Tech Shield: US vs China Updates

Pentagon Bans China's Spygear: Drones Grounded, Clouds Scrubbed, Hackers Unhinged


Listen Later

This is your Tech Shield: US vs China Updates podcast.

Hey listeners, Ting here, your go-to cyber sleuth with a front-row seat to the US-China tech showdown. Picture this: it's the final countdown to 2026, and America's cyber fortress is slamming doors on Beijing's sneaky probes faster than you can say "Brickstorm backdoor." Just days ago, on December 22, the FCC dropped a bombshell Public Notice, adding all foreign-produced drones and their guts—like DJI and Autel Robotics gear—to the Covered List. No more importing, selling, or flying those spy-prone UAS in the US, period. Why? A National Security Determination nailed it: risks from surveillance, data theft, and supply chain sabotage ahead of big events like the World Cup. Pillsbury Law's breakdown calls it the first categorical ban on an entire product class—smart move, but hackers gotta hack.

Fast-forward to President Trump's signature on the $900 billion defense bill this month. ProPublica exposed how Microsoft let China-based engineers poke around Pentagon clouds for years, with so-called "digital escorts" who couldn't tell a firewall from a fidget spinner. Defense Secretary Pete Hegseth blasted it on X: "Foreign engineers from China should NEVER access DoD systems." Boom—new rules ban anyone from China, Russia, Iran, or North Korea from DoD clouds, plus annual congressional briefings starting June 2026. Hegseth even kicked off probes and audits on Microsoft. Effectiveness? Experts say it plugs a gaping hole, but as CISA's acting director Madhu Gottumukkala warns, Chinese ops like Brickstorm are embedding for sabotage.

Speaking of which, CISA, NSA, and Canada's Cyber Centre just updated their malware report on December 4—Brickstorm, PRC state-sponsored nastiness targeting VMware vSphere in government and IT nets. It steals creds, pivots laterally, and auto-reinstalls if you swat it. Broadcom urges patches; Google's Threat Intelligence spotted it hitting legal firms and outsourcers since April 2024. WaterISAC flags water utilities as prime targets. Witty aside: China's hackers are like that ex who won't delete your number—persistent and messy.

Industry's stepping up too: Pentagon's 2025 China report spotlights PLA's Multi-Domain Precision Warfare, blending cyber with info ops, now supercharged by the new Information Support Force. Trump's National Security Strategy pushes resilient energy and outbound investment curbs on sensitive tech. Gaps? Cognitive warfare—deepfakes and narrative nukes via PLA's old Strategic Support Force tricks. Veteran intel folks say we're losing that mind game, per Irregular Warfare Project analysis.

These moves shore up defenses, but China's Justice Mission 2025 drills off Taiwan—live-fire response to that record $11B US arms sale—are testing our nerves. Mick Ryan's Substack nails it: Beijing's normalizing aggression to erode our response threshold. Patches and bans buy time, but we need AI-driven detection and allied intel fusion to stay ahead. Effectiveness on a scale of one to ten? Solid seven—gaps in cognitive and supply chain fronts scream for more.

Thanks for tuning in, listeners—hit subscribe for my next intel drop. This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

Tech Shield: US vs China UpdatesBy Inception Point Ai