Global Defense
No Result
View All Result
  • Login
  • Register
  • Home
  • Air
  • Land
  • Naval
  • Space
  • War & Conflict
  • Business
  • Science & Tech
Contact
Newsletter
Global Defense
  • Home
  • Air
  • Land
  • Naval
  • Space
  • War & Conflict
  • Business
  • Science & Tech
No Result
View All Result
Global Defense
No Result
View All Result
Home Science & Tech

DARPA’s Cyber Challenge Takes Aim at Chinese Hacking

Alex by Alex
April 29, 2025
Reading Time: 2 mins read
0
DARPA’s Cyber Challenge Takes Aim at Chinese Hacking

**SAN FRANCISCO** — The final round of a cybersecurity competition run by the Defense Advanced Research Projects Agency (DARPA) will take inspiration in part from a Chinese hacking campaign discovered last year that burrowed into major U.S. telecommunications systems and their wiretapping platforms.

RELATED POSTS

Army’s MDTF Eyes Advanced Drones for Pacific Operations

AI Revolutionizes Threat Detection for National Security

Small Cruise Missiles Set to Transform Drone Warfare

The final round of DARPA’s AI Cyber Challenge, scheduled to run at the DEF CON conference in August, will task seven teams with crafting an AI-powered system designed to secure open-source software that underpins critical infrastructure sectors like water systems and financial institutions. Teams will be expected to use AI to find and fix bugs in code that supports the functions of these critical infrastructure systems, working with both full code bases and smaller code blocks to mimic real-world debugging of computer system vulnerabilities.

Kathleen Fisher, director of the Information Innovation Office at DARPA, stated at the RSAC Conference in San Francisco, California, that DARPA is “100% inspired by the Salt Typhoon and Volt Typhoon stories, and needing to make the critical infrastructure software more robust from all those stories.” The Salt Typhoon hacks refer to the Chinese intrusions that targeted telecom providers in the U.S. and globally, which were discovered in 2024. Volt Typhoon represents a separate hacking unit infiltrating non-military critical infrastructure systems, such as water treatment plants, with intentions to disrupt them at the behest of China’s central government.

Fisher emphasized the importance of maintaining fairness in the competition while keeping specific challenges confidential. She acknowledged that they have been consulting critical infrastructure partners across different sectors about their threats to select appropriate software for the competition.

Her comments highlight the significant influence Chinese hacking operations have had on the design of the DARPA competition, which aims to help critical infrastructure owners and operators quickly locate and address vulnerabilities in their systems using agentic AI. Agentic AI is a subset of artificial intelligence capable of making autonomous decisions without constant human oversight.

Last summer, during the semifinal round of the AI Cyber Challenge, some simulated software flaws were modeled after known vulnerabilities. However, in recognition of hackers’ tendency to innovate, many flaws were newly created to resemble real-world scenarios. Salt Typhoon’s intrusion campaign, which persisted for about two years before its discovery in the spring, compromised at least nine American telecommunications operators. Modern telecom networks consist of a complex blend of outdated technology and contemporary digital infrastructure, with certain areas exhibiting robust security, while others bore vulnerabilities that the Chinese hackers effectively exploited.

Furthermore, Salt Typhoon breached America’s “lawful intercept” systems that manage wiretap requests designated for law enforcement surveillance of suspected criminals and spies. Under the Communications Assistance for Law Enforcement Act (CALEA), passed in 1994, telecom firms must architect their networks to accommodate such intercepts.

Fisher concluded by emphasizing the educational objectives of these events, stating, “The spectacle of these events is to teach people… about the risks and about the tools and techniques we could use to lower that threat threshold,” comparing software vulnerabilities to being defenseless against a missile attack.

ShareTweetShare

Related Posts

Army’s MDTF Eyes Advanced Drones for Pacific Operations
Science & Tech

Army’s MDTF Eyes Advanced Drones for Pacific Operations

May 15, 2025
AI Revolutionizes Threat Detection for National Security
Science & Tech

AI Revolutionizes Threat Detection for National Security

May 13, 2025
Small Cruise Missiles Set to Transform Drone Warfare
Science & Tech

Small Cruise Missiles Set to Transform Drone Warfare

May 9, 2025
Air Force Abandons Minuteman Silos for New Missile Bases
Science & Tech

Air Force Abandons Minuteman Silos for New Missile Bases

May 6, 2025
Pentagon Seeks Low-Collateral Drone Defense Solutions
Science & Tech

Pentagon Seeks Low-Collateral Drone Defense Solutions

May 5, 2025
Marines Showcase Game-Changing Autonomous Vehicles!
Science & Tech

Marines Showcase Game-Changing Autonomous Vehicles!

May 3, 2025
Next Post
Firefly Rocket Mishap Grounds Lockheed’s Tech Mission

Firefly Rocket Mishap Grounds Lockheed's Tech Mission

Marine Corps Eyes Cargo Drones for Pacific Missions

Marine Corps Eyes Cargo Drones for Pacific Missions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Testing a ‘narco-boat’ for resupply efforts: The Marine Corps’ innovative approach

Army moves closer to using autonomous boats for supply delivery in combat

October 17, 2024
Israel Confirms Ceasefire Deal Amid Ongoing Strikes

Israel Confirms Ceasefire Deal Amid Ongoing Strikes

January 17, 2025
French Defense Companies to Manufacture Weapons in Ukraine

French Defense Companies to Manufacture Weapons in Ukraine

March 11, 2024

Popular Stories

  • Find out the timeline for the US Army to select its next long-range spy plane

    Find out the timeline for the US Army to select its next long-range spy plane

    0 shares
    Share 0 Tweet 0
  • Silvus and Kagwerks combine radios and chest rigs for enhanced battle communications

    0 shares
    Share 0 Tweet 0
  • Marines and special ops conduct testing on MRZR vehicles to assess increased power and payload capacity

    0 shares
    Share 0 Tweet 0
  • Palantir selected by Army to develop advanced targeting system

    0 shares
    Share 0 Tweet 0
  • New Air Defense Facility to be Opened by Rheinmetall in Ukraine

    0 shares
    Share 0 Tweet 0
Global Defense

Global Defense is an online news source that provides up-to-date information on defense-related news and essential insights into military strategies for its readers. The site offers a comprehensive perspective for readers interested in the defense industry by delivering in-depth analyses and reports on national security, weapon systems, military technology, and strategic matters.

Recent Posts

  • Houthi Rebels Announce Naval Blockade on Haifa Port
  • Aviators Honored with Distinguished Flying Crosses
  • Netanyahu Vows Full Control Over Gaza Amid Crisis

Categories

  • Air
  • Business
  • Land
  • Naval
  • Science & Tech
  • Space
  • War & Conflict

© 2023 Global Defense. All right reserved. Developed by Webixmo.

No Result
View All Result
  • Home
  • Air
  • Land
  • Naval
  • Space
  • War & Conflict
  • Business
  • Science & Tech

© 2023 Global Defense. All right reserved. Developed by Webixmo.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In