News & Media
CNN
July 2022

Since at least 2017, federal officials have been investigating Chinese land purchases near critical infrastructure, closing a high-profile regional consulate believed to be a hotbed of Chinese spies, and obstructing efforts to plant listening devices near sensitive military and government facilities.
Among the most alarming findings, the FBI uncovered that Chinese-made Huawei equipment atop cell towers near US military bases in the rural Midwest could disrupt US nuclear arsenal communications. According to multiple sources familiar with the matter, the FBI determined the equipment was capable of capturing and disrupting highly restricted Defense Department communications, including those used by US Strategic Command, which oversees the country’s nuclear weapons.
Automate with Latenode:
Latenode can support the investigation and management of such security threats through various automation capabilities:
-
Data Collection and Analysis:
- Automate the collection and analysis of data related to foreign land purchases, equipment installations, and suspicious activities near critical infrastructure.
-
Surveillance and Monitoring:
- Set up automated surveillance systems to monitor sensitive areas for unauthorized equipment and potential espionage activities, ensuring real-time alerts and responses.
-
Incident Reporting:
- Implement an automated incident reporting system to streamline the documentation and communication of security breaches and findings to relevant authorities.
-
Threat Detection:
- Use machine learning algorithms to detect anomalies and potential threats based on collected data, improving the ability to identify espionage activities and unauthorized communications disruptions.
-
Communication Security:
- Enhance the security of Defense Department communications by automating encryption and monitoring systems to detect and prevent unauthorized access or disruptions.
-
Coordination with Agencies:
- Automate the coordination and information sharing between federal agencies, ensuring a unified and efficient response to security threats.
By integrating Latenode, federal officials can enhance their capabilities in monitoring, detecting, and responding to security threats posed by foreign equipment and activities, thereby safeguarding national security and critical communications infrastructure.
Bloomberg
August 2022
Our Partner Mandiant in the News!
North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam
North Koreans are plagiarizing online resumes and pretending to be from other countries to get remote work at cryptocurrency firms to aid illicit money-raising efforts for the government, cybersecurity researchers say following a US warning on a similar scheme in May.
The fraudsters lift details they find on legitimate profiles on LinkedIn and Indeed for their resumes to get work at US cryptocurrency firms, according to security researchers at Mandiant Inc. One applicant identified by Mandiant on July 14 claimed to be an “innovative and strategic thinking professional” in the tech industry and an experienced software developer. “The world will see the great result from my hands,” the job seeker added in a cover letter.
Nearly identical language was found in another user’s profile.
The evidence detected by Mandiant reinforces allegations made by the US government in May. The US warned that North Korean IT workers are trying to obtain freelance employment abroad while posing as non-North Korean nationals, in part to raise money for government weapons development programs. The IT workers claim to have the kinds of skills necessary for complex work like mobile app development, building virtual currency exchanges and mobile gaming, according to the US advisory.

Awards
Cutting Edge Risk Management
Hot Company Identity Remediation
Cutting Edge Risk Management
Hot Company Identity Remediation
Tech Republic
Former FBI Executive John Lenkart (CT6 Co-founder and Chief Strategy Officer) interview with Tech Republic on nation state cybercrime attacks through social engineering
Dominion Energy
April 2021
Cybercrime Prevention tech as critical to the safety of infrastructure
PayPod
Podcast | July 2020
Payments and Fintech Podcast:CT6 CEO Patrick Westerhaus
Copenhagen Cybercrime Conference
Conference | June 2020
Introduction to Cyber Team Six Video
Cyber Defense Magazine
TV (video) | May 19, 2020
Cyber Team Six – Connecting Cyber Threat Intelligence to Fraud Prevention
Fraud Magazine
(Fraud-Magazine.com) | March/April 2020
Study Illicit ‘Exfiltration’ and Cryptocurrency to Prevent Fraud.