『Salt Typhoon』のカバーアート

Salt Typhoon

Salt Typhoon

無料で聴く

ポッドキャストの詳細を見る

このコンテンツについて

This week we talk about cyberespionage, China, and asymmetrical leverage.We also discuss political firings, hardware infiltration, and Five Eyes.Recommended Book: The Fourth Turning Is Here by Neil HoweTranscriptIn the year 2000, then-General Secretary of the Chinese Communist Party, Jiang Zemin (jong ZEM-in), approved a plan to develop so-called “cyber coercive capabilities”—the infrastructure for offensive hacking—partly as a consequence of aggressive actions by the US, which among other things had recently bombed the Chinese embassy in Belgrade as part of the NATO campaign in Yugoslavia.The US was a nuclear power with immense military capabilities that far outshone those of China, and the idea was that the Chinese government needed some kind of asymmetrical means of achieving leverage against the US and its allies to counter that. Personal tech and the internet were still relatively young in 2000—the first iPhone wouldn’t be released for another seven years, for context—but there was enough going on in the cyber-intelligence world that it seemed like a good point of leverage to aim for.The early 2000s Chairman of the CCP, Hu Jintao, backed this ambition, citing the burgeoning threat of instability-inducing online variables, like those that sparked the color revolutions across Europe and Asia, and attack strategies similar to Israel’s Stuxnet cyberattack on Iran as justification, though China’s growing economic dependence on its technological know-how was also part of the equation; it could evolve its capacity in this space relatively quickly, and it had valuable stuff that was targetable by foreign cyberattacks, so it was probably a good idea to increase their defenses, while also increasing their ability to hit foreign targets in this way—that was the logic here.The next CCP Chairman, Xi Jinping, doubled-down on this effort, saying that in the cyber world, everyone else was using air strikes and China was still using swords and spears, so they needed to up their game substantially and rapidly.That ambition seems to have been realized: though China is still reportedly regularly infiltrated by foreign entities like the US’s CIA, China’s cybersecurity firms and state-affiliated hacker groups have become serious players on the international stage, pulling off incredibly complex hacks of foreign governments and infrastructure, including a campaign called Volt Typhoon, which seems to have started sometime in or before 2021, but which wasn’t discovered by US entities until 2024. This campaign saw Chinese hackers infiltrating all sorts of US agencies and infrastructure, initially using malware, and then entwining themselves with the operating systems used by their targets, quietly syphoning off data, credentials, and other useful bits of information, slowly but surely becoming even more interwoven with the fabric of these systems, and doing so stealthily in order to remain undetected for years.This effort allowed hackers to glean information about the US’s defenses in the continental US and in Guam, while also helping them breach public infrastructure, like Singapore’s telecommunications company, Singtel. It’s been suggested that, as with many Chinese cyberattacks, this incursion was a long-game play, meant to give the Chinese government the option of both using private data about private US citizens, soldiers, and people in government for manipulation or blackmail purposes, or to shut down important infrastructure, like communications channels or electrical grids, in the event of a future military conflict.What I’d like to talk about today is another, even bigger and reportedly more successful long-term hack by the Chinese government, and one that might be even more disruptive, should there ever be a military conflict between China and one of the impacted governments, or their allies.—Salt Typhoon is the name that’s been given to a so-called '“advanced persistent threat actor,” which is a formal way of saying hacker or hacker group, by Microsoft, which plays a big role in the cybersecurity world, especially at this scale, a scale involving not just independent hackers, but government-level cyberespionage groups.This group is generally understood to be run out of the Chinese Ministry of State Security, or MSS, and though it’s not usually possible to say something like that for certain, hence the “generally understood” component of that statement, often everyone kind of knows who’s doing what, but it’s imprudent to say so with 100% certainty, as cyberespionage, like many other sorts of spy stuff, is meant to be a gray area where governments can knock each other around without leading to a shooting war. If anyone were to say with absolute certainty, yes, China is hacking us, and it’s definitely the government, and they’re doing a really good job of it, stealing all our stuff and putting us at risk, that would either require the targeted government to ...
まだレビューはありません