Skip to content
smallstepsgiantstrides.net Unknown's avatar

smallstepsgiantstrides.net

THE ONLY FREE PRESS IS THE ONE YOU OWN.

  • Home
  • AvogadrosNumbur
  • Cartoons Plus
  • Weather Or Not
  • Ear to the Track
  • … To The Point …
  • Home
  • AvogadrosNumbur
  • Cartoons Plus
  • Weather Or Not
  • Ear to the Track
  • … To The Point …

… Chinese hackers are deep inside America’s telecoms networks …

Straight Arrow Home January 1, 2025 3 Minutes

Rooting them out is proving a challenge

News of the hack began trickling out in September, but the American government waited weeks to confirm the reports.

Only this month did it begin briefing members of Congress and the media.

Officials say a Chinese hacking group dubbed Salt Typhoon compromised at least eight of America’s telecoms

networks.

The intruders stole the call-record metadata of a “large number” of Americans.

They gained access to the wiretap requests of security agencies—meaning they could work out if any Chinese spies or

agents were under American surveillance.

And they targeted phones used by officials and politicians, reportedly including Donald Trump, J.D. Vance and

members of the Biden administration and the Harris-Walz campaign.

Mark Warner, the chairman of the Senate Intelligence Committee, has called it the “worst telecom hack in our

nation’s history—by far”.

After receiving a briefing from intelligence agencies, Brendan Carr, the incoming chair of the Federal

Communications Commission, said: “It made me want to basically smash my phone.”

The hackers remain inside the networks.

American officials are struggling to understand how deeply they have penetrated.

The government does not know when it will be able to root them out.

The work of Salt Typhoon is the latest demonstration of China’s hacking capabilities.

In 2023 American officials discovered that intruders from another Chinese group, Volt Typhoon, were lurking inside

networks attached to America’s critical infrastructure.

(“Typhoons” are a naming convention used by Microsoft, a tech giant, for China-affiliated hacking groups.

Russian groups are called “blizzards”, Iranian groups are “sandstorms”.)

The Chinese weren’t disrupting anything, just checking in every six months to ensure they still had access.

They had been doing this for five years before the hack was discovered.

The discovery of the Volt Typhoon intrusions was the first time American officials were able to find Chinese hackers

“preparing for conflict on our networks”, says Brandon Wales, the former executive director of America’s

Cybersecurity and Infrastructure Security Agency.

Since then American officials have been sounding the alarm.

China was called the “most active and persistent” cyber-menace in this year’s threat assessment by the American

intelligence community.

Christopher Wray, the outgoing fbi director, has said that even if every one of his cyber-agents and intelligence

analysts worked exclusively on China, they would still be outnumbered by China’s hackers “by at least 50 to 1”.

China’s prowess at hacking is the result of more than a decade of investment by the government.

The push under Xi Jinping, China’s leader, was motivated by a sense of threat, says Dakota Cary of the Atlantic

Council, a think-tank.

Mr Xi came to power in 2012, shortly after China discovered and executed more than a dozen of the cia’s informants

in the country.

Then, in 2013, Edward Snowden revealed that America had been hacking hundreds of targets in China.

In response, Mr Xi established a new agency and a Communist Party committee focused on cyber-security.

The state certified some Chinese universities as “world-class cyber-security schools” and China’s top intelligence

agency started sponsoring hacking competitions.

(A recent report by Chinese universities said that the country is producing 30,000 new cyber-security experts each year.)

The Ministry of Public Security has also made it harder for Chinese experts to share with the public vulnerabilities

they discover in commonly used tech. These are now reported to the government.

China denies that it is behind the recent hacks in America.

Officials in Washington aren’t having it.

On December 4th security agencies in America issued a joint statement with those of Australia, Canada and New

Zealand on how to strengthen telecoms networks against the Salt Typhoon hack.

New defences are needed.

China is just beginning to reap the benefits of its decade-long investment in cyber-activities, says Mr Cary.

“We’re just getting to the part where their hackers are really good.”

More typhoons are coming. ■

 

####

…. w

 

warm? … is anyone warm? … ????  Oh well ….

Share

  • Tweet
  • Share on Telegram (Opens in new window) Telegram
  • Print (Opens in new window) Print
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email
  • More
  • Share on Tumblr
Like Loading...
  • Tagged
  • America’s telecoms networks
  • Brandon Wales
  • Brendan Carr
  • call-record metadata
  • Chinese hackers
  • Christopher Wray
  • Cybersecurity and Infrastructure Security Agency
  • Microsoft
  • Salt Typhoon
  • Volt Typhoon
  • Xi Jinping
Published January 1, 2025

Post navigation

Previous Post … Fuck …
Next Post … Trump will overplay his hand …
Follow smallstepsgiantstrides.net on WordPress.com
Follow smallstepsgiantstrides.net on WordPress.com

Cloudy

Current Events Dead Serious Donald Trump Dupes..witting and otherwise... Follow the Money Good Guys and Bad Guys Home Journalism Presidential Election Republicans Right Wing Wackos Rule of Dumb The White House White House Yabba Dabba Doo
Blog at WordPress.com.
  • Reblog
  • Subscribe Subscribed
    • smallstepsgiantstrides.net
    • Join 169 other subscribers
    • Already have a WordPress.com account? Log in now.
    • smallstepsgiantstrides.net
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar

Loading Comments...

You must be logged in to post a comment.

    %d