Gordon G. Chang

45.2K posts

Gordon G. Chang banner
Gordon G. Chang

Gordon G. Chang

@GordonGChang

Author of Plan Red: China’s Project to Destroy America, The Coming Collapse of China, and China Is Going To War.

Katılım Haziran 2010
927 Takip Edilen437K Takipçiler
Gordon G. Chang
Gordon G. Chang@GordonGChang·
If China’s AI is on a par with America’s, @RnaudBertrand, why is it stealing America’s AI? And even if China has caught up, the Chinese depend on America’s chips to develop theirs. So why should we let them have our chips?
Arnaud Bertrand@RnaudBertrand

@GordonGChang Read again the second part of my sentence, but slower this time.

English
16
14
93
7.7K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
Yes, @RahmEmanuel is right. We Americans must unite because we have a common enemy that intends to destroy our society and subjugate us. We must start listening to what China’s regime is saying. Its strident anti-American words are intended to create the justification to strike us.
Council on Foreign Relations@CFR_org

“America’s divisions will stop America. Nothing China does really frightens me as much as what America does not do,” says @RahmEmanuel, former U.S. ambassador to Japan and former White House chief of staff. Watch his full conversation: on.cfr.org/4n4PyWZ

English
14
34
124
7.4K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
“Impasse”? “Stalemate”? Why should we allow money to flow to an Iranian regime that over the decades believed it had to destroy our country?
Fareed Zakaria@FareedZakaria

The war with Iran has entered its third month — and while a shaky ceasefire holds, diplomatic efforts between the US and Iran are at an impasse. What will it take to break the stalemate? Part 1 of my conversation with @newamerica CEO @SlaughterAM and former NATO supreme allied commander @stavridisj:

English
6
18
69
4.7K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
Iran may be a “quagmire” for America—I doubt that—but the war poses a threat to China, which needs oil that passes through the Strait of Hormuz. Beijing will now say or do anything to get Prez Trump to lift the blockade. @JosephPinion @the_irascible @ProfessorPape @NEWSMAX
NEWSMAX@NEWSMAX

"[China] expects this to be a quagmire for the United States." @ProfessorPape responded to arguments by @GordonGChang and Brig. Gen. Blaine Holt (Ret.) advocating for continued action against Iran and what it means for China on "Sunday Agenda." @the_irascible @JosephPinion

English
8
37
122
7.3K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
China touts its EVs, but only about 35% of the country’s electricity comes from renewables. This means the Chinese are driving coal-fired cars.
English
38
65
320
14.2K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
Prayer clarifies everything. Pray.
English
24
71
535
6.5K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
Fight for freedom in Korea. Everything is on the line now.
English
54
286
1.2K
13.4K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
China’s regime is continuing to kill Americans, as a matter of deliberate policy, with fentanyl, about 48,000 last year.
English
22
154
614
11.3K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
A loving God gave us this.
Gordon G. Chang tweet media
English
74
200
2.1K
16.3K
Gordon G. Chang
Gordon G. Chang@GordonGChang·
Fiber cable can be turned into a spying device.
The Whizz AI@TheWhizzAI

🚨BREAKING: The fiber cable sitting in your wall has been secretly listening to you. And researchers just proved it. Security researchers from Hong Kong Polytechnic University and the Chinese University of Hong Kong presented a fully working attack at NDSS Symposium 2026 turning ordinary fiber optic internet cables into hidden, undetectable microphones. No laser bugs. No physical implants. No drilling through walls. Just the broadband cable already sitting in your living room or office. How It Actually Works: Optical fibers are sensitive to tiny vibrations. When sound waves travel through the air, they cause microscopic changes in the shape of the fiber. These changes alter the light signals traveling inside the cable. By watching these changes with a Distributed Acoustic Sensing system linked to one end of the cable, an attacker can recreate the original sound wave from the other end even over distances greater than 50 meters. Sound hits fiber. Fiber vibrates. Light shifts. AI reconstructs your conversation. No microphone. No bug. No trace. Why This Is Different From Everything Before: This attack transforms standard FTTH telecom fiber cables into passive, undetectable listening devices invisible to RF scanners and immune to ultrasonic jammers. Your traditional counter-surveillance gear will not work. The Device They Built: The researchers engineered a custom Sensory Receptor a hollow cylinder with 15 meters of optical fiber wound around it. Critically, this device can be disguised as an ordinary optical fiber box the same type routinely installed in homes and offices during FTTH deployments making it virtually indistinguishable from legitimate networking equipment. It looks exactly like what your ISP already installed. Who Is Most At Risk: → Corporate offices with FTTH connections → Government buildings and embassies → Law firms, banks, and financial institutions → Anyone having sensitive conversations near a fiber cable The Takeaway: Fiber optic cables have long been considered inherently secure. Resistant to RF emissions. Resistant to electromagnetic interference. That belief is now broken. The cable delivering your internet can also deliver your conversations to someone else entirely. Nobody installed a bug in your home. The infrastructure already was one.

English
50
644
1.6K
151.1K