Welcome to this week’s Intelligence Brief… on Thursday, the existence of newly leaked documents revealing the Chinese government’s use of hacking for hire made headlines, offering new insights into Beijing’s ongoing espionage efforts. In our analysis, we’ll look at 1) China’s booming business of hacking, 2) I-Soon, the company offering the hacking resources behind the efforts, and 3) the known extent of China’s cyber espionage operations based on current information.
Quote of the Week
“This represents the most significant leak of data linked to a company suspected of providing cyberespionage and targeted intrusion services for the Chinese security services.”
– Jonathan Condra, cybersecurity expert
Latest News: In recent coverage from The Debrief, we look at DARPA’s new REMA program, which could transform commercial and military drones into autonomous killing machines. Elsewhere, the Naval Research Lab says it has discovered waveguides based on 2D materials with “exotic” properties. Links to all our recent stories cand be found at the end of this week’s newsletter.
Podcasts: In podcasts from The Debrief, on The Micah Hanks Program, we dive into claims about past U.S. presidents and their involvement with aerial mysteries. Over on The Debrief Weekly Report, Kenna and Stephanie explore Saturn’s “Death Star” moon and recent findings that could hint at what lurks beneath its dark surface. You can subscribe to all of The Debrief’s podcasts on our Podcasts Page.
Video News: In the latest installment of Rebelliously Curious, Chrissy Newton is joined by Jeffrey Kripal, Ph.D., for a discussion on various intersections of UAP, theology, and science. You can check out this interview, and other great content from The Debrief, on our official YouTube Channel.
Now, it’s time to look at the recent revelations about Beijing’s hacking operations, as revealed in a newly leaked trove of documents that recently surfaced online.
Beijing’s Booming Hacking Business
This morning, the extent of the Chinese government’s reliance on hackers was unveiled, following the leak of a series of documents that showcased an industry built around efforts by hacking groups to bid for what amounts to government contracts.
The revelations were made as part of a pair of releases by The New York Times and the Washington Post Thursday morning, each of which exposed details on the hacking operations.
Based on the leaked documents, military and intelligence groups in China have enacted “large-scale, systematic cyber intrusions against foreign governments, companies and infrastructure,” according to the Washington Post, which has exploited purported vulnerabilities in the software offered by several of the world’s leading providers, including Google, Microsoft, and Apple.
I-Soon: Hacking Tools and Data for Sale
At the heart of the controversy is the Chinese security firm I-Soon, which is alleged to have sold hacking tools and data that supported Beijing’s state-sponsored hacking efforts.
Examples cited by The New York Times included a $15,000 price tag that allowed a local government in southwestern China to access private traffic policing data from Vietnam, as well as $100,000 “that helped run disinformation campaigns and hack accounts on X” and a hefty $278,000 that allowed Chinese customers to access “a trove of personal information behind social media accounts on platforms like Telegram and Facebook.”
The eight-year hacking campaign also targeted the technological infrastructure and communication systems of targets in several other Asian countries, in addition to its use in monitoring ethnic minorities in China.
The documents, widely believed to be authentic, shed new light on the burgeoning private industry of cyberespionage in China, and their ties to the country’s Ministry of State Security and the People’s Liberation Army.
The batch of documents, which according to the Times appeared on a public website last week, apparently detail that I-Soon marketed its hacking capabilities to various government agencies in China, offering capabilities primarily described as being for anti-terrorism and surveillance.
Hacking techniques for gaining access to smartphone data, email accounts, and a range of other capabilities for use in military operations were also detailed.
The Extent of China’s Hacking Operations
Building on existing reports from recent months that divulged China’s hacking intrusions, the new documents appear to reveal that China has skirted efforts by the U.S. and its allies to curb its hacking operations. Not only that, but China appears to have now taken a few pages out of the playbook of countries like Russia and Iran, now going beyond just espionage and, in some instances, employing malware to damage or gain unauthorized access to critical infrastructure in America, resulting in a surge of hacking incidents that have hit a variety of targets.
Also of particular concern in the leaks had been a spreadsheet that contained “a sample of 459GB of road-mapping data from Taiwan, the island of 23 million that China claims as its territory,” data which would provide recent data to the country if a future invasion of the country.
However, since the hacking and espionage efforts are often managed by provincial-level state security offices, there is also some evidence of situations where some of the hacking efforts have backfired to a degree, and sometimes may have led to conflicts with diplomatic priorities.
Presently, the Chinese government has not acknowledged the leaks, which paint a concerning picture of its use of hacking in relation to the current state of online global security. Last weekend, FBI director Christopher Wray said during a visit to Munich that hacking efforts directed against the U.S. and its allies have reached a “scale greater than we’d seen before,” placing them among the most significant threats to national security that presently exist.
“Taken together, the files offered a rare look inside the secretive world of China’s state-backed hackers for hire,” the Times reported. Although the newest revelations warrant concern, they aren’t entirely unexpected, and the leaked information also potentially offers data that cybersecurity experts can leverage in defending against potential methods Chinese hacking efforts may employ to exploit vulnerabilities.
That concludes this week’s installment of The Intelligence Brief. You can read past editions of The Intelligence Brief at our website, or if you found this installment online, don’t forget to subscribe and get future email editions from us here. Also, if you have a tip or other information you’d like to send along directly to me, you can email me at micah [@] thedebrief [dot] org, or Tweet at me @MicahHanks.
Here are the top stories we’re covering right now…
- AI Propaganda is Dangerously Persuasive and Could be Used in Covert Operations, New Study Warns
AI propaganda generated by popular large language models is remarkably persuasive, according to new findings that compared AI-generated content to real propaganda produced by countries like Russia and Iran.
- Pentagon’s BLUE Program Aims to Fuel Underwater Remote Sensors Using Microscopic Marine Organisms
DARPA’s BLUE program seeks sustainable solutions for ocean deployments by harnessing the potential of microscopic marine organisms.
- Scientists Can See Around Obstacles With This Reality Hack that Turns Ordinary Surfaces Into Mirrors
A pair of scientists say they have developed a potentially revolutionary technique that lets them see around obstacles.
- Ancient Megalithic Structure Older than the Egyptian Pyramids Discovered in the Peruvian Andes
A nearly 5,000-year-old ancient megalithic site discovered in the Peruvian Andes is older than the Pyramids of Egypt.
- U.S. Navy to Equip Game-Changing Underwater Sensor System That Mimics Biology to Detect and Track Anomalies A sophisticated new underwater sensor system aims to replicate the abilities of one of nature’s most formidable aquatic mammals.
- Naval Research Laboratory Leverages Exotic Properties of 2D Waveguides to Capture the Light of Dark Excitons
The milestone discovery of waveguides based on 2D materials with “exotic” properties has been achieved by the U.S. Naval Research Laboratory.
- DARPA’s New REMA Program is Turning Ordinary Drones into Autonomous Killing Machines. Kind of.
DARPA’s newly announced REMA program hopes to turn ordinary commercial and military drones into autonomous killing machines.
- New Photonic Computer Chip Performs Calculations at ‘Light Speed’ Using Light Waves Instead of Electricity
Insane new photonic computer chip can perform calculations at light speed by replacing electricity with light waves.
- Mission to Investigate Potentially Hazardous Objects in Orbit Lifts Off Aboard Rocket Lab Electron Rocket
Aerospace company Rocket Lab has successfully deployed a satellite on a mission to inspect space junk for potential removal from orbit.
- In Antarctica, Dark Matter Mystery Comes into Focus as South Pole Telescope Extends Our View of the Cosmos
An upgraded camera system on Antarctica’s South Pole Telescope could offer astronomers clues to a longstanding cosmic mystery.
- Scientist Says Engaging One Particular Sense May Dramatically Reduce Feelings of Depression
Scientists have discovered that engaging in this particular human sense can trigger positive memories to help battle feelings of depression.
- Jeffrey J. Kripal: History of Religion, UAP, and Humanity’s Place in the Cosmos
Jeffrey J. Kripal, a professor who holds the J. Newton Rayzor Chair in Philosophy and Religious Thought at Rice University, joins Chrissy Newton for a discussion about UFOs, religion, and more.
- “Shooting Down Souls… Good Luck with That”: Some Paradoxical Thoughts on the UFO Phenomenon from a Historian of Religions
Historian of religions Jeffrey Kripal, Ph.D., looks at a few of the paradoxes that arise in the study of the UFO phenomenon.
- Revolutionary AI Tool, “Deep-DRAM,” Opens Door to Discovering Unprecedented Metamaterials with “Unusual Properties”
Deep-DRAM, an groundbreaking AI tool allows for the crafting of durable, customizable metamaterials with unprecedented functions.
- James Webb Space Telescope Has Discovered an Enormous Remnant of the Early Universe That Astronomers Say Shouldn’t Exist
The James Webb Space Telescope has made an 11-billion-year-old discovery more massive than the Milky Way, and it shouldn’t exist.
- This Strange Phenomena Could Place NASA’s Lunar Landers At Risk It’s a sticky situation…
NASA has embarked on the Electrostatic Regolith Interaction Experiment (ERIE) to combat the hazards posed by lunar dust.
- The US Government Wants to Combat Cyber Attacks with Psychology
The U.S. Government has launched a program that will attempt to leverage psychology in defending against future cyber attacks.
- Mysterious ‘National Security Threat’ Revealed in Cryptic Statements by House Intel Chair
This week, a concerning statement issued by the Chair of the House Intelligence Committee about a mysterious national security threat is examined.
- The Sol Foundation UAP Initiative
This week, joining us are Dr. Garry Nolan and Dr. Peter Skafish of The Sol Foundation. who discuss the release of new videos featuring lectures from the organization’s first event.
- Fiery Satellite Images Reveal New Insights on the Latest Volcanic Eruption That Has Rocked Iceland
Recent satellite images are offering a glimpse of the latest eruption in Iceland, along with other unique insights into the ongoing volcanic activity.
- Space Force Will Take Command of Future Live Target-Tracking Satellites
The U.S. Space Force is set to take command of a new fleet of satellites that will provide real-time monitoring of ground targets around the globe, offering unprecedented surveillance capabilities.
- Scientists Have Designed the World’s First True ‘One-Way Glass’ Using the Magic of Metamaterials
A team of materials scientists say they have designed a novel optical NME metamaterial that could be used to build true one-way glass.
- A Breakthrough in the Control of Quantum Phenomena at Room Temperature Has Been Achieved, Researchers Say
The control of quantum phenomena at room temperature has been achieved, according to the findings of a pioneering new study.
- These Natural Heart-Shaped Features Top Our List of the World’s Most Romantic Locations
Just in time for Valentine’s Day, here are several of the most striking natural heart-shaped formations found anywhere in nature.