{"id":1121038,"date":"2024-01-14T22:27:09","date_gmt":"2024-01-15T03:27:09","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/ai-is-helping-us-spies-catch-stealthy-chinese-hacking-ops-nsa-official-says-cyberscoop\/"},"modified":"2024-01-14T22:27:09","modified_gmt":"2024-01-15T03:27:09","slug":"ai-is-helping-us-spies-catch-stealthy-chinese-hacking-ops-nsa-official-says-cyberscoop","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/ai-is-helping-us-spies-catch-stealthy-chinese-hacking-ops-nsa-official-says-cyberscoop\/","title":{"rendered":"AI is helping US spies catch stealthy Chinese hacking ops, NSA official says &#8211; CyberScoop"},"content":{"rendered":"<p><p>    NEW YORK CITY  Artificial intelligence and machine learning    technologies are helping the National Security Agency and other    U.S. government agencies detect malicious Chinese cyber    activity, a top U.S. intelligence official said in remarks on    Tuesday that indicate how U.S. security agencies are using the    technology to improve computer defenses.  <\/p>\n<p>    Speaking Tuesday at the International Conference on Cyber    Security at Fordham University, Rob Joyce, the director of the    NSA Cybersecurity Directorate, said that AI is helping his    agency detect Chinese operations targeting U.S. critical    infrastructure that might evade traditional defensive measures.  <\/p>\n<p>    U.S. intelligence officials have warned in recent months that    Chinese hacking groups are increasingly targeting power    generation systems, ports and other critical infrastructure    entities by using methods that analysts refer to as living off    the land  the use of tools, software and privileges already    present on networks to achieve various objectives. Malware that    would normally trip detection software or tools is never    employed, making it much harder to detect.  <\/p>\n<p>    Recent Chinese operations do not rely on traditional or known    malware that might be easily flagged based on signatures, Joyce    explained. Instead, the hackers takes advantage of architecture    implementation flaws or misconfigurations, or default passwords    to get into networks, create accounts or users that appear to    be legitimate, which are then used to move around the networks    or perform activities that typical users dont normally do.  <\/p>\n<p>    AI tools are helping the NSA catch these operations. Machine    learning, AI and big data help us surface those activities,    Joyce said, because the models are better at detecting    anomalous behavior of supposedly legitimate users.  <\/p>\n<p>    Recent advances in AI and machine learning have raised concerns    among researchers and security officials that they might    provide an advantage to offensive cyber operations, but Joyce    said Tuesday that hes encouraged by the defensive dividends    offered by the technology.  <\/p>\n<p>    Youre going to see that on both sides, people that use AI\/ML    will do better, Joyce said.  <\/p>\n<p>    Joyce, his colleagues at the NSA and other agencies have been    warning for months that China is aggressively targeting U.S.    critical    infrastructure in troubling ways. The U.S. government and    Microsoft     revealed in May 2023 that Chinese-linked operations were    targeting critical infrastructure entities in the U.S. and Guam    as part of a campaign tracked as Volt Typhoon.  <\/p>\n<p>    Theyre not there for intelligence. Theyre not there for    financial motivation. Theyre in places like electric,    transportation, and ports, trying to hack in so they can cause    societal disruption and panic at a time and place of their    choosing, Joyce said Tuesday.  <\/p>\n<p>    In November, Morgan Adamski, the director of the NSAs    Cybersecurity Collaboration Center, told a crowd of industry    analysts and researchers at the CYBERWARCON conference that    China was penetrating crtiicial infrastructure and waiting for    the best time to exploit these networks. In a call to action,    Adamski urged the researchers to look for anomalous behavior    beyond known malware in their networks and emphasized how    serious the situation is.  <\/p>\n<p>    The threat is extremely sophisticated and pervasive,     she said, as reported by Wired at the time. It is not easy    to find. It is pre-positioning with intent to quietly burrow    into critical networks for the long haul. The fact that these    actors are in critical infrastructure is unacceptable, and it    is something that we are taking very seriously  something that    we are concerned about.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/cyberscoop.com\/ai-china-hacking-operations\/\" title=\"AI is helping US spies catch stealthy Chinese hacking ops, NSA official says - CyberScoop\" rel=\"noopener\">AI is helping US spies catch stealthy Chinese hacking ops, NSA official says - CyberScoop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NEW YORK CITY Artificial intelligence and machine learning technologies are helping the National Security Agency and other U.S. government agencies detect malicious Chinese cyber activity, a top U.S. intelligence official said in remarks on Tuesday that indicate how U.S <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/ai-is-helping-us-spies-catch-stealthy-chinese-hacking-ops-nsa-official-says-cyberscoop\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1121038","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121038"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1121038"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121038\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1121038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1121038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1121038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}