logo
#

Latest news with #ChineseMinistryofStateSecurity

Sen. Kelly Says CCP Still Has Access to US Telecom Networks
Sen. Kelly Says CCP Still Has Access to US Telecom Networks

Epoch Times

time04-05-2025

  • Politics
  • Epoch Times

Sen. Kelly Says CCP Still Has Access to US Telecom Networks

Sen. Mark Kelly (D-Ariz.) told attendees of the McCain Institute's Sedona Forum on May 3 that the Chinese communist regime still has access to the nine U.S. telecommunication companies hacked into in December 2024 during the Salt Typhoon cyber intrusion coordinated by the Chinese Ministry of State Security. 'They did it in such a way that it was very hard for us to detect that they were there and not done through the typical way that you would do something with malware,' he explained to the panel moderator. 'It was done through access to routers and using a lot of sophisticated techniques, and it was the, as you mentioned, the Chinese Ministry of State Security that coordinated this operation. They're still there, and we have yet to figure out a way to kick them off.' The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) identified the hacks in October of 2024 and began an investigation. In a joint statement issued on Nov. 13, 2024, the agencies revealed that the hackers compromised the networks of multiple telecom companies and stole customer call records and private communications from 'a limited number of individuals who are primarily involved in government or political activity.' CISA Executive Assistant Director for Cybersecurity Jeff Greene 'It would be impossible for us to predict when we'll have full eviction,' Greene said at the time. On Dec. 4, 2024, the Biden administration Related Stories 3/14/2025 3/5/2025 By Dec. 27, the number of compromised telecommunication companies had increased to nine. Kelly sits on the Senate Intelligence Committee and told the audience that rebuilding the United States' telecom infrastructure in order to prevent hackers from gaining access continues to be a topic of conversation among his fellow committee members. One of the issues with the nation's current telecommunication infrastructure is how organically it developed over time. 'Somebody built a system, somebody improved that system,' Kelly said. 'They added technology to it, and today we have this collaged together systems of multiple companies using different kinds of equipment that are easily accessible from our adversaries, and they're able to, if they know who you are, know your phone number, and they want to get access to some of your information, they today can probably do that, including voice calls.' Meanwhile, the Volt Typhoon threat group had been targeting U.S. critical infrastructure since 2021, and CISA confirmed that hackers had Volt Typhoon was reported to be dismantled in January 2024 but Kelly said the CCP's Ministry of State Security 'still have access into some of these systems,' and emphasized that the security risks such infiltration poses to the nation's ability to mobilize against communist China. He and his fellow panelists, Sue Gordon, former principal deputy director of national intelligence, and Frances Fragos Townsend, former counterterrorism and homeland security advisor, stressed the need for the federal government to lead the way in developing the necessary cybersecurity. They also stated that there is still no clear definition of when a cyberattack is considered an act of war. In the meantime, the senator advised the crowd on how to proceed with their telecommunications. 'If you're in any kind of sensitive position, just be aware that there are folks that are gathering information on you that want to know who all your connections are, that in a lot of cases, there are probably people in this room that foreign adversaries have access to your cell phone and you do not know it,' he said. 'There are ways to kick them off. The easiest way is [by] keeping your software up to date and turning the phone off.' Frank Fang contributed to this report.

Foreign Spies to Team Trump: 👊🇺🇸🔥
Foreign Spies to Team Trump: 👊🇺🇸🔥

New York Times

time26-03-2025

  • Politics
  • New York Times

Foreign Spies to Team Trump: 👊🇺🇸🔥

If you're running the security directorate of a hostile nation, savor this moment. It's never been easier to steal secrets from the United States government. Can you even call it stealing when it's this simple? The Trump administration has unlocked the vault doors, fired half of the security guards and asked the rest to roll pennies. Walk right in. Take what you want. This is the golden age. In its first two months, the Trump administration has made move after move that exposes the government to penetration by foreign intelligence services. It's not just the group chat about forthcoming military strikes that The Atlantic revealed on Monday — although that was, to be clear, as audacious and ridiculous a security breach as there has been in decades. The administration short-circuited the process for conducting background checks on top officials, turned tens of thousands of people with access to government secrets into disgruntled ex-employees and announced it was lowering its guard against covert foreign influence operations. It installed one of Elon Musk's satellite internet terminals on the roof of the White House, seemingly to bypass security controls, and gave access to some of the government's more sensitive systems to a teenager with a history of aiding a cybercrime ring, who goes by the nickname Big Balls. In his first term, President Trump caused an uproar by revealing intelligence to the Russian ambassador that was routinely withheld from America's actual allies. This is something different: the erosion of America's ability to keep any secrets at all. The second Trump administration is treating security like just another stale Washington convention, an annoying impediment to its ambitions to move fast, break the bureaucratic state and replace it with an all-powerful executive. The bros in tech and finance don't have to deal with these creaky, fussy restraints. Why should the White House? Major adversaries pray for this level of chaos, confusion and opportunity. A secretive Chinese network is trying to recruit fired U.S. government workers. The Naval Criminal Investigative Service states with 'high confidence' that foreign adversaries are trying to 'capitalize' on the Trump administration's mass layoffs. But the Chinese Ministry of State Security or the Russian Main Intelligence Directorate aren't the only ones who stand to profit from the Trump administration's disregard for even minimal operational security. Intelligence gathering has become easier for everyone. So-called zero-click spyware is now sold to regimes and corporations around the globe. Apple has notified users in 150 countries that they've been targeted. A program from a single Israeli spyware maker, the NSO Group, has been deployed in Saudi Arabia, Spain, Hungary, India, Mexico and Rwanda. 'Now the junior varsity countries can come in and succeed,' says Frank Figliuzzi, the F.B.I.'s former assistant director for counterintelligence. 'You don't need to be very sophisticated.' This should be the time to batten down the hatches. But the Trump administration has other priorities. Around 1,000 F.B.I. agents have been diverted from their regular duties to scrub the case files of Jeffrey Epstein. (Even in New York City — a hotbed of foreign intelligence activity — the F.B.I. field office is 'all hands on deck' on the Epstein review.) Meanwhile, the Justice Department stopped its investigations into the possible compromise of New York City's Mayor Eric Adams by foreign governments. A seven-agency effort to counter Russian sabotage and cyberattacks has been put on hold. Personnel from the bureau's counterterrorism division have been newly asked to pursue those who vandalize Teslas, while the new Joint Task Force Oct. 7 investigates 'illegal support of Hamas on our campuses.' As for that mortifying incident in which a journalist was invited into a supposedly super-triple-extra-confidential conversation with top military and intelligence leaders, it's hard to know what's worse: not being aware who was in the group chat or conducting the chat on mobile phones. The participants — the intended participants, anyway — may have thought they were safe because their texts were encrypted by the Signal messaging app, prized by the secrecy-minded all over the world. But a chat is only as secure as the people using it. Just a few days ago, the Pentagon issued a warning that Russian hackers were tricking people into letting them join their Signal group texts. Steve Witkoff, a special envoy, accepted an invitation to join a chat anyway — and he did it from Moscow. There's no way to make a phone completely unhackable. In SCIFs, the secure rooms where Washington officials conduct their most sensitive conversations, phones aren't even allowed in the door. The people at the center of Signalgate — the national security adviser, Michael Waltz; the defense secretary, Pete Hegseth; the director of national intelligence, Tulsi Gabbard; to name a few — all know this. They all served in the military. They no doubt heard innumerable lectures from counterintelligence experts about all the different ways an adversary can make off with sensitive data. But this is an administration that actively, proudly rejects expertise. It casts those who have it as the corrupt old guard, the real enemy, the 'deep state,' and it touts its own refusal to heed them as proof of its legitimacy and righteousness. By that view, the security establishment must be bent to the White House's will, and if the people at the top don't have the traditional qualifications for their positions, all the better. This is an administration that makes a weekend Fox News host the leader of the world's largest military, puts a conspiracy-minded podcaster in charge of the F.B.I., and has at its pinnacle a reality star turned president. Blunders like this are an inevitable consequence. 'Of course they have their WhatsApp groups and their Signal groups,' Matt Tait told me. Mr. Tait is a well-connected cybersecurity consultant and a former analyst at GCHQ, the British signals intelligence service. 'Fundamentally, they don't really trust the civil service that are working for them, and don't really see any of the constraints that traditionally people would follow as applying to them at all.' In the coming days the administration's defenders may note, correctly, that much of what the federal government stamps secret barely qualifies as sensitive, and that administrations going back 20 years or more have used their personal devices to talk war and peace. But that does nothing to excuse the recent gaffe, which is why those involved are trying to distract us with claims that fall just this side of comedy. Mr. Waltz suggested that Jeffrey Goldberg, the journalist who was invited to the war planning chat, might have hacked his way in, as if that would make the security concerns better, not worse. Ms. Gabbard claimed the texts exchanged by the group — detailing the targets, timing and weapons system used in an ongoing U.S. attack — were somehow not classified at all, and therefore no secrets had really leaked. So if you're running a foreign intelligence service, relax. You've got time. This fiasco could've been a wake-up call to the Trump team, an opportunity to overhaul their security procedures and maybe stop courting disaster on quite so many fronts. This administration has decided to go hard in the other direction. 'Nobody's texting war plans,' Mr. Hesgeth told reporters, after being exposed for doing just that. 'I know exactly what I'm doing.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store