August 20, 2025 — San Diego The U.S. Attorney’s Office (S.D. Cal.) announced today that Jinchao “Patrick” Wei, 25, an active‑duty U.S. Navy sailor assigned to the USS Essex, was convicted by a federal jury on six counts, including conspiracy to commit espionage, espionage, and multiple Arms Export Control Act/ITAR violations for exporting defense technical data. According to trial evidence, Wei sold thousands of pages of technical and operational information, photographs, videos, and ship location data to a PRC intelligence…
Category: Uncategorized
Top 10 Noteworthy Wireless Threat Stories of 2025 (So Far)
This year has had its share of noteworthy stories touching upon wireless threats. Below is the top 10 most interesting stories for the first half of 2025, along with any relevant updates. 1: Chinese park‑bench bugs and mobile spying on UK officials UK Security sources reported Chinese intelligence operatives have been planting covert listening devices in and around Westminster. UK sources previously reported that military doctors received warnings of adversaries targeting their phones to extract information on medical personnel. Officials…
Wireless Airspace Defense in 2025: How Bastille Strengthens Enterprise Security
The Growing Wireless Attack Surface Corporate environments now host thousands of unmanaged wireless devices, ranging from tablets, wireless headphones, Bluetooth-enabled coffee mugs, and wireless peripherals to employee phones and smart building controls, each of which is a potential threat vector. Unmanaged radios now outnumber managed assets in many enterprises. Meanwhile, as wireless communications technologies evolve, so do the vulnerabilities they contain. In 2024 alone, researchers identified more than 700 new wireless vulnerabilities, representing a 25% increase in new wireless CVEs…
The Wireless Airspace Threat to Operational Technology Networks
Industrial environments and critical infrastructure operators are increasingly dependent on Operational Technology (OT) networks, including Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, and Internet of Things (IoT) devices. These systems form the backbone of essential services, such as energy, water, transportation, emergency warning systems, and manufacturing. Although OT networks have traditionally focused on safety, reliability, and availability, many of these environments were not originally architected to withstand modern cyber threats. Wireless connectivity has become a cornerstone…
PlayPraetor’s Worldwide Push: a Chinese‑Language Android RAT Turns Malware‑as‑a‑Service
A fast-moving Android remote-access Trojan known as PlayPraetor has breached more than 11,000 smartphones in under three months, giving financially motivated criminals real-time control of victims’ devices and a direct path into nearly 200 mobile-banking and cryptocurrency apps. Researchers at Cleafy, who traced the infrastructure behind the attack, say the campaign is no ordinary operation. PlayPraetor relies on a Chinese-language command-and-control (C2) panel with multi-tenant support that lets dozens of affiliates rent malware, spin up convincing Google Play look-alike pages,…
Chinese Agent Indictments Indicate Mobile Phones Used for Espionage Activities
San Francisco, CA — A federal grand jury has unsealed a three‑count indictment charging two men with acting as unregistered agents of the People’s Republic of China (PRC), conspiring to recruit U.S. Navy personnel while funneling cash payments through clandestine communication systems and ordinary mobile phones. Yuance Chen, 38, a legal permanent resident living in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, who arrived in Houston from China in April on a tourist visa, are accused of working under the direction…
What is a Wireless Intrusion Detection System (WIDS)? How it Works and Why it Matters
Traditional cybersecurity defenses focus on wired and Wi-Fi networks - but attackers are increasingly using wireless devices and RF signals to bypass these controls. To close this gap, enterprises are turning to Wireless Intrusion Detection Systems (WIDS). WIDS continuously monitors the airspace for rogue devices, unauthorized access points, and suspicious transmissions - threats that traditional firewalls and intrusion detection systems (IDS) cannot see. This article explains what WIDS is, how it works, its limitations, and why Bastille delivers the next…
Secretary of State Targeted By AI Voice-Clone Smartphone Attack
Secretary of State Marco Rubio is the latest of several high‑level officials ensnared by artificial‑intelligence voice spoofing, a technique experts warn is reshaping the digital threat landscape faster than federal defenses can adjust. Rubio said Thursday in Kuala Lumpur that at least five senior figures, including three foreign ministers, a U.S. governor, and a senator, received calls or voicemails from a Signal account masquerading as his. The impostor even left invitations to “talk further” on the encrypted app. This is just the…
U.S. Memo Warns Salt Typhoon Infiltrated State National Guard Networks
A previously undisclosed Department of Homeland Security memorandum says a Chinese state‑linked hacking outfit known as “Salt Typhoon” spent nine months inside one state’s Army National Guard network last year, siphoning off network maps and traffic data tied to every other U.S. state and four territories. The memo, obtained by the transparency group Property of the People, shows that the intruders maintained access from March through December 2024, a breach that government analysts described as “extensive.” Investigators informed DHS that the…
From Zone-Level Alerts to Real-Time Precision: Modernizing In-Place Monitoring Systems (IPMS)
Wireless threat detection is not optional in secure government environments, such as SCIFs, forward operating locations, and classified contractor spaces. As RF-enabled devices proliferate and become more difficult to detect with traditional methods, the demand for accurate, continuous monitoring of the wireless spectrum has never been higher. In-Place Monitoring Systems (IPMS) have been a foundational technology for decades, enabling the detection of unauthorized wireless transmissions in sensitive areas. However, most legacy IPMS platforms have not kept pace with the complexity…