@@isenewotheophilus6485 And money. Once money is involved, a lot of things become clearer for people who want to investigate these strange “anomalies” in national security.
You mean to tell me that NSA, PRISM and all the other hackers didn't catch that. The US budget is over 50 billion for US hackers. Other countries are better?
Well, this empire is very good in a few thing, namely writing story, telling it convincingly and make believe for their tax payer to support more money spent on new projects in the name of National Security, right.
dont take it seriously, reasoning with these people makes no sense, people only believe what they want to believe and content creator only wants money out of it.
Regarding F35 design theft: When I worked for Defence companies, it was standard for all classified data and software to be stored on locked-down air-gapped systems. Avoiding those DOD mandates could get you free room and board at a federal facility for several years (IF you didn't have the right contacts, see case of Sandy Burger). Have the security rules been relaxed? Have we gotten that stupid? If this was willful stupidity on the part of Lockheed Martin staff, they should VERY PUBLICLY be convicted and sent to the Big House. I font
I believe it's usually mistakes. Temporary systems set up for testing purposes and forgetting to remove them. Files copied from air gaped server for research but forget to remove them from the connected server etc. That said I don't know what happened in this case.
Simple, you don't go after Lockheed you go after their part vendors. China realized that if you go after the small businesses that have a DoD connection you can effectively unveil all the parts and pieces that go into it. Don't try to steal the schematics for the radar system find the business that manufactures them for both Military and Civilian. Can't crack those guys? go for the ones that lost the contract to the other guys they're probably worse but it beats expending the billions in research that goes into it. Software is the biggest kicker and most likely the most secure, that's developed in house however with AI you can now supercharge it. China can copy American design and manufacturing but they're just cheating. They won't actually learn anything or why we developed or how which ironically makes them rely on the U.S. China is quite literally leeching off the money of the American tax payer
This all happened pre-Snowden before 2007 back when sub-contractors kept kicking the bucket in regards to security. When the F35 incident happened the DoD lost it's collective shit and cracked down.
China became smarter when they started using local technology companies. The US still has higher access to other countries as they can inject any RAT along with Windows OS which the majority of countries do use in their critical infrastructures.
yeah the west doesnt work like that operationally. state and business isnt connected the way it is in say China, russia, North Korea etc. They dont have access to OS development at all, They have tried to have backdoor access for law inforcement but its just not a good business plan and customer confidence is king, so only an idiot would grant the government that kind of access! Just ask any Hong Kong citizen.. lmao..
@@douglascampbell4993 Maybe not, but it's arguable. China does use some western cloud solutions like Azure but only hosted in Chinese data centers managed my Chinese companies.
You might be talking abou the west, I have worked in many emergent countries and most services do run on Windows even airports. FYI there are ATM machines running Windows XP still, many countries have stopped in the stone age.@@LeelaSlayys
@@LeelaSlayysThat would be good if people acted smart. And if there's something you cannot underestimate is human capacity to make stupid decision in key infrastructure
This is exactly what US has done to Iran by developing Stuxnet worm. It was one of the most sophisticated attacks to the control system of an industrial plant.
@@kentlu4781 In fairness to NSA employees, this isn't really their fault. The NSA is structured as a surveillance and code-breaking agency. That's *all* they do. The NSA works with US Cyber Command to engage in Offensive Security practices (as well as conduct Cyber Warfare Operations, but... shh, they aren't supposed to do that). CISA (CyberSecurity & Infrastructure Security Agency) is the agency responsible for US Federal Cyber Security and infrastructure.
Every single one of these companies could have avoided all this trouble by spending more money on security rather than just 'hoping' that the measures they had in place would be good enough.
Very ignorant comment. The age old adage rings true, if you build it, they will come. This isn't ancient China with Mongols on horseback. The threat, as was just explained to you, is persistent, and ever evolving. Cold war never ended mate.
@@EB-73- Excuses excuses. Being proactive costs money so there's a cut off point where companies know that they need security but it's cheaper to just cross your fingers, hope for the best, and pay off individuals who _do_ get screwed over. Or, if you like, you can just pretend that doesn't happen. Very ignorant comment 😂
@@wavydavy9816 Point being is that security itself is an illusion. As you so kindly point out, no amount of money is ever enough. At some point you HAVE to cross your fingers and call it good. If you want the gods honest truth, the best security would have been not to go digital in the first place. Or maintain a closed loop system. Both of which cost next to nothing by comparison. Once you open yourself up to attack it's impossible to ever say with certainty that it won't come. Perhaps that concept is a bit difficult for you to reconcile.
@@EB-73- I own a nice motorbike which I have to park on the street. I have done everything possible to make sure that nobody can steal my motorbike and get away with it. It has taken a lot of money and effort to get to that stage, some might even say that I've gone too far with my security (which, admittedly, makes it slightly inconvenient to use my motorbike). A team of people who specifically set out to steal _my_ motorbike and circumvent the various devices fitted would indeed be able to steal it, given an unrealistic amount of time, then they'd have to store it underground to stop the tracker working to avoid recovery I can confidently say that I'm not worried about my bike being stolen, because I've taken those measures myself, and that's being pro-active. I can measure the amount of hassle potential bike thieves face compared to how much profit they are likely to make, seee the cut off point and act accordingly. Banks and other financial institiutions definitely don't care about their customer's investments as much as I care about my motorbike, and THAT'S the difference. If they _really_ wanted to they could do it no problem 🤷♂
Biggest story slept on before Trump even got mentioned. I remember feeling so ashamed just reading in it through middle school, knowing that the kids around me had no clue what that meant for China's supremecy in Information warfare. To me, it signaled a ton of corruption had to be in place for this purge & ip theft to happen. Sure enough, our politicians been in bed, married to & served by Chinese agents all over in 2024. Meanwhile we save them years & millions worth in R&D.
😂 i am thinking the same .... The US is only sour because someone else did it better . Or they are playing the moral card , because no one has caught them yet 😅 .
There is (or was) plenty of troians that used to spread themselves by running through yous email contacts and sending copies of itself to them. But they obviously weren't able to properly reply to a question like a human would. Those poor guys thougth the person on the other side was one of their collegues and asked if they were the ones that sent the mail and not some software, when they found that they were talking to an actual human everything suddenly seemed fine to them.
I'd be willing to be that most of these companies/organizations that were victims of Shady Rat had at least one employee raise concerns about their poor infosec to a superior, and were promptly ignored. The people in charge often don't understand anything about this kind of stuff, and don't like it when someone below them knows more than they do. Thankfully that's been slowly changing over the last decade, but it's always going to be a problem to some extent.
10:51 hilarious that this is presented as a logical fallacy in the context of geopolitics. If you're a global power, you should be hacking, and hacking well
@@albertkirilov6921 what is there more to say? Nations that matter on the world stage are doing hacking regardless of any laws, either domestic or international. Just because some official document states they aren't means nothing. I mean, maybe it does to the gullible public but not to the people who are in the know.
Logical fallacies were originally designed by Aristotle cuz he was essentially a Destiny debate-lord. He’d go to public squares to debate people and put both their social reputation on the line, and you can imagine who won the most. their purpose is not to prove anything or make any sort of meaningful point, it is to discredit the opposing sides point without actually attacking it, just the logical structure of it; which is different than saying something is illogical. Way too many people equate logical fallacies with illogical. Illogical means that there are missing steps, claims of logical fallacies attack the steps you are taking instead of the destination. Claiming that something is a logical fallacy might win over the majority of people, but in any sort of competition you want to be doing as much if not more than your opponent. Good fear mongering though keep it up 🎉
We do not have to put our infrastructure on the net to begin with. Seems to be a security risk easily explored. Why risk National Security for convenience?!?
Exactly! I saw somebody say, well it stifles innovation. Maybe, but I would rather it take an extra year or two then have our enemies also be able to use the same weapons technology we do. You cant have it both ways.
@@neanda reminds me of the NASA intern who dropped a wrench six stories down onto the Shuttle heat shield, causing millions in damages and weeks in repairs. Guy was fired before he got off the elevator.
I'm guessing the person who clicked the mail wasn't the only one at fault. Someone left the plans in a place that was easily accessible as well. It's nearly always a series of mistakes.
@@smallpeople172 Those two don't compare well. One could be interpreted as a civil mistake for civil penalties, and the other can be interpreted as being traitorous.
It's baffling how many "advanced" and highly educated users fall for the most basic social engineering. People can be absolutely brilliant and yet completely naive and ignorant.
@@Dwigt_Rortugal CuteCatVideo.exe just install...Uhm, I mean just open a watch 🤨😅 Yup, there's no shortage of naiv people so hackers or scammers don't need much of a brain at all. They just hammer out the same bs by the millions, and they know they will have positive hits even how foolish it is.
At this point it must ironically be safer to just store the most important and most classified information solely in a seriously sealed chamber, that almost nobody knows about, underground with meters thick concrete walls. No copy on any computer at all. It's probably how some of those things are already being handled.
But doing so makes it impossible for our own scientists to learn and improve upon those designs. Science progress depends on collaboration. So there is no easy way
@@dzungtran314I mean, it depends. Scientists didn’t seem to have a problem innovating a literal bombshell in the Manhattan Project. That isn’t the issue though, I think you missed it. The issue is if you have any classified information, one that is a cognito hazard to the public at large, then you by definition trying to hide information. Scientists or not. Even politicians or not. You have to be either high up with the DOD, the FBI/CIA or the Armed Forces if it were a serious piece of information. The most secure location if you can’t encrypt your own data and protect it is ironically what OP said. A locked cabinet no one knows about. Data sanitation and security is still hard for the average person, it is why security researchers and scientists often raise the alarm when breaches in any network, private or public is made especially with Malware and Phishing.
@@dracoborne2648Because it isnt the AIVD or MI6 doing the hacking its random civilains hence 'trolls' as a term Wtf does the intelligence agency of Holland need info from a waterplant from?
Roman proverb: "Opportunity makes the thief.". As long as America continues to blame other countries for it's own shortcomings progress won't come. Face facts: You're responsible for your own vulnerabilities.
It's the truth. If you don't lock your doors it's on you when the thief gets in easy. But blaming others is our way. If not foreigners, some minority here in the US, but never the people in charge who are obviously to blame. They're rich and get extra rights you see.
@supadupahilton6848 You need to evolve and transcend above that programmed response. Not immediately turning rabid and repeating US state department, and indeed NORMIE rhetoric is based. The calm person who can see things clearly is more sophisticated than someone who hears China and says "wumao".
It is a fallacy on an individual moral level. Assuming that an action is immoral, other people being immoral does not change that fact. This is true for criminals, for example. Other criminals existing does not absolve any person of their crimes. It is a fair argument on a social level. The argument distilled is that one party is being unequally held accountable for an action that everyone does. Typically these actions are wrong on an individual level, but necessary evils on country level. All countries kill people. If you only ever target one country for killing people, that is not a fair criticism, but just a social attack.
@@andrewzhao444 If you're going to argue that there are "necessary evils on a country level," then the hypocrisy of targeting one country unequally in order to advance some sort of goal or interest can itself also be justified as being one of those "necessarily evils."
The thing is America doesn't actually have a problem with the action, if America do have a problem with it then America wouldn't have been doing it, the fact is that America had a problem with who is doing it, the enemy
America doesn't actually have a problem with the action itself, heck America itself is doing the exact same thing, it's just that they had a problem with who is doing it, the enemy
It reflects their industry mantra. They are always counterfeiting from luxuxy brand items to fast food. Brands don't matter as long no on bother and cared.
Great video brother 🔥 Been trying to tell people about this for years , the Chinese are also hyper focused on a quantum computer, pouring more resources and money into the project than anyone else. You could probably speculate the implications of that more than I could but it’s not great 😁
they already have it, it's called Jiuzhang1 & Jiuzhang2. their quantum computer is different than ours, they use lasers & mirrors, it's a double slit delayed choice setup on steroids
@@cybernews 7:00 "Their attacks were brazen and aggressive. Relying more on poor cybersecurity of victims..." So, it was just a marketing stunt for antivirus software companies?
It's interesting that simply from a numbers standpoint, China has an insane advantage. The more people you have, the more hackers, the more geniuses, etc.
I don't think so. You can steal the hardware blueprints but getting the software and getting it working on copied hardware is much harder, not to mention you won't get any updates. Which why is Tesla vetting on fast innovation. By the time someone else copies their hardware and software it's already obsolete. And they certainly won't copy the massive servers for training and collecting data using another custom architecture.
their master was an executed criminal wanted by the FBI Known as Kidi Menta Marius aka jay chesavage in Palo Alto, CA 3833 Middlefield road, palo alto working for the Chinese military to steal intellectual property. his legal age: born in November 1985, Touboro, Cameroon
i hope this video and your channel gets to millions as it's info people and companies definately need to know. what an amazing video, best i've seen in a long time in terms of the insights and high production quality. this was quite an adveture. please do more like this, i'm gonna spend some time binging on your channel as I just discovered it today (and i'm in the tech iindustry as it's defo my kind of thing)
There are always holes in the infrastructure created by people. It is a difficult problem. The only way is reduce the attack surface, isolate data within a secure network and make convenience non existent. Only allow downstream traffic. Encryption at rest and transit between internal services. These are the things i can think about.
Our data 😊 Joke aside, I don't see how this operation made China a superpower - the video goes a long way to explain the operation, but not to explain its economic effects and how they played out, besides 2 points in the video where it makes use of correlation and many asumptions but just leaving more questions unanswered: how has this operation played out to make China a superpower? I'm sure the data stolen played a role in a multitude of factors, but I highly doubt its effect was proportionally significant. Not only is China a vastly different country, with its own history, economic status and system (therefore requiring customized policies and can't be reliant on someone else's specific data), but data has been stolen before and it didn't boom other countries into superpower status
what the hell does a country's history have to do with the design of an industrial product ? There was no need to go deep into it b/c the answer is obvious to anyone with even the slightest common sense - the stolen IP was used to create cheap replicas of said IP . The only things the Chinese paid for was the production machinery to mass produce said cheap replicas
Thanks for stating that saved me the trouble of watching the video. I don't mind if it talked about other things but if the video doesn't answer the question then I'm not going to watch it further.
If the stealing of US IP by China had not significantly impacted its technological advancement, the US government would not be worried. How can anyone not see the technological strides of China in various domains? Baffling.
Slightly? Ya should be panicking... They are producing 1.2 million degree + 75k STEM PhD grads per year... mate. correction : 4.2 bachelor's grads , 1.2 of it are Engineering..
@@emeraldlucky1274 And Ph D in African studies ! Australia is also doing a lot of research on Aboriginal studies. Now the first few units of a bachelor degree in Australia has to teach something about the abos !
This could be solved by just making external hack attacks that do crypto mining but no damage or info theft are civil matters, not criminal, and any company that is hacked must report the intrusion or face huge fines. A free for all that forces everyone to tighten security overnight
Well, according to Article 1 of the Might-Makes-Right universally accepted international treaty, USA and their allies have might so they are right, and therefore can not do wrong even when they hack or participate in gross human rights violations. China is not as strong, therefore are not allowed to do any of that. I hope I managed to help clear any confusion. Thank God for Rules-Based International Order. Can you imagine what anarchy we would have without it?
@@guydreamr The Jesse James comparison would only work if Jesse James was not persecuted for robbing banks. He was. This is more of "Some nations are allowed and even encouraged to do bad stuff, while everyone else is not". I'm all for keeping everyone accountable for their actions. But right now (well, in the entire history of humanity, honestly) the strong nations can do whatever they want, and everyone else needs to cope. I get that. What I can't stand is the insane hypocrisy of USA repeating 'rules-based international order' while breaking the rules and also shielding allies from accountability. This is not how you get others to behave responsibly. This is how you incentivize them to become militarily strong enough to be untouchable.
Man, you sure know how to tell a story. That intro was perfect: tells its own short story, grabs your attention, piques your curiosity then abruptly ends just as it reveals an answer that only raises more questions and increases the mystique...first video of yours I've watched but I was just blown away immediately. Not my typical content but you've got a new subscriber here!
I live in Hawaii and the Chinese are big property owners here. Big Chinese investment groups are aggressively building massive high rises here, and raising property prices quickly. There is no longer an affordable middle income home, condo, or doghouse.
Its why critical infrastructure and military assets should always be on a air gapped network, additionally having a fake network that lets you track your would be attackers and in turn hack them back is an ideal strategy
The F-35 is too advanced, it may took 30 years for China to catch up and the US having incentive to get a new one, just imagine a light bulb that lasts 30 years, that's no good for business. Hence, the NGAD program.
@null2470 They know very well that other nations are very interested in getting information from the US and the West for their technology and economic advantages, and yet they didn't put enough effort and budget to create a more secure network and limit the information from getting out to vulnerable personnel. And you think China and other nation will stop because we call them bad? If China will have an edge in technology and military research then the US would do the same.
Remember the incident at Underwriters Laboratory? A Chinese engineer got caught walking out the gate with hard drives filled with sensitive information. 🥺
Critical infrastructure should NEVER be on the internet. It doesn't matter how inconvenient it is, or how many fat bonuses management has to give up, it just shouldn't be connected. Period.
This video is great! If at all possible, please include source material for this/future informational videos. Sounds like it'd be a great read. After doing some searching it's proving rather difficult to find the source material
People have no idea how active the indian community is on youtube comments, specifically regarding politics - they fucking love this shit....a lot of the haters and people who talk bad about china online aren't actually american, theyre indian pretending to be american or chinese or whatevrer
to me, its amazing when chinese hackers, most if not all barely could speak great english and yet their hacking skills are crazy. you have to know english really well, then the programming languages... that is like knowing three or more just computer languages, plus english and chinese. i cant even walk and chew gum, without biting my cheek and lips.
Let us know if you would like to see more explainers like this!
Why isn't Joe hosting this?
now this is an explainer that i wanted to see
Yep. I love to watch explainers like these lengthy video > 20 min as movie 🍿😊😊
always
I love it!
Lockheed Martin billion dollar technology and yet bought an ebay network security.
Greed breeds stupidity
the biggest vulnerability in a system is humans
@@isenewotheophilus6485 And money. Once money is involved, a lot of things become clearer for people who want to investigate these strange “anomalies” in national security.
@@isenewotheophilus6485stupid humans not humans in general
If the us doesn't force a security standard, companies wont enforce it.
You mean to tell me that NSA, PRISM and all the other hackers didn't catch that. The US budget is over 50 billion for US hackers. Other countries are better?
Well, this empire is very good in a few thing, namely writing story, telling it convincingly and make believe for their tax payer to support more money spent on new projects in the name of National Security, right.
@@clearheaded5696huhh an American who knows truth
you cant buy talent, the US has been trying to do so for long.
dont take it seriously, reasoning with these people makes no sense, people only believe what they want to believe and content creator only wants money out of it.
Did u not watch the video? They specifically said that they knew about it when the Snowden leaks came out.
Regarding F35 design theft: When I worked for Defence companies, it was standard for all classified data and software to be stored on locked-down air-gapped systems. Avoiding those DOD mandates could get you free room and board at a federal facility for several years (IF you didn't have the right contacts, see case of Sandy Burger). Have the security rules been relaxed? Have we gotten that stupid? If this was willful stupidity on the part of Lockheed Martin staff, they should VERY PUBLICLY be convicted and sent to the Big House. I font
Continued - edit session was aborted somehow. I don't care if the top responsible person was the CEO of LM.
I believe it's usually mistakes. Temporary systems set up for testing purposes and forgetting to remove them.
Files copied from air gaped server for research but forget to remove them from the connected server etc.
That said I don't know what happened in this case.
Simple, you don't go after Lockheed you go after their part vendors. China realized that if you go after the small businesses that have a DoD connection you can effectively unveil all the parts and pieces that go into it. Don't try to steal the schematics for the radar system find the business that manufactures them for both Military and Civilian. Can't crack those guys? go for the ones that lost the contract to the other guys they're probably worse but it beats expending the billions in research that goes into it.
Software is the biggest kicker and most likely the most secure, that's developed in house however with AI you can now supercharge it.
China can copy American design and manufacturing but they're just cheating. They won't actually learn anything or why we developed or how which ironically makes them rely on the U.S.
China is quite literally leeching off the money of the American tax payer
This all happened pre-Snowden before 2007 back when sub-contractors kept kicking the bucket in regards to security. When the F35 incident happened the DoD lost it's collective shit and cracked down.
yes makes me sick
China became smarter when they started using local technology companies. The US still has higher access to other countries as they can inject any RAT along with Windows OS which the majority of countries do use in their critical infrastructures.
yeah the west doesnt work like that operationally. state and business isnt connected the way it is in say China, russia, North Korea etc. They dont have access to OS development at all, They have tried to have backdoor access for law inforcement but its just not a good business plan and customer confidence is king, so only an idiot would grant the government that kind of access! Just ask any Hong Kong citizen.. lmao..
@@douglascampbell4993 Maybe not, but it's arguable. China does use some western cloud solutions like Azure but only hosted in Chinese data centers managed my Chinese companies.
Heard of Linux? "Critical" infrastructures nowadays don't use good old Windows anymore
You might be talking abou the west, I have worked in many emergent countries and most services do run on Windows even airports. FYI there are ATM machines running Windows XP still, many countries have stopped in the stone age.@@LeelaSlayys
@@LeelaSlayysThat would be good if people acted smart. And if there's something you cannot underestimate is human capacity to make stupid decision in key infrastructure
This is exactly what US has done to Iran by developing Stuxnet worm. It was one of the most sophisticated attacks to the control system of an industrial plant.
Boy sheer havoc. Darknet diaries episode was crazy.
Iranian nuclear development is hardly a positive and beneficial organization as U.S. industries.
NSA: focus on hacking others, too busy to take care of the domestic cybersecurity🐶😎
@@kentlu4781 In fairness to NSA employees, this isn't really their fault.
The NSA is structured as a surveillance and code-breaking agency. That's *all* they do.
The NSA works with US Cyber Command to engage in Offensive Security practices (as well as conduct Cyber Warfare Operations, but... shh, they aren't supposed to do that).
CISA (CyberSecurity & Infrastructure Security Agency) is the agency responsible for US Federal Cyber Security and infrastructure.
This seems far worse. One factory in Iran vs thousands of stolen industrial secrets...
Every single one of these companies could have avoided all this trouble by spending more money on security rather than just 'hoping' that the measures they had in place would be good enough.
Or simply cut off China from the internet, and block all access from China to the US
Very ignorant comment. The age old adage rings true, if you build it, they will come.
This isn't ancient China with Mongols on horseback. The threat, as was just explained to you, is persistent, and ever evolving.
Cold war never ended mate.
@@EB-73- Excuses excuses.
Being proactive costs money so there's a cut off point where companies know that they need security but it's cheaper to just cross your fingers, hope for the best, and pay off individuals who _do_ get screwed over.
Or, if you like, you can just pretend that doesn't happen.
Very ignorant comment 😂
@@wavydavy9816 Point being is that security itself is an illusion. As you so kindly point out, no amount of money is ever enough. At some point you HAVE to cross your fingers and call it good.
If you want the gods honest truth, the best security would have been not to go digital in the first place. Or maintain a closed loop system. Both of which cost next to nothing by comparison.
Once you open yourself up to attack it's impossible to ever say with certainty that it won't come.
Perhaps that concept is a bit difficult for you to reconcile.
@@EB-73- I own a nice motorbike which I have to park on the street.
I have done everything possible to make sure that nobody can steal my motorbike and get away with it.
It has taken a lot of money and effort to get to that stage, some might even say that I've gone too far with my security (which, admittedly, makes it slightly inconvenient to use my motorbike).
A team of people who specifically set out to steal _my_ motorbike and circumvent the various devices fitted would indeed be able to steal it, given an unrealistic amount of time, then they'd have to store it underground to stop the tracker working to avoid recovery
I can confidently say that I'm not worried about my bike being stolen, because I've taken those measures myself, and that's being pro-active. I can measure the amount of hassle potential bike thieves face compared to how much profit they are likely to make, seee the cut off point and act accordingly.
Banks and other financial institiutions definitely don't care about their customer's investments as much as I care about my motorbike, and THAT'S the difference.
If they _really_ wanted to they could do it no problem 🤷♂
Who had the "brilliant" idea of hooking up the controls of the most important infrastructure in the world to the internet?
Well it’s mostly engineering portals for remote access and monitoring of systems. But security is often light or non existent in these areas.
Bill gates
@@realmemegalacticand the Bush republican government.
the IT departments that get paid by American companies i feel like to put everything into the cloud :)
Remote monitoring is needed to catch problems before they start impacting public health.
At the same time there was a purge of all CIA human assets in the Chinese mainland, Hong Kong and Macau. The US has never recovered since again.
Based
Based
Based
Biggest story slept on before Trump even got mentioned. I remember feeling so ashamed just reading in it through middle school, knowing that the kids around me had no clue what that meant for China's supremecy in Information warfare. To me, it signaled a ton of corruption had to be in place for this purge & ip theft to happen. Sure enough, our politicians been in bed, married to & served by Chinese agents all over in 2024. Meanwhile we save them years & millions worth in R&D.
Nahh no evidence of it
I'm sure we never spy on any body ....
😂 i am thinking the same ....
The US is only sour because someone else did it better .
Or they are playing the moral card , because no one has caught them yet 😅 .
😂
Oh it's a given, we absolutely haven't spied on anyone.....😈👿🫅👿😈
@@Ahoooooooo lol.. Yeah we definitely should have just left the Japanese to keep doing their thing back in world war two.. 🤣😅
I mean china just caught spies of cia just a couple of days back 😂
Why would anyone be dumb enough to ask the e-mail sender if the file attachment is legit?
There is (or was) plenty of troians that used to spread themselves by running through yous email contacts and sending copies of itself to them.
But they obviously weren't able to properly reply to a question like a human would.
Those poor guys thougth the person on the other side was one of their collegues and asked if they were the ones that sent the mail and not some software, when they found that they were talking to an actual human everything suddenly seemed fine to them.
I'd be willing to be that most of these companies/organizations that were victims of Shady Rat had at least one employee raise concerns about their poor infosec to a superior, and were promptly ignored. The people in charge often don't understand anything about this kind of stuff, and don't like it when someone below them knows more than they do. Thankfully that's been slowly changing over the last decade, but it's always going to be a problem to some extent.
It's the Dunning-Kruger effect. Which will never go away, unless we let AI run the show.
@@eskileriksson4457 they will just use quantum computer boosted AI to override the other AI
10:51 hilarious that this is presented as a logical fallacy in the context of geopolitics. If you're a global power, you should be hacking, and hacking well
@@albertkirilov6921 what is there more to say? Nations that matter on the world stage are doing hacking regardless of any laws, either domestic or international. Just because some official document states they aren't means nothing. I mean, maybe it does to the gullible public but not to the people who are in the know.
Logical fallacies were originally designed by Aristotle cuz he was essentially a Destiny debate-lord. He’d go to public squares to debate people and put both their social reputation on the line, and you can imagine who won the most. their purpose is not to prove anything or make any sort of meaningful point, it is to discredit the opposing sides point without actually attacking it, just the logical structure of it; which is different than saying something is illogical. Way too many people equate logical fallacies with illogical. Illogical means that there are missing steps, claims of logical fallacies attack the steps you are taking instead of the destination. Claiming that something is a logical fallacy might win over the majority of people, but in any sort of competition you want to be doing as much if not more than your opponent. Good fear mongering though keep it up 🎉
@@nodaxxingSocrates was the original annoying debate lord. He was so hated he got killed for it
@@nodaxxingall that typing for a fallacy fallacy 😂😂😂
@@nodaxxingdo you not agree with his statement tho
Please post more content like this weekly.
Wonderful video
Work 24/7 😂😂
100% agree, thiis one of the best videos i've seen in a long time
@@Andreas_linden serve the hive mind, right? Not a chance, I say. Ridiculous
We do not have to put our infrastructure on the net to begin with. Seems to be a security risk easily explored. Why risk National Security for convenience?!?
Exactly! I saw somebody say, well it stifles innovation. Maybe, but I would rather it take an extra year or two then have our enemies also be able to use the same weapons technology we do. You cant have it both ways.
like when Biden open the Border?
for power, fast reaction to failures stops the load from causing more failures and it cascading into a blackout like what happened in 2003.
That Lockheed Martin employees face when he found out what happened must have been… *chefs kiss*
i was thinking that too, he just gave the chinese the plans for their most advanced fighter jet. i'm sure he left that accomplishment out of his CV
@@neanda reminds me of the NASA intern who dropped a wrench six stories down onto the Shuttle heat shield, causing millions in damages and weeks in repairs. Guy was fired before he got off the elevator.
I'm guessing the person who clicked the mail wasn't the only one at fault. Someone left the plans in a place that was easily accessible as well. It's nearly always a series of mistakes.
@@smallpeople172 Those two don't compare well. One could be interpreted as a civil mistake for civil penalties, and the other can be interpreted as being traitorous.
@@twavee interpretation depends on intent
That screensaver sound laughable, but I worked for a company who had a corporate screensaver.
It's baffling how many "advanced" and highly educated users fall for the most basic social engineering. People can be absolutely brilliant and yet completely naive and ignorant.
@@Dwigt_Rortugal yeah. I think a lot of people are in „get it done mode“ and mindlessly click m-on and react-to every email.
@@Dwigt_Rortugal CuteCatVideo.exe just install...Uhm, I mean just open a watch 🤨😅 Yup, there's no shortage of naiv people so hackers or scammers don't need much of a brain at all. They just hammer out the same bs by the millions, and they know they will have positive hits even how foolish it is.
It's like a website cypher
@@Dwigt_Rortugal I blame blind adherence to Occam's razor.
3:30 - RuneScape Dragon Scimitar haha.. brings back memories
Haha screw doing Monkey Madness to wield that thing
At this point it must ironically be safer to just store the most important and most classified information solely in a seriously sealed chamber, that almost nobody knows about, underground with meters thick concrete walls. No copy on any computer at all.
It's probably how some of those things are already being handled.
B21 bomber schematics and nuclear secrets I reckon
even the electric cable one day will be used to hack machines so it would have to be off the grid too lol
But doing so makes it impossible for our own scientists to learn and improve upon those designs. Science progress depends on collaboration. So there is no easy way
I mean the leak benefits everyone. The Chinese get their blueprints and the DoD and MIC gets to bang their drums to the tunes of trillions
@@dzungtran314I mean, it depends. Scientists didn’t seem to have a problem innovating a literal bombshell in the Manhattan Project. That isn’t the issue though, I think you missed it.
The issue is if you have any classified information, one that is a cognito hazard to the public at large, then you by definition trying to hide information. Scientists or not. Even politicians or not. You have to be either high up with the DOD, the FBI/CIA or the Armed Forces if it were a serious piece of information.
The most secure location if you can’t encrypt your own data and protect it is ironically what OP said. A locked cabinet no one knows about. Data sanitation and security is still hard for the average person, it is why security researchers and scientists often raise the alarm when breaches in any network, private or public is made especially with Malware and Phishing.
This is crazy. I had no idea I was so smart and so ahead of these methods when I was only six years old.
TL;DR they aren’t that smart, we’re just that stupid.
All infrastructure should have analog redundancy if not be entirely non-network
As a Shanghaiese I'm quite surprised to see they're actually doing such big things in that building.
Why is it that attacks from us and europe are called trolls but the rest are named "countries attacking"
Coz that's a friendly fire
Because the uploader obviously has a western bias. Most YT do.
@@dracoborne2648Because it isnt the AIVD or MI6 doing the hacking its random civilains hence 'trolls' as a term
Wtf does the intelligence agency of Holland need info from a waterplant from?
They don't call them trolls, they call them hackers
Roman proverb: "Opportunity makes the thief.". As long as America continues to blame other countries for it's own shortcomings progress won't come. Face facts: You're responsible for your own vulnerabilities.
Wow. Wumao's getting all agro!
America is itself a big thief if you don't know. They grew on British patents.
It's the truth. If you don't lock your doors it's on you when the thief gets in easy.
But blaming others is our way. If not foreigners, some minority here in the US, but never the people in charge who are obviously to blame. They're rich and get extra rights you see.
@supadupahilton6848 You need to evolve and transcend above that programmed response. Not immediately turning rabid and repeating US state department, and indeed NORMIE rhetoric is based. The calm person who can see things clearly is more sophisticated than someone who hears China and says "wumao".
Considering America is the leader in hacking, I don't understand the storyline... whoever rules technology rules the world.....
I didn't get the fallacy part? Why is the argument wrong? " If the US conducts them, why shouldn't we " 10:53
It is not.
It is a fallacy on an individual moral level. Assuming that an action is immoral, other people being immoral does not change that fact. This is true for criminals, for example. Other criminals existing does not absolve any person of their crimes.
It is a fair argument on a social level. The argument distilled is that one party is being unequally held accountable for an action that everyone does. Typically these actions are wrong on an individual level, but necessary evils on country level. All countries kill people. If you only ever target one country for killing people, that is not a fair criticism, but just a social attack.
@@andrewzhao444 If you're going to argue that there are "necessary evils on a country level," then the hypocrisy of targeting one country unequally in order to advance some sort of goal or interest can itself also be justified as being one of those "necessarily evils."
@@wasd____ hypocrisy cannot be "justified" because it's a logical contradiction, not an immorality that can be excused away as a necessary evil
The thing is America doesn't actually have a problem with the action, if America do have a problem with it then America wouldn't have been doing it, the fact is that America had a problem with who is doing it, the enemy
China has a point there. If someone else does it why cant they.
As long as you are a nuclear threat then you can do what ever you want
@@rallinrallen8040 Actually true
America doesn't actually have a problem with the action itself, heck America itself is doing the exact same thing, it's just that they had a problem with who is doing it, the enemy
It reflects their industry mantra. They are always counterfeiting from luxuxy brand items to fast food. Brands don't matter as long no on bother and cared.
@@ian-tumulak "counterfeiting" lol the small timers yes but big daddy oh no he makes better and wipes you XDDDDD
Great video brother 🔥 Been trying to tell people about this for years , the Chinese are also hyper focused on a quantum computer, pouring more resources and money into the project than anyone else. You could probably speculate the implications of that more than I could but it’s not great 😁
It would be analogous to the cracking of the Enigma and JN25 codes.
they already have it, it's called Jiuzhang1 & Jiuzhang2.
their quantum computer is different than ours, they use lasers & mirrors, it's a double slit delayed choice setup on steroids
@@kylorenkardashian79 omg i'll have to find out more about this. i like that analogy
@kylorenkardashian79 nobody has a quantum computer lol it would take another 20 years to have one
@@shashankdixit8949literally every major player has quantum computers. U can even get access online 😂
love the storytelling and the narration
Thank you for the kind words!
@@cybernews 7:00 "Their attacks were brazen and aggressive. Relying more on poor cybersecurity of victims..."
So, it was just a marketing stunt for antivirus software companies?
love the dragon scimmy as the cursor lmao. reminds me of the old hack videos on YT back in 2010ish era :P
Dragon scimmy, that takes me back
“There is no honour among thieves”.
@mugbeer9440 already there - next stage is making it profitable and building brands .
Moral of the story, never ever use Windows OS for the work!
It would have still happened... Why? Because people still clicked on the emails.
Linux is not 100% immune. But it is way better than Windows. I've seen even some ATM machines running on Windows XP.
@@Curb65-f3r most ATM machines run on windows XP. In fact, a grand majority of similar systems run on windows XP
if your computer has access to internet and ability to run background job, it doesn't matter what OS you are on.
This would will happen in any os. The problem is not the os is people installing and clicking in shit that they are not supposed too.
Please more of this! If possible even a bit technical (imo)
agreed
Got my sub on the first vid. The visuals, even the simple ones, were really insightful
Why don’t they just disconnect from internet?? Can’t get hacked if there is no connection to outside.
me: why are you avoiding my messages?
her: I am taking counter measurements against Chinese spies.
It's interesting that simply from a numbers standpoint, China has an insane advantage. The more people you have, the more hackers, the more geniuses, etc.
That would be fair but about a billion in China are in the mainland away from that sort of education.
A great little documentary! A++
In what way is "if the US engages in cyberattacks, why shouldn't we?" a logical fallacy? Genuinely asking, seems like a perfectly reasonable question.
The f35 being stolen is such a massive L considering the whole point is how computerized and it is. Why didnt we listen to Battlestar Galactica😭
Battlestar? What do you mean?
I don't think so. You can steal the hardware blueprints but getting the software and getting it working on copied hardware is much harder, not to mention you won't get any updates. Which why is Tesla vetting on fast innovation. By the time someone else copies their hardware and software it's already obsolete. And they certainly won't copy the massive servers for training and collecting data using another custom architecture.
@@jan.tichavsky they did get the software at the time too
Treat research sounds like a sweet gig
the runescape dragon scimitar cursor made me laugh so hard, beautiful little detail
the americans have been doing it for decades, they taught them to do it. what are you wondering now
This is the Art of War!
their master was an executed criminal wanted by the FBI Known as Kidi Menta Marius aka jay chesavage in Palo Alto, CA 3833 Middlefield road, palo alto working for the Chinese military to steal intellectual property. his legal age: born in November 1985, Touboro, Cameroon
Nobody does this better than US gov. through its big tech companies.
Whataboutism is hereabouts.
back again, always like these type of vids.
Thank you!
CIA does this all the time
If you enjoyed this you ahould read 'this is how they tell me the world ends'. It covers this an a whole lot more about the cyber arms race
i hope this video and your channel gets to millions as it's info people and companies definately need to know.
what an amazing video, best i've seen in a long time in terms of the insights and high production quality. this was quite an adveture. please do more like this, i'm gonna spend some time binging on your channel as I just discovered it today (and i'm in the tech iindustry as it's defo my kind of thing)
There are always holes in the infrastructure created by people. It is a difficult problem. The only way is reduce the attack surface, isolate data within a secure network and make convenience non existent. Only allow downstream traffic. Encryption at rest and transit between internal services. These are the things i can think about.
Awesome narration and video content! Subscribed!
Western nations using it for manufacturing made it a super power.
Our data 😊
Joke aside, I don't see how this operation made China a superpower - the video goes a long way to explain the operation, but not to explain its economic effects and how they played out, besides 2 points in the video where it makes use of correlation and many asumptions but just leaving more questions unanswered: how has this operation played out to make China a superpower? I'm sure the data stolen played a role in a multitude of factors, but I highly doubt its effect was proportionally significant. Not only is China a vastly different country, with its own history, economic status and system (therefore requiring customized policies and can't be reliant on someone else's specific data), but data has been stolen before and it didn't boom other countries into superpower status
what the hell does a country's history have to do with the design of an industrial product ?
There was no need to go deep into it b/c the answer is obvious to anyone with even the slightest common sense - the stolen IP was used to create cheap replicas of said IP . The only things the Chinese paid for was the production machinery to mass produce said cheap replicas
Its called click bait buddy.. Welcome to the internet..
Thanks for stating that saved me the trouble of watching the video. I don't mind if it talked about other things but if the video doesn't answer the question then I'm not going to watch it further.
If the stealing of US IP by China had not significantly impacted its technological advancement, the US government would not be worried. How can anyone not see the technological strides of China in various domains? Baffling.
12:32?
That was awesome. Really enjoyed it
This is the pure example of simplicity beating complexity
How do you make such clip? the edit is perfect. Great video.
Thank you so much for the feedback!
Such is the meaning of cold and ruthless pragmatism.
3:30 with the RuneScape dragon scimitar 😂😂😂
I cant help but be slightly concerned for the future when the US education sytem is failing in so many ways
Slightly? Ya should be panicking...
They are producing 1.2 million degree + 75k STEM PhD grads per year... mate.
correction : 4.2 bachelor's grads , 1.2 of it are Engineering..
@@kentershackle1329 Meanwhile the US is making gender studies PHD 😂😂
@@emeraldlucky1274
And Ph D in African studies !
Australia is also doing a lot of research on Aboriginal studies.
Now the first few units of a bachelor degree in Australia has to teach something about the abos !
😂 I always thought that there was some high level shit going on with Lockheed but now I laugh looking at this
Omg that dscim 07 scape cursor brought me back to my childhood 😢😢😢😢 custom moparscape clients makes me wanna cry a bit
This could be solved by just making external hack attacks that do crypto mining but no damage or info theft are civil matters, not criminal, and any company that is hacked must report the intrusion or face huge fines. A free for all that forces everyone to tighten security overnight
How exactly is "The US is doing it, so why shouldn't we?" a logical fallacy?
Well, according to Article 1 of the Might-Makes-Right universally accepted international treaty, USA and their allies have might so they are right, and therefore can not do wrong even when they hack or participate in gross human rights violations.
China is not as strong, therefore are not allowed to do any of that.
I hope I managed to help clear any confusion.
Thank God for Rules-Based International Order. Can you imagine what anarchy we would have without it?
Because it's like saying, "Well I robbed a bank, but Jesse James also robbed a bank so therefore I shouldn't be charged." Aka, "whataboutism."
@@guydreamr The Jesse James comparison would only work if Jesse James was not persecuted for robbing banks. He was.
This is more of "Some nations are allowed and even encouraged to do bad stuff, while everyone else is not".
I'm all for keeping everyone accountable for their actions. But right now (well, in the entire history of humanity, honestly) the strong nations can do whatever they want, and everyone else needs to cope. I get that. What I can't stand is the insane hypocrisy of USA repeating 'rules-based international order' while breaking the rules and also shielding allies from accountability.
This is not how you get others to behave responsibly. This is how you incentivize them to become militarily strong enough to be untouchable.
@@guydreamr nothing about it is "whataboutism" when the US was outed for it recently for spying even on friends
Man, you sure know how to tell a story. That intro was perfect: tells its own short story, grabs your attention, piques your curiosity then abruptly ends just as it reveals an answer that only raises more questions and increases the mystique...first video of yours I've watched but I was just blown away immediately. Not my typical content but you've got a new subscriber here!
“This is CEO open file” is the Chinese equivalent of “show bobs” lol
😭😭lmao i can't 😂😂😂bro comon
Don't have to Do our indian broa like that
@@GTFO_0 💀 OP is dumb af and he knows it look at his pfn , but the broken English part is legit tho
*shows boobs*
I live in Hawaii and the Chinese are big property owners here. Big Chinese investment groups are aggressively building massive high rises here, and raising property prices quickly. There is no longer an affordable middle income home, condo, or doghouse.
Mrs Moraine the bitcoin trader is legit and her method works like magic I keep on earning every single week with her new strategy
Wow I' m just shock someone mentioned expert Mrs Moraine I thought I'm the only one trading with her
She helped me recover what I lost trying to trade my self
She's really amazing with her skills. She changed my 0.5btc to 2.1btc
I think I'm blessed because if not I wouldn't have met someone who is as spectacular as expert Mrs Moraine, I think she is the best broker I ever seen
I still wonder how she gets her analysis, I got profit of $28, 609 with a capital of $4000 in 16 days of trading with her
7:12 "hello this is ceo" 💀
Awesome Explainer video. 👍👍👍
so basically if you're powerful enough you are really untouchable. it's easy to see how lives become very cheap, chaos is imminent
Its why critical infrastructure and military assets should always be on a air gapped network, additionally having a fake network that lets you track your would be attackers and in turn hack them back is an ideal strategy
Nobody really cares.
@@wecx2375 Speak for yourself.
Literally the best argument for staying away from the metric system. Let them have to deal with all the unit conversion.
Awesome Content. More like this.
To sum it up
“Thanks for giving me the keys to your house and now your system is mine”
The F-35 is too advanced, it may took 30 years for China to catch up and the US having incentive to get a new one, just imagine a light bulb that lasts 30 years, that's no good for business. Hence, the NGAD program.
the rats are in Palo Alto, CA as homeless people living in all saints church opposite chase bank near the city hall .
Everything start with CIA. .
I enjoy watching your videos great job.
Microsoft gives it's source code to militaries that use their products. That includes Russia and China.
What about apple?
All these shady company doing shady things under the sun
I'm not saying you're wrong, but i have a really hard time believing that. Can you cite a source to back up this claim?
Gotta be in the know bro. @@Dwigt_Rortugal
If they gave their source code to everyone that wouldn't be a problem at all.
@@aakashramdam7543
Apple is lifestyle brand.
China Just Nailed it, when it comes to do something serious. It country with most better copycat than original itself.
Fantastic video, very informative, thanks for sharing.
3:28 Dragon Scimitar for ever :,)
Other countries: USA please transfer some technology to us.
China: I took it, catch me if you can.
Great content. More please....
Cant spell China without CIA
Ok and you can't spell "homeowner" without "meow" what's your point
bro is speaking yappanese
Great video!
You can partly blame the countries being hack because they are ignorant in keeping their network secure and better employee training.
Yea we should blame the elderly for falling for social security scams, too. Ignorance is no excuse afterall, right?
@null2470 They know very well that other nations are very interested in getting information from the US and the West for their technology and economic advantages, and yet they didn't put enough effort and budget to create a more secure network and limit the information from getting out to vulnerable personnel. And you think China and other nation will stop because we call them bad? If China will have an edge in technology and military research then the US would do the same.
The US is after Linux distros now. Since people have stopped using for critical infra, as the US introduces vulnerabilities in windows.
Bill Gate is a SELLOUT Commie CCP Agent 🇨🇳
That's how we became a super power also!
USA 🇺🇸 USA 🇺🇸
Thank you much greatful 👍👍🙌🙌👏👏
all of Chinese military and officials have their original physical bodies in Titing a village in the sub division of Moutourwa in Cameroon
i had these problems on my old website. I didn’t even know what to do.
Remember the incident at Underwriters Laboratory?
A Chinese engineer got caught walking out the gate with hard drives filled with sensitive information. 🥺
Critical infrastructure should NEVER be on the internet. It doesn't matter how inconvenient it is, or how many fat bonuses management has to give up, it just shouldn't be connected. Period.
This video is great! If at all possible, please include source material for this/future informational videos. Sounds like it'd be a great read. After doing some searching it's proving rather difficult to find the source material
it is, because it is baseless, just storytelling, have fun watching!
As a Chinese I want to say, none of us want to be superpower. You can give this title to India. They will be happy
People have no idea how active the indian community is on youtube comments, specifically regarding politics - they fucking love this shit....a lot of the haters and people who talk bad about china online aren't actually american, theyre indian pretending to be american or chinese or whatevrer
Saar😂😂
Lmao they feel Proud just with that😂😂
Nobody wants the crown huh
They already claimed to be super power 😂😂😂😂
@@ghazanhussain2070 this is why I prefer beanies over crowns
What if a conversation afterwards you allowed the intellectual property fraud!?
to me, its amazing when chinese hackers, most if not all barely could speak great english and yet their hacking skills are crazy. you have to know english really well, then the programming languages... that is like knowing three or more just computer languages, plus english and chinese. i cant even walk and chew gum, without biting my cheek and lips.
Sadly, in a lot of cases the hacking skills don't have to be impressive because the targets are so soft and security is so lax.
speaking English don't mean intelligence you literally got men with the intelligence of gorillas in English Speaking countries