Welcome to our community

Be apart of something great, join today!

China Catch-All

  • Thread starter Thread starter altmin
  • Start date Start date
  • Replies: 25
  • Views: 1K
  • Politics 

altmin

Inconceivable Member
ZZL Supporter
Messages
2,900

Hackers for the Chinese government were able to deeply penetrate U.S. telecommunications infrastructure in ways that President Joe Biden’s administration hasn’t yet acknowledged, according to new reports from the Washington Post and New York Times. The hackers were able to listen to phone calls and read text messages, reportedly exploiting the system U.S. authorities use to wiretap Americans in criminal cases. The worst part? The networks are still compromised and it may take incredibly drastic measures to boot them from U.S. systems.


The hackers behind the infiltration of U.S. telecom infrastructure are known to Western intelligence agencies as Salt Typhoon, and this particular breach of U.S. equipment was first reported in early October by the Wall Street Journal. But Sen. Mark Warner, a Democrat from Virginia, spoke with the Washington Post and New York Times this week to warn the public that this is so much worse than we initially thought, dubbing it “the worst telecom hack in our nation’s history.” And those articles based on Warner’s warnings were published late Thursday.

Warner is chairman of the U.S. Senate Intelligence Committee and a former venture capitalist who bet big on telecom in the 1980s and 90s, making him uniquely qualified to talk about threats to U.S. communications infrastructure. And he says it’s really bad. “My hair’s on fire,” Warner told the Post.

Hackers weren’t able to monitor or intercept anything encrypted, according to the Times, which means that conversations over apps like Signal and Apple’s iMessage were probably protected. But end-to-end encryption over texts between Apple devices and Android devices, for instance, aren’t encrypted in the same way, meaning they were vulnerable to interception by Salt Typhoon, according to the Times.
 
I have a very close friend who works high up in cyber security for uncle sam. He's says its just a matter of time before we are crippled because we are too care more with spending hundreds of billions building planes and ships instead of spending on keeping the best IT minds. Huge govt contracts rules the USA.
 
I have a very close friend who works high up in cyber security for uncle sam. He's says its just a matter of time before we are crippled because we are too care more with spending hundreds of billions building planes and ships instead of spending on keeping the best IT minds. Huge govt contracts rules the USA.
If he's high up in cyber security, he really shouldn't be talking to you like this.
 
Hes not sharing anything that requires any clearance, Einstein
He shouldn't be sharing anything. People don't need to know that a cyber security specialist high up in the government thinks our cyber defenses are garbage. That's valuable information. Maybe anyone who would value this information already knows it, but it's still not something that should be blabbed around.
 
My bad. Should’ve read the article before commenting based on this: “The hackers were able to listen to phone calls and read text messages, reportedly exploiting the system U.S. authorities use to wiretap Americans in criminal cases.”
Yes, a system that has been around for a very long time. Our telephone infrastructure is leaky because it is old.
 
Maybe Trump will offer Taiwan a chance to become a US territory. He‘s not likely to do anything militarily to help them.
 
Maybe Trump will offer Taiwan a chance to become a US territory. He‘s not likely to do anything militarily to help them.
If such a scenario actually transpired, St. Donald of Mar-a-Lago would immediately sell Taiwan to China and, presumably, collect some sort of fee for facilitating the sale. A fee similar--in kind, if not amount--to what he anticipates collecting on the upcoming property transfers to the US of Greenland, Panama Canal, and Canada. St. Donald of Mar-a-Lago has more experience that all the other US Presidents combined in how to make money off driving a previously thriving enterprise into the ground.be

ETA: I assume the key selling point in "acquiring" Canada and Greenland is to gain sovereignty over of the upcoming North-West passage between East Asia and Northern Europe, now that the long-range strategy of excessive Greenhouse gas emissions, i.e., Global Warming, is finally becoming clear. I assume that St. Donald plans to "flip" the Panama Canal to some unsuspecting rube before this "North-West" passage becomes the preferred route.
 
Last edited:


Many of the techbros influencing the Trump Admin seem to share a similar dream with Trump - build a new, modern city from the ground up.
 

When the Chinese hacker group known as Salt Typhoon was revealed last fall to have deeply penetrated major US telecommunications companies—ultimately breaching no fewer than nine of the phone carriers and accessing Americans' texts and calls in real time—that hacking campaign was treated as a four-alarm fire by the US government. Yet even after those hackers' high-profile exposure, they've continued their spree of breaking into telecom networks worldwide, including more in the US.

Researchers at cybersecurity firm Recorded Future on Wednesday night revealed in a report that they've seen Salt Typhoon breach five telecoms and internet service providers around the world, as well as more than a dozen universities from Utah to Vietnam, all between December and January. The telecoms include one US internet service provider and telecom firm and another US-based subsidiary of a UK telecom, according to the company's analysts, though they declined to name those victims to WIRED.

...

Recorded Future found more than 12,000 Cisco devices whose web interfaces were exposed online, and says that the hackers targeted more than a thousand of those devices installed in networks worldwide. Of those, they appear to have focused on a smaller subset of telecoms and university networks whose Cisco devices they successfully exploited. For those selected targets, Salt Typhoon configured the hacked Cisco devices to connect to the hackers' own command-and-control servers via generic routing encapsulation, or GRE tunnels—a protocol used to set up private communications channels—then used those connections to maintain their access and steal data.
 

Researchers from China are to be allowed access to half a million UK GP records despite western intelligence agencies’ fears about the authoritarian regime amassing health data, the Guardian can reveal.

Preparations are under way to transfer the records to UK Biobank, a research hub that holds detailed medical information donated by 500,000 volunteers. One of the world’s largest troves of health data, the facility makes its information available to universities, scientific institutes and private companies. A Guardian analysis shows one in five successful applications for access come from China.


For the past year, health officials had been assessing whether extra safeguards were needed for patient records when added to the genomes, tissue samples and questionnaire responses held by UK Biobank. Personal details such as names and dates of birth are stripped from UK Biobank data before it is shared but experts say that in some cases individuals can still be identified.

MI5, the UK Security Service, has warned that Chinese organisations and individuals granted access to UK data can be ordered by Chinese intelligence agencies “to carry out work on their behalf”. But UK Biobank told the Guardian that the NHS unit responsible for health data had in recent weeks cleared it to grant Chinese researchers access to GP records.

As Keir Starmer’s ministers court Beijing in search of economic growth, the decision avoids crossing a rising superpower that has made biotech prowess a priority. UK-China relations already face tests over the fate of a Chinese-owned steel plant in Scunthorpe and plans for new rules on foreign interference campaigns.

“Security and privacy considerations are always taken into account when UK health data is used to drive forward our understanding of diseases and advance scientific research,” a government spokesperson said. Health data was “only shared with legitimate researchers”, they added.
 
Back
Top