"Tek Talk" is not the largest Chinese cyberspace against Trump

If an American -Chinese conflict arises, and it can deal with Taiwan, the Americans will face a more dangerous threat to their daily lives than the issue of political propaganda that surrounds the application of ‘Tok’. In the worst scenarios, they may not be able to get gasoline for their cars or set their housing on fire. Chinese pirates penetrate the most important biomassic infrastructure networks in the United States, including electricity networks, water treatment plants and transport networks. FBI director Christopher Rai said during the Cyber ​​Security Summit in April that this cyber fracture is part of a plan that enables Beijing to directly directly directly and resist the belt against civil infrastructure to panic and resist America’s will. ” In other words, these warriors intensify their abilities to disable decisive aspects of American life through keyboards. ‘Oben Ai’ is working with the Pentagon on the development of cyber security, while the government is still investigating the extent of the electronic spying campaign launched by a group ‘volt typhoon’, in December, the White House confirmed that another group ‘Salt Typhone’ succeeded in penetrating the most important US telecom businesses. One of the lawmakers described the matter as “the worst penetration of communication in the history of our country, with a big difference of what preceded it.” The Americans were surprised again when the Treasury revealed that an infiltrator sponsored by a state penetrated its network. It was said that even the computer of Treasury Secretary Janet Yellen was chopped. The last electronic spying invasion, in which Beijing officially denied any role, represents a tremendous and embarrassment of the United States, which will not overcome in a technical war with China if it cannot protect the basic civil infrastructure or government agencies from such offenses. What did the American Airlines learn from the “Craoud Strike” function? Despite the high risks of potential acute consequences, the most mysterious aspects of cyber security were never an attractive point of political mobilization in Washington. If concrete goals such as “Tech Talk”, and even the Chinese spy balloon in 2023, attract a much greater amount of public’s attention. In terms of protection and confrontation of the advanced and invisible cyber -to -spy campaigns that Beijing launches will eventually appear as the biggest test of President Donald Trump on China. Investigations in the recent attacks are still underway, and we can realize many things in the coming months (we will also see a lot of guilt while the authorities determine the weaknesses). However, some initial reports indicate that the “Solt Typhoon” attacks on communication networks were the result of gaps caused by old equipment, and legislators must work with the private sector to ensure the weaknesses identified immediately. The ‘US Treasury’ is exposed to the burglary of ‘Pirates supported by China’ that spurred on the cyber security and infrastructure safety of the government ‘highly targeted individuals’ in December – such as those who hold high positions in government or politics, or who probably have information they start at Beijing – to start the cryptocurrencies between two contacts, just take. The guidelines warned that “they must assume that all communication between government and personal mobile devices and internet services is at risk of tapping or manipulating.” Government organizations and agencies need to require possible goals to comply with the recommendations, as offenses are often found in the worst links, which are often individuals who ignore the theoretically required protocols. The United States is strongly lower in this battle, as the number of pirates supported by Beijing exceeds the agents of the Cyber ​​Federal Bureau of Investigation by at least “at least one”, according to warnings that Ray has repeated over the ears of legislators, adding that China has a ‘larger pirater program combined than other major countries’. If you face such threats, it will need much larger investments in workers and building pans that focus exclusively on this danger. Report: A Chinese attack on piracy that has entered the US “T -Mobile” network, and it will also require a lot of cooperation with the private sector. Technology manufacturers and program providers must realize that cyber security is a priority for their businesses, and Washington must also deepen its partnerships with essential infrastructure providers to ensure that these sectors, who often suffer from resources, take the best precautions. Lawmakers must work on targeted laws that require businesses to be at risk of ensuring strong defense measures, instead of being satisfied once they voluntarily comply. Last week, the United States announced sanctions against a Chinese company and a person that it belongs to the Chinese Ministry of State, because they are linked to modern electronic attacks. These sanctions that Sichuan Juxinhe Network Technology, which is the Cipranian Security Company, and on Yen Kitcheng, accused of being involved in treasury violation, of trade in the United States and obstacles to their own ownership in the country, but it is probably not that it has a tangible impact on their operations or goals. This is a clear message, but it is a short length in terms of risks. America places sanctions against a Chinese security company after an electronic attack. Trump fought his campaign based on the rigor in the handling of China. But he still repeats his speech, threatening to launch another trade war by imposing major customs duties. But his record in cyber security was unbalanced. During his first period, he canceled the position of the Cyber ​​Security official in the country and proposed great discounts for federal agencies by the “government efficiency” campaign, involving Elon Musk. Cyber ​​security must be at the head of Trump’s technical policy agenda, even if the popularity of the policy is less than the movements such as rescue “Tech Tok” or the appointment of Caesar for coding and artificial intelligence. The threat of Cyber-Chinese attacks is not new, but it is now clear that it is no longer targeting the intellectual property of companies or data related to political campaigns. The infilters previously revealed their motives when they fall into the trap of the ‘honeyfall’ installed by the FBI, which quickly stole information related to the control of infrastructure systems and financial and commercial states. It has become clear that Pirates Beijing is preparing for conflict and cyber war. The United States cannot leave itself weak.