• 11 Posts
  • 4 Comments
Joined 3M ago
cake
Cake day: Jan 29, 2025

help-circle
rss

Accusing people of bad faith without reason just because they disagree with you is one of the most disingenuous things you can do.

I fully agree. Just read many of the comments about the linked article. They do exactly what you portray.


Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows
cross-posted from: https://lemmy.sdf.org/post/32848522 > [Archived](https://web.archive.org/web/20250417143144/https://www.wired.com/story/brass-typhoon-china-cyberspies/) > > **Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.** > > As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking. > > Last year, revelations rocked the United States federal government that the Chinese hacking group known as “Salt Typhoon” had breached at least nine major US telecoms. And the group’s rampage even continued into this year in the US and other countries around the world. Meanwhile, the Beijing-linked hacking group “Volt Typhoon” has continued to lurk in US critical infrastructure and utilities around the world. Meanwhile, the notoriously versatile syndicate known as Brass Typhoon—also called APT 41 or Barium—has been operating in the shadows. > > [...] > > Brass Typhoon is known for having carried out a notable string of software supply chain attacks in the late 2010s and for brazen attacks on **telecoms** around the same time in which the group specifically targeted call record data. The gang is also known for its hybrid activity, carrying out hacks that align with Chinese state-sponsored espionage by the Chinese Ministry of State Security, but also moonlighting on seemingly cybercriminal projects, particularly focused on the **video game industry and in-game currency scams**. > > Research indicates that Brass Typhoon has continued to be active in recent months with financial crimes targeting online gambling platforms as well as espionage targeting manufacturing and energy firms. Its sustained activity has run in parallel to Salt and Volt Typhoon’s recent, attention-grabbing campaigns, and analysis increasingly shows that China’s state-backed hacking operations must be viewed comprehensively, not just in terms of individual actors. > > [...]
fedilink


Chinese people flood TikTok with videos urging Americans to buy direct amid Trump tariffs
cross-posted from: https://lemmy.sdf.org/post/32835964 > [Archived](https://web.archive.org/web/20250417095349/https://www.independent.co.uk/news/world/americas/us-politics/china-trump-tariffs-tiktok-instagram-lululemon-louis-vuitton-b2734819.html) > > [...] > > In one [Tiktok] video that has nearly 10 million views, a creator claims to be able to sell yoga pants from the same manufacturer that supplies Lululemon for $5-$6, instead of the $100 they sell for in the United States. > > “The material and the craftsmanship are basically the same because they come from the same production line,” she says, standing in front of what appears to be a factory. > > In another, a man standing on a factory floor claims to have access to manufacturers that produce Louis Vuitton bags, which he says can be sold directly to customers for $50. > > But both companies deny their products are finished in China, and experts told The Independent the videos are likely an effort by counterfeit or “dupe” manufacturers to take advantage of the chaos over the tariffs to boost their sales. > > “They're trying to conflate the fake manufacturers in China with the real manufacturers,” said Conrad Quilty-Harper, author of Dark Luxury, a newsletter about the luxury goods industry. > > “They're very clever with their social media, and they’re very effective at driving demand in the West,” he added. > > [...] > > Louis Vuitton has said repeatedly that it does not manufacture products in China. > > [...] > > TikTok users have reported seeing the videos appear in their feeds in recent days as the trade war between the U.S. and China continues to heat up. > > [...] > > **The counterfeit market in China is the largest in the world**. U.S. Customs seized counterfeit items worth some $1.8 billion in recommended retail price in 2023. > > Quilty-Harper said the counterfeit industry in China has been a concern for Western companies for years. And the enforcement of trademark and intellectual property rights internally has tended to depend on the geopolitical climate. > > “In the past, the Chinese authorities have been stricter on it, and sometimes they've been looser on it, and often that's to do with the relationship with the US and previous presidents,” he said. > > “This is part of a huge geopolitical battle between America and China over intellectual property. And it's just fascinating to see this sort of propaganda fight happening on these very high-traffic TikTok videos,” he added.
fedilink


DeepSeek: The Chinese Communist Party’s newest AI advance is making repression smarter, cheaper, and more deadly. Even worse, they aim to export it to the world.
cross-posted from: https://lemmy.sdf.org/post/32830658 *[This is an op-ed by Valentin Weber, senior research fellow with the German Council on Foreign Relations. He is the author of the International Forum for Democratic Studies report “Data-Centric Authoritarianism: How China’s Development of Frontier Technologies Could Globalize Repression.” His research covers the intersection of cybersecurity, artificial intelligence, quantum technologies, and technological spheres of influence.]* [...] While the financial, economic, technological, and national-security implications of DeepSeek’s achievement have been widely covered, there has been little discussion of its significance for authoritarian governance. DeepSeek has massive potential to enhance China’s already pervasive surveillance state, and it will bring the Chinese Communist Party (CCP) closer than ever to its goal of possessing an **automated, autonomous, and scientific tool for repressing its people**. [...] With the world’s largest public AI-surveillance networks — “smart cities” — Chinese police started to amass vast amounts of data. But some Chinese experts lamented that smart cities were not actually that smart: They could track and find pedestrians and vehicles but could not offer concrete guidance to authorities — such as providing police officers with different options for handling specific situations. [...] China’s surveillance-industrial complex took a big leap in the mid-2010s. Now, AI-powered surveillance networks could do more than help the CCP to track the whereabouts of citizens (the chess pawns). It could also suggest to the party which moves to make, which figures to use, and what strategies to take. [...] Inside China, such a network of large-scale AGI [Artificial General Intelligence] systems could autonomously improve repression in real time, rooting out the possibility of civic action in urban metropolises. Outside the country, if cities such as Kuala Lumpur, Malaysia — where China first exported Alibaba’s City Brain system in 2018 — were either run by a Chinese-developed city brain that had reached AGI or plugged into a Chinese city-brain network, they would quietly lose their governance autonomy to these highly complex systems that were devised to achieve CCP urban-governance goals. [...] As China’s surveillance state begins its third evolution, the technology is beginning to shift from merely providing decision-making support to actually acting on the CCP’s behalf. [...] The next step in the evolution of China’s surveillance state will be to integrate generative-AI models like DeepSeek into urban surveillance infrastructures. Lenovo, a Hong Kong corporation with headquarters in Beijing, is already rolling out programs that fuse LLMs with public-surveillance systems. In [the Spanish city of] Barcelona, the company is administering its Visual Insights Network for AI (VINA), which allows law enforcement and city-management personnel to search and summarize large amounts of video footage instantaneously. [...] The CCP, with its vast access to the data of China-based companies, could use DeepSeek to enforce laws and intimidate adversaries in myriad ways — for example, deploying AI police agents to cancel a Lunar New Year holiday trip planned by someone required by the state to stay within a geofenced area; or telephoning activists after a protest to warn of the consequences of joining future demonstrations. It could also save police officers’ time. Rather than issuing “invitations to tea” (a euphemism for questioning), AI agents could conduct phone interviews and analyze suspects’ voices and emotional cues for signs of repentance. Police operators would, however, still need to confirm any action taken by AI agents. [...] DeepSeek and similar generative-AI tools make surveillance technology smarter and cheaper. This will likely allow the CCP to stay in power longer, and propel the export of Chinese AI surveillance systems across the world — to the detriment of global freedom. [Edit typo.]
fedilink

China: Southeast Asia visit raises alarm over digital repression
cross-posted from: https://lemmy.sdf.org/post/32773817 > [Archived](https://web.archive.org/web/20250416075039/https://www.article19.org/resources/china-southeast-asia-visit-raises-alarm-over-digital-repression/) > > In his speech, [Chinese leader Xi Jinping] highlighted the Belt and Road Initiative (BRI) cooperation [with Asian countries], and touted ideas of building high-level connectivity networks, enhancing industrial cooperation, advancing security and law enforcement cooperation, and expanding people-to-people exchanges. China is likely to sign a number of agreements as it seeks to deepen ‘all-around cooperation’ with the three Southeast Asian nations. These are likely to include ongoing attention to digital infrastructure, technology, and governance norms-setting under digital cooperation – and risk further entrenching digital repression in the region. > > [...] > > **Vietnam** > > Vietnam is emblematic of a digital authoritarian state learning from China’s digital governance norms. > > [...] > > there is a great degree of similarity between the two laws, pointing to China’s influence over the development of Vietnam’s digital governance. Both laws define cybersecurity in a manner that diverges from conventional, rights-based approach, conflating technical infrastructure security with information control — resulting in enhanced censorship. Both laws also take a centralised approach to critical information infrastructure and promote centralised censorship of information critical of the regime. They require data localisation, raising serious risks of surveillance, and include a number of concerning obligations on foreign tech companies. Both laws also promote real name registration, which further compromises right to privacy and anonymity protections, adversely impacting freedom of expression online. Finally, Vietnam’s approach to cybersecurity models China’s emphasis on individual and tech companies’ requirements to act as surveillance extensions of the Party-State apparatus. Subsequent decrees in Vietnam have positioned the law even closer to its Chinese predecessor. > > [...] > > **Cambodia** > > In early 2022, Cambodia launched its Cambodian Digital Government Policy 2022– 2035, which referred to China as a positive case study in successful digital government, raising concerns about internet freedom in the country. We are likely to see further tightening of this relationship through additional cooperation agreements and memoranda of understanding. > > The starkest example of China’s malicious influence over Cambodia’s digital infrastructure and governance space is in the National Internet Gateway (NIG). In February 2021 Cambodia enacted the NIG Sub-Decree, establishing the country’s version of the Great Firewall of China. Article 6 of the Sub-Decree requires telecommunications companies and service providers to route internet traffic through government-controlled and monitored servers ‘to prevent and disconnect all network connections that affect national income, security, social order, morality, culture, traditions, and customs’. Articles 14 and 16 allow government officials to retain traffic data for a year and issue overbroad penalties for non-compliance. Sopheap Chak, former executive director of the Cambodian Centre for Human Rights, has observed that ‘the proposed NIG mirrors that of the Chinese internet gateway’. > > [...] > > **Malaysia** > > Malaysia is home to the second-largest Chinese overseas community in the world, after Thailand. It is also among the top 10 global recipients of BRI support; relations with China and digital cooperation are common elements of Malaysian politics. [...] > > One area where cooperation between China and Malaysia has raised human rights concerns is around partnerships on high-risk Chinese surveillance and artificial intelligence (AI) technology. For example, last year ByteDance, TikTok’s parent company, promised to invest some USD 2,13 billion to develop an AI hub in Malaysia. > > [...] > > One of the stated objectives outlined the recent Central Work Conference on Diplomacy with Neighbouring Countries has been to expand law enforcement cooperation. This is likely to be among the priorities of Xi Jinping’s trip, and we should expect further discussion on these points in Malaysia. Cooperation on expanding partnership in new and emerging technologies, especially around AI, are likely to also be a focus of the upcoming delegation, as China seeks to both elevate its global norms setting role and further dislodge the United States as a leader in AI technology.
fedilink

EU Civil society organisations file DSA complaint against Meta for toxic feeds
cross-posted from: https://lemmy.sdf.org/post/32771800 > Bits of Freedom, European Digital Rights (EDRi), Gesellschaft für Freiheitsrechte, and Convocation Design + Research are filing a complaint under the Digital Services Act (DSA) against Meta, the company behind Facebook and Instagram. According to the complaint, Meta violates the DSA’s user protections by not offering easily accessible news feed options on its platforms that are not based on profiling of users. > > [...] > > > > The obligation set out in the DSA is meant to enable people to protect themselves against Meta’s sensationalist and toxic content algorithms. By using deceptive interface designs, Meta makes it unnecessarily difficult for people to choose and keep a content feed that is not based on profiling. > > [...]
fedilink

Western intelligence agencies warn spyware threat from Beijing targeting Taiwan, Tibetan rights advocates
cross-posted from: https://lemmy.sdf.org/post/32771896 > Western intelligence agencies warned on Tuesday of an increasing threat from Beijing's security services to use malicious mobile phone applications to surveil Taiwanese independence activists, Tibetan rights advocates and others opposed by the Chinese government. > > An advisory warned of "the growing threat" posed by malicious surveillance software deployed by a Chengdu-based contractor reported to have ties to China’s Ministry of Public Security. The advisory was signed by cybersecurity agencies in Britain, the U.S., Canada, New Zealand, Australia and Germany. > > [...] > > The warning comes amid increasing tensions surrounding Taiwan, including April 1 Chinese military drills around the island and a March 28 visit to the Philippines by U.S. Defense Secretary Pete Hegseth in which he reaffirmed Washington’s commitment to deterring Chinese aggression in the region. > > [...]
fedilink

Just read the article before you (intentionally?) misinterpret the content:

The admission of Chinese responsibility came during a secret meeting between outgoing Biden administration officials and Chinese representatives on the sidelines of a summit in Geneva in December 2024. […] The Chinese attendants referred indirectly to the activity as being a warning for the US to stay away from any attempts to support or defend Taiwan.


China admits to being behind Volt Typhoon cyber activity targeting US
[Archived](https://web.archive.org/web/20250415062224/https://www.cyberdaily.au/security/11981-china-admits-to-being-behind-volt-typhoon-cyber-activity-targeting-us) [Original article behind paywall](https://www.wsj.com/politics/national-security/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb) Volt Typhoon has been responsible for intrusions into vital critical infrastructure both in the continental United States and its possessions through the Pacific. The group has made transport hubs and water utilities a particular target, with the hackers so far not causing any disruption but rather prepositioning themselves ahead of any hostile action. The admission of Chinese responsibility came during a secret meeting between outgoing Biden administration officials and Chinese representatives on the sidelines of a summit in Geneva in December 2024. According to two anonymous observers, The Wall Street Journal (WSJ) reported late last week that the Chinese attendants referred indirectly to the activity as being a warning for the US to stay away from any attempts to support or defend Taiwan. According to the WSJ, the comments were “indirect and somewhat ambiguous”; however, US officials present felt the meaning was plain. Speaking to Cyber Daily’s sister brand, Defence Connect, earlier this year, Adam Meyers, SVP of counter-adversary operations at CrowdStrike, said that Volt Typhoon’s activity was clearly aimed at disrupting any US action in the region.
fedilink

France: International rights group for the Uyghur people files lawsuit in French court against Huawei, other Chinese tech companies over surveillance, crimes against humanity
cross-posted from: https://lemmy.sdf.org/post/32482359 > [Archived](https://web.archive.org/web/20250410162332/https://www.uyghurcongress.org/en/the-wuc-files-legal-complaint-in-french-court-against-huawei-hikvision-and-dahua/) > > The World Uyghur Congress (WUC) has filed a legal complaint in Paris against Dahua Technology France, Hikvision France, and Huawei France. The submission, made by prominent French human rights lawyer William Bourdon of Bourdon & Associés, accuses the three Chinese companies of complicity in crimes against humanity perpetrated against the Uyghur people in East Turkistan. > > “This submission is an important reminder to all companies complicit in the Chinese government’s genocide that they bear legal responsibility,” said WUC President Turgunjan Alawdun. “We are confident that the French judiciary will take this matter seriously.” > > The legal complaint outlines four serious charges: > > - Concealment of complicity in the crime of aggravated servitude > - Concealment of complicity in the crime of trafficking in human beings as part of an organized gang > - Concealment of complicity in genocide > - Concealment of complicity in crimes against humanity > > [...] >
fedilink

BadBazaar and Moonshine malware targets Taiwanese, Tibetan and Uyghur groups, U.K. and Western allies warn
cross-posted from: https://lemmy.sdf.org/post/32431077 > Two spyware variants are targeting Uyghur, Taiwanese and Tibetan groups and individuals, the U.K.’s National Cyber Security Centre warned in a [joint alert (opens pdf)](https://www.ncsc.gov.uk/files/NCSC-Advisory-BADBAZAAR-and-MOONSHINE-guidance.pdf) Wednesday with Western allies. > > [...] > > **Cybersecurity researchers have previously linked the BADBAZAAR and MOONSHINE spyware to the Chinese government. The variants mentioned in Wednesday’s alert trojanize apps that are of interest to the target communities, such as a Uyghur language Quran app, and have appeared in official app stores.** > > “BADBAZAAR and MOONSHINE collect data which would almost certainly be of value to the Chinese state,” the alert reads. Agencies in Australia, Canada, Germany, New Zealand and the United States, namely the FBI and National Security Agency, collaborated on it. > > Groups most at risk include those focused on Taiwanese independence, Tibetan rights, Uyghur Muslims, democracy advocacy and Falun Gong, according to the alert. The espionage tools can access and download information like location data or messages and photos, and can access microphones and cameras on a phone. > > BADBAZAAR is mobile malware with both iOS and Android variants, while MOONSHINE is Android-only. MOONSHINE has been shared through Telegram channels and links sent via WhatsApp. > > [...] > > Beyond official app stores, BADBAZAAR also spreads through social media platforms. It’s been drawing its own attention from cybersecurity researchers since at least 2022 when Lookout identified it.
fedilink

Russian disinformation on X: Botnet spreads quotes by “Nikola Tesla’s nephew," who praises Elon Musk and accuses Ukrainians of burning cars
cross-posted from: https://lemmy.sdf.org/post/32323159 > [Archived](https://web.archive.org/web/20250406214305/https://theins.press/en/news/280311) > > **The Russian disinformation network “Matryoshka” is spreading fake videos on X, posing as Western media and quoting “relatives of Nikola Tesla” who glorify Elon Musk and criticize Ukrainians**, the Bot Blocker project told The Insider. **The videos, bearing the logos of Euronews, Deutsche Welle, and Car&Driver, show photos of Nikola Tesla, Musk, and Ukrainian protesters, with a voiceover reading the script.** > > One of the videos asserts that Tesla's heirs are receiving threats from Ukrainians because of Musk and Tesla's company name. Another video claims the grandnephew of the famous scientist accuses Ukrainians of setting Tesla cars on fire. > > > “Nikola Tesla's nephew Dusan Kosanovic has endorsed Musk and his company. Kosanovich says he is proud to have the name of his illustrious ancestor associated with such a company. And he is sick of Ukrainians around the world protesting Musk and Tesla. 'All the negativity around Tesla has to do with a small group of people no one has to worry about. Ukrainians can only destroy what others have created with hard work.' Earlier, a wave of arson attacks on Tesla cars swept across the U.S. and Europe.” > > Meanwhile, **open sources do not contain any reference to a Tesla descendant named Dusan Kosanovic**. The famous scientist did have a nephew — his younger sister's son, Sava Kosanovic, but he died in 1956. **No data on the existence of Sava Kosanovic's son could be found — to say nothing of any quotes regarding Musk or Ukrainians**. Elon Musk himself has yet to repost these videos. > > [...] > > The disinformation campaign known as Matryoshka (“Russian doll”) began as early as September 2023. It was first described by the Bot Blocker project. Most frequently, bots use videos denigrating Ukrainians, bearing the logos of reputable Western media outlets in order to create an appearance of credibility. Earlier, the campaign organizers used Twitter to appeal to Western journalists with the request that they “verify the information” — namely, the network’s own fake materials and anti-Ukrainian propaganda. These posts were then shared en masse by stolen accounts, ensuring a broad circulation. > > [...]
fedilink

‘Profiting from misery’: how TikTok makes money from child begging livestreams
cross-posted from: https://lemmy.sdf.org/post/32280023 > Three young children huddle in front of a camera, cross-legged and cupping their hands. “Please support me. We are very poor,” says a boy, staring down the lens. > > They appear to be in a mud-brick hut in Afghanistan, living in extreme poverty. But their live stream is reaching viewers in the UK and worldwide – via TikTok Live. > > For hours, they beg for virtual “gifts” that can later be exchanged for money. When they get one, they clap politely. On another live stream, a girl jumps up and shouts: “Thank you, we love you!” after receiving a digital rose from a woman in the US, who bought it from TikTok for about 1p. By the time it’s cashed out it could be worth less than a third of a penny. > > **TikTok says it bans child begging and other forms of begging it considers exploitative, and says it has strict policies on users who go live.** > > But an Observer **investigation has found the practice widespread. Begging live streams are actively promoted by the algorithm and TikTok profits from the content, taking fees and commission of up to 70%.** > > Olivier de Schutter, the UN special rapporteur on extreme poverty and human rights, called the trend a “shocking development” and accused TikTok and middlemen of “profiting from people’s misery”. “Taking a cut of people’s suffering is nothing short of digital predation. I urge TikTok to take immediate action and enforce its own policies on exploitative begging and seriously question the ‘commission’ it is taking from the world’s most vulnerable people,” he said. > > Jeffrey DeMarco, digital harm expert at Save the Children, said: “The documented practices represent significant abuses and immediate action must be taken to ensure platforms no longer allow, or benefit directly or indirectly, from content such as this.” > > [...]
fedilink