Eric O'Neill
👤 PersonAppearances Over Time
Podcast Appearances
It's going to be denying the things that we need and love to be happy as humans. You know, our power, our gas, our water. Look, we got to talk about what we just learned about, which has been this progressing story right now. And this goes back to Chinese espionage, an attack group called Salt Typhoon that apparently for the last year or two has been lurking in at least eight U.S.
It's going to be denying the things that we need and love to be happy as humans. You know, our power, our gas, our water. Look, we got to talk about what we just learned about, which has been this progressing story right now. And this goes back to Chinese espionage, an attack group called Salt Typhoon that apparently for the last year or two has been lurking in at least eight U.S.
It's going to be denying the things that we need and love to be happy as humans. You know, our power, our gas, our water. Look, we got to talk about what we just learned about, which has been this progressing story right now. And this goes back to Chinese espionage, an attack group called Salt Typhoon that apparently for the last year or two has been lurking in at least eight U.S.
telecom providers. So that's your phone in your pocket. It's quite possible that as you made a call or sent a text, Chinese spies have been reading it. And in fact, even though we know about it, and now we know that they've been there for a year or two, the U.S. can't kick them out.
telecom providers. So that's your phone in your pocket. It's quite possible that as you made a call or sent a text, Chinese spies have been reading it. And in fact, even though we know about it, and now we know that they've been there for a year or two, the U.S. can't kick them out.
telecom providers. So that's your phone in your pocket. It's quite possible that as you made a call or sent a text, Chinese spies have been reading it. And in fact, even though we know about it, and now we know that they've been there for a year or two, the U.S. can't kick them out.
They're using part of the telecom infrastructure that allows government agencies like the FBI to use backdoors when they have warrants to get phone information. They're able to exploit that using different methods and cyber attacks. and get in and steal some of this information. So they're linked to Chinese government.
They're using part of the telecom infrastructure that allows government agencies like the FBI to use backdoors when they have warrants to get phone information. They're able to exploit that using different methods and cyber attacks. and get in and steal some of this information. So they're linked to Chinese government.
They're using part of the telecom infrastructure that allows government agencies like the FBI to use backdoors when they have warrants to get phone information. They're able to exploit that using different methods and cyber attacks. and get in and steal some of this information. So they're linked to Chinese government.
They're Chinese government spies, and they're stealing information from telecom networks. They've stolen plenty of data, and they're going to use it for espionage and potentially downstream disruptive purposes. You know, if there's a crisis or a conflict, they can use this information.
They're Chinese government spies, and they're stealing information from telecom networks. They've stolen plenty of data, and they're going to use it for espionage and potentially downstream disruptive purposes. You know, if there's a crisis or a conflict, they can use this information.
They're Chinese government spies, and they're stealing information from telecom networks. They've stolen plenty of data, and they're going to use it for espionage and potentially downstream disruptive purposes. You know, if there's a crisis or a conflict, they can use this information.
Right. Well, I don't think it's we can't legally buy like U.S. companies can't legally buy certain Chinese, you know, telecom or communications hardware. And they shouldn't be buying a lot of it. And I didn't see that. We don't know the exact way that they got in, but we do know that they got in. And what's been revealed right now is they leverage known security flaws in telecom networks.
Right. Well, I don't think it's we can't legally buy like U.S. companies can't legally buy certain Chinese, you know, telecom or communications hardware. And they shouldn't be buying a lot of it. And I didn't see that. We don't know the exact way that they got in, but we do know that they got in. And what's been revealed right now is they leverage known security flaws in telecom networks.
Right. Well, I don't think it's we can't legally buy like U.S. companies can't legally buy certain Chinese, you know, telecom or communications hardware. And they shouldn't be buying a lot of it. And I didn't see that. We don't know the exact way that they got in, but we do know that they got in. And what's been revealed right now is they leverage known security flaws in telecom networks.
Now, how do they do it? They probably used a combination of attacking employees. You can do that through spear phishing. You can attack unpatched flaws. It's quite possible that there is some technology that China has gotten into the network. I mean, these are massive infrastructure networks. You know, China has been known to put chips and routers that are built in China and the U.S.
Now, how do they do it? They probably used a combination of attacking employees. You can do that through spear phishing. You can attack unpatched flaws. It's quite possible that there is some technology that China has gotten into the network. I mean, these are massive infrastructure networks. You know, China has been known to put chips and routers that are built in China and the U.S.
Now, how do they do it? They probably used a combination of attacking employees. You can do that through spear phishing. You can attack unpatched flaws. It's quite possible that there is some technology that China has gotten into the network. I mean, these are massive infrastructure networks. You know, China has been known to put chips and routers that are built in China and the U.S.
uses, and now you've got a spy living in your home because you bought that brand of router.
uses, and now you've got a spy living in your home because you bought that brand of router.