Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Report: China Already Hacking into U.S. Utilities, Pipeline, Port Companies
Just The News ^ | December 13, 2023 5:05pm | By The Foreign Desk Staff

Posted on 12/14/2023 6:22:48 AM PST by Red Badger

The goal, the report describes, is to find ways to “sow panic and chaos or snarl logistics in the event of a U.S.-China conflict in the Pacific.”

China’s threat to America now includes schemes to disrupt power and water supplies, communications and even transportation systems, according to officials cited in a new report.

Experts quoted by the Washington Post explained that hackers linked to China’s People’s Liberation Army already have succeeded in breaching “the computer systems of about two dozen critical entities over the past year.”

The goal, the report describes, is to find ways to “sow panic and chaos or snarl logistics in the event of a U.S.-China conflict in the Pacific.”

Those in a bull’s-eye already include a water utility in Hawaii, a port along the West Coast and an oil and gas pipeline, those experts told the publication.

“The hackers also attempted to break into the operator of Texas’s power grid, which operates independently from electrical systems in the rest of the country,” the report noted.

The report, citing anonymous sources, said there also were several targets outside the United States.

The report noted no industrial controls so far have been disrupted, but the fact that Hawaii has been targeted suggests the intent to impact America’s operation of its Pacific Fleet, such as shipping troops or equipment.

The report said there previously were reports of a “Volt Typhoon” campaign being conducted against the U.S.

“It is very clear that Chinese attempts to compromise critical infrastructure are in part to pre-position themselves to be able to disrupt or destroy that critical infrastructure in the event of a conflict, to either prevent the United States from being able to project power into Asia or to cause societal chaos inside the United States — to affect our decision-making around a crisis,” charged Brandon Wales, who is with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency.

“That is a significant change from Chinese cyber activity from seven to 10 years ago that was focused primarily on political and economic espionage.”

An official with the National Security Agency said in the report Volt Typhoon activity is focused on “indo-Pacific region” targets.

Joe McReynolds, of the Jamestown Foundation, explained the hackers are trying to uncover a way to get into the computer systems without detection.

The report noted the Office of the Director of National Intelligence already has admitted the China is capable of delivering cyberattacks that would create disruption for America.


TOPICS: Business/Economy; Foreign Affairs; Government; War
KEYWORDS: china; chinahacking; hacking; hawaii; infrastructure; pipelines; ports; portsecurity; volttyphoon
PROBING, probing, probing...................

Synchronizing, Synchronizing, Synchronizing, Synchronizing, .................

Initiating, Initiating, Initiating, Initiating, ............

Launching, Launching, Launching, Launching, Launching, ...................

USA DEAD..........................

1 posted on 12/14/2023 6:22:48 AM PST by Red Badger
[ Post Reply | Private Reply | View Replies]

To: Red Badger

Well the US has a President and an Obama Criminal Gang at the White House that cares nothing about Security


2 posted on 12/14/2023 6:24:48 AM PST by butlerweave
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Considering that China hacked into Biden a long time ago and Biden, via the Democrat Party, hacked into and politicized the entire Deep State and Intel Community, hacking into utilities and energy operations seems like small potatoes.


3 posted on 12/14/2023 6:26:13 AM PST by RoosterRedux (A person who seeks the truth with a strong bias will never find it. He will only confirm his bias.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Utility grids present a security liability. Every individual home and business should have independent utilities, whether nuclear, geothermal, etc. Water is more difficult, but those homes with wells have a good start.

I’ve inquired as to whether fuel pumps have a manual override and not received an answer. You might have a generator, but what do you do when fuel runs out and you cannot pump more?


4 posted on 12/14/2023 6:29:17 AM PST by Fester Chugabrew (May I please have a government shutdown?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fester Chugabrew
Utility grids present a security liability. Every individual home and business should have independent utilities, whether nuclear, geothermal, etc.

This is one reason I have tons of solar (81% of the power we consumed in the past 365 days was from solar -- with me pulling the other 19% from the grid, almost all of that in the winter). Although I'll admit I wasn't thinking about security against China cutting us off from energy. I figured the Dims would beat China to it.

5 posted on 12/14/2023 6:32:49 AM PST by Tell It Right (1st Thessalonians 5:21 -- Put everything to the test, hold fast to that which is true.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: All

Maybe these things shouldn’t be connected to the internet


6 posted on 12/14/2023 6:42:05 AM PST by escapefromboston (Peace, commerce and honest friendship with all nations, entangling alliances with none.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Cuse me… if say someone in a nice shiny suit in a political position gave the Chinese the passwords, is that still considered Hacking?


7 posted on 12/14/2023 6:43:14 AM PST by Lockbox (politicians, they all seemed like game show hosts to me.... Sting…)
[ Post Reply | Private Reply | To 1 | View Replies]

To: butlerweave

China paid Bidens and Marxist Dems for the privilege.


8 posted on 12/14/2023 6:43:47 AM PST by chopperk
[ Post Reply | Private Reply | To 2 | View Replies]

To: Lockbox

No, that is treason.................


9 posted on 12/14/2023 6:48:05 AM PST by Red Badger (Homeless veterans camp in the streets while l aliens are put up in hotels.....................)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Red Badger

And they have been doing food chain disruptions with all the fires at chicken farms and pork processing plants.


10 posted on 12/14/2023 7:41:22 AM PST by kvanbrunt2
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

One day fiction will become reality because Fedgov is a liability and Americans are dumb down.


11 posted on 12/14/2023 7:42:54 AM PST by shanover (...To disarm the people is the best and most effectual way to enslave them.-S.Adams)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

I’ve worked for several utilities. Any reasonably run one knows in their bones that there should be no physical connection (including WiFi, Bluetooth, etc) between the operations systems and any outside system that can be connected to the WWW. No, not some damned firewall — NO PHYSICAL CONNECTION.
If you then control who can touch the control systems the only way your utility can be hurt is by an inside guy. Preventing hacking is relatively easy.
Need to update the operation’s system? Then, get off your fat butt and walk over there and do the install, yourself. No dialing in from outside.

It is like no voting system can have a physical connection to the WWW. Oh, oopsie. That was permitted in the Michigan Dominion systems. Imagine my surprise.


12 posted on 12/14/2023 7:52:47 AM PST by bobbo666 (Baizuo, )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Ain’t technology grand it’s fail safe huh.


13 posted on 12/14/2023 7:59:54 AM PST by Vaduz (....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RoosterRedux

I so remember when Nancy Pelosi forced the commandeer of military logistics in all of Europe to appear before her in the house. His travel and methods of communication were compromised after that. It’s way past time this compromised traitor got hers.


14 posted on 12/14/2023 8:20:10 AM PST by OftheOhio (never could dance but always could fight - Romeo company)
[ Post Reply | Private Reply | To 3 | View Replies]

To: RoosterRedux

Never mind they’ve bought up land around power stations.


15 posted on 12/14/2023 8:36:44 AM PST by bgill
[ Post Reply | Private Reply | To 3 | View Replies]

To: Red Badger

Wait till they change chemical compositions in the cities drinking water. Kill millions before they find out it’s even happening.


16 posted on 12/14/2023 9:15:55 AM PST by lucky american (Progressives are attacking our rights and y'all will sit there and take it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

And our elites want to eliminate fossil fuels while China hacks into and shuts down our power grid. At least we’ll habe practice.


17 posted on 12/14/2023 10:11:43 AM PST by Tacrolimus1mg (Do no harm, but take no sh!t.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void; aragorn; EnigmaticAnomaly; kalee; Kale; AZ .44 MAG; Baynative; bgill; bitt; ...

P


18 posted on 12/14/2023 2:45:22 PM PST by bitt (<img src=' 'width=30%>)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt
***Report: China Already Hacking into U.S. Utilities, Pipeline, Port Companies***

COUNTER ATTACK❗❗❗

19 posted on 12/14/2023 3:39:08 PM PST by Bob Ireland (The Democrap Party is the enemy of freedom.They use all the seductions and deceits of the Bolshevics)
[ Post Reply | Private Reply | To 18 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson