US Expands Cyber Countermeasures as List of China Telecom Hack Victims Grows

The Epoch Times Header

Senior national security official said the United States looks to ‘lock down’ telecom infrastructure with stricter cybersecurity rules.

The White House has identified a ninth U.S. telecom network that Chinese state hackers have compromised in a sweeping intrusion, a senior official said on Dec. 27, as authorities take steps to prevent similar cases of cyberespionage and hold the cyberattackers liable for their actions.

Anne Neuberger, deputy national security adviser for cyber and emerging technology, revealed the new information in a press briefing as officials continue to assess the scope of the cybersecurity breach from China’s state-backed Salt Typhoon hacking group, which has carried out a wide-ranging espionage campaign since 2022.

The hacking operation has affected major telecommunications companies and dozens of nations, with Verizon, AT&T, and CenturyLink among the targets. Officials said in early December that these hackers are still embedded in U.S. infrastructure.

Neuberger said in an earlier conference that the hackers had focused on “very senior” American political figures and stolen vast troves of American data. She said on Friday that they still don’t have a good sense of the total scope of the breach.

“Our understanding is that a large number of individuals were geolocated in the Washington DC, Virginia area,” she said.

Only a fraction of them had their communications affected, Neuberger said, as the hackers are more interested in eavesdropping on U.S. government officials.

“The scale we’re talking about is far larger on the geolocation, probably less than 100 on the actual individuals,” she said.

As officials scramble to understand the impact of the Chinese cyber intrusion, they also began a multi-agency effort to fortify U.S. infrastructure against such operations.

Shortly after the briefing, the Justice Department issued a final rule naming China, Cuba, Iran, North Korea, Russia, and Venezuela as countries of concern over their ambitions to exploit sensitive U.S. personal and government-related data by bulk. Under the rule, certain individuals and groups whom authorities deemed as threat actors are barred from transactions involving six types of U.S. data, including certain personal identifiers such as social security numbers or government identification numbers, precise geolocation data, biometric identifiers, human genetic or molecular data, personal health data, and personal financial data.

By Eva Fu

Read Full Article on TheEpochTimes.com

Opinion

00:02:26

2024 Rearview Awards

As 2024 enters the history books and the days slowly begin to lengthen, the time for the Annual Rearview Awards is upon us. 
00:01:18

Biden In A Dream World: While Americans Face A Nightmare

The Biden nightmare is almost over. With Trump’s sound economic policies the American dream will be obtainable for families who have spent 4 years struggling.
00:00:16

Annual Review Awards 2

As 2024 enters the history books and the days slowly begin to lengthen, the time for the Annual Rearview Awards is upon us. Here are the Annual Review Awards 2.
01:55:59

Mystery Fog is Making People Sick

Reports of a “mystery fog” began around Christmas and came from all over the world but Canada, Europe, and the United States are noted most often.

50 Examples of Fake News in 2024

Just Facts has summarized 50 false or misleading claims spread by journalists, commentators, and so-called fact checkers during the year 2024.

News

00:02:41

Encode Joins Musk in Fight Against OpenAI’s For-Profit Transition

Encode filed a brief in support of Musk’s lawsuit against OpenAI, arguing that enabling the conversion toward a for-profit entity could endanger public interest.
00:03:08

A Plug in the Pipeline: Keystone XL Revival Tempered by Tariff Talk

Trump vowed to issue day-one executive order to restore federal approvals for Keystone XL Pipeline while also pledging to slap tariffs on Canadian imports.

Cybersecurity: An Invisible War Grows More Intense, More Challenging

The invisible war in cybersecurity grows more intense and challenging. Bad guys only have to be right 1% of the time to get through said security firm founder.

What’s Ahead for the Health Care Industry in 2025?

The health care industry will be at the crossroads of several trends in 2025: demographics, proposed Medicare changes, staffing constraints, AI innovations, and deregulation.
00:04:43

Jimmy Carter, 39th President and Nobel Peace Prize Winner, Dies at 100

Former President Jimmy Carter, the longest-lived president in U.S. history, died at his home, his family and the Carter Center confirmed Sunday. He was 100.

Musk Appears to Soften Pro-Foreign Worker, H-1B Visa Stance Amid Online Spat

‘I’ve been very clear that the program is broken...

Yellen Says US Will Hit Debt Ceiling Mid-January, Forcing Treasury to Employ ‘Extraordinary Measures’

Yellen warned U.S. will hit statutory debt ceiling middle of Jan., prompting Treasury to resort to “extraordinary measures” to prevent government defaulting.

Costco Board Urges Shareholders to Reject Calls to End DEI Programs

Several large U.S. companies ended their DEI programs in...
spot_img

Related Articles

Popular Categories

spot_img