Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Spring of 2025 external equipment and new books guide
    • The 18 best beaches in the world
    • River mares in Tanzania: Heavy weights in Africa
    • How to decide which one chooses
    • Tarangy National Park: The hidden jewel of Tanzania
    • 15 Something to do around Chautauqua Lake, New York – a short drive from Buffalo, Cleveland, or Pitsburgh
    • Discover the magic of relaxation and rich history of hot springs, Arkansas: a perfect mix of nature and culture
    • Level8 Creator Carry -A – Best Luggage for Modern Travel
    Facebook X (Twitter) Instagram
    ZEMS BLOG
    • Home
    • Sports
    • Reel
    • Worklife
    • Travel
    • Future
    • Culture
    • Politics
    • Weather
    • Financial Market
    • Crypto
    ZEMS BLOG
    Home » Is this the year of Hurricane Volt? | Critic portal
    Politics

    Is this the year of Hurricane Volt? | Critic portal

    ZEMS BLOGBy ZEMS BLOGFebruary 24, 2024No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In recent testimony before Congress on January 31, FBI Director Christopher Wray and CISA Administrator Jane Easterly gave stark accounts of China's deployment of malware in critical infrastructure.

    The testimony of Mr. Ray and Ms. Easterly was disturbing. Ms. Easterly described China's actions starkly, saying: “This is truly an 'everything everywhere, all at once' scenario.”

    In military operations, the term given to this type of pre-conflict action is known as “battlefield operational preparation”, or sometimes shortened to “forward force operations”.

    The tip of the spear for such actions by the Chinese Communist Party is the seemingly mundane Strategic Support Force (SSF), the People's Liberation Army's equivalent of US Special Operations Command plus parts of the NSA and CIA. An intelligence agency all in one. Fentanyl operators and Chinese paramilitaries who cross the unsecured southern US border could also be traced to the SS.

    The first outbreak of malware in China was observed in Guam

    Although the recent testimony by Mr. Ray and Ms. Easterly was shocking, it was a recycled news event. Volt Typhoon, the name of the hacking group that Mr. Ray and Ms. Easterly were referring to, was first reported publicly about a year ago. It was announced by Microsoft in May and then appeared again around July. The Typhoon Volt received some attention, but initial public reports were still in the shadow of the initial Chinese spy balloon episodes and may not have been fully understood in terms of their significance.

    Initial reports of the malware situation were somewhat “technical” and the seriousness of the situation was glossed over. There is a well-developed process and protocol in various environments for information exchange, such as the Persistent Security Framework, which is one of the high-level entry points for information exchange between industry and government. Trending new cyber issues are presented here for discussion, and response actions are planned and implemented.

    The effects of Hurricane Volt can be catastrophic and extremely significant. The eight major floating drydocks that the U.S. Navy and defense industrial base rely on for new construction and ship repair were either built in China or likely will be equipped with engines, pumps or valves from China and could capsize if improperly submerged. Spycranes are also a related security vulnerability and can fall when driving if remote security features are bypassed. The US government is trying to study and organize this large-scale operation of Chinese advance forces that aims to prepare the cyber battlefield and disrupt America's critical infrastructure.

    National Defense Authorization Act Section 1088: Surface drill on attacks on critical infrastructure

    The National Defense Authorization Act of 2023 (signed into law in December 2022) is buried in Section 1088 language that is easy to overlook. It was a tip that things were getting serious regarding the Chinese attack on the cyber playing field.

    The National Table is essentially a gathering of senior government officials, think tanks and industry representatives to meet and study various scenarios and develop the best courses of action to respond to the identified threat. The language put the Department of Defense in the lead, undersecretary of the Department of Homeland Security.

    The description of the tabletop exercise was to “assess the resiliency of U.S. domestic critical infrastructure supporting U.S. military requirements in the event of a military emergency related to Taiwan.” When precise directive language is provided in legislation (now enacted law), it usually indicates extensive coordination in advance between the executive and legislative branches.

    To further decipher the language of government, the leaders of Congress and the executive branch were very concerned and had been talking for months, perhaps years, on the subject and have now agreed to act. A classified report has likely been delivered to Congress, and more action has been taken to protect America's critical infrastructure.

    Effective cybersecurity depends on using all tools of national power

    Cybersecurity is often thought of as protected access points to the Internet, internal scanning for malware, and key measures like two-factor authentication. All this is true, but one of the most effective methodologies to ensure cybersecurity is the effective application of all tools of national power – diplomatic, informational, military, economic, financial, intelligence and law enforcement (DIMEFIL). Using non-cyber means to deter, and if necessary punish, is one of the most effective ways to prevent aggressive hackers like the Chinese regime from penetrating U.S. critical infrastructure.

    The Trump team knew this and implemented DIMEFIL very effectively. The Biden team appears reticent to use the most effective tools, such as US economic and financial tools of national power against China.

    All views are personal and do not reflect the views of any organization.

    This article first appeared in the Epoch Times and is reprinted with permission.

    Source link

    ZEMS BLOG
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe White House reverses its West Bank policy and describes Israeli settlements as illegal
    Next Article Read Adam Back's full emails with Bitcoin creator Satoshi Nakamoto
    ZEMS BLOG
    • Website

    Related Posts

    Rule change bans trans golfer from women's tour | Critic portal

    March 10, 2024

    Burlington Police Arrest Wisconsin State Assembly Speaker for Subpoenaing Petitioners, Taking Them Off Public Property – Last Day to Sign Petition (Video) | Critic portal

    March 10, 2024

    WATCH: Nancy Mays destroys crying Clinton friend George Stephanopoulos after he tried to expose her as a rape victim in support of President Trump | Critic portal

    March 10, 2024
    Leave A Reply Cancel Reply

    Spring of 2025 external equipment and new books guide

    May 29, 2025

    The 18 best beaches in the world

    May 28, 2025

    River mares in Tanzania: Heavy weights in Africa

    May 26, 2025

    How to decide which one chooses

    May 9, 2025
    Recent Posts
    • Spring of 2025 external equipment and new books guide
    • The 18 best beaches in the world
    • River mares in Tanzania: Heavy weights in Africa
    • How to decide which one chooses
    • Tarangy National Park: The hidden jewel of Tanzania
    About

    ZEMS BLOG in partnership with Holiday Omega keeps you informed. Bringing you the latest news from around the world with fresh perspectives and unique insights. Your daily source for news from around the world. All perspectives, all curated for a global audience.

    Facebook X (Twitter) Instagram YouTube Telegram
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    Subscribe For latest updates

    Type above and press Enter to search. Press Esc to cancel.