Hotznplotzn

joined 2 months ago
 
  • Ukraine president says China providing artillery and gunpowder
  • Zelenskiy also says Beijing helping make weapons in Russia
  • Beijing accused of direct military aid for Russia for first time
  • Russia waging a more than three-year-old invasion of Ukraine
 

cross-posted from: https://lemmy.sdf.org/post/32890027

Archived

“If [the] government goes to the bank with a list of 100 Uyghur names and says, you know, ‘give me the bank balance for these people [and] how much money they have.’ The bank will print it out and hand it over to the CCP [Chinese Communist Party]. Then, they shut down the bank accounts, freeze their assets, and they take their properties,” she said.

 

cross-posted from: https://lemmy.sdf.org/post/32890027

Archived

“If [the] government goes to the bank with a list of 100 Uyghur names and says, you know, ‘give me the bank balance for these people [and] how much money they have.’ The bank will print it out and hand it over to the CCP [Chinese Communist Party]. Then, they shut down the bank accounts, freeze their assets, and they take their properties,” she said.

 

cross-posted from: https://lemmy.sdf.org/post/32890027

Archived

“If [the] government goes to the bank with a list of 100 Uyghur names and says, you know, ‘give me the bank balance for these people [and] how much money they have.’ The bank will print it out and hand it over to the CCP [Chinese Communist Party]. Then, they shut down the bank accounts, freeze their assets, and they take their properties,” she said.

 

Archived

“If [the] government goes to the bank with a list of 100 Uyghur names and says, you know, ‘give me the bank balance for these people [and] how much money they have.’ The bank will print it out and hand it over to the CCP [Chinese Communist Party]. Then, they shut down the bank accounts, freeze their assets, and they take their properties,” she said.

 

cross-posted from: https://lemmy.sdf.org/post/32848522

Archived

Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.

As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking.

Last year, revelations rocked the United States federal government that the Chinese hacking group known as “Salt Typhoon” had breached at least nine major US telecoms. And the group’s rampage even continued into this year in the US and other countries around the world. Meanwhile, the Beijing-linked hacking group “Volt Typhoon” has continued to lurk in US critical infrastructure and utilities around the world. Meanwhile, the notoriously versatile syndicate known as Brass Typhoon—also called APT 41 or Barium—has been operating in the shadows.

[...]

Brass Typhoon is known for having carried out a notable string of software supply chain attacks in the late 2010s and for brazen attacks on telecoms around the same time in which the group specifically targeted call record data. The gang is also known for its hybrid activity, carrying out hacks that align with Chinese state-sponsored espionage by the Chinese Ministry of State Security, but also moonlighting on seemingly cybercriminal projects, particularly focused on the video game industry and in-game currency scams.

Research indicates that Brass Typhoon has continued to be active in recent months with financial crimes targeting online gambling platforms as well as espionage targeting manufacturing and energy firms. Its sustained activity has run in parallel to Salt and Volt Typhoon’s recent, attention-grabbing campaigns, and analysis increasingly shows that China’s state-backed hacking operations must be viewed comprehensively, not just in terms of individual actors.

[...]

 

cross-posted from: https://lemmy.sdf.org/post/32848522

Archived

Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.

As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking.

Last year, revelations rocked the United States federal government that the Chinese hacking group known as “Salt Typhoon” had breached at least nine major US telecoms. And the group’s rampage even continued into this year in the US and other countries around the world. Meanwhile, the Beijing-linked hacking group “Volt Typhoon” has continued to lurk in US critical infrastructure and utilities around the world. Meanwhile, the notoriously versatile syndicate known as Brass Typhoon—also called APT 41 or Barium—has been operating in the shadows.

[...]

Brass Typhoon is known for having carried out a notable string of software supply chain attacks in the late 2010s and for brazen attacks on telecoms around the same time in which the group specifically targeted call record data. The gang is also known for its hybrid activity, carrying out hacks that align with Chinese state-sponsored espionage by the Chinese Ministry of State Security, but also moonlighting on seemingly cybercriminal projects, particularly focused on the video game industry and in-game currency scams.

Research indicates that Brass Typhoon has continued to be active in recent months with financial crimes targeting online gambling platforms as well as espionage targeting manufacturing and energy firms. Its sustained activity has run in parallel to Salt and Volt Typhoon’s recent, attention-grabbing campaigns, and analysis increasingly shows that China’s state-backed hacking operations must be viewed comprehensively, not just in terms of individual actors.

[...]

 

Archived

Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.

As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking.

Last year, revelations rocked the United States federal government that the Chinese hacking group known as “Salt Typhoon” had breached at least nine major US telecoms. And the group’s rampage even continued into this year in the US and other countries around the world. Meanwhile, the Beijing-linked hacking group “Volt Typhoon” has continued to lurk in US critical infrastructure and utilities around the world. Meanwhile, the notoriously versatile syndicate known as Brass Typhoon—also called APT 41 or Barium—has been operating in the shadows.

[...]

Brass Typhoon is known for having carried out a notable string of software supply chain attacks in the late 2010s and for brazen attacks on telecoms around the same time in which the group specifically targeted call record data. The gang is also known for its hybrid activity, carrying out hacks that align with Chinese state-sponsored espionage by the Chinese Ministry of State Security, but also moonlighting on seemingly cybercriminal projects, particularly focused on the video game industry and in-game currency scams.

Research indicates that Brass Typhoon has continued to be active in recent months with financial crimes targeting online gambling platforms as well as espionage targeting manufacturing and energy firms. Its sustained activity has run in parallel to Salt and Volt Typhoon’s recent, attention-grabbing campaigns, and analysis increasingly shows that China’s state-backed hacking operations must be viewed comprehensively, not just in terms of individual actors.

[...]

 

cross-posted from: https://lemmy.sdf.org/post/32836649

Archived

A Chinese state-owned company that was previously sanctioned by the U.S. for facilitating human rights abuses against Uyghurs is now training police officers in Tibet on hacking techniques and digital forensics, according to a watchdog organization.

SDIC Intelligence Xiamen Information Co Ltd, a digital forensics company better known as Meiya Pico, won a contract in mid-2023 to build two labs at the Tibet Police College: one on offensive and defensive cyber techniques and the other on electronic evidence collection and analysis. Details of the approximately $1.32 million contract were analyzed and released on Wednesday by Turquoise Roof, a research network focused on Tibet.

The contracts include “servers for the cyber range, network switches, intrusion simulation software, forensic workstations and] evidence storage systems,” the researchers said.

Founded in 1999 as an independent company, Meiya Pico is now state-owned, and as of 2019 it reportedly had a 45% market share of China’s digital forensics market. Its products have raised controversy globally for their invasiveness, including a spyware app called MFSocket that police have allegedly installed on phones throughout the country during inspections of smartphones.

[...]

According to the company, it has conducted training courses in 30 countries as part of China’s Belt and Road Initiative.

[...]

 

cross-posted from: https://lemmy.sdf.org/post/32836649

Archived

A Chinese state-owned company that was previously sanctioned by the U.S. for facilitating human rights abuses against Uyghurs is now training police officers in Tibet on hacking techniques and digital forensics, according to a watchdog organization.

SDIC Intelligence Xiamen Information Co Ltd, a digital forensics company better known as Meiya Pico, won a contract in mid-2023 to build two labs at the Tibet Police College: one on offensive and defensive cyber techniques and the other on electronic evidence collection and analysis. Details of the approximately $1.32 million contract were analyzed and released on Wednesday by Turquoise Roof, a research network focused on Tibet.

The contracts include “servers for the cyber range, network switches, intrusion simulation software, forensic workstations and] evidence storage systems,” the researchers said.

Founded in 1999 as an independent company, Meiya Pico is now state-owned, and as of 2019 it reportedly had a 45% market share of China’s digital forensics market. Its products have raised controversy globally for their invasiveness, including a spyware app called MFSocket that police have allegedly installed on phones throughout the country during inspections of smartphones.

[...]

According to the company, it has conducted training courses in 30 countries as part of China’s Belt and Road Initiative.

[...]

 

Archived

A Chinese state-owned company that was previously sanctioned by the U.S. for facilitating human rights abuses against Uyghurs is now training police officers in Tibet on hacking techniques and digital forensics, according to a watchdog organization.

SDIC Intelligence Xiamen Information Co Ltd, a digital forensics company better known as Meiya Pico, won a contract in mid-2023 to build two labs at the Tibet Police College: one on offensive and defensive cyber techniques and the other on electronic evidence collection and analysis. Details of the approximately $1.32 million contract were analyzed and released on Wednesday by Turquoise Roof, a research network focused on Tibet.

The contracts include “servers for the cyber range, network switches, intrusion simulation software, forensic workstations and] evidence storage systems,” the researchers said.

Founded in 1999 as an independent company, Meiya Pico is now state-owned, and as of 2019 it reportedly had a 45% market share of China’s digital forensics market. Its products have raised controversy globally for their invasiveness, including a spyware app called MFSocket that police have allegedly installed on phones throughout the country during inspections of smartphones.

[...]

According to the company, it has conducted training courses in 30 countries as part of China’s Belt and Road Initiative.

[...]

 

Archiv-Link

[...]

Anstatt in die USA seien immer mehr asiatische Containerschiffe mit geringwertigen Waren nun "in Richtung Europa unterwegs", sagte Handelsverband-Geschäftsführer Rainer Will am Donnerstag bei einer Fachtagung des Verbands. Neben den besonders hohen generellen Sonderzöllen für China hat US-Präsident Donald Trump zusätzlich Zölle von 90 Prozent auf geringwertige Waren aus China angeordnet - eine Verdreifachung der bisher vorgesehenen Abgaben für diese Artikel, die vor allem über die Apps von Temu und Shein gekauft werden. Trump hatte zuvor bereits die zollbefreite Einfuhr von Paketen mit einem Wert von bis zu 800 Dollar (rund 724 Euro) aufgehoben.

[...]

Der Handelsverband-Geschäftsführer fordert angesichts der jüngsten Entwicklungen im US/China-Zollstreit die EU-Kommission "sofort zum Handeln" auf. Temu und Shein verstoßen "mutmaßlich wiederholt gegen geltendes EU-Recht". Die EU habe die "Vollzugsinstrumente der EU noch nicht auf scharf gestellt", kritisierte Interessensvertreter Will.

[...]

Auch für Sozial- und Gesundheitsministerin Korinna Schumann (SPÖ) sind die Billig-Warenlieferungen von Temu, Shein & Co "ein unglaubliches Problem". Dies könne man "nicht auf österreichischer Ebene lösen", sondern nur gemeinsam als Europäische Union, sagte Schumann am Donnerstagnachmittag beim Handelskolloquium des Handelsverbandes. "Das ist einer der großen Gefahren für unseren Handel." Auch müsse sichergestellt werden, dass die über Temu und Shein verkauften Produkte nicht gesundheitsgefährdend seien, so die Konsumentenschutzministerin.

[–] Hotznplotzn 10 points 1 day ago (8 children)

Amazing how this thread illustrates how many tankie alt accounts are here on Beehaw already.

[–] Hotznplotzn 5 points 1 day ago

Yeah, China and Spain appear to have good relationships. Spain's PM Pedro Sanchez visited China just last week again, after his visits in 2024 and 2023.

One of Mr. Sanchez’s trusted figures regarding China-relations is former PM José Luis Rodríguez Zapatero from the Spanish Socialist Workers' Party (PSOE), who co-founded the Gate Center, a Spanish-Chinese organization aiming to strenghten the two countries' ties., together with Chinese businessman Du Fangyong.

Mr. Zapatero has also acted as an intermediary to improve the image of Chinese company Huawei in Spain. The partner of Foreign Minister José Manuel Albares was vice president of Huawei Spain, and Esteban González Pons, deputy secretary general of Spain's People's Party (PP), supported Huawei's participation in European technological infrastructure projects.

In 2021, another PP politician, MEP Gabriel Mato supported the EU-China Investment Agreement, highlighting its potential to open the Chinese economy to European investors and promote what he called "fairer conditions" (Mr. Mato did not elaborate about Beijing's conditions for foreign investments in China, though). Last year, in 2024, Juanma Moreno, the president of the Spanish region of Andalusia, also made an official visit to China.

None of them ever discussed human rights issues, though.

[–] Hotznplotzn -1 points 2 days ago

@Diplomjodler3@lemmy.world

China or any of those others are no direct military threat to Europe.

Chinese soldiers are already fighting in Europe, killing Europeans, including civilians and children. The Chinese Communist Party is censoring reports on Chinese soldiers being caught in Ukraine, but it doesn't censor Russia's conscription ads. This suggests that the Chinese party-state not only knows about these soldiers, they actively support Russia once again by their inaction, constituting a direct threat to Europe.

[–] Hotznplotzn 7 points 3 days ago (1 children)

Just read the article before you (intentionally?) misinterpret the content:

The admission of Chinese responsibility came during a secret meeting between outgoing Biden administration officials and Chinese representatives on the sidelines of a summit in Geneva in December 2024. [...] The Chinese attendants referred indirectly to the activity as being a warning for the US to stay away from any attempts to support or defend Taiwan.

[–] Hotznplotzn 4 points 3 days ago (2 children)

In 2023, then Chinese ambassador to France Lu Shaye (who is now Chinese envoy to Europe) said that former Soviet countries "have no effective status in international law."

“In international law, even these ex-Soviet Union countries do not have the effective status because there is no international agreement to materialize their status of a sovereign country,” [China's ambassador Lu Shaye] said.

He denies the very existence of countries like Ukraine, Lithuania, Estonia, Kazakhstan, etc.,” [wrote] Antoine Bondaz, a China expert at the Paris-based think-tank Foundation for Strategic Research.

[–] Hotznplotzn 13 points 3 days ago

As EDRi-advisor Itxaso Domínguez de Olazábal cited in the article says, “Reopening the GDPR for simplification is risky," but the whole article is not about what its title suggests. I don't want to play this down, but it's a bit another clickbait headline by Axel Springer media. They somehow contradict themselves in the end:

According to Austrian privacy activist Max Schrems, the GDPR is still a “huge target” for lobbyists, but its core rules can’t easily be scrapped since the protection of personal data is enshrined in the EU’s Charter of Fundamental Rights as an inalienable freedom.

“A Court of Justice would annul a GDPR that doesn’t have these core elements," Schrems said. "So if it’s where [lobbyists] want to spend their energy, be my guest, but they’re not going to get there.”

[–] Hotznplotzn 4 points 3 days ago (1 children)

As someone else already wrote, Chinese companies simply don't care.

[–] Hotznplotzn 9 points 4 days ago* (last edited 3 days ago)

They hopefully can sidestep him again as they did once and form a 'coalition of the willing."

Addition: President Zelensky to the US: "When children and adults are killed by missiles, I do not understand why we cannot agree on additional Patriot systems."

Second addition: Scene of destruction in Sumy after Russian attack -- (video, 1 min)

At least 34 people have been killed and 117 injured in a Russian attack on the city of Sumy, according to Ukrainian authorities. Two ballistic missiles struck the city, with the second causing the most casualties when it exploded over a street, officials said. 20 buildings were damaged, including cafes, shops and five apartment buildings.

[–] Hotznplotzn 2 points 4 days ago (1 children)

That’s true however China is slightly more democratic and doesn’t wage war on their neighbors.

I have to disagree. Although it is true there is no hot war at the moment, China has been increasingly aggressive toward Taiwan and practically all its neighbours (India, Buthan, Nepal, ...) as you probably know. But, yes, I fully agree Europe and all others should become more self-sufficient.

[–] Hotznplotzn 6 points 4 days ago (3 children)

I get your point, though I am afraid China is by no means a better partner.

[–] Hotznplotzn 1 points 4 days ago

And Canada, Australia, New Zealand, ...

[–] Hotznplotzn 12 points 6 days ago (1 children)

A new survey of Southeast Asian opinion leaders shows renewed trust in the EU after last year's decline

Last year [2024] saw trust in the EU drop by nearly 10% among the participants, which some experts attributed to Brussels' support for Israel in Gaza. But the latest ISEAS-Yusof [2025] report shows the EU has recovered and surpassed its previous standing.

"The levels of trust in the EU saw a significant improvement this year, rising from 41.5% in 2024 to 51.9% this year for ASEAN-10 respondents," the authors noted in the 2025 survey.

"One of my takeaways is that the European Union retained its top spot as the preferred ASEAN partner to hedge the great power rivalry between China and the United States," Sujiro Seam, the EU ambassador to ASEAN, said in a video he released this week.

Brussels also saw improvements in its trustworthiness as a defender of free trade and regional security.

view more: ‹ prev next ›