US-China CyberPulse: Defense Updates

Pentagon's Beijing Backdoor, FCC's Vendor Vetting, and Salt Typhoon's Guard Raid: Juicy Bits Exposed!


Listen Later

This is your US-China CyberPulse: Defense Updates podcast.

Alright listeners, Ting here—hacker at heart, cyber-sleuth by trade, and your guide to the riveting highs, lows, and “did they really do that?” moments on the US-China CyberPulse. And wow, did the cyber world bring some serious fireworks this week.

Let’s get right to it. The news breaking late yesterday? The Pentagon. Yes, our very own Department of Defense—turns out it’s been giving Microsoft engineers based in mainland China a backstage pass to some of their cloud computing systems for nearly a decade. You'd think with all our acronyms—DOD, NSA, DoJ—we’d have better alphabet soup protection! But as ProPublica reports, these Chinese engineers had indirect hands-on with “High Impact Level” military data under what the DOD optimistically calls 'digital escorts.' Sadly, these escorts often didn’t know enough to spot a digital Trojan horse from a typo. So, the Pentagon found itself relying on trust, not tech, to keep Beijing at bay.

Meanwhile, Microsoft was already under fire for previous Chinese-linked breaches—remember the BeyondTrust incident at the Treasury Department? Allegedly, attackers wormed into Secretary Janet Yellen’s own digital files. If you’re keeping score: espionage one, federal oversight zero.

On the home front, the Federal Communications Commission’s shiny new Council on National Security is locking down telecom supply chains. Brendan Carr made it clear: banning foreign testing labs, tightening undersea cable rules, and creating a two-tiered club—“secure” vendors versus “see ya later.” The goal? Keep nation-state snoops like China from sneaking their tech into the nation’s digital arteries. ISPs are now required to submit security blueprints, but personal cyber hygiene is still your job—don’t be that person who makes “password123” famous.

And in Congress, the Chip Security Act is the hot new thing, aiming to thwart AI chip smuggling to China by slapping advanced semiconductors with location-verification features. But cybersecurity pros are worried—won’t this just give hackers another target and make things worse for US and allied systems? Secure chips are good. Chips that broadcast their every move—not so much.

On data frontiers, the Department of Justice rolled out new rules barring US companies from brokering your sensitive personal data to “countries of concern”—think China, Russia, the usual suspects. This now covers not just brokers but anyone doing vendor deals, investments, or employment contracts involving data. Don’t expect to TikTok your tax returns anywhere near ByteDance without some heavy red tape.

Meanwhile, Chinese state-backed hacker group Salt Typhoon leveled up, breaching a US state’s Army National Guard, scooping admin credentials and network blueprints. It’s a chilling sign every network has to assume the bad guys are inside and ready to strike. Gary Barlet, ex-Air National Guard and now Illumino’s CTO, was blunt: “Assume your network's compromised and will be degraded.” Stay paranoid, my friends.

On a brighter note, industrial collaboration in the Indo-Pacific is going deeper than ever. The US, Australia, and India are cranking up joint defense manufacturing—think drone supply chains, missile coproduction, repair hubs—so when China tries to dominate, they’ll find the shop closed.

Alright, cyber warriors, that wraps your pulse-check on a week that proves vigilance isn't just a buzzword—it's job one. Thanks for tuning in. Hit subscribe or risk missing the next plot twist. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta
...more
View all episodesView all episodes
Download on the App Store

US-China CyberPulse: Defense UpdatesBy Quiet. Please