{"id":18708,"date":"2024-11-24T21:53:20","date_gmt":"2024-11-24T21:53:20","guid":{"rendered":"https:\/\/gpt.m2mbeta.com\/?p=18708"},"modified":"2024-11-24T21:53:20","modified_gmt":"2024-11-24T21:53:20","slug":"white-house-officials-meet-with-telecom-executives-over-china-hack","status":"publish","type":"post","link":"https:\/\/gpt.m2mbeta.com\/?p=18708","title":{"rendered":"White House Officials Meet With Telecom Executives Over China Hack"},"content":{"rendered":"<div id=\"\">\n<p>White House national security adviser Jake Sullivan and deputy national security adviser for cyber and emerging technology Anne Neuberger <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2024\/11\/22\/readout-of-national-security-advisor-jake-sullivans-meeting-with-executives-from-the-telecommunications-sector\/\" target=\"_blank\">hosted<\/a> telecommunications executives for a meeting on Nov. 22 to share intelligence after several networks were reported hacked.<\/p>\n<p>The Wall Street Journal was the first to confirm that major telecommunications companies including AT&amp;T and Verizon were the target of a large scale cyberattack that was part of the \u201cSalt Typhoon\u201d campaign, which is backed by the Chinese Communist Party (CCP). Hackers reportedly had access to the network for months or longer.<\/p>\n<p>\u201cThe meeting was an opportunity to hear from telecommunications sector executives on how the U.S. Government can partner with and support the private sector on hardening against sophisticated nation state attacks,\u201d the White House officials said in a statement.<\/p>\n<p>The industry and U.S. officials alike have pointed out that while the CCP uses a whole-of-state approach in its cyberattacks against U.S. institutions, the targets are individual private entities, which do not have an intelligence sharing mechanism across the industry or with the government.<\/p>\n<p>On Nov. 13, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.theepochtimes.com\/china\/china-linked-hackers-conduct-broad-and-significant-espionage-against-us-telecom-companies-says-fbi-5759632\" target=\"_blank\">jointly<\/a> stated that the CCP\u2019s cyber efforts against the United States is a \u201cbroad and significant cyber espionage campaign,\u201d encouraging victims to contact local FBI offices.<\/p>\n<p>The FBI and CISA believe that the CCP-backed hackers were after customer call records and private communications, targeting people involved in government and political activity, and evidence obtained by law enforcement via warrants.<\/p>\n<p>Last month, Vice President-elect JD Vance <a href=\"https:\/\/www.theepochtimes.com\/us\/vance-confirms-chinese-hackers-breached-his-phone-5751523\" target=\"_blank\" rel=\"nofollow noopener\">confirmed<\/a> that his phone had been breached by Chinese hackers, and believed President-elect Donald Trump\u2019s phone had been hacked as well. Vance said on the \u201cThe Joe Rogan Experience\u201d podcast that authorities believed the breach was part of the \u201cSalt Typhoon\u201d campaign.<\/p>\n<p>U.S. lawmakers and intelligence officials have sounded the alarm on several large-scale, CCP-backed cyberattack campaigns.<\/p>\n<p>In addition to the cyber-espionage \u201cSalt Typhoon\u201d operation, officials have long warned about \u201cVolt Typhoon,\u201d which intelligence agencies say <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-038a\" target=\"_blank\" rel=\"nofollow noopener\">targets<\/a> critical infrastructure in the Western world and has already compromised organizations in fields of energy, transportation, wastewater, and others.<\/p>\n<p>Authorities also identified a \u201cFlax Typhoon\u201d <a href=\"https:\/\/www.theepochtimes.com\/china\/fbi-disrupts-chinese-botnet-infecting-thousands-of-us-devices-5726553\" target=\"_blank\" rel=\"nofollow noopener\">campaign<\/a> that targeted consumer devices, installing malware to create a botnet that could launch additional attacks. The FBI was able to disrupt this network and disable the malware.<\/p>\n<p>Intelligence officials have also warned that the CCP-backed campaigns are \u201cnot consistent with traditional cyber espionage or intelligence gathering operations.\u201d In the case of \u201cVolt Typhoon,\u201d officials believe hackers are prepositioning themselves on critical IT networks to monitor and disrupt in the event of conflicts.<\/p>\n<p>In the wake of these telecom breaches, lawmakers have requested close-door briefings with telecom <a href=\"https:\/\/www.theepochtimes.com\/us\/congress-asks-telecom-executives-to-testify-on-ccp-hack-5740029\" target=\"_blank\">executives<\/a> and <a href=\"https:\/\/www.theepochtimes.com\/china\/senators-ask-cyber-review-board-to-conduct-investigation-on-chinese-hack-group-5761636\" target=\"_blank\">intelligence<\/a> officials to increase private-public cooperation on the issue.<\/p>\n<p><em>From <a href=\"https:\/\/www.theepochtimes.com\/us\/white-house-officials-meet-with-telecom-executives-over-china-hack-5765313\" target=\"_blank\">The Epoch Times<\/a><\/em><\/p>\n<\/div>\n<p><\/p>\n<hr style=\"border-top: 2px solid #ccc; margin-top: 20px;\">\n<p><em>Source: <\/em> <em><a href=\"https:\/\/politics.einnews.com\/article\/763439566\/oWr78U7AvzinF_SF?ref=rss&amp;ecode=kmfm9fDbRbj4OPCJ\">politics.einnews.com\u2026<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>White House national security adviser Jake Sullivan and deputy national security adviser for cyber and emerging technology Anne Neuberger hosted telecommunications executives for a meeting on Nov. 22 to share intelligence after several networks were reported hacked. The Wall Street Journal was the first to confirm that major telecommunications companies including AT&amp;T and Verizon were [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18708","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=\/wp\/v2\/posts\/18708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18708"}],"version-history":[{"count":0,"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=\/wp\/v2\/posts\/18708\/revisions"}],"wp:attachment":[{"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gpt.m2mbeta.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}