Chinese hackers impersonate one of the most important politicians in the United States

A select committee of the U.S. House of Representatives has reported that Chinese actors impersonated Representative John Moolenaar with the aim of stealing key information that could influence trade negotiations between the United States and China. This incident has raised serious concerns about national security and the country’s trade relations. China vs. the United States: Fight! According to the committee’s statements, the intruders used identity spoofing techniques to pose as Moolenaar, which allowed them to obtain sensitive data. This type of maneuver not only puts specific individuals at risk, but […]

A select committee of the U.S. House of Representatives has reported that Chinese actors have impersonated Representative John Moolenaar with the aim of stealing key information that could influence trade negotiations between the United States and China. This incident has raised serious concerns about national security and the country’s trade relations.

China against the United States: Fight!

According to the committee’s statements, the intruders used identity theft techniques to impersonate Moolenaar, which allowed them to obtain sensitive data. This type of maneuver not only puts specific individuals at risk but can also affect business and strategic policies at the national level.

The stolen information could be used to manipulate business negotiations in favor of foreign interests, which raises alarms in the political and economic sphere. The actions of these Chinese actors are seen as a clear threat to the stability of bilateral relations between the U.S. and China, which are already in a tense context due to various trade and technological disputes.

2131862425

As the story unfolds, it is speculated that the actors may have had access to more information than was initially thought. This situation highlights the vulnerability of government infrastructures to cyber attacks and underscores the urgent need to strengthen security protocols.

Policymakers have emphasized the importance of thoroughly investigating this incident and taking appropriate measures to safeguard sensitive information and protect national security. This episode serves as a reminder that information technologies, while useful, can also be a battleground for misinformation and espionage.

The United States is destroying its ability to fight online crime and cyberattacks

The U.S. State Department has begun to face difficulties in its ability to address cyber threats following a recent reorganization of offices and a staff reduction that has affected its Cyberspace and Digital Policy Office (CDP). This situation has raised concerns about how the country will be able to effectively collaborate with its allies on cybersecurity. The government of the mess Approved in 2022, the Cyber Diplomacy Act established the creation of the CDP with the aim of strengthening internet infrastructure and improving the cyber capacity of U.S. partners […]

The U.S. Department of State has begun to face difficulties in its ability to address cyber threats following a recent reorganization of offices and a staff reduction that has affected its Cyber and Digital Policy Office (CDP). This situation has raised concerns about how the country will be able to effectively collaborate with its allies on cybersecurity issues.

The government of troubles

Approved in 2022, the Cyber Diplomacy Act established the creation of the CDP with the aim of strengthening internet infrastructure and improving the cyber capabilities of U.S. partners. However, in a move that has been criticized by many experts, the Department has decided to split the CDP into multiple offices, which jeopardizes its mission and the resources necessary for cooperation with allies.

This reorganization has not only led to the loss of specialized personnel, such as two strategists and several experts in bilateral affairs, but it has also affected the U.S. response to cyberattacks, which have been perpetrated by nations such as China, Russia, and Iran. The inability to secure cyber infrastructure could even compromise U.S. military operations abroad.

The Congress, recognizing the importance of robust cyber diplomacy, is considering a reauthorization that could restore the mandate of the CDP. However, experts warn that, despite legislative efforts, recovering lost capabilities will be a lengthy process. Cybersecurity experts who have left the department may seek more attractive opportunities in the private sector.

Meanwhile, the consequences of this reorganization are being felt in a context where international collaboration is becoming increasingly crucial to counter current cyber threats.

The United States is going to spend $3 billion to dismantle all Chinese infrastructure in its country

It was back in 2018 when Donald Trump targeted Huawei to make it the enemy. The reason, according to the White House at the time, was espionage. Huawei was spying on the United States through its 5G infrastructure. The reality, over the years, has become clear: Huawei was far ahead of American companies, and the dependence of the American giant on a key Chinese government company was unfeasible for Trump. This war ended recently when Huawei, so expelled from the American ecosystem (and therefore expelled from Android), cut the last ties it had with the […]

It was back in 2018 when Donald Trump targeted Huawei to make it the enemy. The reason, according to the White House at the time, was espionage. Huawei was spying on the United States through its 5G infrastructure. The reality, over the years, has become clear: Huawei was far ahead of American companies, and the dependence of the American giant on a key company of the Chinese government was unfeasible for Trump.

This war ended recently, when Huawei, so expelled from the American ecosystem (and therefore expelled from Android), cut the last ties it had with the world’s most used operating system, owned by Google.

The war against Chinese companies did not end there, as the White House drew up a long list of Chinese companies that were suspected of collaborating with the Chinese government and posing a strategic threat to the United States. ZTE was one of those companies, along with Huawei and many others.

Approve a $3 billion budget to dismantle all Chinese infrastructure

The United States House of Representatives is scheduled to vote this week on the defense budget for 2025, which includes an allocation of 3 billion dollars to replace telecommunications equipment previously purchased from Huawei and ZTE.

According to Reuters, the equipment supplied by these companies poses security risks, especially because hackers affiliated with the People’s Republic of China (PRC) have been conducting a massive cyber-espionage campaign to compromise private U.S. telecommunications companies.

Congress also wants an intelligence report describing Chinese espionage efforts and the country’s biotechnological capabilities.

The U.S. Federal Communications Commission (FCC) has previously created the Supply Chain Reimbursement Program (also known as the Rip and Replace Program) endowed with $1.9 billion so that network operators with ten million or fewer customers can obtain reimbursement for the removal, replacement, and disposal of hardware and services supplied by Huawei and/or ZTE.

However, the agency has previously stated that the total cost of replacing everything could reach $4.98 billion. Therefore, the $3 billion added to the National Defense Authorization Act for Fiscal Year 2025 should offset part of the deficit, helping more than 100 U.S. companies to dispose of potentially compromised equipment.

Although enormous, this amount is still not enough, as FCC Chairwoman Jessica Rosenworcel has urgently requested an additional $3.08 billion in funding from Congress. Thus, even if the FCC secures the full $3 billion, it will still need to provide another $80 million to cover the anticipated expenses.

Senator Maria Cantwell, chair of the Senate Commerce Committee, stated that the funding for this program will come from the auction of the advanced AWS-3 wireless spectrum, so it will likely not be a direct burden on the average taxpayer.

Discord DOWNLOAD

Aside from that, all Huawei and ZTE equipment that needs to be disposed of must be replaced, likely with U.S.-made products from Cisco and other major networking companies.

Thus, if Congress approves the full amount, the U.S. telecommunications sector could finally be freed from the alleged threat posed by the use of Huawei and ZTE communications equipment.

The United States is taking piracy seriously: it will begin blocking websites

A plan that would make it a bit harder to download and consume illegal content. No matter how much you enjoy visiting your favorite pirate bay every Friday.

Depending on the country you live in, piracy can be a dangerous thing for you or not. For example, in Europe each nation has specific policies regarding this practice. In Spain, there is a lot of permissiveness, and in Germany, it is relentlessly pursued.

SkyShowtime DOWNLOAD

At this year’s CinemaCon, the President and CEO of the Motion Picture Association, Charles Rivkin, has revealed a plan that would make it a little more difficult to download and consume illegal content. It doesn’t matter how much you enjoy visiting pirate bay every Friday.

Rivkin has stated that the association will work with Congress to establish and implement legislation for blocking piracy websites in the United States. He added that nearly 60 countries use website blocking as a tool against piracy, “including major democracies and many of the closest allies of the United States.”

United States wants to block illegal audiovisual content sites

The only reason why the United States is not one of them, he continued, is the “lack of political will, combined with an outdated understanding of what blocking sites really entails, how it works, and who it affects.”

With the current law, “film and television producers, music and book publishers, sports leagues, and broadcasters” can request the court to order Internet service providers to block websites that share stolen content.

Rivkin, arguing in favor of site blocking, explained that the practice does not affect legitimate businesses. And he said that legislation regarding this practice would require detailed evidence demonstrating that a specific entity engages in illegal activities and that alleged perpetrators can appear in court to defend themselves.

SkyShowtime DOWNLOAD

Rivkin cited FMovies, an illegal movie streamer, as an example of how site blocking in the US would minimize traffic to piracy websites. Apparently, FMovies receives 160 million visits per month, one third of which come from the United States. If the regulation also existed in the country, the website’s traffic would theoretically decrease quite drastically.

Cyberpunk 2077 has new secrets nobody discovered until NOW

Three years since its release, hidden secrets of Cyberpunk 2077 are still being discovered, demonstrating the care that is put into the game.

It is common for open-world games to have many secrets that are discovered over time. Sometimes, even years later. All the great titles of the genre have had them, in many cases they still have them, and even today, they continue to amaze us with everything their developers hid in them.

The latest game to experience this has been Cyberpunk 2077. A Reddit user named CommercialLeg2439 one day discovered something strange at the Grand Imperial Mall in the Pacifica area. He noticed that when night fell, some letters would light up while others wouldn’t. Which resulted in an apparently nonsensical message: “GRA D IMPERI L MALI”. Except it turned out to have a hidden meaning.

As other Reddit users noticed, the message was in Latin and if you ignore the L, you get “grad imperi mali”. Or “Degree of government evil”. Something that if we introduce the L, which is the number 50, could well mean either that the 50 states of the United States are part of that evil, or that the degree of evil is 50. Depending on how we want to interpret the message.

Although it’s not a big detail, it shows that, despite everything, Cyberpunk 2077 still has many hidden details yet to be discovered. A reminder of the attention to detail that developers put into this kind of games, and how they don’t seem to run out even years after their initial release.

Cyberpunk 2077: Phantom Liberty DOWNLOAD