According to three people whom the newspaper described as familiar with the situation, the hackers are linked to the “<a href="https://www.archyde.com/shattered-signals-a-web-of-deceit-uncovering-the-shadow-war-of-us-and-chinese-cyber-spies/" title="Shattered Signals: A Web of Deceit – Uncovering the Shadow War of US and Chinese Cyber Spies”>Salt Typhoon” group, which is allegedly linked to the Chinese government.
According to the sources, they were able to access audio recordings of phone calls, in addition to unencrypted text messages. One source indicated that the American authorities are still trying to determine the number of messages and records that fell into the hands of the hackers.
Sources also believe that another goal of “Salt Typhoon” is to create a system that can legally trace wiretap requests from government agencies to telecom operators.
They believe the motive may be to identify individuals being monitored by the US Federal Bureau of Investigation and other intelligence agencies.
Last Friday, sources told the American Associated Press that the United States is investigating Chinese attempts to hack and hack mobile phones used by Donald Trump and his vice president, J.D. Vance.
The FBI statement did not confirm that Trump and Vance were among the potential targets, but said it was investigating “unauthorized access to commercial communications infrastructure by entities affiliated with the People’s Republic of China.”
The FBI has repeatedly warned over the past year of “Chinese hacking operations,” and FBI Director Chris Wray told Congress in January that investigators had disrupted a Chinese state-sponsored group known as Volt Typhoon.
Source: RT
#Media #Chinese #hackers #intercept #calls #American #politicians
**Interview with Cybersecurity Expert on Recent Hackings Linked to Chinese Group “Salt Typhoon”**
**Interviewer:** Thank you for joining us today. Recent reports indicate that the “Salt Typhoon” hacking group, allegedly linked to the Chinese government, has accessed sensitive communications, including audio recordings and unencrypted text messages. What are the implications of this for American national security?
**Expert:** Thank you for having me. The implications are quite significant. If confirmed, this access to sensitive communications could potentially allow foreign actors to influence or disrupt American political processes. Moreover, it raises serious questions about the security of the infrastructure that underpins our communications.
**Interviewer:** Sources suggest that one of the group’s goals is to trace wiretap requests from government agencies back to telecom operators. How concerning is this for privacy and surveillance in the U.S.?
**Expert:** It’s profoundly concerning. If a foreign entity can monitor how and when government agencies are surveilling individuals, it undermines the very foundation of our surveillance laws. It opens the door to a range of abuses and complicates efforts by intelligence agencies to operate effectively.
**Interviewer:** The FBI has been investigating unauthorized access to commercial communication infrastructure and has previously warned about Chinese hacking operations. In your view, how should the U.S. respond to these types of cyber threats?
**Expert:** A multi-faceted approach is necessary. This includes enhancing cybersecurity protocols for sensitive communications, increasing collaboration between government institutions and private sector telecom companies, and possibly imposing sanctions against identified actors. However, this needs to be balanced with protecting civil liberties.
**Interviewer:** As these developments unfold, what do you think the general public’s perception should be about the ongoing cybersecurity threats posed by foreign entities? Should we be more concerned about privacy issues or the potential for national security breaches?
**Expert:** That’s a vital question for public discourse. While national security is paramount, this incident raises critical discussion points about privacy. Many citizens may feel conflicted; they want their government to protect them but also value their personal privacy. Encouraging public debate around these issues is essential, as it will shape how policies are developed going forward. How much surveillance is acceptable in the name of security, and what safeguards can be implemented to protect individual rights?
**Interviewer:** It sounds like a debate worth having. How do you think readers will feel about the balance between security and privacy in light of these events?
**Expert:** I think many readers will feel a mix of concern and urgency. Some may prioritize national security, believing that heightened surveillance is necessary to combat foreign threats. Others might be alarmed at the prospect of their communications being vulnerable to hacking. This raises an important discussion: How do we, as a society, prioritize our values in an increasingly digital and interconnected world? I encourage everyone to reflect on this balance and express their viewpoints.
Private sector companies, and developing a robust response strategy for any breaches. Additionally, diplomatic measures should be considered to hold foreign entities accountable for their cyber activities. We also need to invest in public awareness and education on cybersecurity to help individuals and organizations strengthen their defenses against such threats.
**Interviewer:** There are concerns surrounding the potential targeting of high-profile individuals, including Donald Trump and J.D. Vance. How does this shift our understanding of cyber espionage?
**Expert:** Targeting prominent political figures takes cyber espionage to a different level. It indicates a strategic intent to interfere with the political landscape, potentially swaying public opinion or influencing decision-making processes. This highlights the need for heightened security measures not just for government officials, but also for the institutions and infrastructure that support our democracy.
**Interviewer:** what can citizens do to protect themselves amidst these unsettling developments?
**Expert:** Citizens should be proactive about their personal cybersecurity. This includes using strong, unique passwords, enabling two-factor authentication when possible, and being cautious about the information they share online. Additionally, being knowledgeable about phishing attempts and other common cyber threats can make a significant difference in protecting individual privacy and security.
**Interviewer:** Thank you for your insights on this critical issue. It’s clear that cyber threats are a pressing concern that requires immediate attention and action.
**Expert:** Thank you for having me. It’s essential that we remain vigilant and informed about these evolving threats as we navigate this complex landscape.