Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Teens sue Elon Musk’s xAI over Grok’s AI-generated CSAM

    Teens sue Elon Musk’s xAI over Grok’s AI-generated CSAM

    March 16, 2026
    Ecovacs’ Deebot X8 and X9 Pro Omni robovacs are nearly 50 percent off

    Ecovacs’ Deebot X8 and X9 Pro Omni robovacs are nearly 50 percent off

    March 16, 2026
    This chair gives half-worn clothes a home

    This chair gives half-worn clothes a home

    March 16, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking
    Security

    Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking

    News RoomBy News RoomDecember 10, 20244 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking

    The senators also provide evidence in their letter that US telecoms have worked with third-party cybersecurity firms to conduct audits of their systems related to the telecom protocol known as SS7 but have declined to make the results of these evaluations available to the Defense Department. “The DOD has asked the carriers for copies of the results of their third-party audits and were informed that they are considered attorney-client privileged information,” the department wrote in answer to questions from Wyden’s office.

    The Pentagon contracts with major US carriers for much of its telecom infrastructure, which means that it inherits any potential corporate security weaknesses they may have but also the legacy vulnerabilities at the heart of their telephony networks.

    AT&T and Verizon did not respond to multiple requests for comment from WIRED. T-Mobile was also reportedly breached in the Salt Typhoon campaign, but the company said in a blog post last week that it has seen no signs of compromise. T-Mobile has contracts with the Army, Air Force, Special Operations Command, and many other divisions of the DOD. And in June, it announced a 10-year, $2.67 billion contract with the Navy that “will give all Department of Defense agencies the ability to place orders for wireless services and equipment from T-Mobile for the next 10 years.”

    In an interview with WIRED, T-Mobile chief security officer Jeff Simon said that the company recently detected attempted hacking activity coming from its routing infrastructure by way of an unnamed wireline partner that suffered a compromise. T-Mobile isn’t certain that the “bad actor” was Salt Typhoon, but whoever it was, Simon says the company quickly stymied the intrusion attempts.

    “From our edge routing infrastructure you can’t get to all of our systems—they’re somewhat contained there and then you need to try to move between that environment and another one in order to gain more access,” Simon says. “That requires them to do things that are rather noisy and that’s where we were able to detect them. We’ve invested heavily in our monitoring capabilities. Not that they’re perfect, they never will be, but when someone’s noisy in our environment, we like to think that we’re going to catch them.”

    In the midst of the Salt Typhoon chaos, T-Mobile’s assertion that it did not suffer a breach in this instance is noteworthy. Simon says that the company is still collaborating with law enforcement and the telecom industry more broadly as the situation unfolds. But it is no coincidence that T-Mobile has invested so extensively in cybersecurity. The company had suffered a decade of repeated, vast breaches, which exposed an immense amount of customer data. Simon says that since he joined the company in May 2023, it has undergone a significant security transformation. As one example, the company implemented mandatory two-factor authentication with physical security keys for all people who interact with T-Mobile systems, including all contractors in addition to employees. Such measures, he says, have drastically reduced the risk of threats like phishing. And other improvements in device population management and network detection have helped the company feel confident in its ability to defend itself.

    “The day we did the transition, we cut off a number of people’s access, because they hadn’t gotten their YubiKeys yet. There was a line out the door of our headquarters,” Simon says. “Every life form that accesses T-Mobile systems has to get a YubiKey from us.”

    Still, the fact remains that there are fundamental vulnerabilities in US telecom infrastructure. Even if T-Mobile successfully thwarted Salt Typhoon’s latest intrusion attempts, the espionage campaign is a dramatic illustration of long-standing insecurity across the industry.

    “We urge you to consider whether DOD should decline to renew these contracts,” the senators wrote, “and instead renegotiate with the contracted wireless carriers, to require them to adopt meaningful cyber defenses against surveillance threats.”

    Additional reporting by Dell Cameron.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleYouTube’s AI-powered dubbing is now available to many more creators
    Next Article Google’s future data centers will be built next to solar and wind farms

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Ecovacs’ Deebot X8 and X9 Pro Omni robovacs are nearly 50 percent off

    Ecovacs’ Deebot X8 and X9 Pro Omni robovacs are nearly 50 percent off

    March 16, 2026
    This chair gives half-worn clothes a home

    This chair gives half-worn clothes a home

    March 16, 2026
    Amazon’s Fire TV Stick 4K Max and 4K Plus sticks are up to 50 percent off 

    Amazon’s Fire TV Stick 4K Max and 4K Plus sticks are up to 50 percent off 

    March 16, 2026
    How Yahoo escaped the Verizon death spiral

    How Yahoo escaped the Verizon death spiral

    March 16, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Amazon’s best Echo speakers and screens just got their biggest discounts News

    Amazon’s best Echo speakers and screens just got their biggest discounts

    By News RoomMarch 16, 2026

    While Amazon’s previous lineup of Echo speakers and smart displays was boring, frankly, its late…

    Apple’s 9 AirPods Max 2 add better ANC and live translation

    Apple’s $549 AirPods Max 2 add better ANC and live translation

    March 16, 2026
    The classic Apple Macintosh mouse inspired Spigen’s retro AirPods case

    The classic Apple Macintosh mouse inspired Spigen’s retro AirPods case

    March 16, 2026
    OpenAI’s adult mode will reportedly be smutty, not pornographic

    OpenAI’s adult mode will reportedly be smutty, not pornographic

    March 16, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.