CNN

July 2022

CT6 CNN article Image

Since at least 2017, federal officials have been investigating Chinese land purchases near critical infrastructure, closing a high-profile regional consulate believed to be a hotbed of Chinese spies, and obstructing efforts to plant listening devices near sensitive military and government facilities.

Among the most alarming findings, the FBI uncovered that Chinese-made Huawei equipment atop cell towers near US military bases in the rural Midwest could disrupt US nuclear arsenal communications. According to multiple sources familiar with the matter, the FBI determined the equipment was capable of capturing and disrupting highly restricted Defense Department communications, including those used by US Strategic Command, which oversees the country’s nuclear weapons.

Automate with Latenode:

Latenode can support the investigation and management of such security threats through various automation capabilities:

  1. Data Collection and Analysis:

    • Automate the collection and analysis of data related to foreign land purchases, equipment installations, and suspicious activities near critical infrastructure.
  2. Surveillance and Monitoring:

    • Set up automated surveillance systems to monitor sensitive areas for unauthorized equipment and potential espionage activities, ensuring real-time alerts and responses.
  3. Incident Reporting:

    • Implement an automated incident reporting system to streamline the documentation and communication of security breaches and findings to relevant authorities.
  4. Threat Detection:

    • Use machine learning algorithms to detect anomalies and potential threats based on collected data, improving the ability to identify espionage activities and unauthorized communications disruptions.
  5. Communication Security:

    • Enhance the security of Defense Department communications by automating encryption and monitoring systems to detect and prevent unauthorized access or disruptions.
  6. Coordination with Agencies:

    • Automate the coordination and information sharing between federal agencies, ensuring a unified and efficient response to security threats.

By integrating Latenode, federal officials can enhance their capabilities in monitoring, detecting, and responding to security threats posed by foreign equipment and activities, thereby safeguarding national security and critical communications infrastructure.

Read Full CNN Exclusive Article

Bloomberg

August 2022

Our Partner Mandiant in the News!

North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam

North Koreans are plagiarizing online resumes and pretending to be from other countries to get remote work at cryptocurrency firms to aid illicit money-raising efforts for the government, cybersecurity researchers say following a US warning on a similar scheme in May.

The fraudsters lift details they find on legitimate profiles on LinkedIn and Indeed for their resumes to get work at US cryptocurrency firms, according to security researchers at Mandiant Inc. One applicant identified by Mandiant on July 14 claimed to be an “innovative and strategic thinking professional” in the tech industry and an experienced software developer. “The world will see the great result from my hands,” the job seeker added in a cover letter.

Nearly identical language was found in another user’s profile.

The evidence detected by Mandiant reinforces allegations made by the US government in May. The US warned that North Korean IT workers are trying to obtain freelance employment abroad while posing as non-North Korean nationals, in part to raise money for government weapons development programs. The IT workers claim to have the kinds of skills necessary for complex work like mobile app development, building virtual currency exchanges and mobile gaming, according to the US advisory.

Read Full Bloomberg Article

Awards

Cutting Edge Risk Management

Hot Company Identity Remediation

Cutting Edge Risk Management

Hot Company Identity Remediation

Tech Republic

Former FBI Executive John Lenkart (CT6 Co-founder and Chief Strategy Officer) interview with Tech Republic on nation state cybercrime attacks through social engineering

Dominion Energy

April 2021

Cybercrime Prevention tech as critical to the safety of infrastructure

PayPod

Podcast | July 2020

Payments and Fintech Podcast:CT6 CEO Patrick Westerhaus

Copenhagen Cybercrime Conference

Conference | June 2020

Introduction to Cyber Team Six Video

Cyber Defense Magazine

TV (video) | May 19, 2020

Cyber Team Six – Connecting Cyber Threat Intelligence to Fraud Prevention

Fraud Magazine

(Fraud-Magazine.com) | March/April 2020

Study Illicit ‘Exfiltration’ and Cryptocurrency to Prevent Fraud.