Skip to content
Advertisement

The Washington Times

NATSEC-TECH THURSDAY — February 27, 2025: Every Thursday’s edition of Threat Status highlights the intersection between national security and advanced technology, from AI to cyber threats and the battle for global data dominance.

Share the daily Threat Status newsletter and the weekly NatSec-Tech Wrap with friends who can sign up here. Send tips to National Security Editor Guy Taylor or lead Tech Correspondent Ryan Lovelace.

The LockBit ransomware gang, which the U.S. Justice Department has described as among the world’s “most prolific” purveyors of ransomware, has wished FBI Director Kash Patel a happy birthday. 

… Threat Status has a first look at ex-CIA analyst Patrick Eddington’s new book exposing the secret history of the U.S. government’s domestic spying. 

… A new Government Accountability Office report on military space lasers recommends demonstrating that the technology works before the Pentagon spends more cash.

… CrowdStrike detected a surge in China’s cyberattacks in 2024, and SentinelOne says a data leak exposed new aspects of Beijing’s vast censorship regime. 

… The 2025 edition of the Stanford Emerging Technology Review takes a dour view of quantum computing, saying even if breakthroughs are realized, they won’t address many important computing needs and challenges.

… Lithuania might disagree. Three universities there conducted the first successful trials of quantum communication for secure data transmission. 

… Poland is providing Ukraine with about 5,000 more Starlink terminals that allow more reliable access to the internet via a network of satellites circling the planet.

… And U.S. defense contractor L3Harris Technologies is partnering with Shield AI to develop an electronic warfare operation powered by artificial intelligence.

Ex-CIA analyst’s book exposes hidden history of U.S. government’s spying on Americans

The Federal Bureau of Investigation (FBI) headquarters is seen in Washington, Dec. 7, 2024. (AP Photo/Jose Luis Magana, File)

Cato Institute senior fellow Patrick Eddington, a former CIA analyst, authored the forthcoming book, “The Triumph of Fear,” which reveals the American government’s surveillance efforts using primary source materials that were previously unavailable to federal investigators and researchers alike.

Those materials include “literally hundreds of thousands of pages” of federal records, first-person accounts, congressional hearings and reports, and more secondary sources, according to a copy of the book obtained by Threat Status.

After years spent fighting with government officials and battling in federal courts to unearth the records, Mr. Eddington wrote that all past efforts to restrain the government’s spying powers have proven unsuccessful. He told Threat Status that the incoming leadership of the intelligence community and FBI should support “real restraints on their activities as it pertains to collecting data on or investigating Americans.” 

CrowdStrike: China’s cyberattacks ramping up, growing more sophisticated

A CrowdStrike office is seen in Sunnyvale, Calif., July 19, 2024. (AP Photo/Haven Daley, File)

The Austin, Texas-based cyber firm CrowdStrike observed a massive increase in China-linked cyberattacks and digital espionage in 2024, demonstrating that the Chinese communist regime’s offensive cyber operations have achieved a new level of sophistication.

China-linked malicious cyber activity rose 150% year-over-year across all sectors that CrowdStrike tracks, according to a draft of the firm’s 2025 Global Threat Report made public Thursday. While China’s Typhoon hacking groups grabbed international headlines for breaking into American infrastructure and Western telecommunications companies, CrowdStrike detected China’s hackers across many other sectors.

The annual report showed the most dramatic upticks of China’s malicious cyber activity hit the media, manufacturing, financial services, and industrials and engineering sectors. China’s hacks and attacks rose from 200 to 300% against these sectors. National Security Tech Correspondent Ryan Lovelace takes a more detailed look at the report.

Leak exposes how private firms fuel China’s censorship regime

A vendor promoting surveillance camera technologies stretches his head during Security China 2023 in Beijing, on June 9, 2023. After years of breakneck growth, China's security and surveillance industry is now focused on shoring up its vulnerabilities to the United States and other outside actors, worried about risks posed by hackers, advances in artificial intelligence and pressure from rival governments. The renewed emphasis on self-reliance, combating fraud and hardening systems against hacking was on display at the recent Security China exhibition in Beijing. (AP Photo/Ng Han Guan)

New details about how China relies on private sector partners to censor the internet have spilled into public view via a data leak analyzed by the Mountain View, California-based cybersecurity firm SentinelOne.

The leak from Chinese cyber firm TopSec included more than 7,000 lines of work logs and code that SentinelOne analysts used to trace the Chinese government and the ruling Communist Party’s coordination with the tech sector.

“TopSec is likely enabling content-moderation for internet censorship purposes, a key strategy used by the Chinese Communist Party to monitor and control public opinion on issues that the state deems contentious or antisocial,” SentinelOne’s Alex Delamotte, Aleksandar Milenkoski and Dakota Cary said in a new report.

The company reached this conclusion, in part, by studying the leaked data on TopSec’s web content monitoring capabilities believed to be used for a project of China’s Ministry of Public Security, one of Beijing’s top intelligence agencies. TopSec’s tools enabled Chinese authorities to hunt for sensitive words.

Beijing balks at Trump’s call for nuclear arms talks

The Chinese and United States flags are flown outside the China International Supply Chain Expo in Beijing, Nov. 27, 2024. (AP Photo/Ng Han Guan) ** FILE **

The Chinese government this week appeared to throw cold water on a proposal by President Trump for nuclear arms talks with Moscow and Beijing, and what Mr. Trump hopes will be an eventual halving of defense spending by all three nations.

Russian President Vladimir Putin has responded to the Trump proposal by saying Moscow is ready to discuss the prospect of mutual defense budget cuts of 50% and that he believed China could join three-way talks on the reductions.

However, when asked about Mr. Putin’s comment during a press briefing in Beijing, Chinese Foreign Ministry spokesman Lin Jian did not answer directly and defended the pace of Beijing’s defense spending and its buildup of weapons and forces.

Opinion: Without China’s help, Russia’s war in Ukraine would end

China supporting Russia illustration by Linas Garsys / The Washington Times

China denies providing weapons to Russia, but “reportedly provides dual-use critical components, estimated at $300 million monthly, enabling Russia to produce munitions, tanks, armored vehicles, missiles and drones,” writes Joseph R. DeTrani, a former senior U.S. intelligence official and opinion contributor to Threat Status. 

“China’s allied relationship with Russia, which invaded a sovereign and independent Ukraine, has adversely affected China’s credibility with the European Union and other countries,” writes Mr. DeTrani. “Foreign direct investment in China fell $168 billion in 2024. International companies are leaving China, and Chinese firms are moving money abroad for better returns.”

“Mr. Putin’s invasion of Ukraine could be the beginning of his effort to re-create the Russian empire. Although it’s in China’s interest to see an end to the war in Ukraine, it is not in China’s interest to maintain a close allied relationship with a revanchist Russian Federation,” he writes. “The impact on China’s economy and international credibility will be profound. Without China’s support, Russia will find it difficult, if not impossible, to persist with its invasion of Ukraine.”

Threat Status Events Radar

• Feb. 26-27 — Global Space & Technology Convention & Exhibition, Singapore Space & Technology

• March 3-8 — SANS Security East, SANS

• March 4 — How Terrorists Use the Internet and Online Networks for Recruitment, House Homeland Security Committee

• March 5 — Investigating the Threat to U.S.-funded Research, House Science Committee

• March 6 — Iran on the Brink: Resistance, Repression, and Global Power Shifts, Hudson Institute

• March 17-19 — 2025 ARPA-E Energy Innovation Summit, ARPA-E

Thanks for reading NatSec-Tech Thursday from Threat Status. Don’t forget to share it with your friends who can sign up here. And listen to our weekly podcast available here or wherever you get your podcasts.

If you’ve got questions, Guy Taylor and Ryan Lovelace are here to answer them.