• AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    5
    ·
    5 months ago

    This is the best summary I could come up with:


    Experts are poring over the documents, which offer an unusual glimpse inside the intense competition of China’s national security data-gathering industry — where rival outfits jockey for lucrative government contracts by pledging evermore devastating and comprehensive access to sensitive information deemed useful by Chinese police, military and intelligence agencies.

    “Understanding the highway terrain and location of bridges and tunnels is essential so you can move armored forces and infantry around the island in an effort to occupy Taiwan,” said Dmitri Alperovitch, a national security expert and chairman of Silverado Policy Accelerator, a think tank.

    “In the current climate, we, along with many other organizations, are the target of regular attempted attacks from both state and non-state actors,” said a Chatham House spokesperson, who said the group is “naturally concerned” about the leaks but has protection measures in place.

    Many software vendors offer bounties to reward researchers who report security flaws, but government contractors in the United States and elsewhere often claim these exploits — paying more for the right to use them in espionage or offensive activity.

    The documents show that iSoon met and worked with members of APT41, a Chinese hacking group that was charged by the U.S. Justice Department in 2020 for targeting more than 100 video game firms, universities and other victims worldwide.

    Afterward, iSoon’s founder and CEO, Wu Haibo, who goes by the alias “shutd0wn,” joked with another executive about going for “41” drinks with Chengdu 404 — the organization APT41 is a part of — to celebrate them now being “verified by the Federal Bureau of Investigation.”


    The original article contains 1,918 words, the summary contains 262 words. Saved 86%. I’m a bot and I’m open source!