Salt Typhoon Strikes Again: FBI Hacked, Texas Bans Chinese Med Tech, and Trumps Cyber Plan Drops the Ball

Salt Typhoon Strikes Again: FBI Hacked, Texas Bans Chinese Med Tech, and Trumps Cyber Plan Drops the Ball

3:43 Mar 9, 2026
About this episode
This is your Tech Shield: US vs China Updates podcast.Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking hijinks. Picture this: it's March 9, 2026, and the US-China tech shield battle is hotter than a server farm in a Beijing summer. Just this week, Salt Typhoon—that sneaky Chinese Ministry of State Security crew—struck again, breaching the FBI's Digital Collection System Network, or DSCNet, as reported by Centraleyes and the Wall Street Journal. These hackers slipped in via a commercial ISP's backdoor on February 17, snagging warrant details and surveillance metadata without touching the juicy audio in Digital Storm. Senator Mark Warner's sounding alarms, saying these APT41-linked ghosts might still be lurking, fresh off hacking AT&T, Verizon, Comcast, Digital Realty, and over 200 firms in 80 countries since 2019. FBI's dropped a $10 million bounty, but eviction? Nah, not confirmed yet.Texas Governor Abbott isn't messing around—today, he ordered the Health and Human Services Commission, Department of State Health Services, and public unis to scrub cyber risks in China-made medical gear, echoing CISA and FDA January alerts on vulnerable patient monitors that could leak your health data to the CCP. Trump's cyber strategy, unveiled Friday per Politico, promises aggressive takedowns of threats with six pillars: offensive ops, smart regs, network upgrades, infra hardening, workforce boosts, and crypto secures. Industry bigwigs like USTelecom's Jonathan Spalter and Auburn's Frank Cilluffo are cheering the proactive punch, but Foundation for Defense of Democracies' Mark Montgomery calls out the elephant: no direct shoutout to Volt Typhoon or Salt Typhoon's crit infrastructure rampages.On the tech front, Small Wars Journal details China's MSS blending HUMINT with cyber ops like Operation Cloud Hopper, hitting telcos for "one-to-many" access, while their 2023 Counter-Espionage Law now tags cyber hits on crit infra as straight-up spying. US responses? Clean Network vibes to ditch risky vendors, EU's NIS2 for risk management, and basics like patching, segmentation, and monitoring—'cause these pros exploit routine holes, not zero-days.As your witty cyber whisperer, here's the expert scoop: Trump's strategy's bold, but gaps scream louder—naming China explicitly would've lit a fire under telecoms. Salt Typhoon's supply-chain sorcery shows defenses are porous; effectiveness hinges on execution, like rumored EOs from the Office of the National Cyber Director. Emerging tech? Quantum-resistant crypto and AI-driven anomaly detection could plug holes, but without ditching China vendor dependencies—like those med devices—we're playing whack-a-mole. China's hypervigilant at home, raiding consultancies via WeChat warnings, turning the info war into mutual paranoia. Stay patched, encrypt app-layer, assume metadata's spied—resilience beats reaction every time.Thanks for tuning
Select an episode
0:00 0:00