U.S. government agencies held a classified briefing for all senators on Wednesday on China's alleged efforts known as Salt Typhoon to burrow deep into American telecommunications companies and steal data about U.S. calls.
The FBI, Director of National Intelligence Avril Haines, Federal Communications Commission Chair Jessica Rosenworcel, the National Security Council and the Cybersecurity and Infrastructure Security Agency were among the participants in the closed-door briefing, officials told Reuters.
Democratic Senator Ron Wyden told reporters after the briefing he was working to draft legislation on this issue, while Senator Bob Casey said he had "great concern" about the breach and added it may not be until next year before Congress can address the issue.
Republican Senator Rick Scott expressed frustration with the briefing. "They have not told us why they didn't catch it; what they could have done to prevent it."
Separately, a Senate Commerce subcommittee will hold a Dec. 11 hearing on Salt Typhoon and how "security threats pose risks to our communications networks, and review best practices." The hearing will include Competitive Carriers Association CEO Tim Donovan.There is growing concern about the size and scope of the reported Chinese hacking into U.S. telecommunications networks and questions about when companies and the government can assure Americans over the matter.
A U.S. official told reporters a large number of Americans' metadata has been stolen in the sweeping cyber espionage campaign, adding dozens of companies across the world had been hit by the hackers, including "at least" eight telecommunications and telecom infrastructure firms in the United States.
"The extent and depth and breadth of Chinese hacking is absolutely mind-boggling -- that we would permit as much as has happened in just the last year is terrifying," said Senator Richard Blumenthal.
Incoming FCC Chair Brendan Carr said Wednesday he will work "with national security agencies through the transition and next year in an effort to root out the threat and secure our networks."
No comments:
Post a Comment