This is your Tech Shield: US vs China Updates podcast.
Hey there, I'm Ting, and let's dive right into the latest on Tech Shield: US vs China updates. It's been a wild ride over the past few days, especially with the FY 2025 National Defense Authorization Act (NDAA) making waves. This legislation is all about bolstering US resilience against Chinese tech and influence, and it's packed with provisions to address security risks linked to Chinese-origin technology[1].
One of the key measures is Section 1546, which requires the Department of Defense (DoD) to develop a risk framework assessing the threat of data collection and misuse posed by personal mobile devices and applications, particularly those tied to China and other adversarial nations. This is crucial because, let's face it, our personal devices are often the weakest link in the security chain.
But that's not all. The House Armed Services Committee (HASC) Report accompanying the NDAA for FY 2025 includes provisions targeting routers, modems, and similar devices from Chinese manufacturers that pose security risks akin to Huawei and ZTE technologies banned under section 889 of the FY 2019 NDAA. It's like playing whack-a-mole; every time we think we've got one threat covered, another pops up.
And then there's the issue of hardware-based encrypted data storage devices used in DoD, particularly those potentially compromised by Chinese control over encryption technologies. DoD is directed to evaluate existing risk management tools and provide Congress a list of hardware-based encrypted data storage products that have been excluded from DoD procurement in the last 5 years. It's a complex game of cat and mouse, but we need to stay on top of it.
But let's not forget about the recent advisories. The National Security Agency (NSA), Federal Bureau of Investigation (FBI), and Cyber National Mission Force (CNMF) have issued a joint advisory about People’s Republic of China (PRC)-linked cyber actors who have compromised internet-connected devices worldwide to create a botnet and conduct malicious activity[2][5]. This is serious stuff; we're talking about thousands of US devices compromised, with victims in a range of sectors.
Mark E. Green, chairman of the House Committee on Homeland Security, put it bluntly: "The PRC has gained significant ground in its information warfare on American soil over the past four years." His committee's updated 'China Threat Snapshot' report highlights over 60 instances of espionage by the Chinese Communist Party (CCP) on US soil, including cases of transmission of sensitive military information, theft of trade secrets, transnational repression operations, and obstruction of justice[4].
So, what's the takeaway? The US is stepping up its game against Chinese cyber threats, but there's still a lot of ground to cover. We need to stay vigilant, keep patching those vulnerabilities, and invest in emerging defensive technologies. It's a never-ending battle, but with experts like John Riggi, AHA national advisor for cybersecurity and risk, sounding the alarm, we're at least on the right track. Stay safe out there, folks.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta