U.S. House Panel Demands Records on Chinese Telecom Cyber Attacks
![]() |
| Lawmakers Probe DHS Response to Major Hacking Incidents |
The U.S. House Committee on Homeland Security has formally requested detailed records from the Department of Homeland Security (DHS) regarding the federal government's response to significant Chinese telecom hacking incidents, spotlighting national security vulnerabilities. Led by Chairman Mark Green, alongside chairs of two subcommittees, the committee is pressing DHS Secretary Kristi Noem to provide comprehensive documentation on how the agency addressed two prominent cyber threats: "Salt Typhoon" and "Volt Typhoon." These incidents, linked to Chinese state-sponsored actors, have raised alarms due to their unprecedented scale and potential to disrupt critical infrastructure and telecommunications networks across the United States. This inquiry underscores growing congressional concern over the adequacy of current cybersecurity measures and the government's preparedness to counter sophisticated foreign cyber espionage.
The request focuses on "Salt Typhoon," widely regarded as the largest telecommunications hack in U.S. history, and "Volt Typhoon," a stealthy operation targeting critical infrastructure sectors like energy and water systems. "Salt Typhoon" has compromised major telecom giants such as Verizon, AT&T, and T-Mobile, potentially exposing millions of Americans' call records and enabling real-time monitoring of communications, including those of senior government officials and political figures. Cybersecurity experts attribute this breach to China’s Ministry of State Security, noting its exploitation of outdated vulnerabilities and weak security practices, such as unpatched Cisco routers and default passwords like "1111." Meanwhile, "Volt Typhoon" employs "living off the land" techniques, using legitimate system tools to evade detection while prepositioning for potential sabotage of essential services. FBI Director Christopher Wray has called "Volt Typhoon" a defining generational threat, emphasizing its capacity to cripple national infrastructure during a crisis. The House committee’s demand for records seeks to unravel how DHS detected these breaches, coordinated with agencies like the Cybersecurity and Infrastructure Security Agency (CISA), and implemented mitigation strategies to safeguard American interests.
This congressional action reflects broader anxieties about Chinese telecom hacking threats and their implications for national security. The committee’s letter to Secretary Noem likely requests specifics on detection timelines, interagency collaboration, and long-term prevention plans, aiming to evaluate whether DHS has effectively countered these advanced persistent threats. Recent developments add urgency to this probe, as the Trump administration terminated DHS advisory committees, including the Cyber Safety Review Board tasked with investigating "Salt Typhoon," effective January 20, 2025. This decision has sparked concerns about gaps in oversight and continuity, potentially weakening the federal response to ongoing cyber campaigns. Lawmakers are also grappling with the diplomatic fallout, as China denies involvement, labeling U.S. accusations as baseless slander, which complicates attribution efforts and international cooperation on cybersecurity.
Delving deeper into the incidents, "Salt Typhoon" represents a monumental breach of telecommunications security, with hackers infiltrating core network components across nine U.S. providers since at least 2020. Reports indicate the operation accessed sensitive metadata and audio, affecting not only the U.S. but dozens of countries, amplifying its global reach. Senate Intelligence Committee Chairman Mark Warner has described it as the most severe telecom hack in U.S. history, a sentiment echoed by the White House, which confirmed the targeting of high-profile political figures. In contrast, "Volt Typhoon," active since mid-2021, poses a different but equally dire threat by embedding itself in critical infrastructure systems worldwide, including in Australia and the UK. Microsoft’s 2023 disclosure highlighted its use of stealth tactics, while the FBI’s efforts to dismantle its network of compromised routers underscore the challenge of rooting out such deeply entrenched threats. Together, these incidents expose vulnerabilities in both private sector cybersecurity practices and federal response mechanisms, prompting the House committee to demand transparency from DHS.
The implications of this inquiry extend beyond immediate accountability, potentially shaping future legislative and policy frameworks to bolster U.S. defenses against Chinese cyber threats. With telecom companies criticized for lax security and critical infrastructure operators facing sophisticated adversaries, the committee’s findings could drive mandates for stricter standards, enhanced funding for cybersecurity initiatives, and improved public-private partnerships. The financial stakes are significant, with potential losses from such breaches running into billions of dollars, not to mention the incalculable cost to national security if these systems fail during a geopolitical crisis. As the House Committee on Homeland Security presses DHS for answers, the outcome of this investigation will likely influence how the U.S. fortifies its digital frontiers against an increasingly aggressive cyber landscape dominated by state-sponsored actors like those behind "Salt Typhoon" and "Volt Typhoon." This push for detailed records marks a pivotal moment in addressing the evolving threat of Chinese telecom hacking and ensuring robust protection for American infrastructure and citizens.

댓글
댓글 쓰기