What are state-sponsored threats?
State-sponsored threats are intellectual property (IP) theft, attacks on critical infrastructure, and media manipulation or disinformation directed by or on behalf of a state agent. 2430 Group specializes in identifying, educating, and combating these threats.
What techniques do your adversaries use?
Foreign adversaries commonly use intellectual property theft, attacks on critical infrastructure, and media manipulation to access sensitive corporate and government information. Understanding these tactics is vital to protect against them.
Resources
The following are and resources that 2430 Group finds useful for researchers investigating state-sponsored intellectual property theft, critical infrastructure attacks, and mis- and disinformation.
How do foreign adversaries weaponize disinformation?
States often employ traditional and social media platforms to spread disinformation that targets specific companies or governments. Our experts specialize in tracing Russian, Chinese, and Iranian campaigns to sow distrust or false narratives on key platforms.
Our Latest Research
This document is a categorized reference list of the major laws, regulations, and frameworks that shape the People’s Republic of China (PRC), Hong Kong, and Russia’s contemporary national-security and counter-espionage environment.
RedNote, a short-form video and augmented reality platform better known in Mandarin as xiaohongshu, or “little red book,” has rapidly gained traction in recent years as an alternative to the video blogging service TikTok, especially among younger users drawn to its immersive alternate reality features and tailored content feeds. Like TikTok, RedNote offers algorithmically driven entertainment; however, its underlying infrastructure and legal obligations differ in critical ways. While TikTok has faced scrutiny over its Chinese parent company, ByteDance, and its opaque data practices, RedNote is even more closely aligned with the People’s Republic of China’s (PRC) surveillance architecture. Promoted as a creative social app, RedNote conforms to PRC policy of surveillance-by-design, requiring extensive data extraction, non-transparent content moderation, and legally mandated state access to user information. This closer look examines how RedNote operates within—and extends—the global reach of China’s digital governance model.
The author, Christian Ryan, is an open-source national security researcher and a Research Fellow at Trefoil Strategies Ltd., a Pittsburgh-based risk consultancy.
US and allied export controls are failing to stop critical microelectronics from reaching sanctioned adversaries like Russia and Iran. Weak supply chain oversight, inconsistent due diligence, and industry resistance to stricter controls have enabled a global gray market for these components, undermining national security and costing American lives.
This paper analyzes the widespread availability of US components used in Russian unmanned aerial vehicles (UAVs), and specifically:
documents the methodology used to track critical components and their
distribution channels;presents four detailed findings that reveal significant vulnerabilities in the semiconductor supply chain and distribution networks; and
offers five practical recommendations for government and industry to help disrupt the flow of US technology to adversary states.