for IP theft. Texas AG Ken Paxton's probing DeepSeek's Nvidia Blackwell training dodge despite bans—smuggled clusters in Inner Mongolia, anyone?

Witty wrap: China's AI surveillance patents are fusing cams, satellites, and social media for predictive policing, but US defenses are evolving faster—drones cleared, data flows fought for, hackers holed below the Sheets.

Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

US-China CyberPulse: Defense UpdatesBy Inception Point Ai