Author Topic: China Chinese Penetration and Invasion of America  (Read 88356 times)




Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
Less Pilot Training, but TTPs
« Reply #453 on: June 11, 2024, 01:59:44 PM »



Less Pilot Training, but TTPs
interrogation by other means
CDR SALAMANDER
JUN 11

 https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4209ff4a-3bdb-4ab7-8655-3d09ec24f73a_1692x504.png?utm_source=substack&utm_medium=email

A lot of the reports on this story seem to be focused on the pilot training aspect of this, and … that is just plain missing the story.

There is a lot more here than just, “pilot training” - and much more dangerous. The PRC is a big nation with a big military. Basic pilot training is not all that difficult. I really doubt they are short instructor pilots - and neither should any retired military pilots.

There is a reason that for two decades we have discussed here the absolute strategic stupidity on our part allowing People’s Republic of China (PRC) passport holders to take so many of the post-graduate and doctoral position at our best research institutions of higher learning. They are almost all directly or indirectly under the influence of the Chinese Communist Party (CCP).

If you have not been to a graduation ceremony at a top-tier STEM university in the last 10 years, you cannot fully appreciate the absolute state of it all.

Admissions to the best positions at our best universities is a zero-sum game. Each bran you improve for the CCP is one less brain improved for the USA.

The PRC is not content with simple business snooping, military espionage, and wholesale intellectual capital theft. No … that is just a small part of a larger play.

They want to understand HOW we think, HOW we work, and the mechanisms and procedures we will use to fight. That way, they can copy what looks good - adopting without cost decades of trial and error development - and also have a better view of critical capabilities, vulnerabilities, etc.

Before I dive in to a 3,000-word Operational Planning overview - if you are not familiar with Vulnerability Assessment (I prefer this term now as the Cultural Marxists have ruined the phrase “Critical Analysis”), I’d like you to at least read RAND’s “Vulnerability Assessment Method Pocket Guide: A Tool for Center of Gravity Analysis”. If you have time, also look over Dr. Joe Strange, USMC War College, and Colonel Richard Iron, GBR A’s, “Understanding Centers of Gravity and Critical Vulnerabilities“ over at Australia’s The Forge, and then come back.

This should give you insight as to why the below would be of such value to the PRC and of such concern to the Five-Eyes nations;

China is continuing efforts to recruit Western military pilots to train its forces, often using privately-owned companies and “lucrative contracts” with vague terms to obscure the true customer.

That is the conclusion of a dossier released on 5 June by the so-called “Five Eyes” alliance, an intelligence sharing and collaboration partnership between the USA, Canada, UK, Australia and New Zealand.

While China’s efforts to use the expertise of Western aviators to benefit its own armed forces are not new, the intelligence summary offers new details about the programme.

“To overcome their shortcomings, China’s People’s Liberation Army (PLA) has been aggressively recruiting Western military talent to train their aviators, using private firms around the globe that conceal their PLA ties and offer recruits exorbitant salaries,” says Michael Casey, director of the US National Counter Intelligence and Security Center.

Read the full dossier and then come back. It’s just a couple of pages. Yes, I know, I’m giving out a lot of homework, but this is more important than is being led on.

The PLA wants the skills and expertise of these individuals to make its own military air operations more capable while gaining insight into Western air tactics, techniques, and procedures.

They are after our intellectual property, and they will pay handsomely for it.

Why make the effort to recruit serving officers as spies when you can simply buy their brains after they retire?

How do you counter this?

One action Five-Eyes should look at is the peer-pressure aspect of most people in aviation. I am sure they know who is working for these PRC front companies and allowing their honor to be purchased.

Name them and shame them. That would help put a disincentive in play while the law catches up. Give them 2-weeks notice they are going to be named, and if they stay, well, that’s on them.

Just an idea.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3776
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #454 on: June 11, 2024, 04:21:01 PM »
Re the above: citing budget pressures state funded colleges endlessly pursue “out of state” students as they pay many times the in-state tuition, and this goes more so for international students that often require ESL and other help schools can charge what the market will bear for, while even private institutions love the international gravy train, particularly if some sort of nudge nudge totally unrelated contribution is involved. Bottom line, should any sort of reduction in Chinese grad or other students be demanded anticipate autistic screeching about stretched thin college budgets from the usual suspects.
« Last Edit: June 11, 2024, 06:58:54 PM by Body-by-Guinness »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #455 on: June 11, 2024, 06:56:49 PM »
Yes.

I made some comment about the Chinese in the context of the Wuhan Virus when I was teaching at UNC Pembroke and the Dept Chair had a cow.


Body-by-Guinness

  • Power User
  • ***
  • Posts: 3776
    • View Profile
Chinese Drones Phone Home?
« Reply #457 on: June 20, 2024, 12:38:19 PM »
China is a major maker of drones, but what they collect and share with their Chinese military hardware manufacturer companies isn’t well understood or appreciated:

China’s drones are its greatest weapon in today’s information warfare
The Hill News / by Rob Joyce / Jun 20, 2024 at 8:47 AM

I’ve spent a career studying and mitigating threats from our most significant adversaries, and it is clear the growing threat from Chinese-made drones is dire and underappreciated.

I couldn’t be happier to see members of Congress working across the aisle to rid the U.S. of these dangerous products. Across my decades of public service, including as the acting homeland security adviser for the U.S. National Security Council and director of cybersecurity for the National Security Agency, I recognize urgent threats to our nation when I see them. Chinese drones are one of the most significant intelligence and national security threats we currently face as a country.

When it comes to national security, drones have changed the game.

The Russian invasion of Ukraine demonstrates the expansive and exceptional capabilities of both large and small drones. The world has awakened to the power of these technical marvels. From the war’s earliest days, drones played a key role as intelligence collectors, becoming deadly spotters for artillery and irreplaceable for understanding adversary movements.

Drone tradecraft rapidly evolved, making them hyper-accurate explosive delivery systems in their own right. The Ukrainians made massive innovations in their employment, including how they replace artillery and mortars and even using their footage for real-time information operations. Future conflicts will never be the same.

Today, drones have become ubiquitous in conflict zones across the world. They formed part of the barrage Iran fired at Israel in April. They’ve breached South Korean airspace. Both sides in Sudan’s ongoing civil war are deploying them. Houthi rebels are strapping bombs to drones as a menace to Red Sea shipping.

That’s precisely why it’s a problem that China currently controls the drone marketplace, with companies like Da Jiang Innovations (which the Department of Defense has deemed a Chinese military company) and Autel Robotics accounting for more than half of global sales. China is rapidly advancing both the capabilities of these drones and their national capacity to manufacture them. We will continue to lag behind without a trusted and independent supply chain.

This year, the U.S. government sounded the alarm about China’s efforts to pre-position cyber attack capability in our civilian critical infrastructure. So while U.S. businesses and hobbyists are legitimately using these Chinese-made drones to image and map our critical infrastructure, the data they accrue is still at risk for exploitation in the same Chinese preparations for conflict.

Because of China’s strict Military Civil Fusion data-sharing requirements, there is no daylight between Chinese companies and the Chinese Communist Party — especially ones like Da Jiang Innovations, which receives direct funding from the Chinese government. All the information these drones are soaking up is available on demand to China’s intelligence apparatus. 

And make no mistake about it: the CCP uses its industry to its advantage.

In 2017, customs authorities accused Da Jiang Innovations of passing along sensitive information about American infrastructure. In 2022, lawmakers received a series of classified briefings where they reportedly learned that hundreds of drones had breached restricted airspace in Washington, D.C., including near the White House and Pentagon.

Then, in January 2024, the Cybersecurity and Infrastructure Security Agency and FBI warned that China “has enacted laws that provide the government with expanded legal grounds for accessing and controlling data held by firms in China” and that the “use of Chinese-manufactured [unmanned aerial systems] in critical infrastructure operations risks exposing sensitive information to [Chinese] authorities.”

The more U.S. companies — especially those involved in sectors like construction, communications and transportation — introduce drones into their daily operations, the greater the risk.

Companies cannot simply vet their drones’ software to ensure they’re not calling home to Beijing, either. As the agencies note, “updates controlled by Chinese entities could introduce unknown data collection and transmission capabilities without the user’s awareness.” All it would take is a few keystrokes to turn a harmless drone into a highly effective espionage device.

Additionally, Beijing intimately understands what is collected, along with where and how it is stored. That’s a tremendous advantage for the country, even if the data they desire is not initially transmitted back to China.

Congress enacted important restrictions on using Chinese-manufactured drones in the 2024 National Defense Authorization Act. Starting in December 2025, federal funds can’t be used to purchase drones made in China, Russia, Iran or North Korea, and drones that use certain components made in those countries.

This is a good start to help the supply chain issue, but it is not enough to address the present risk they pose.

Thankfully, Democratic and Republican lawmakers are again uniting to resolve this issue.

The bipartisan Countering CCP Drones Act, which is working its way through the House of Representatives, would ban future licensing of Da Jiang Innovations technologies for use on U.S. communications infrastructure.
 
Republican New York Rep. Elise Stefanik called the bill “a win for America’s national security and a win for Americans whose data and critical infrastructure has been collected and monitored by our adversary Communist China.” It also drew praise from Rep. Raja Krishnamoorthi (D-Ill.), who said the legislation would “protect our communications equipment while strengthening American supply chains.” For all these reasons, the legislation currently boasts an impressive list of Democratic and Republican co-sponsors.

Keeping this country safe in the coming decades will mean developing our own military technologies and tactics as we advance the art of drone warfare. But it will also mean recognizing the threat of drone-based espionage. We wouldn’t willingly give our greatest rival air superiority in wartime. We shouldn’t do it in peacetime, either.

Kudos to the members of Congress who have demonstrated such wisdom and foresight in introducing and pushing this bill. We’ll all be better off because of it.

Rob Joyce is a cybersecurity leader with more than 34 years in the intelligence community. Previously, he served as acting homeland security adviser and special assistant to the president on the U.S. National Security Council, and as director of cybersecurity for the National Security Agency.

https://thehill.com/opinion/national-security/4730109-china-drones-intelligence-weapon/

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
FO
« Reply #458 on: June 28, 2024, 08:59:06 AM »


(4) LEFT WING PROTESTS AGAINST RIMPAC MILITARY EXERCISE: Multiple left wing protest groups are organizing a protest called “Cancel RIMPAC” against the Rim of the Pacific military exercise. Protest events will be held on 29 and 30 June in San Diego, CA.
One anti-war organization calls for the end of U.S. military expansion in the Pacific and previously protested U.S. involvement in Balikatan, the annual joint exercise with the Philippines.

Why It Matters: The U.S. has a historic anti-war movement, which at times has been aided or driven by foreign powers. It’s possible that the protests against U.S. military exercises in the Indo-Pacific theater are driven by pro-Chinese interests. An Army security report from December 2020, for instance, warned that foreign powers, without specifically naming China, would seek both “conventional and unconventional” means against the United States, to include the use of protest organizations. The U.S. Pacific Fleet and Naval Special Warfare Center is based out of Naval Base San Diego, while four SEAL teams are based out of nearby Coronado, which, in a time of crisis or conflict, could be disrupted by anti-war protest organizations. We’ve previously and repeatedly warned about the potential for disruption to mobilization, deployment, and even base security through foreign-backed sabotage or proxy actors. – M.S.


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
Commerce Dept black lists four companies
« Reply #460 on: July 04, 2024, 10:26:49 AM »
BTW, working from memory, one of President Clinton's tricks in return for $345k in cash from Bernie Schwarz of Loral Satellites was to move approval process for helping China better launch his satellites from State Dept (which uses security criteria) to Commerce Dept-- which tends not to.

Also note that a related misdirect was used by Hillary on the Uranium One deal, on which she signed off as Sec State by saying that many other Dept signed off too-- the misdirect being that her State Dept was the one responsible for applying national security criteria.

https://www.theepochtimes.com/us/commerce-blacklists-4-companies-for-training-chinese-military-pilots-5679490?utm_source=Goodevening&src_src=Goodevening&utm_campaign=gv-2024-07-03&src_cmp=gv-2024-07-03&utm_medium=email&est=AAAAAAAAAAAAAAAAYvAqcwcVzc7PzLYPrHFRB710wA0AIj31kx5JTWZu9FddhEg4S8RP

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
FO: Chinese Cranes
« Reply #461 on: July 04, 2024, 01:06:27 PM »
(4) PORTS SAY CHINA CRANE TARIFF A GRAVE THREAT: Port owners in California, Florida, South Carolina, Texas, and Virginia urged the Biden administration to reconsider a proposed 25% tariff on Chinese-made ship-to-shore cranes in a letter to U.S. Trade Representative Katherine Tai.
American Association of Port Authorities CEO Cary Davis said the tariff will not meet its stated objective but “will only result in negative outcomes, including grave harm to port efficiency and capacity, strained supply chains, increased consumer prices, and a weaker U.S. economy.”
Why It Matters: The proposed tariff on Chinese-made ZPMC cranes will likely cause disruptions in port development and shipping, as the ports say. However, the ZPMC ship-to-shore cranes pose a significant cyber threat to U.S. supply chains. China-linked hacking groups could use the networked cranes to disrupt port operations and also use the cranes as nodes to conduct cyber attacks against other targets, including trucks using federally mandated mileage trackers. – R.C.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
China increasing Penetration of American infrastructure
« Reply #462 on: July 08, 2024, 09:06:21 AM »
(2) NEW FED WARNING CONFIRMS CHINA COMPROMISED INFRASTRUCTURE: In a new report released on 7 July, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and FBI said they confirmed that People’s Republic of China (PRC) state-sponsored hackers had compromised the networks of multiple critical infrastructure operators.

According to the joint report, the agencies confirmed that China-linked hackers conducted network reconnaissance and exfiltrated data intended to cause physical disruptions to critical infrastructure operational technology.

Why It Matters: Federal officials are increasingly warning that China-linked hackers are preparing to strike in the event of a crisis between the U.S. and China. Hackers accessing chemical security information, including site vulnerability assessments and security plans, points to the likelihood that foreign adversaries intend to conduct both cyberattacks and physical sabotage to disrupt U.S. critical infrastructure. And their target set likely includes agricultural facilities, in addition to power, water, and communications. Taken together with other developments, it appears China is preparing to conduct a first strike, combining cyber and physical sabotage in the event of a crisis or conflict. – R.C.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
Feds begin doing something about fgn land buys near bases
« Reply #463 on: July 11, 2024, 06:21:32 AM »
I note that these regs (and it sounds like in many cases it will take quite some time to get them up and running) are enabled by a 2018 (i.e. Trump) law.

https://amgreatness.com/2024/07/11/new-federal-rule-implemented-to-protect-military-bases-from-foreign-land-purchases/

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
FO: Is this any way to fight an adversary?
« Reply #464 on: July 11, 2024, 08:53:09 AM »
second

(1) BIDEN LEANS INTO CHINA TRADE WAR, WHILE INSTITUTIONS PROP CHINA UP: White House National Economic Council Director Lael Brainard announced on Wednesday that the Biden administration will impose a 25% tariff on steel and a 10% tariff on aluminum from China shipped through Mexico.

According to a preliminary paper from defense software company Govini, Chinese suppliers in U.S. supply chains quadrupled from 2005 to 2020, and U.S. dependence on Chinese microelectronics grew by 600% from 2014 to 2020.

The authors also found that 40% of the semiconductors that sustain U.S. defense systems and infrastructure, like the B2 bomber and Patriot missile system, are dependent on Chinese suppliers.

During a House Financial Services Committee hearing, Rep. Patrick McHenry (R-NC) said China is now the largest creditor of the developing world while also remaining one of the largest annual borrowers from the World Bank. And the Biden administration is failing to leverage U.S. leadership at international financial institutions to block money flowing to the Chinese Communist Party.

During the same hearing, Rep. Erin Houchin (R-IN) said the World Bank is “empowering China and its efforts to expand its geopolitical influence” by buying Chinese energy components for developing country energy projects.

Why It Matters: The bottom-line-up-front appears to be that the U.S. is financing China’s rise as a defense production power, and financing China’s geopolitical influence campaign, while the U.S. defense industrial base is struggling to supply key munitions and systems to allies. The tariffs targeting the transshipment of Chinese steel and aluminum are preliminary, anticipating that Chinese overproduction will flood the U.S. market with cheap steel and aluminum and another move toward a trade war by the Biden administration. However, this seems miniscule in comparison to how much U.S. money is flowing to Chinese defense production due to U.S. reliance on Chinese components and U.S.-led international financial institutions’ loans and energy infrastructure component purchases also flowing to China. – R.C.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
You can't go to war with your factory
« Reply #465 on: August 16, 2024, 11:52:32 AM »
https://cdrsalamander.substack.com/p/you-cant-go-to-war-with-your-factory?publication_id=247761&post_id=146846953&isFreemail=true&r=z2120&triedRedirect=true 

(Important graphs/charts in the original)

You Can't go to War With Your Factory
...no one can, or should, defend this

CDR Salamander
Aug 14, 2024
Back in March, Joshua Steinman made a simple request of us all:

If you pay attention to one tech twitter chart this week, I beg you, make it this one

What chart was he referring to?

Image
As Balaji let us know last month:

"The report was issued by Arlington, VA-based Govini which was awarded a five-year $400 million contract from the Pentagon in 2019 to deliver data, analysis and insights into DoD spending, supply chain and acquisition"

I forgot about both the report and the amount of money we - yes kiddies, we - paid for it. Nice snag by their Board of Directors, and … I hope their graphics department was well paid, because this report, now five years old, has some good ones.

I hope we got a lot more than a 12-page document for $400 million. You paid for it, so go here and download your copy.

As I was mowing the yard - wonderful therapy that is in 95 degree heat at 6pm with 85% humidity - it popped in to my head this simple fact; all this talk here and elsewhere of a long awaited ‘Pacific Pivot’ to get ready for a ‘Great Pacific War’ sometime in the Davidson Window™ against the People’s Republic of China … is it all just delusional?

Has the talk about “72-hr Wars” not so much a grand idea - but a requirement? How do we go to war with the same nation who we cannot produce weapons without their factories?

As a Southerner, going to war against your own industrial center is a Lesson Learned, and yet here we are.

Here’s another ponderable chart;

Image
Just look at it. The implications are so … well … shocking that they don’t seem to quite sink in.

This report was funded in 2019 and delivered in 2024, 150% of the time it took for the USA to defeat Imperial Japan in the Pacific.

As such, a lot of that data is reward looking. It begs the question, what progress has been made in the last 5 years to wean ourselves off of relying on our greatest opponent on the world stage?


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile

ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #467 on: September 04, 2024, 06:09:25 AM »
" Chinese Spamoflage-- fake social media accounts "

Sounds like Russian disinformation  :wink:

That would be what Hollywood and all the tech CEOs invested in CCP would say in response to this.

Russia => BAD

China => threat exaggerated or ignored.





Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
FO: Chinese-Russian Penetration of American Uranium supplies
« Reply #472 on: September 18, 2024, 02:04:35 PM »
(6) U.S. PROBES INTO NUCLEAR SUPPLY VULNERABILITIES: The Biden Administration announced an investigation into U.S. imports of Chinese enriched uranium due to concerns that China is helping Russia work around sanctions.
China’s imports to the U.S. went from zero in 2022 to 535,700 pounds in May 2023, the beginning of the U.S. ban on importing Russian uranium.
Why It Matters: If the U.S. is indirectly importing Russian enriched uranium and using China to do it, this makes U.S. nuclear power, carrier, submarine, and missile production partially dependent on two potentially hostile powers, undermining national and energy security. – J.V.


ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #474 on: September 19, 2024, 06:35:29 AM »
"The seizure follows increased statements of concern about the security of the “internet of things,” such as routers and surveillance cameras. Industry experts have been pressing for accountability by manufacturers, especially for older devices that keep functioning after updates and other support have been cut off."

I wonder how much of this is rigged IT that we buy from China.

Not surprising some of the spies are bribed American citizens.  One got 10 yrs === > not enough as for me.
Should be life or execution.

I read with counterfeit coins most of the coins that come from China are entered into the market by bribed Americans.

We need to get MORE serious with white collar crime!
I said this for yrs.


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
WT: Backdoor to US University Tech
« Reply #475 on: September 24, 2024, 07:52:11 AM »


U.S. university tech research opens back door to China

‘Sophisticated system’ circumvents blacklist

By Guy Taylor THE WASHINGTON TIMES

China is exploiting U.S. government-funded research and partnerships between American and Chinese universities — including some with explicit links to the Chinese military — to gain “back-door access” to insights on advanced technology breakthroughs, according to a new congressional report reviewed by The Washington Times.

The report was produced by Republicans on the House Committee on Education and the Workforce and the Select Committee on the Strategic Competition Between the United States and the Chinese Communist Party. It focuses specifically on the transfer of technology research with sensitive defense applications.

“Hundreds of millions of dollars in U.S. federal research funding over the last decade” have helped the Chinese Communist Party “achieve advancements in dual-use, critical, and emerging technologies like hypersonic weapons, artificial intelligence, fourth generation nuclear weapons technology and semiconductor technology,” states a summary of the report.

The full report was set to be released later Monday. According to the summary, the document uncovers a “sophisticated system” through which China is transferring critical U.S. technologies and

expertise to entities on a Commerce Department blacklist that are “linked to China’s defense and security apparatus.”

The document does not say any American universities or researchers have broken laws but asserts that a “lack of legal guardrails around federally funded research” has played directly into China’s strategic goal of outpacing the U.S. and its allies in the race to dominate emerging technology.

Investigators focused specifically on research publications that have disclosed funding from the Pentagon and the U.S. intelligence community. They also included collaboration between U.S. researchers and researchers affiliated with Chinese institutions and universities.

“The purpose that research funding is to generate advancements that will eventually become applied warfighting and intelligence capabilities to protect America against adversarial nations,” the summary of the report states. “Yet the research that the [Department of Defense] and the [intelligence community] are funding is providing back-door access to the very foreign adversary nation whose aggression these capabilities are necessary to protect against.”

Investigators say they identified nearly 9,000 research publications supported by Defense Department funding and published with co-authors affiliated with Chinese government-linked institutions, as well as 185 publications supported by funding from U.S. intelligence agencies.

The report’s summary refers to China by its formal name, the People’s Republic of China, or PRC, and the Chinese military as the People’s Liberation Army, or PLA. “More than 2,000 DOD-funded papers included PRC [co-authors] who were directly affiliated with the PRC’s defense research and industrial base,” it states. “Some topics have direct military applications — such as high-performance explosives, tracking of targets, and drone operation networks — that the PLA would use against the U.S. military in the event of a conflict.”

With regard to circumventing U.S. government blacklists, the report describes a system through which Beijing uses “joint institutes between U.S. research universities and universities and other entities” inside China as a “guise of academic cooperation.”

Investigators highlight three such joint institutes: the Tsinghua-Berkeley Shenzhen Institute (TBSI), which involves a partnership between the University of California, Berkeley, and Shenzen Institute in China; the Georgia Tech Shenzhen Institute (GTSI); and the Sichuan University-Pittsburgh Institute (SCUPI).

“These joint institutes facilitate the transfer of expertise, applied research, and technologies related to dual-use, critical, and emerging technologies to the PRC,” the report’s summary states. “Through these institutes, participating American academics, many of whom conduct U.S. federally-funded research, travel to the PRC to collaborate on research, advise PRC scholars, teach and train PRC graduate students, and collaborate with PRC companies on their areas of expertise — frequently, critical and emerging technologies with national security implications.

“While doing so, academics typically maintain affiliations with their U.S. institutions, and many continue to lead U.S. federally funded R& D projects. This creates a direct pipeline for the transfer of the benefit of their research expertise to the PRC.”

The summary notes that after months of “productive engagement” with the House Committee on Education and the Workforce and the Select Committee on the CCP, Georgia Tech recently terminated GTSI and curtailed its partnership with China’s Tianjin University.

Berkeley has also “informed the Committees that it ‘has started the process of relinquishing all ownership’ in TBSI, and is ‘in the early stages of unwinding the joint legal entity,’” states the summary of the report, which described the developments and steps in the right direction.

A statement published on Georgia Tech’s website this month announced the termination and acknowledged that Tianjin University has been on the Commerce Department’s blacklist since 2020. “Given Georgia Tech’s extensive role in national security, it immediately began conducting a thorough review of all its activities and partnerships in China,” Georgia Tech wrote in a statement dated Sept. 6.

“To date, Tianjin University remains on the Entity List, making Georgia Tech’s participation with Tianjin University, and subsequently GTSI, no longer tenable,” the statement said. “The approximately 300 admitted students currently in degree programs at GTSI will have the opportunity to fulfill their degree requirements.”

Rep. John Moolenaar, Michigan Republican and chairman of the Select Committee on the CCP, said in a statement that “Georgia Tech did the right thing for U.S. national security by shutting down its PRC-based joint institute, and U.C. Berkeley and other universities should follow suit.”

“We also must ban research collaboration with blacklisted entities, enact stricter guardrails on emerging technology research, and hold American universities accountable through passing the Deterrent Act,” Mr. Moolenaar said. He was referring to legislation that aims to expand federal government oversight and U.S. university disclosure requirements relating to foreign sources and institutes of higher education.

The legislation was passed by the House last year and is awaiting action in the Senate.

Rep. Virginia Foxx, North Carolina Republican and chair of the Committee on Education and the Workforce, also called for the Deterrent Act to be made law.

She said in a statement that her committee has for years “pushed for greater transparency regarding foreign investment in American universities.”

“This investigation just further proved why it’s necessary,” Ms. Foxx said. “Our research universities have a responsibility to avoid any complicity in the CCP’s atrocious human rights abuses or attempts to undermine our national security.”

The New York Times, which first reported on the joint congressional report on Monday, said Georgia Tech and Berkeley had disputed many of the report’s findings.

The newspaper also reported that it had received a statement Friday from Berkeley, saying it had decided to terminate its ownership in the Chinese Institution, partly because of its lack of visibility into research by affiliates of other institutions.

The joint congressional report, meanwhile, cited failures in the reporting of foreign funding by U.C. Berkeley and Georgia Tech under Section 117 of the Higher Education Act.

The report’s summary also criticized the Biden administration. “Enforcement of foreign gift and contract reporting requirements by the Biden-Harris Department of Education has been an abject failure,” the report’s summary states. “And the Biden-Harris Department of Education has failed to open a single enforcement action under Section 117 of the Higher Education Act in the last four years, despite widespread evidence of lack of reporting.

“These undisclosed foreign gifts — likely hundreds of millions, if not billions in total — give PRC entities troubling influence without transparency and contribute to building the research relationships that pose risks to U.S. national security,” it states. “Stronger safeguards and more robust enforcement is urgently required.”

ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #476 on: September 24, 2024, 10:43:35 AM »
" China is exploiting U.S. government-funded research and partnerships between American and Chinese universities — including some with explicit links to the Chinese military — to gain “back-door access” to insights on advanced technology breakthroughs, according to a new congressional report reviewed by The Washington Times."

Old news.
But nothing ever changes.

My question:

HAVE WE EVER GAINED ANY KNOWLEDGE FOR ANYTHING FROM THE CHINESE?

THEY STEAL ALL OURS AND WHAT DO WE GET BACK?  ANYTHING?

I have never read anything we ever get from them other then they found a new dinosaur or something of minimal consequence.

What great technology comes from China other than cheap rigged stuff?




ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #478 on: September 24, 2024, 12:41:21 PM »
how stupid is this.

we have relied on rare metal imports from our leading adversary

our leaders failed us again

OMFG read this

look at the other top producers in the world and the top reserves:

https://en.wikipedia.org/wiki/Antimony

 :x


Body-by-Guinness

  • Power User
  • ***
  • Posts: 3776
    • View Profile
China’s Unabashed Penetration of the US
« Reply #480 on: October 26, 2024, 04:04:30 PM »
Not only are they not shy when it comes to espionage, the current admin hasn’t done much about it, hmm:

Voters: Beware the government’s China problem at home and abroad
The Hill News / by Erik Durneika / Oct 26, 2024 at 1:10 PM

The Chinese Communist Party’s influence is alive and well in the U.S.

Political scandals have reignited concerns over Beijing’s overseas campaign. Examples include the charging of an unregistered Chinese state agent working as a top aide for New York Gov. Kathy Hochul (D) and foreign agents affiliated with a Chinese Communist Party-linked electrical vehicle battery company making contributions to Democratic campaigns.

Although it has been framed as such, this is not a recent issue either. In 2018, it came to light that the late Sen. Dianne Feinstein (D-Calif.) had employed an unidentified Chinese agent for nearly 20 years at her field office.

These Chinese agents and lobbyists have sought not only to promote China’s interests and repair its image abroad but have also aimed to censor topics that the Chinese Communist Party deems controversial, such as discussions about Taiwan’s sovereignty and the treatment of the Uyghurs, labeled by various governments and organizations as a genocide.

This exportation of censorship is clearly an attack on one of American democracy’s most prized tenets: the freedom of speech and expression.

Perhaps even more concerning are the alleged ties between the Chinese Communist Party and Minnesota Gov. and Vice Presidential nominee Tim Walz (D), detailed in a recent letter and subpoena by the House Oversight Committee.

He is running for the second-highest office in the federal government — one that closely advises the president and often acts as a representative of the country when meeting with foreign dignitaries. This comes after his false claims over his whereabouts during the 1989 Tiananmen Massacre and his sympathetic statements about Chinese communism .

The Chinese government continues to harass and repress dissidents, many of whom are U.S. citizens, and run espionage operations in their communities. Such operations may utilize Chinese police stations located in five states.

Beyond politics, the Chinese government's influence is seeping into our educational system, from elementary schools to universities. It has contributed to and funded anti-Jewish fervor on college campuses, poses a risk to our critical defense infrastructure and is largely fueling the nation’s opioid and illegal marijuana production, which is intertwined with concerns over human and labor trafficking. And there is much more to this list.

The foreign policy that a given administration adopts will sway not only the actions of this authoritarian regime with respect to its own citizens but will also affect the extent to which such foreign infiltration succeeds on U.S. soil.

These instances of continued — and intensified — intrusion using psychological warfare, espionage, election interference and hard money show that the traditional distinction between foreign policy and domestic issues is outmoded. Foreign policy has immense potential to shape a country — socially, politically, fiscally and in terms of security.

Luckily, this election cycle, polling indicates that more American voters are paying attention to foreign policy than previously. About 4 in 10 voters now view foreign policy as a top concern, with registered Republicans expressing more interest in this issue than registered Democrats. The same poll reveals the current percentage of U.S. adults who want the government to focus on foreign policy is up from 18 percent in 2023.

This increase in attention to foreign policy comes at a time when inter-state wars have increased as well, and their fiscal implications are undeniable, as exemplified by the substantial spending on a seemingly unending war in Ukraine — funds that could be rediverted to local communities and disaster relief in the U.S. in the presence of decisive political leadership. This war is also contributing to inflation.

Despite its recent traction, foreign policy should continue gaining momentum among voters in subsequent elections — and must not be forgotten. It is an issue area that deserves consideration among bread-and-butter issues like taxation, education and drug addiction, as it can have a bearing on them.

Unmitigated Chinese Communist Party influence, however, also poses long-term dangers to our democracy. The Chinese party-state’s influence in the U.S. extends to political and non-political areas of life, affecting how safe people feel articulating their views and citizens’ trust in elections at all levels of government. Each of these corresponds to a different facet of American democracy — the freedom of speech and assembly and free and fair elections.

Foreign adversaries’ plans to incite political violence, such as through assassination plots, further degrade the fabric of our political system and contribute to societal upheaval.

On the other hand, efforts by media outlets and some elected officials to vilify domestic conservative groups as threats to democracy are unproductive and serve politically motivated purposes. Such incendiary rhetoric overlooks the oversized risk that China and other external actors, like Iran, pose to the health of U.S. democracy as well as to the immediate safety of the U.S. citizenry. China and like adversaries are also sure to reap benefits from this type of division.

If the public turns a blind eye to the Chinese government’s actions within our borders and to the broader implications of foreign policy on domestic security, who will pay attention? What will happen? The answer to the former question is uncertain while the response to the latter is slightly clearer: The situation is bound to worsen.

Erik Durneika is a graduate teaching assistant at the University of Pittsburgh’s Department of Political Science. He has done work for the Uyghur Human Rights Project and served as a distinguished visiting researcher at National Taiwan University’s Research and Educational Center for China Studies and Cross-Taiwan Strait Relations.

https://thehill.com/opinion/international/4953307-chinese-communist-party-influence-us/


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
FO: Chinese still listening in on our phone calls; Chinese Spy
« Reply #484 on: December 04, 2024, 12:15:37 PM »

Chinese hacker group Salt Typhoon is still present on U.S. telecommunication company networks, and it is “impossible for us to predict a time frame on when we’ll have full eviction,” according to Cybersecurity and Infrastructure Security Agency (CISA) Executive Assistant Director Jeff Greene.

=============

The Department of Justice arrested a Chinese illegal alien in California yesterday for smuggling firearms, ammunition, “a chemical threat identification device,” and “a hand-held broadband receiver that detects eavesdropping devices” to North Korea, through Hong Kong. The man was here on an expired student visa.
« Last Edit: December 04, 2024, 12:20:59 PM by Crafty_Dog »


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
China Penetrates Biden yet again
« Reply #486 on: December 18, 2024, 05:31:25 AM »

Secretary of State Antony Blinken was sent a congressional letter urging him to suspend efforts to renew an agreement that critics fear will help the Chinese military with science and technology. ASSOCIATED PRESS

FOREIGN POLICY

Biden saves science, tech cooperation with China

Agreement raises security concerns

By Bill Gertz THE WASHINGTON TIMES

The Biden administration has renewed a science and technology cooperation agreement with China despite complaints about Beijing’s theft of American technology and damaging state-linked hacking operations.

The State Department announced Friday that the 1979 agreement that lapsed this summer had been extended for five years, although the scope of the cooperation described is more limited than in the past.

The department said in a brief statement that the protocol extension includes strengthened intellectual property protections and creates guardrails for protecting researchers. The accord “advances U.S. interests through newly established and strengthened provisions on transparency and data reciprocity,” the State Department said.

Despite the more modest scope of the amended accord, the Chinese government hailed the renewal as a step toward improved relations overall.

Extending the agreement “will advance technological progress in both nations, drive socioeconomic development, enhance collaboration on global challenges and improve the well-being of people worldwide,” Chinese Foreign Ministry spokesperson Lin Jian said Monday, according to a report in the state-controlled Global Times.

On Capitol Hill, Rep. John Moolenaar, Michigan Republican and chairman of the House Select Committee on the Chinese Communist Party, and several other House members condemned the action. The committee had called for ending the agreement over concerns that cooperating on science and technology bolstered the Chinese military.

Mr. Moolenaar and 13 other House members said renewing the agreement in the final days of President Biden’s

term is a “clear attempt to tie the hands” of the incoming Trump administration, which could reject it or negotiate a better arrangement.

“We urge you to immediately suspend efforts to renew the U.S.PRC STA prior to January 20, 2025,” the lawmakers said in a letter to Secretary of State Antony Blinken, using the acronym for the Science and Technology Agreement.

The State Department said the agreement’s extension is part of the Biden administration’s policy of “responsibly managing” strategic competition with China and follows extensive consultations and months of negotiation. The agreement that expired on Aug. 27 was limited by a six-month extension imposed amid U.S.China tensions.

Unlike previous extensions of the agreement, the amended accord requires that any federal science and technology cooperation with China benefits the United States and “minimizes” risks to national security. The agreement is also limited to “basic research,” does not facilitate the development of critical or emerging technology, and does not explicitly endorse collaborations between American and Chinese private companies or institutions of higher learning.

A 2018 White House report estimated that China’s technology theft costs American companies $225 billion to $600 billion annually. Former National Security Agency Director Keith Alexander has described Chinese theft of U.S. technology as “the greatest transfer of wealth in human history.”

Security officials recently said Chinese intelligence-linked hackers have broken into computer networks of U.S. telecommunications companies and critical infrastructure networks for spying and plotting sabotage.

The House recently passed legislation requiring any extension of the science and technology agreement with China to include 15 days of notice to Congress, explicit protections for human rights, and curbs on dual civilian-military research.

“While not yet law, the Biden administration’s decision to ignore Congress’s articulated guardrails is alarming,” the committee said in a statement.

The Bureau of Oceans and International Environmental and Scientific Affairs declined to provide The Washington Times with a copy of the agreement. A spokesman said the accord will be published on the department website.

The agreement that expired on Aug. 27 was limited by a sixmonth extension imposed amid U.S.-China tensions.

A Congressional Research Service report said that Chinese cooperation under the agreement was inconsistent and that Beijing had restricted U.S. researchers’ access to certain areas.

Critics in Congress view China as “an unreliable or untrustworthy research partner, citing data restrictions and a lack of forthrightness in sharing scientific results,” the report said.

China cut off access to U.S.funded coronavirus work at the Wuhan Institute of Virology in 2019. Some intelligence agencies consider a potential leak of a deadly virus from the institute to be the source of the COVID-19 pandemic.

The House select committee also recently produced a report highlighting how federal research funding helped advance Chinese military-related technology in hypersonic and nuclear weapons, artificial intelligence and semiconductors.

Sen. Marco Rubio, Florida Republican and President-elect Donald Trump’s nominee for secretary of state, has said he opposes the accord and warned that any agreement with a communist regime that spies on the United States and steals intellectual property “is a horrible idea.” Miles Yu, a former State Department policymaker, said the agreement should be canceled because it reflects a faulty U.S. engagement strategy with Beijing.

“That engagement strategy has been thoroughly discredited, with a bipartisan consensus, as it has empowered [China] to become the leading tormentor of its enabler, the United States,” said Mr. Yu, now with the Hudson Institute’s China Center.

Roger Pielke, a nonresident senior fellow with the American Enterprise Institute, has said he favors continuing the agreement because the cooperation could, on balance, benefit the U.S.

“I support continuing the U.S.-China STA in the most robust form that can be negotiated between the two nations,” Mr. Pielke wrote in a review of the pact earlier this year. “In my view, its existence is much more important than the exact particulars. In general — and contrary to both Trump and Biden — I view ‘decoupling’ [with China] to be a bad idea and it is also a bad idea in science and technology.”

The Congressional Research Service report said Beijing’s state control “has allowed the [People’s Republic of China] to shape [science and technology] ties with the United States to fill research gaps, develop competencies and [intellectual property] in priority areas targeted in its industrial policies, and develop PRC talent,” Mr. Pielke said

ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
Salt Typhoon
« Reply #487 on: December 25, 2024, 10:18:37 AM »
darn stinking reds:

https://en.wikipedia.org/wiki/Salt_Typhoon

I will say till I die we have got to be first at making the theory of quantum computing a reality.

If they get it first our way of life is over. 

We can shut down all their espionage and their systems before they do it to us.

God, I hate them.

This Xi guy and his party are going the way of Hitler and Mao on roids.



Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile

ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
every week we are reading about Chinese Reds
« Reply #491 on: December 31, 2024, 09:03:12 AM »
attacking us in every conceivable "non kinetic" way

and now the IRS hack.......they are obviously racheting it up.   I don't know what the breaking point will be. 

 :-(

Just a matter of time before the s hits the fan.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
FO: Chinese hack Treasury
« Reply #492 on: January 01, 2025, 03:06:11 PM »
(2) CHINA-LINKED HACKERS TARGET TREASURY DEPARTMENT: The Treasury Department said yesterday that China-linked hackers gained access to employee workstations and some unclassified documents through third-party service provider BeyondTrust.
FBI and Treasury officials said evidence points to a China-based Advanced Persistent Threat (APT) actor, and the hack is considered a major cybersecurity incident.
Why It Matters: China-linked hackers are likely targeting the Treasury Department to gain economic intelligence ahead of the incoming Trump administration. China’s likely goal is to assess the strength of the U.S. economy and the capacity of the U.S. to weather a trade war, and adapt China’s response to the incoming Trump administration’s Economic Statecraft grand strategy. – R.C.

ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
China is beating us. China controls Panama canal
« Reply #493 on: January 05, 2025, 12:16:47 PM »
Admits that damn fool Sullivan chosen by Professor Barry who recommends his book to us.
 :x

https://www.newsmax.com/newsfront/china-hackers-ports/2025/01/05/id/1193920/

Remember the reports not too long ago when some who played the military gaming said in every scenerio we lose?

 :x :x :x

We pay a lot of money for R and D much in the wrong places, only for the Reds to steal it and thus save all the R and D research we do for them only for them to spend less and yet still be able to counter everything.

I believe they probably could sink our carriers with drone attacks.   I believe they could sabatoge our grids, and hack into our government systems , send drones overhead probing our defenses blending in with commercial drones

We were completely let down by this and Obamster administration

I do believe Taiwan will be taken.   Will Xi do during Trump or wait till after is my only remaining question

https://www.cfr.org/blog/why-taiwan-important-united-states

Thank you Democrats - and Rinos.  How stupid.

Vote of confidence = > 0

I only hope it is not too late but probably is.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
It would appear we are utterly fuct
« Reply #494 on: January 05, 2025, 05:43:26 PM »
And here is the WSJ article referenced:
===================

How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons
Massive ‘Typhoon’ cyberattacks on U.S. infrastructure and telecoms sought to lay groundwork for potential conflict with Beijing, as intruders gathered data and got in position to impede response and sow chaos

Alexandra Citrin-Safadi/WSJ
By Dustin Volz, Aruna Viswanatha, Sarah Krouse, and Drew FitzGerald
Jan. 4, 2025 9:00 pm ET
The message from President Biden’s national security adviser was startling.

Chinese hackers had gained the ability to shut down dozens of U.S. ports, power grids and other infrastructure targets at will, Jake Sullivan told telecommunications and technology executives at a secret meeting at the White House in the fall of 2023, according to people familiar with it. The attack could threaten lives, and the government needed the companies’ help to root out the intruders.

What no one at the briefing knew, including Sullivan: China’s hackers were already working their way deep inside U.S. telecom networks, too.

The two massive hacking operations have upended the West’s understanding of what Beijing wants, while revealing the astonishing skill level and stealth of its keyboard warriors—once seen as the cyber equivalent of noisy, drunken burglars.

China’s hackers were once thought to be interested chiefly in business secrets and huge sets of private consumer data. But the latest hacks make clear they are now soldiers on the front lines of potential geopolitical conflict between the U.S. and China, in which cyberwarfare tools are expected to be powerful weapons.

U.S. computer networks are a “key battlefield in any future conflict” with China, said Brandon Wales, a former top U.S. cybersecurity official at the Department of Homeland Security, who closely tracked China’s hacking operations against American infrastructure. He said prepositioning and intelligence collection by the hackers “are designed to ensure they prevail by keeping the U.S. from projecting power, and inducing chaos at home.”

As China increasingly threatens Taiwan, working toward what Western intelligence officials see as a target of being ready to invade by 2027, the U.S. could be pulled into the fray as the island’s most important backer. Other friction between Washington and Beijing has intensified in recent years, with President-elect Donald Trump threatening a sharp trade war and China building a tighter alliance with Russia. Top U.S. officials in both parties have warned that China is the greatest danger to American security.

In the infrastructure attacks, which began at least as early as 2019 and are still taking place, hackers connected to China’s military embedded themselves in arenas that spies usually ignored, including a water utility in Hawaii, a port in Houston and an oil-and-gas processing facility.

Investigators, both at the Federal Bureau of Investigation and in the private sector, found the hackers lurked, sometimes for years, periodically testing access. At a regional airport, investigators found the hackers had secured access, and then returned every six months to make sure they could still get in. Hackers spent at least nine months in the network of a water-treatment system, moving into an adjacent server to study the operations of the plant. At a utility in Los Angeles, the hackers searched for material about how the utility would respond in the event of an emergency or crisis. The precise location and other details of the infrastructure victims are closely guarded secrets, and couldn’t be fully determined.

American security officials said they believe the infrastructure intrusions—carried out by a group dubbed Volt Typhoon—are at least in part aimed at disrupting Pacific military supply lines and otherwise impeding America’s ability to respond to a future conflict with China, including over a potential invasion of Taiwan.

Advertisement

In the separate telecom attacks, which started in mid-2023 or earlier and were first reported by The Wall Street Journal in September, a hacking group—this one known as Salt Typhoon—linked to Chinese intelligence burrowed into U.S. wireless networks as well as systems used for court-appointed surveillance.

They were able to access data from over a million users, and snapped up audio from senior government officials, including some calls with Trump by accessing the phone lines of people whose phones he used. They also targeted people involved in Vice President Kamala Harris’s presidential campaign.

They were also able to swipe from Verizon and AT&T a list of individuals the U.S. government was surveilling in recent months under court order, which included suspected Chinese agents.

The intruders used known software flaws that had been publicly warned about but hadn’t been patched. Investigators said they were still probing the full scope of the attack.

Lawmakers and officials given classified briefings in recent weeks told the Journal they were shocked at the depth of the intrusions and at how hard the hacks may be to resolve, and some telecom company leaders said they were blindsided by the attack’s scope and severity.

“They were very careful about their techniques,” said Anne Neuberger, President Biden’s deputy national security adviser for cybersecurity. In some cases hackers erased cybersecurity logs, and in others the victim companies didn’t keep adequate logs, meaning there were details “we will never know regarding the scope and scale of this,” she said.


Liu Pengyu, the spokesman for the Chinese embassy in Washington, accused the U.S. of peddling disinformation about threats from Chinese hackers to advance its geopolitical ambitions. Chinese leader Xi Jinping told President Biden during their meeting in Peru in November that there was no evidence to support the allegations, he said.

“Some in the U.S. seem to be enthusiastic about creating various types of ‘typhoons,’” the spokesman said, referring to the names assigned to the hacking groups. “The U.S. needs to stop its own cyberattacks against other countries and refrain from using cybersecurity to smear and slander China.”

Verizon said a small number of high-profile customers in government and politics were specifically targeted by the threat actor and that those people had been notified. “After considerable work addressing this incident, we can report that Verizon has contained the activities associated with this particular incident,” said Vandana Venkatesh, chief legal officer at Verizon.

An AT&T spokeswoman said the company detected “no activity by nation-state actors in our networks at this time,” adding that the Chinese government targeted a “small number of individuals of foreign intelligence interest” and that affected customers were notified in cooperation with law enforcement.

‘Shocking how exposed we are’

Some national security officials involved in the investigation said they believe the telecom hack is so severe, and the networks so compromised, that the U.S. may never be able to say with certainty that the Chinese hackers have been fully rooted out.

Several senior lawmakers and U.S. officials have switched from making traditional cellphone calls and texts to using encrypted apps such as Signal, for fear that China may be listening in. Federal law-enforcement officials have told state and local law enforcement to do the same. (Federal agents already use their own encrypted systems for classified work.) 

In late December, in response to the Salt Typhoon campaign, federal cybersecurity officials published new guidance recommending the public use end-to-end encryption for communications, and said text-based multifactor authentication for account logins should be avoided in favor of app-based methods.

U.S. officials have warned for more than a decade about fast-evolving threats in cyberspace, from ransomware hackers locking computers and demanding payments to state-directed thefts of valuable corporate secrets. They also raised concerns about the use of Chinese equipment, including from telecom giants Huawei and ZTE, arguing they could open a back door to unfettered spying. In December, the Journal reported that U.S. authorities are investigating whether the popular home-internet routers made by China’s TP-Link, which have been linked to cyberattacks, pose a national-security risk.

But Beijing didn’t need to leverage Chinese equipment to accomplish most of its goals in the massive infrastructure and telecom attacks, according to U.S. officials and others familiar with the investigation. In both hacks, China exploited a range of aging telecom equipment that U.S. companies have trusted for decades.

In the telecom attacks, the hackers exploited unpatched network devices from security vendor Fortinet and compromised large network routers from Cisco Systems. In at least one case, they took control of a high-level network management account that wasn’t protected by multifactor authentication, a basic safeguard.

That granted them access to more than 100,000 routers from which they could further their attack—a serious lapse that may have allowed the hackers to copy traffic back to China and delete their own digital tracks.

The router hijacking took place within AT&T’s networks, a person familiar with the matter said.

AT&T declined to comment on the router attack. Cisco and Fortinet declined to comment.

In December, Neuberger said the number of U.S. telecom victims had grown to nine, and that there could be more.

In addition to deep intrusions into AT&T and Verizon, hackers pierced other networks belonging to Lumen Technologies and T-Mobile. The Chinese hackers also reached into Charter Communications, Consolidated Communications and Windstream, according to people familiar with the matter.

Lumen said it no longer sees evidence of the attackers in its network and that no customer data was accessed. T-Mobile said it stopped recent attempts to infiltrate its systems from advancing and protected sensitive customer information from being accessed.

Some U.S. officials, including Neuberger, have said the hack underscores the need for baseline cybersecurity requirements for the telecom industry. The Biden administration created such mandates through executive actions for pipelines, railways and the aviation industry.

“Cyberspace is a fiercely contested battlefield,” said Sullivan, the national security adviser. “We…have made considerable progress, but serious vulnerabilities remain in sectors where we don’t have mandatory cybersecurity requirements.”

Sen. Dan Sullivan (R., Alaska), during a congressional hearing in December, said “It’s shocking how exposed we are, and still are.” He described a recent classified briefing on the telecom hacks as “breathtaking.”

The infrastructure hacks also alarmed officials. In April, during a five-hour session with his Chinese counterpart in Beijing, U.S. Secretary of State Antony Blinken said China’s attacks on physical infrastructure were concerning, dangerous and escalatory, people familiar with the encounter said. 

Advertisement

Flanked by aides at a long table with pots of tea and water, China’s Foreign Minister Wang Yi shrugged and called the allegations a phantom concocted by the U.S. to increase support for military spending.



In another meeting later that week, other U.S. officials presented evidence linking the intrusions to China-based IP addresses. The Chinese officials said they would look at it and get back to the Americans, but never substantively did, U.S. officials familiar with the interactions said.   

This account of the two devastating cyberattacks is based on interviews with around 50 national security, law enforcement and private-sector officials. Many of the details have never been reported.

Port attack

The first shot that revealed the new cyberwar came midmorning on Aug. 19, 2021, when Chinese hackers gained a foothold in the digital underpinnings of one of America’s largest ports in just 31 seconds.

At the Port of Houston, an intruder acting like an engineer from one of the port’s software vendors entered a server designed to let employees reset their passwords from home. The hackers managed to download an encrypted set of passwords from all the port’s staff before the port recognized the threat and cut off the password server from its network.

A mysterious file launches a global hunt

How Chinese hackers broke into the Port of Houston in just 31 seconds.

An attacker, acting like an engineer from one of the port’s software vendors, enters a server that lets employees reset their passwords.  The user uploads a file that looks like a normal IT file that would track server usage and generate reports. The file, named reportwriter.js, even had comments explaining each piece of the code to anyone looking at it.

reportwriter.js

The attacker leaves with a back door in place, to get back in even more easily.

At approximately this time, a cybersecurity vendor notices the activity and flags it to the port's cybersecurity chief, who

examines it and decides it's a false alarm. He heads to lunch at Whataburger.

log in credentials

Two additional suspicious IP

addresses access the server, then use its connection to the server holding all employee username and password data to download a complete list of log in credentials.

The attackers start using their access to explore the network further, while the cybersecurity vendor issues another warning that attackers are back.

The port's cybersecurity staff removes the compromised server from its network, ending the attack.

Afterward, the port’s cybersecurity chief, Chris Wolski, called the Coast Guard, which has authority over U.S. ports, to notify it of the attack: “It looks like we have a problem.”

The Houston port neutralized the threat, but unfettered access to the port’s passwords could have given hackers the ability to move around in internal networks and find places to hide until they wanted to act. They could have eventually been in position to disrupt or halt operations, according to investigators. 

The attack on the port—which at that time had only recently upgraded from basic antivirus software and from just one IT employee working part time on cybersecurity—was a crucial early tip to U.S. officials that China was going after targets that didn’t house corporate or government secrets, and was using novel ways to get in.

The FBI found the intrusion relied on a previously unknown flaw in the password software.

A group of Microsoft analysts determined that the same hacking group had used the flaw in the software, which came from another company, to also target consulting services and IT companies. The analysts also spotted the hackers targeting networks in Guam, the U.S. territory in the Pacific that is home to a key American naval base, where the intruders had breached a communications provider.

The Redmond, Wash., team prowls for security threats, using billions of signals that come from security features built into Microsoft products, including Office 365, the Windows operating system or Azure cloud. 

The intruders started showing up in other surprising places, from the Hawaii water utility and a West Coast port, to sectors including manufacturing, education and construction, according to U.S. officials and researchers at cyber-threat firms. 

Microsoft analysts realized they were seeing novel behavior from China, with a host of Chinese hackers inside critical infrastructure, which appeared to have little espionage or commercial value, at the same time.

Tom Burt, until recently Microsoft’s vice president for customer trust and safety, said in an interview the company’s threat researchers identified commonalities in the tradecraft and victim targeting that helped link the attacks to a common hacking group. “And that all builds up to, oh, OK, we know this is a new actor group in China,” he said.

With the information from Microsoft and other intelligence streams, federal agents fanned out across the U.S. to investigate, and throughout 2022 and ’23 heard a similar story at visits to more than a dozen sites. The victims had mediocre cybersecurity, and some had no idea they had even been breached. The hackers generally weren’t installing malware or stealing data such as trade or government secrets or private information—they were just trying to get in and learn the system.

Using old routers
In previous cases, FBI agents could often trace hackers once they found the servers in the U.S. they were renting for their attacks.

This time, the hackers were getting in via a type of router used by small and home offices, which disguised the intrusions as legitimate U.S. traffic.

The routers, largely built by Cisco and Netgear, were vulnerable to attack because they were so old they were no longer receiving routine security updates from their manufacturers. Once in the hackers’ control, the routers functioned as steppingstones to other victims, without raising alarms because the incursions looked like routine traffic. Netgear declined to comment.

Separately, analysts at the National Security Agency had observed that Beijing was starting to lay the cyber groundwork for a potential Taiwan invasion, including in the U.S., according to current and former U.S. officials familiar with the analysis. The information helped bring the new infrastructure hacking activity into focus, showing investigators a bigger picture.

American officials shared with allies data on the infrastructure intrusions, Western security officials said.

The focus on Guam and West Coast targets suggested to many senior national-security officials across several Biden administration agencies that the hackers were focused on Taiwan, and doing everything they could to slow a U.S. response in a potential Chinese invasion, buying Beijing precious days to complete a takeover even before U.S. support could arrive.

Other targets gave analysts pause. One was a small air-traffic control facility on the West Coast, others were water-treatment plants. Those choices suggested the hackers were looking for ways to inflict pain on American civilians, including by scrambling plane routes or shutting off local water-treatment facilities, according to officials familiar with the discussions.

At the NSA, deputy director George Barnes wondered in late 2022 and early 2023 if Beijing’s plan was for the hackers to be found out, intimidating the U.S. into staying out of a potential conflict in Taiwan, he said in an interview.

After Taiwan itself, the U.S. “would be target zero” for disruptive cyberattacks in the event of a conflict over the island, said Barnes, who left the NSA in late 2023 after decades at the spy agency.

George Barnes, deputy director of the NSA at the time, testified in the Senate in 2023. Photo: Michael Brochstein/Zuma Press
By the end of 2023, the FBI had amassed enough information to identify hundreds of the small office routers commandeered by the hackers. Prosecutors asked a judge for authorization to go into the routers remotely and issue a command to neutralize the malware—essentially going into the homes of unsuspecting American victims, who had bought the routers years ago and had no idea their Wi-Fi network was secretly being used as a launchpad for an attack.

In January 2024, a judge approved the request, and the FBI carried out the operation, defanging one of the hackers’ important tools.

Telecom attack

At least several months earlier, a separate group of hackers linked to China had begun a different domestic attack—this time, an all-out assault on U.S. communications systems.

In the summer of 2024, some of the same companies whose executives had visited the White House in the fall of 2023 were told by U.S. officials that a group linked to China’s intelligence operations in the Ministry of State Security had crept into their networks.

The intruders exploited pathways that telecom companies use to hand data off to each other through links that often lack multifactor authentication. Such extra layers of protection, akin to what many consumers use to log in to bank accounts, don’t always exist between telecom providers in part because the barriers can slow down phone call and web traffic.

The hackers were also able to compromise cellphone lines used by scores of senior U.S. national security and policy officials, and at least some phone audio from Trump, incoming Vice President JD Vance and people affiliated with both the Trump and Harris presidential campaigns.

Separately, the hackers sought to access wiretap surveillance systems at Verizon and AT&T in an apparent effort to learn how much the FBI and others understood about Beijing’s spies operating in the U.S. and internationally, investigators said.   

They remain unsure whether Salt Typhoon actors were able to funnel real-time content, such as calls or texts from people under law-enforcement surveillance, from the wiretap breaches back to China.

The White House in December.
The White House in December. Photo: Tom Brenner/Getty Images
The hackers maintained access to the surveillance systems for a long time without detection. At one company, they were inside for about six months, in the other, for about 18 months, according to investigators. Hackers were still inside the wiretap systems of both companies as of October, weeks after the Journal first publicly exposed the intrusions. U.S. officials believe the hackers are now out of the wiretap systems.

After the Journal’s first reports, the hackers changed their behavior, further complicating efforts to locate and evict them, according to investigators.

This fall, a group of Verizon leaders and cybersecurity experts hunkered down in closed sessions in Texas to spot intruders, study their behavior and determine how to oust them. The carrier has since reviewed each router in its network to check for vulnerabilities.

Investigators learned that the hackers at times lurked, simply observing network traffic, and in other cases swiped it, exfiltrating their haul through elaborate paths around the globe before funneling it to China. They were expert at creating footholds from which they could observe network traffic. They would, for example, behave the way network engineers might and then cover up their tracks.

The hackers’ focus was in part regional: Phone records of individuals who work in and around Washington, D.C., were a priority. They accessed call event-date records—including date and time stamps, source and destination IP addresses, phone numbers and unique phone identifiers—from over a million users.

“We saw a massive set of data acquired,” an FBI official familiar with the investigation said.

The relationship between the private sector and federal officials investigating the hack has at times grown tense, with each side saying the other is falling short in their responsibilities. Some lawmakers have grown impatient with the time it has taken to expel the hackers.

Shortly before Thanksgiving, Sullivan, the national security adviser, again convened top executives from telecommunications firms—many of the same ones he called together roughly a year earlier to get help on the infrastructure hacks. This time, the telecoms were themselves the victims, and Sullivan pushed for progress.

Investigators are still determining the full scope and intent of the data haul. They said the data could help hackers establish who different people in the government talk to and better understand their social and professional circles. That intelligence could help facilitate future intrusions or attacks on those individuals.

Robert McMillan and Sadie Gurman contributed to this article.

Write to Dustin Volz at dustin.volz@wsj.com, Aruna Viswanatha at aruna.viswanatha@wsj.com, Sarah Krouse at sarah.krouse@wsj.com and Drew FitzGerald at andrew.fitzgerald@wsj.com

Copyright ©2025 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8
Appeared in the January 6, 2025, print edition as 'China’s New Hacking Prowess Poses Geopolitical Threats'.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile

ccp

  • Power User
  • ***
  • Posts: 20391
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #496 on: January 07, 2025, 05:27:29 AM »
I am thinking treating Quantum computing theory like we did the A bomb - a "Manhattan project".

and treat the time frame as akin to JFKs by the end of the decade.

I would change the name from Democrat crap hole Manhattan to a more patriotic town or city such as one of these:

https://townsoftheusa.com/most-conservative-cities-in-usa/

If it is feasible we have got to get there first.

China is hell bent on being able to shut all our tech driven economy down with the push of a few buttons.   Who needs ICBMs?

When Xi proclaims "no one can stop us" he already is confident he could pull it off - with Taiwan.

Reminds me of when we lived in Florida.  I wanted to avoid using my home cable internet connection because I knew the thieves were hacked into our cable system.

So I went to Kinkos and used their computer.  While sitting at that computer all of a sudden this message comes up directed to me :  "you can't stop us now!"  signed musiclyrics.com

I looked up and through the window to the outside desk area and the attendant was staring right at me. 

I knew then they had stolen more lyrics from us out of our house and we were screwed again.

So Xi "no one can stop us now" strikes a real cord with me.


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
Re: China Chinese Penetration and Invasion of America
« Reply #497 on: January 07, 2025, 06:43:07 AM »
 :-o

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 74389
    • View Profile
WSJ on TikTok issues
« Reply #498 on: January 08, 2025, 08:16:19 AM »
Banning TikTok Won’t Solve Your Data-Security Problem
Beijing doesn’t need the app to get information, and Google and Meta collect much more.
Jason L. Riley
Jan. 7, 2025 5:09 pm ET

During last year’s presidential campaign, Kamala Harris regularly posted on TikTok, encouraging voters to follow her on the platform, as did Joe Biden before he withdrew. Yet the Biden Justice Department is set to argue before the Supreme Court this week that the popular Chinese-owned social-media app, used monthly by around 170 million Americans, represents a grave threat to our national security. Huh?

When Donald Trump tried to ban the app during his first presidency, a federal court blocked his executive order on the grounds that singling out the company was “arbitrary and capricious.” Mr. Trump also cited the nation’s safety, but lately he has become a huge fan of the app. “Why would I want to ban TikTok?” he wrote on Truth Social last week, above a bar graph that showed his TikTok views outpacing not only Ms. Harris’s but also those of Tucker Carlson and Taylor Swift.

For much of the political class, however, TikTok has remained a target. In April, Mr. Biden signed the Protecting Americans from Foreign Adversary Controlled Applications Act. The bipartisan legislation requires TikTok’s owner, Beijing-based ByteDance, to sell the app by Jan. 19 or face a ban in America. TikTok sued, arguing that the law violates free-speech protections under the First Amendment. In a December ruling, the U.S. Circuit Court of Appeals for the District of Columbia rejected those claims. “The Government has offered persuasive evidence demonstrating that the Act is narrowly tailored to protect national security,” Judge Douglas Ginsburg wrote. TikTok appealed to the Supreme Court, which will hear oral arguments on Jan. 10.

Most court observers believe the divestment requirement is on solid legal ground and that TikTok is likely to lose. Presumably, the federal government has a compelling national-security interest in preventing a foreign adversary from harvesting the personal data of 170 million Americans. ByteDance has ties to the communist Chinese government, and in China even supposedly private companies can be forced to turn data over to government intelligence agencies. Moreover, the U.S. has a history of limiting foreign ownership of media platforms to prevent spying. The Radio Act of 1927 was passed in part to restrict foreign control of broadcast stations.

Still, the free-speech concerns of TikTok and its libertarian-leaning defenders shouldn’t be brushed aside. Yes, lawmakers are interested in protecting sensitive data for security purposes, and prohibiting the app on government-issued devices is logical and prudent. But Congress also aims to protect Americans from what a House committee report called “misinformation,” “propaganda,” and “divisive narratives,” which is worrisome. Such language is inherently subjective and suggests that Americans are easily manipulated and incapable of thinking for themselves.

When a New York Times reporter asked then-Rep. Mike Gallagher (R., Wis.), a co-sponsor of legislation against the app, what he feared most about TikTok, his reply was instructive. “There are two threats. One is what you could call the espionage threat. It’s data security—using the app to find Americans, exfiltrate data, track the location of journalists,” he said. “That’s a serious threat, but I actually think the greater concern is the propaganda threat.”

But TikTok is hardly the only social-media platform that offers heaping platefuls of misinformation and political propaganda. It isn’t even the only app owned by a Chinese company that gathers extensive data on American users. WeChat, the messaging app developed by the Chinese tech firm Tencent, is another. Although concerns about fake news and misleading conjecture are legitimate, the best way to fight propaganda is with counterspeech, not censorship.

Another problem with banning TikTok might be that it will do little if anything to address data-security concerns. Foreign and domestic tech companies capture mountains of user information, which enable them to target advertising. TikTok is far from the worst offender. A 2022 Consumer Reports study noted that Google and Meta collect much more data than TikTok. As Scientific American reported last year, “many foreign and domestic tech companies collect data on their users at staggering scale and depth. Many of those data are traded globally in legal markets through third-party data brokers.”

Calli Schroeder of the Electronic Privacy Information Center, which studies digital privacy issues, told the magazine that banning TikTok amounts to “security theater.” According to Ms. Schroeder, “you could get rid of TikTok today, and China would not lose any significant [amount] of personal information on Americans.”

The reality is that nothing TikTok does is unique to TikTok, and China doesn’t need the app to access our data. If Congress wants to do something about digital privacy, it will have to do better than this.