Bill Thompson
๐ค SpeakerAppearances Over Time
Podcast Appearances
So now we're going to write a patch that will close that port so that this port is no longer accessible by a guy like me, so I can't go in there and do something to this particular type of router.
Another great thing, I'll say something good about the administration.
They're doing some stuff right now to make sure that we're getting rid of Chinese technology and Chinese routers.
And there's a widespread network of โ the PLA has a โ and I can't remember the name of the botnet โ
But they essentially implanted a bunch of old unpatched routers to get access to government and business proximal people.
And it was widespread and huge.
And it looked like to me, I haven't read this anywhere, but if I were looking at this implant and how it was done, they were trying to really cause some trouble.
It was being placed at critical places.
Think power, think energy, think banking.
Like they really wanted to cause some ruckus.
And I have not been part of this administration, so I'm not saying anything classified for those of you who are listening.
But there was a decision to say, hey, we need to make sure that these things get patched and also that we're not bringing in architecture from the overseas because they don't play by the same rules that we at least say we play by.
Oh, yeah, and ZTE devices.
And that's really I mean, I can tell you firsthand from having done some other forensic exploitation on this stuff.
Another large part of my career I didn't talk about was just on mobile forensics and media forensics, which is essentially you think of like CSI Miami or CSI, whatever the city was.
You have forensics that are doing forensics on like blood and fingerprints and blood splatter and all that stuff.
There's a whole another part of that same forensics branch that focuses on media forensics.
What was deleted off this phone at one point?