All Episodes

September 19, 2025 4 mins
This is your Tech Shield: US vs China Updates podcast.

Ting here, reporting live and geeky on the cyber frontline. Buckle up, listeners—these past few days have been a wild circuit board of US cyber-defense news, most of it shaped by the ongoing high-stakes chess match with China. And trust me, I’m watching every move.

The Pentagon, clearly not in a gaming mood, dropped new rules banning tech vendors from using China-based engineers on sensitive US government cloud systems. Turns out, Microsoft used these folks to maintain Defense Department servers for years—leaving the door wide open for spying, according to an explosive investigation by ProPublica. Now, only engineers from friendly nations are allowed anywhere near the secret stuff, and they’ll need more supervision than a five-year-old with admin rights. Plus, every keystroke gets logged with country of origin. Microsoft has already shifted its support model, reportedly swearing to match the Pentagon’s beefed-up security standards. I call that a major firewall in policy, but experts say this vulnerability was so obvious, it’s embarrassing it lasted this long.

Meanwhile, the Senate is pushing the China Military Power Transparency Act, expanding annual reports to dig deep into emerging cyber threats and China’s tech advances. Senator Cortez Masto and Ted Budd want to know exactly what China’s cooking up in AI, drones, and even bio-tech. Honestly, good luck keeping up—the pace of innovation is wild over there. The bill also takes aim at everything from farmland acquisitions near military bases to AI-driven scenarios like cyber-enabled economic warfare or blockades. It’s the cyber-age remake of Cold War monitoring, with way more acronyms.

And speaking of innovation, there’s big buzz about the Pentagon needing a Digital Command and a Digital Warfare Corps, according to a recent Special Competitive Studies Project report. Forget old-school arms races—this is about sensors, AI, and autonomous platforms acting as digital gears, turning information into split-second decisions. Picture a Space Force, but for code and data, not rockets, and you get the idea. The game is to offset China’s strengths in numbers with US tech’s speed, autonomy, and smart systems. But as Eric Schmidt’s think tank notes, without a dedicated digital corps, the whole strategy might just short-circuit.

On the ground—or, uh, hard drive—Qilin ransomware is now top dog in attacks against US state and local governments, leapfrogging the likes of RansomHub. CIS says Qilin’s M.O. is double extortion plus data theft, demanding up to half a million dollars and leaking info when frustrated. Their success? Phishing, exploiting app flaws, and even stealing Chrome credentials with their newest variants. They corrupt backups and wipe forensics evidence, making everything from town halls to healthcare networks quake in their boots. CISA and the Center for Internet Security are chiming in: back up your data, patch those vulnerabilities, and watch for phishing attempts like a hawk with broadband.

Industry response? CISOs are snapping up integrated security platforms to fight tool sprawl and give AI developer assistants the mission to write secure code. The consensus among experts: proactive defense beats playing whack-a-mole after the fact.

Now, gaps—no sugarcoating here. The oversight spotlight reveals persistent under-investment in AI control, interpretability, and hardware advantage. That’s right—chips are critical, and if export approvals slip through, China’s data center capacity could double overnight, powering everything from bots to surveillance drones.

To sum up: the US is digging in with stricter protection measures, patching up glaring vulnerabilities, and throwing legislative and tech muscle at the problem. But with China’s cyber capabilities growing, staying one step ahead feels like chasing packets across a jittery network.

Thanks for tuning in, cyber warriors! Don’t forget to subscribe for more updates and perspectives on the great Tech Shield faceoff. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Tingh here reporting live and deky on the cyber front line.
Buckle up listeners. These past few days have been a
wild circuit board of US cyber defense news, most of
its shaped by the ongoing high stakes chess match with China,
and trust me, I'm watching every move. The Pentagon, clearly
not in a gaming mood, dropped new rules banning tech

(00:22):
vendors from using China based engineers on sensitive U S
government cloud systems. Turns out Microsoft use these folks to
maintain Defense Department servers for years, leaving the door ride
open for spying. According to an explosive investigation by Pro Publica,
now only engineers from friendly nations are allowed anywhere near

(00:43):
the secret stuff, and they'll need more supervision than a
five year old with admin rights. Plus every keystroke gets
logged with country of origin. Microsoft has already shifted its
support model, reportedly swearing to match the Pentagon's beefed up
secure purity standards. I call that a major firewall in policy,

(01:04):
but experts say this vulnerability was so obvious it's embarrassing
it lasted this long. Meanwhile, the Senate is pushing the
China Military Power Transparency Act, expanding annual reports to dig
deep into emerging cyber threats and China's tech advances. Senator
Cortez Masto and Ted Bud want to know exactly what
China's cooking up in AI, drones, and even biotech. Honestly,

(01:28):
good luck keeping up. The pace of innovation is wild
over there. The bill also takes aim at everything from
farmland acquisitions near military bases to AI driven scenarios like
cyber enabled economic warfare or blockades. It's the cyber age
remake of Cold War monitoring with way more acronyms. And
speaking of innovation, there's big buzz about the Pentagon needing

(01:50):
a digital command and a digital warfare corps. According to
a recent Special Competitive Studies Project report, forget old school
arms races. This is about sensors, AI and autonomous platforms
acting as digital gears, turning information into split second decisions.
Picture a space force but for code and data, not rockets,

(02:11):
and you get the idea. The game is to offset
china strengths in numbers with US tech, speed, autonomy, and
smart systems. But, as Eric Schmidt's think tank notes, without
a dedicated digital core, the whole strategy might just short
circuit on the ground or a hard drive. Kulin ransomware
is now top dog in attacks against US state and

(02:33):
local governments, leapfrogging the likes of ransom hub CIS, says
Culin's mo is double extortion plus data theft, demanding up
to half a million dollars and leaking info. When frustrated
their success phishing, exploiting app floors, and even stealing Chrome
credentials with their newest variants, they corrupt backups and wipe

(02:55):
forensics evidence, making everything from town halls to healthcare network
works quake in their boots. SIZA and the Center for
Internet Security are chiming in back up your data, patch
those vulnerabilities, and watch for phishing attents like a hawk.
With broadband industry response. Sizos are snapping up integrated security

(03:18):
platforms to fight tools sprawl and give AI developer assistance
the mission to write secure code. The consensus among experts
proactive defense beats playing weckamore after the fact now gaps.
No sugarcoating here. The oversight spotlight reveals persistent under investment

(03:38):
in AI control, interpretability, and hardware advantage. That's right, chips
are critical, and if export approvals slip through, China's data
center capacity could double overnight, powering everything from bots to
surveillance drones. To sum up, the US is digging in
with stricter protection measures, patching up glaring vulnerability, and throwing

(04:01):
legislative and tech muscle at the problem. But with China's
cyber capabilities growing, staying one step ahead feels like chasing
packets across a jittery network. Thanks for tuning in, cyber Warriors,
don't forget to subscribe for more updates and perspectives on
the Great tex Shield face off. This has been a
quiet please production. For more check out Quiet please dot

(04:23):
Ai
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.