United States

FTC Reports 50% Drop in Unwanted Call Complaints Since 2021 50

The Federal Trade Commission reported Friday that the number of consumer complaints about unwanted telemarketing phone calls has dropped over 50% since 2021, continuing a trend that started three years ago. From a report: This year, the FTC has received 1.1 million reports regarding robocalls, down from 1.2 million one year before 2023 and from more than 3.4 million in 2021. According to this year's National Do Not Call Registry Data Book -- which provides the most recent data on robocall complaints together with a complete state-by-state analysis -- the highest number of consumer complaints targeted unwanted calls about medical and prescription issues, with more than 170,000 reports (most of them robocalls) received until September 30, 2024.
United States

Republican States' Attorneys General Sue SEC, Gensler Over Crypto 'Overreach' (foxbusiness.com) 103

Eighteen Republican state attorneys general have sued the U.S. Securities and Exchange Commission (SEC) and Chair Gary Gensler on Thursday, challenging the agency's authority to regulate cryptocurrency markets.

The lawsuit, led by Kentucky Attorney General Russell Coleman, alleges the SEC has exceeded its statutory powers by attempting to assume broad regulatory control over digital assets without congressional authorization. The complaint argues the agency's actions infringe on states' rights to develop their own cryptocurrency regulations and harm consumers by imposing ill-fitting federal securities laws on digital assets.

Speaking at a legal conference Thursday, Gensler defended the agency's approach, citing consistent court support for SEC enforcement actions in cryptocurrency cases. The regulatory landscape appears set for change following President-elect Trump's victory. Trump, who previously dismissed cryptocurrency as a "scam," has pledged to make the U.S. the "crypto capital of the planet" and remove Gensler.
Microsoft

US Regulators Plan To Investigate Microsoft's Cloud Business (ft.com) 20

The Federal Trade Commission is preparing to launch an investigation into anti-competitive practices at Microsoft's cloud computing business, Financial Times reported Thursday, as the US regulator continues to pursue Big Tech in the final weeks of Joe Biden's presidency. From the report: The FTC is examining allegations that Microsoft is abusing its market power in productivity software by imposing punitive licensing terms to prevent customers from moving their data from its Azure cloud service to competitors' platforms, according to people with direct knowledge of the matter.

Tactics being examined include substantially increasing subscription fees for those that leave, charging steep exit fees and allegedly making its Office 365 products incompatible with rival clouds, they added.

Google

CFPB Looks To Place Google Under Federal Supervision 26

Washington Post: The Consumer Financial Protection Bureau has taken steps to place Google under formal federal supervision, an extraordinary move that could subject the technology giant to the regular inspections and other rigorous monitoring that the government imposes on major banks.

Google has fiercely resisted the idea over months of highly secretive talks, according to two people familiar with the discussions, who spoke on the condition of anonymity to describe them -- setting up what may ultimately be a major legal clash with vast implications for the CFPB's powers in the digital age.

The exact scope of the CFPB's concerns is not clear, and its order does not appear to be final. The political fate of the bureau's work under Director Rohit Chopra is also in doubt, as the watchdog agency braces for potentially significant changes to its leadership and agenda with the return of President-elect Donald Trump to the White House.

Formed in the aftermath of the 2008 financial crisis, the CFPB has broad powers to protect consumers from unfair, deceptive or predatory financial practices. That includes the ability to place certain firms under supervision, a status that can afford regulators direct access to the company's internal records to ensure their activities are sound -- and seek fixes if they are not.
Sci-Fi

Experts Testify US Is Running Secret UAP Programs (npr.org) 177

During a public joint hearing today titled "Unidentified Anomalous Phenomena: Exposing the Truth," four experts testified that the U.S. is running secret UAP programs, including crash retrieval and reverse-engineering programs for advanced nonhuman technology. Although the Pentagon maintains there's no evidence of alien spacecraft, witnesses like Luis Elizondo and Michael Gold argue that UAPs represent an intelligence enigma and call for open, stigma-free study to address potential security concerns and unknown scientific possibilities. NPR reports: Tim Gallaudet, retired rear admiral, U.S. Navy; CEO of Ocean STL Consulting, LLC
"Confirmation that UAPs are interacting with humanity came for me in January 2015," Gallaudet said in his written testimony (PDF). He describes being part of a pre-deployment naval exercise off the U.S. East Coast that culminated in the famous "Go Fast" video, in which a Navy F/A-18 jet's sensors recorded "an unidentified object exhibiting flight and structural characteristics unlike anything in our arsenal." He was among a group of commanders involved in the exercise who received an email containing the video, which was sent by the operations officer of Fleet Forces Command, Gallaudet said. "The very next day, the email disappeared from my account and those of the other recipients without explanation," he said.

Luis Elizondo, author and former Department of Defense official
Elizondo's written testimony (PDF) was brief and alleged that a secretive arms race is playing out on the global stage. "Let me be clear: UAP are real," he wrote. "Advanced technologies not made by our Government -- or any other government -- are monitoring sensitive military installations around the globe. Furthermore, the U.S. is in possession of UAP technologies, as are some of our adversaries." Elizondo is a former intelligence officer who later "managed a highly sensitive Special Access Program on behalf of the White House and the National Security Council," according to his official bio (PDF). "By 2012, [Elizondo] was the senior ranking person of the DOD's Advanced Aerospace Threat Identification Program, a secretive Pentagon unit that studied unidentified anomalous phenomena," his bio states, adding that he resigned in 2017.

Michael Gold, former NASA associate administrator of space policy and partnerships; member of NASA UAP Independent Study Team
Gold's written testimony (PDF) stressed the need for government agencies and academics to "overcome the pernicious stigma that continues to impede scientific dialogue and open discussions" about unexplained phenomena. "As the saying goes, the truth is out there," Gold said, "we just need to be bold enough and brave enough to face it."

Michael Shellenberger, founder of Public, a news outlet on the Substack platform
Shellenberger's testimony (PDF) ran to some 214 pages, including a lengthy timeline of UAP reports from 1947 to 2023. Shellenberger pressed the White House and Congress to act, calling for the adoption of UAP transparency legislation and cutting funds for any related programs that aren't disclosed to lawmakers. "UAP transparency is bi-partisan and critical to our national security," his written testimony stated.
You can watch the proceeding here.
Privacy

Secret Service Says You Agreed To Be Tracked With Location Data (404media.co) 103

An anonymous reader shares a report: Officials inside the Secret Service clashed over whether they needed a warrant to use location data harvested from ordinary apps installed on smartphones, with some arguing that citizens have agreed to be tracked with such data by accepting app terms of service, despite those apps often not saying their data may end up with the authorities, according to hundreds of pages of internal Secret Service emails obtained by 404 Media.

The emails provide deeper insight into the agency's use of Locate X, a powerful surveillance capability that allows law enforcement officials to follow a phone, and person's, precise movements over time at the click of a mouse. In 2023, a government oversight body found that the Secret Service, Customs and Border Protection, and Immigration and Customs Enforcement all used their access to such location data illegally. The Secret Service told 404 Media in an email last week it is no longer using the tool. "If USSS [U.S. Secret Service] is using Locate X, that is most concerning to us," one of the internal emails said. 404 Media obtained them and other documents through a Freedom of Information Act (FOIA) request with the Secret Service.

Crime

Discord Leaker Sentenced To 15 Years In Prison (nbcnews.com) 89

An anonymous reader quotes a report from NBC News: Former Massachusetts Air National Guard member Jack Teixeira was sentenced Tuesday to 15 years for stealing classified information from the Pentagon and sharing it online, the U.S. Attorney for Massachusetts announced. Teixeira received the sentence before Judge Indira Talwani in U.S. District Court for the District of Massachusetts. In March, the national guardsman pleaded guilty to six counts of willful retention and transmission of national defense information under the Espionage Act. He was arrested by the FBI in North Dighton, Massachusetts, in April 2023 and has been in federal custody since mid-May 2023.

According to court documents, Teixeira transcribed classified documents that he then shared on Discord, a social media platform mostly used by online gamers. He began sharing the documents in or around 2022. A document he was accused of leaking included information about providing equipment to Ukraine, while another included discussions about a foreign adversary's plot to target American forces abroad, prosecutors said. [...] While the documents were discovered online in March 2023, Teixeira had been sharing them online since January of that year, according to prosecutors.

Privacy

Open Source Project DeFlock Is Mapping License Plate Surveillance Cameras All Over the World (404media.co) 35

An anonymous reader quotes a report from 404 Media: Flock is one of the largest vendors of automated license plate readers (ALPRs) in the country. The company markets itself as having the goal to fully "eliminate crime" with the use of ALPRs and other connected surveillance cameras, a target experts say is impossible. [...] Flock and automated license plate reader cameras owned by other companies are now in thousands of neighborhoods around the country. Many of these systems talk to each other and plug into other surveillance systems, making it possible to track people all over the country.

"It went from me seeing 10 license plate readers to probably seeing 50 or 60 in a few days of driving around," [said Alabama resident and developer Will Freeman]. "I wanted to make a record of these things. I thought, 'Can I make a database of these license plate readers?'" And so he made a map, and called it DeFlock. DeFlock runs on Open Street Map, an open source, editable mapping software. He began posting signs for DeFlock (PDF) to the posts holding up Huntsville's ALPR cameras, and made a post about the project to the Huntsville subreddit, which got good attention from people who lived there. People have been plotting not just Flock ALPRs, but all sorts of ALPRs, all over the world. [...]

When I first talked to Freeman, DeFlock had a few dozen cameras mapped in Huntsville and a handful mapped in Southern California and in the Seattle suburbs. A week later, as I write this, DeFlock has crowdsourced the locations of thousands of cameras in dozens of cities across the United States and the world. He said so far more than 1,700 cameras have been reported in the United States and more than 5,600 have been reported around the world. He has also begun scraping parts of Flock's website to give people a better idea of where to look to map them. For example, Flock says that Colton, California, a city with just over 50,000 people outside of San Bernardino, has 677 cameras.

People who submit cameras to DeFlock have the ability to note the direction that they are pointing in, which can help people understand how these cameras are being positioned and the strategies that companies and police departments are using when deploying them. For example, all of the cameras in downtown Huntsville are pointing away from the downtown core, meaning they are primarily focused on detecting cars that are entering downtown Huntsville from other areas.

United States

The US Has a Cloned Sheep Contraband Problem (wired.com) 109

Federal authorities are grappling with the aftermath of an illegal sheep cloning operation that has scattered hundreds of contraband hybrid animals across multiple states, following the sentencing of the scheme's mastermind. Montana rancher Arthur Schubarth received a six-month prison term for cloning a near-threatened Marco Polo argali sheep from tissue illegally imported from Kyrgyzstan.

The cloned animal, named Montana Mountain King, was used to inseminate over 100 ewes, creating a network of unauthorized hybrid offspring. Court documents reveal that Schubarth sold these hybrids to big game hunting enthusiasts, with prices reaching $10,000 per animal. While the original cloned sheep is now housed at New York's Rosamond Gifford Zoo, authorities cannot account for most of its descendants.
United States

US Senate To Revive Software Patents With PERA Bill Vote On Thursday (eff.org) 111

zoobab writes: The US Senate to set to revive Software Patents with the PERA Bill, with a vote on Thursday, November 14, 2024.

A crucial Senate Committee is on the cusp of voting on two bills that would resurrect some of the most egregious software patents and embolden patent trolls. The Patent Eligibility Restoration Act (PERA), S. 2140, would dismantle vital safeguards that prohibit software patents on overly broad concepts. If passed, courts would be compelled to approve software patents on mundane activities like mobile food ordering or basic online financial transactions. This would unleash a torrent of vague and overbroad software patents, which would be wielded by patent trolls to extort small businesses and individuals.

The EFF is inviting members of the public to contact their Senators.

United States

Biden Administration To Support Controversial UN Cyber Treaty (yahoo.com) 115

The Biden administration plans to support a controversial cybercrime treaty at the United Nations this week despite concerns that it could be misused by authoritarian regimes, Bloomberg News reported Monday, citing senior government officials. From the report: The agreement would be the first legally binding UN agreement on cybersecurity and could become a global legal framework for countries to cooperate on preventing and investigating cybercriminals. However, critics fear it could be used by authoritarian states to try to pursue dissidents overseas or collect data from political opponents. Still, the officials said there are persuasive reasons to support the treaty. For instance, it would advance the criminalization of child sexual-abuse material and nonconsensual spreading of intimate images, they said.

In addition, the wider involvement of member states would make cybercrime and electronic evidence more available to the US, one official said. If all the members sign the agreement, it would update extradition treaties and provide more opportunities to apprehend cybercriminals and have them extradited, the official added. Hundreds of submissions from advocacy groups and other parties criticized US involvement in the agreement. The US plans to strictly enforce human rights and other safeguards in the treaty, the officials said, adding that the Department of Justice would closely scrutinize requests and refuse to provide any assistance that was inconsistent with the agreement.

Power

Can AI-Enabled Thermostats Create a 'Virtual Power Plant' in Texas? (yahoo.com) 113

Renew Home says they're building a "virtual power plant" in Texas by "enabling homes to easily reduce and shift the timing of energy use." Thursday they announced a 10-year project distributing hundreds of thousands of smart thermostats to customers of Texas-based power utility NRG Energy, starting next spring. (Bloomberg calls them "AI-enabled thermostats that use Alphabet Inc.'s Google Cloud technology.") The ultimate goal? "Create a nearly 1-gigawatt, AI-powered virtual power plant" — equivalent to 1.9 million solar panels, enough to power about 200,000 homes during peak demand.

One NRG executive touted the move as "cutting-edge, AI-driven solutions that will bolster grid resilience and contribute to a more sustainable future." [Residential virtual power plants] work by aggregating numerous, small-scale distributed energy resources like HVAC systems controlled by smart thermostats and home batteries and coordinating them to balance supply and demand... NRG, in partnership with Renew Home, plans to offer Vivint and Nest smart thermostats, including professional installation, at no cost to eligible customers across NRG's retail electricity providers and plans. These advanced thermostats make subtle automatic HVAC adjustments to help customers shift their energy use to times when electricity is less constrained, less expensive, and cleaner... Over time, the parties expect to add devices like batteries and electric vehicles to the virtual power plant, expanding energy savings opportunities for customers...

Through the use of Google Cloud's data, analytics, and AI technology, NRG will be able to do things like better predict weather conditions, forecast wind and solar generation output, and create predictive pricing models, allowing for more efficient production and ultimately ensuring the home energy experience is seamless for customers.

Google Cloud will also offer "its AI and machine learning to determine the best time to cool or heat homes," reports Bloomberg, "based on a household's energy usage patterns and ambient temperatures."

It was less than a year ago that Renew Home was formed when Google spun off the load-shifting service for its "Google Nest" thermostats, which merged with load-shift management startup OhmConnect. Bloomberg describes this week's announcement as "Three of the biggest names in US home energy automation... coming together to offer some relief to the beleaguered Texas electrical grid."

But they point out that 1 gigawatt is roughly 1% of the record summer demand seen in Texas this year. Still, "The entire industry has been built to serve the peak load on the hottest day of the year," said Rasesh Patel, president of NRG's consumer unit. "This allows us to be a lot more smarter about demand in shaving the peak."
Government

Gig-Working Uber and Lyft Drivers Can Unionize, Say Massachusetts Voters (reuters.com) 53

On Tuesday Massachusetts voted to become the first state to allow gig-working drivers to join labor unions, reports WBUR: Since these gig workers are classified as independent contractors, federal law allowing employees the right to unionize does not apply to them. With the passage of this ballot initiative, Massachusetts is the first state to give ride-hailing drivers the ability to collectively bargain over working conditions.
Supporters have said the ballot measure "could provide a model for other states to let Uber and Lyft drivers unionize," reports Reuters, "and inspire efforts to organize them around the United States." Roxana Rivera, assistant to the president of 32BJ SEIU, an affiliate of the Service Employees International Union, that had spearheaded a campaign to pass the proposal, said its approval shows that Massachusetts voters want drivers to have a meaningful check against the growing power of app-based companies... The Massachusetts vote was the latest front in a years-long battle in the United States over whether ride-share drivers should be considered to be independent contractors or employees entitled to benefits and wage protections. Studies have shown that using contractors can cost companies as much as 30% less than employees.

Drivers for Uber and Lyft, including approximately 70,000 in Massachusetts, do not have the right to organize under the National Labor Relations Act... Under the Massachusetts measure, drivers can form a union after collecting signatures from at least 25% of active drivers in Massachusetts, and companies can form associations to allow them to jointly negotiate with the union during state-supervised talks.

But the Boston Globe points out that the measure " divided labor advocates in Massachusetts, some of whom worry it would in fact be a step backward in the lengthy fight to boost the rights of gig workers." Those concerns led the state's largest labor organization, the AFL-CIO, to remain neutral. But two unions backing the effort, the SEIU 32BJ and the International Association of Machinists, say allowing drivers to unionize, even if not as full employees, will help provide urgently needed worker protections and better pay and safety standards.
The Military

Behind the Scenes at a Minuteman ICBM Test Launch (airandspaceforces.com) 61

Tuesday at California's Vandenberg Space Force base, the U.S. launched a Minuteman III missile, "in an important test of the weapon's ability to strike its targets with multiple warheads," according to Air and Space Forces magazine: The Minuteman III missiles that form a critical leg of the U.S. nuclear triad each carry one nuclear-armed reentry vehicle. But the missile that was tested carried three test warheads... The intercontinental ballastic missile (ICBM) test was controlled by an airborne command post in a test of the U.S. ability to launch its nuclear deterrent from a survivable platform.... Gen. Thomas A. Bussiere, the commander of Air Force Global Strike Command, said in a release: "An airborne launch validates the survivability of our ICBMs, which serve as the strategic backstop of our nation's defense and defense of allies and partners...."

The three test reentry vehicles — one high-fidelity Joint Test Assembly, which carries non-nuclear explosives, and two telemetry Joint Test Assembly objects — struck the Reagan Test Site near the Kwajalein Atoll in the Marshall Islands roughly 30 minutes later after launch, a flight of about 4,200 miles. "They make up essentially a mock warhead," Col. Dustin Harmon, the commander of the 377th Test and Evaluation Group, the nation's operational ICBM test unit, said in an interview with Air & Space Forces Magazine. "There's two different types. One is telemetered, so it's got a radio transmitter in it, it's got antennas, gyroscopes, accelerometers — all the things that can sense motion and movement. And we fly those or we can put one in there that's called a high-fidelity. That is assembled much like an actual weapon would be, except we use surrogate materials, and so we want it to fly similarly to an actual weapon. ... It has the explosives in it that a normal warhead would to drive a detonation, but there's nothing to drive...."

The U.S. government formally notified Russia in advance of the launch in accordance with a 1988 bilateral agreement. More than 145 countries were also provided with advance notice of the launch under the Hague Code of Conduct — an international understanding on launch notifications. The U.S. also provided advance notice to China, a DOD spokesperson told Air & Space Forces Magazine. China notified the U.S. of an ICBM launch over the Pacific Ocean in September. There is no formal agreement between Washington and Beijing that requires such notifications, but each side provided them to avoid miscalculations.

Test launches happen three times a year, according to the article, yielding "several gigabytes of data" about reentry vehicles, subsystems, and payloads. "There are 400 Minuteman III missiles currently in service across Colorado, Montana, Nebraska, North Dakota, and Wyoming."

Thanks to long-time Slashdot reader SonicSpike for sharing the article.
United States

Forty-Three Monkeys Escape From US Research Lab (bbc.com) 138

An anonymous reader quotes a report from the BBC: Police are on the hunt for 43 monkeys who escaped from a research facility in South Carolina, after a keeper left their pen open. The rhesus macaque fugitives broke out of Alpha Genesis, a company that breeds primates for medical testing and research, and are on the loose in a part of the state known as the Lowcountry. Authorities have urged residents to keep their doors and windows securely closed and to report any sightings immediately. The escaped monkeys are young females, weighing about 7lbs (3.2kg) each, according to the Yemassee Police Department. Police said on Thursday that the company had located the "skittish" group, and "are working to entice them with food."

"Please do not attempt to approach these animals under any circumstances," police said. The statement added that traps had been set in the area, and police were on-site "utilizing thermal-imaging cameras in an attempt to locate the animals". Police say the research company has told them that because of their size, the monkeys have not yet been tested on and "are too young to carry disease."
In an update Friday, the local police department said the monkeys are still staying around the perimeter of the facility. "The primates are exhibiting calm and playful behavior, which is a positive indication," the department noted.

"They're just being goofy monkeys jumping back and forth playing with each other," Alpha Genesis CEO Greg Westergaard told CBS News Thursday. "It's kind of like a playground situation here."

The article points out that all the escaped monkeys "carry no contagious viruses because they were too young to test, according to the lab. "
Privacy

FBI Says Hackers Are Sending Fraudulent Police Data Requests To Tech Giants To Steal People's Private Information (techcrunch.com) 42

The FBI is warning that hackers are obtaining private user information -- including emails and phone numbers -- from U.S.-based tech companies by compromising government and police email addresses to submit "emergency" data requests. From a report: The FBI's public notice filed this week is a rare admission from the federal government about the threat from fraudulent emergency data requests, a legal process designed to help police and federal authorities obtain information from companies to respond to immediate threats affecting someone's life or property.

The abuse of emergency data requests is not new, and has been widely reported in recent years. Now, the FBI warns that it saw an "uptick" around August in criminal posts online advertising access to or conducting fraudulent emergency data requests, and that it was going public for awareness. "Cyber-criminals are likely gaining access to compromised U.S. and foreign government email addresses and using them to conduct fraudulent emergency data requests to U.S. based companies, exposing the personal information of customers to further use for criminal purposes," reads the FBI's advisory.

United States

US Agency Warns Employees About Phone Use Amid Ongoing China Hack (msn.com) 8

A federal agency has issued a directive to employees to reduce the use of their phones for work matters due to China's recent hack of U.S. telecommunications infrastructure, WSJ reported on Thursday, citing people familiar with the matter. From the report: In an email to staff sent Thursday, the chief information officer at the Consumer Financial Protection Bureau warned that internal and external work-related meetings and conversations that involve nonpublic data should only be held on platforms like Microsoft Teams and Cisco WebEx and not on work-issued or personal phones.

"Do NOT conduct CFPB work using mobile voice calls or text messages," the email said, while referencing a recent government statement acknowledging the telecommunications infrastructure attack. "While there is no evidence that CFPB has been targeted by this unauthorized access, I ask for your compliance with these directives so we reduce the risk that we will be compromised," said the email, which was sent to all CFPB employees and contractors. It wasn't clear if other federal agencies had taken similar measures or were planning to, but many U.S. officials have already curtailed their phone use due to the hack, according to a former official.

United States

Russian Email Domains Target US Polling Sites with Bomb Threats, FBI Says (theverge.com) 57

The FBI warned on Tuesday that polling stations across multiple U.S. states received fake bomb threats sent from Russian email domains, forcing brief evacuations at two voting sites in Georgia's Fulton County.

The threats, which targeted locations in Georgia, Michigan, and Wisconsin, have not been deemed credible, the FBI said in a statement. The evacuated Fulton County sites reopened after 30 minutes, prompting local officials to seek extended voting hours beyond the 7 p.m. ET deadline.

The incidents follow Friday's joint intelligence warning from the FBI, ODNI, and CISA about Russian-created fake videos aimed at undermining election integrity. The agencies also reported Russian actors are spreading false claims about planned election fraud by U.S. officials.
AI

Meta Permits Its AI Models To Be Used For US Military Purposes (nytimes.com) 44

An anonymous reader quotes a report from the New York Times: Meta will allow U.S. government agencies and contractors working on national security to use its artificial intelligence models for military purposes, the company said on Monday, in a shift from its policy that prohibited the use of its technology for such efforts. Meta said that it would make its A.I. models, called Llama, available to federal agencies and that it was working with defense contractors such as Lockheed Martin and Booz Allen as well as defense-focused tech companies including Palantir and Anduril. The Llama models are "open source," which means the technology can be freely copied and distributed by other developers, companies and governments.

Meta's move is an exception to its "acceptable use policy," which forbade the use of the company's A.I. software for "military, warfare, nuclear industries," among other purposes. In a blog post on Monday, Nick Clegg, Meta's president of global affairs, said the company now backed "responsible and ethical uses" of the technology that supported the United States and "democratic values" in a global race for A.I. supremacy. "Meta wants to play its part to support the safety, security and economic prosperity of America -- and of its closest allies too," Mr. Clegg wrote. He added that "widespread adoption of American open source A.I. models serves both economic and security interests."
The company said it would also share its technology with members of the Five Eyes intelligence alliance: Canada, Britain, Australia and New Zealand in addition to the United States.
United States

Millions of U.S. Cellphones Could Be Vulnerable to Chinese Government Surveillance (washingtonpost.com) 73

Millions of U.S. cellphone users could be vulnerable to Chinese government surveillance, warns a Washington Post columnist, "on the networks of at least three major U.S. carriers."

They cite six current or former senior U.S. officials, all of whom were briefed about the attack by the U.S. intelligence community. The Chinese hackers, who the United States believes are linked to Beijing's Ministry of State Security, have burrowed inside the private wiretapping and surveillance system that American telecom companies built for the exclusive use of U.S. federal law enforcement agencies — and the U.S. government believes they likely continue to have access to the system.... The U.S. government and the telecom companies that are dealing with the breach have said very little publicly about it since it was first detected in August, leaving the public to rely on details trickling out through leaks...

The so-called lawful-access system breached by the Salt Typhoon hackers was established by telecom carriers after the terrorist attacks of Sept. 11, 2001, to allow federal law enforcement officials to execute legal warrants for records of Americans' phone activity or to wiretap them in real time, depending on the warrant. Many of these cases are authorized under the Foreign Intelligence Surveillance Act (FISA), which is used to investigate foreign spying that involves contact with U.S. citizens. The system is also used for legal wiretaps related to domestic crimes.

It is unknown whether hackers were able to access records about classified wiretapping operations, which could compromise federal criminal investigations and U.S. intelligence operations around the world, multiple officials told me. But they confirmed the previous reporting that hackers were able to both listen in on phone calls and monitor text messages. "Right now, China has the ability to listen to any phone call in the United States, whether you are the president or a regular Joe, it makes no difference," one of the hack victims briefed by the FBI told me. "This has compromised the entire telecommunications infrastructure of this country."

The Wall Street Journal first reported on Oct. 5 that China-based hackers had penetrated the networks of U.S. telecom providers and might have penetrated the system that telecom companies operate to allow lawful access to wiretapping capabilities by federal agencies... [After releasing a short statement], the FBI notified 40 victims of Salt Typhoon, according to multiple officials. The FBI informed one person who had been compromised that the initial group of identified targets included six affiliated with the Trump campaign, this person said, and that the hackers had been monitoring them as recently as last week... "They had live audio from the president, from JD, from Jared," the person told me. "There were no device compromises, these were all real-time interceptions...." [T]he duration of the surveillance is believed to date back to last year.

Several officials told the columnist that the cyberattack also targetted senior U.S. government officials and top business leaders — and that even more compromised targets are being discovered. At this point, "Multiple officials briefed by the investigators told me the U.S. government does not know how many people were targeted, how many were actively surveilled, how long the Chinese hackers have been in the system, or how to get them out."

But the article does include this quote from U.S. Senate Intelligence Committee chairman Mark Warner. "It is much more serious and much worse than even what you all presume at this point."

One U.S. representative suggested Americans rely more on encrypted apps. The U.S. is already investigating — but while researching the article, the columnist writes, "The National Security Council declined to comment, and the FBI did not respond to a request for comment..." They end with this recommendation.

"If millions of Americans are vulnerable to Chinese surveillance, they have a right to know now."

Slashdot Top Deals