All Episodes

August 29, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

Hey listeners, it’s Ting here—your favorite cyber sleuth and semi-professional dumpling enthusiast. Settle in, because the last few days have been wild on the US–China cyber defense front. The NSA, CISA, FBI, and a league of international cyber avengers dropped what’s basically a giant, glowing advisory warning about Chinese state-backed actors. The latest alert is titled “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System.” (Say that five times fast and you get an honorary badge from the Ministry of Acronyms.) According to NSA and friends, threat groups like Salt Typhoon, UNC5807, and RedMike have been tunneling into telecom, government, and military networks worldwide—the full buffet of critical infrastructure, right down to hotel WiFi for your sketchy conference calls.

CISA’s guidance isn’t shy: they want telecom and infrastructure defenders to patch up vulnerabilities (nerd translation: CVE-2024-21887, CVE-2024-3400, CVE-2023-20198, and more), centralize log collection, lock down routers, and hunt for malicious activity like your job depends on it—because it does. FBI cyber-division’s Michael Machtinger put it bluntly: nearly every American is likely affected, not just the ones working with classified stuff. So yes, grandma’s Sudoku scores might now be state secrets.

The campaign, dubbed Salt Typhoon, didn’t start yesterday. This operation dates back at least six years but only got blown open last fall. What’s jaw-dropping is scale: over 200 American organizations compromised, info scooped from millions domestically and in over 80 countries. Victims? Not just regular folks, but headliners like Donald Trump and JD Vance, per The Register. Beijing’s strategy involves using companies like Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology, and Sichuan Zhixin Ruijie Network Technology—contractors with serious ties to China’s Ministry of State Security.

Let’s talk industry and government response. The National Cyber Security Centre in the UK and agencies from Japan, Australia, and others have joined the US in urging organizations to review logs, hunt threats proactively, and fix what’s broken. This isn’t just about reacting—Richard Horne of NCSC says we need to be actively looking for trouble, because these attackers don’t telegraph their punches.

One big bombshell: The Pentagon revealed they’ve terminated a Microsoft-serviced program that let Chinese engineers touch Defense Department cloud systems. Secretary Pete Hegseth was not amused, calling the practice “mind-blowing” in his video address. Microsoft is now banned from letting foreign nationals anywhere near DoD networks, and all vendors have been told to exorcise their codebases of anything remotely made-in-China.

Expert take? The coordination between agencies is stronger than ever, and published vulnerability lists make life much harder for Chinese APTs. But the gaps remain: initial access vectors still aren’t fully understood, and the sheer scale of China’s third-party contractor network means new proxy companies will pop up like weeds. FBI’s Jason Bilnoski notes that China’s reliance on domestic tech firms actually creates weaknesses—sloppy coordination meant US and its allies could finally trace some digital bread crumbs.

Emerging defensive tech is sharp: more automated threat hunting, AI-driven anomaly detection, and collective playbooks now circulate among the major telcos and cloud providers. Still, the biggest challenge? Keeping every corner patched while attackers evolve tactics. Today’s cyber chessboard rewards the pros who always check their logs and trade notes with their counterparts. If you’re not sharing intel, you’re playing solo—and that’s the quickest way to get checkmated by Salt Typhoon.

All right, listeners, that’s your crash course in Tech Shield: US versus China cyber drama this week. Thanks for tuning in, and don’t forget to subscribe wherever you get your info. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Hey listeners, it's tang here. Your favorite cyber sleuth and
semi professional dumple enthusiast settle in because the last few
days have been wild. On the US China cyber defence front,
the NSA, SISA, FBI, and a league of international cyber
avengers dropped what's basically a giant glowing advisory warning about

(00:23):
Chinese state backed actors. The latest alert is titled Countering
Chinese State Sponsored Actors compromise of networks worldwide to feed
global espionaur system. Say that five times fast and you
get an honorary badge from the Ministry of Acronyms. According
to NSA and friends, threat groups like salt Typhoon, UNC

(00:46):
five eight oh seven and red Mike have been tunneling
into telecom, government, and military networks worldwide the full buffet
of critical infrastructure write down to Hotel Wi Fi for
your sketchy conference call. Siss's guidance isn't shy. They want
telecom and infrastructure defenders to patch up vulnerabilities. NERD translation

(01:08):
c the DASH twenty twenty four DASH three hundred forty,
see the DASH twenty twenty three DASH three hundred forty
and more centralized log collection, lock down raters, and hunt
from malicious activity like your job depends on it, because
it does. FBI Cyber Divisions Michael Mactinger put it bluntly,

(01:30):
nearly every American is likely affected, not just the ones
working with classified stuff. So yes, Grandma's Sudoku scores might
now be state secrets. The campaign dubbed salt Typhoon didn't
start yesterday. This operation dates back at least six years,
but only got blown open last fall. What's jaw dropping

(01:52):
is scale. Over two hundred American organizations, compromised info scooped
from millions domestically, and an over eighty countries. Victims not
just regular folks, but headliners like Donald Trump and JD. Vance.
Per the Register, Beijing's strategy involves using companies like Sichuan

(02:12):
Jukshinhei Network Technology, Beijing, haun U t and Geong Information Technology,
and Sichuan Zishin Ruiji Network Technology, contractors with serious ties
to China's Ministry of State Security. Let's talk industry and
government response. The National Cybersecurity Center in the UK and

(02:33):
agencies from Japan, Australia and others have joined the US
in urging organizations to review logs, hunt threats proactively, and
fix what's broken. This isn't just about reacting. Richard Horn
of NCSC says we need to be actively looking for
trouble because these attackers don't telegraph their punches. One big bombshell,

(02:56):
the Pentagon revealed they've terminated a Microsoft service program that
let Chinese engineers touch Defense Department cloud Systems. Secretary Pete
Hesith was not amused, calling the practice mind blowing in
his video address. Microsoft is now banned from letting foreign
nationals anywhere near DoD networks, and all vendors have been

(03:19):
told to exercise their code bases of anything remotely made
in China. Expert take the coordination between agencies is stronger
than ever, and published vulnerability lists make life much harder
for Chinese apts, but the gaps remain. Initial access vectors
still aren't fully understood, and the sheer scale of China's

(03:40):
third party contractor network means new proxy companies will pop
up like weeds. FBI's Jason bil Nooski notes that China's
reliance on domestic tech firms actually creates weaknesses. Sloppy coordination
meant US and its allies could finally trace some digital breadcrumbs.
Urging defensive tech is sharp, more automated threat hunting, AI

(04:04):
driven anomaly detection and collective playbooks now circulate among the
major telcos and cloud providers. Still the biggest challenge keeping
every corner patched while attackers evolve tactics. Today's cyber chess
board rewards the pros who always check their logs and
trade notes with their counterparts. If you're not sharing Intel,

(04:26):
you're playing solo, and that's the quickest way to get
checkmated by salt typhoon. All right, listeners, that's your crash
course in tech Shield US versus China cyber drama this week.
Thanks for tuning in, and don't forget to subscribe wherever
you get your info. This has been a quiet please production.
For more check out quiet please dot ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.