China Admitted Its Role in Cyberattacks on the U.S.
IFA Countered the Satanic āBlack Massā In Prayer
Trump Orders Probes into āBad-Faith Actorsā From First Admin
House Clears Legislative Hurdle in Key Budget Vote
Senate Confirms Mike Huckabee As Ambassador to Israel
China Admitted Its Role in Cyberattacks on the U.S.
In a secret meeting late last year, Chinese officials acknowledged Beijing’s involvement in the recent Chinese cyberattacks on U.S. infrastructure, suggesting these attacks came as a result of America’s support for Taiwan.
From The Wall Street Journal. Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate.
This content is supported by your donations.
Give today.
The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan, the people, who declined to be named, said.
The first-of-its-kind signal at a Geneva summit with the outgoing Biden administration startled American officials used to hearing their Chinese counterparts blame the campaign, which security researchers have dubbed Volt Typhoon, on a criminal outfit, or accuse the U.S. of having an overactive imagination. …
Officials say Chinese hackersā targeting of civilian infrastructure in recent years presents among the most troubling security threats facing the Trump administration. …
During the half-day meeting in Geneva, Wang Lei, a top cyber official with Chinaās Ministry of Foreign Affairs, indicated that the infrastructure hacks resulted from the U.S.ās military backing of Taiwan, an island Beijing claims as its own, according to current and former U.S. officials familiar with the conversation.
Wang or the other Chinese officials didnāt directly state that China was responsible for the hacking, the U.S. officials said. But American officials present and others later briefed on the meeting perceived the comments as confirmation of Beijingās role and was intended to scare the U.S. from involving itself if a conflict erupts in the Taiwan Strait.Ā …
A Chinese official would likely only acknowledge the intrusions even in a private setting if instructed to do so by the top levels of Xiās government, said Dakota Cary, a China expert at the cybersecurity firm SentinelOne. The tacit admission is significant, he said, because it may reflect a view in Beijing that the likeliest military conflict with the U.S. would be over Taiwan and that a more direct signal about the stakes of involvement needed to be sent to the Trump administration.
āChina wants U.S. officials to know that, yes, they do have this capability, and they are willing to use it,ā Cary said.
Share your prayers for America’s cybersecurity and infrastructure below.
(Excerpt from The Wall Street Journal. Photo Credit: Microbiz Mag – https://www.flickr.com/photos/microbizmag/53344484803/, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=141177757)
Partner with Us
Intercessors for America is the trusted resource for millions of people across the United States committed to praying for our nation. If you have benefited from IFA's resources and community, please consider joining us as a monthly support partner. As a 501(c)3 organization, it's through your support that all this possible.


We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Privacy Policy
Comments
China likes to interfere and cause trouble in every country and Canada has been targeted for many years…but the Canadian Government won’t admit it and seems to like its ties with China…training Chinese army in BC and letting in drugs through B.C. borders. Canadians are dying due to the Canadian governments blatent wrongdoing.
Everyone who uses equipment connected to a network in any way, whether personal or commercial, must adopt the idea that if it can be secured, it MUST be secured. These types of attacks should never have been possible.