Salt Typhoon recorded top US officials’ calls, says White House

Salt Typhoon recorded top US officials' calls, says White House

December 9, 2024 at 02:08PM

Chinese cyberspies, part of the Salt Typhoon campaign, reportedly recorded calls of senior US political figures, according to Anne Neuberger, deputy national security advisor. Eight US telecom providers were compromised, impacting government officials and corporate intellectual property. A Senate hearing will address the risks from such cyber intrusions.

### Meeting Takeaways:

1. **Chinese Espionage Program**: White House Deputy National Security Advisor Anne Neuberger highlighted concerns about a Chinese cyber espionage program known as “Salt Typhoon,” which specifically targets senior US political figures.

2. **Compromised Telecom Providers**: Neuberger confirmed that eight US telecommunications providers have been compromised in the Salt Typhoon campaign, which also affected organizations globally across multiple countries.

3. **Targeted Communications**: According to Neuberger, the focus of the espionage included “very senior political individuals,” and while a significant amount of metadata was stolen, only a limited number of private communications were accessed, specifically concerning individuals involved in government and political activities.

4. **Law Enforcement Systems**: The Salt Typhoon campaign also compromised wiretapping systems used by law enforcement, although this was not the primary focus of the intrusions.

5. **Upcoming Senate Hearing**: The US Senate Commerce subcommittee will hold a hearing focusing on the risks posed by digital criminals and cyberspies infiltrating American telecom systems, with Salt Typhoon being a major topic of discussion.

6. **Notable Testimony**: Tim Donovan, president and CEO of the Competitive Carriers Association, is scheduled to testify during the subcommittee hearing.

7. **Wider Implications**: Neuberger’s remarks reaffirm the ongoing and broader threat posed by Chinese espionage efforts to US national security and the protection of corporate intellectual property.

Full Article