Chinese Hackers Used U.S. Government-Mandated Wiretap Systems
A backdoor for anybody is a backdoor for everybody.

For as long as law enforcement has sought a way to monitor people's conversations—though they'd only do so with a court order, we're supposed to believe—privacy experts have warned that building backdoors into communications systems to ease government snooping is dangerous. A recent Chinese incursion into U.S. internet providers using infrastructure created to allow police easy wiretap access offers evidence, and not for the first time, that weakening security for anybody weakens it for everybody.
You are reading The Rattler from J.D. Tuccille and Reason. Get more of J.D.'s commentary on government overreach and threats to everyday liberty.
Subverted Wiretapping Systems
"A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests," The Wall Street Journal reported last week. "For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data."
Among the companies breached by the hacker group, dubbed "Salt Typhoon" by investigators, are Verizon, AT&T, and Lumen Technologies. The group is just one of several linked to the Chinese government that has targeted data and communications systems in the West.
While the Journal report doesn't specify, Joe Mullin and Cindy Cohn of the Electronic Frontier Foundation (EFF) believe the wiretap-ready systems penetrated by the Chinese hackers were "likely created to facilitate smooth compliance with wrong-headed laws like CALEA." CALEA, known in full as the Communications Assistance for Law Enforcement Act, dates back to 1994 and "forced telephone companies to redesign their network architectures to make it easier for law enforcement to wiretap digital telephone calls," according to an EFF guide to the law. A decade later it was expanded to encompass internet service providers, who were targeted by Salt Typhoon.
"That's right," comment Mullin and Cohn. "The path for law enforcement access set up by these companies was apparently compromised and used by China-backed hackers."
Ignored Precedents
This isn't the first time that CALEA-mandated wiretapping backdoors have been exploited by hackers. As computer security expert Nicholas Weaver pointed out for Lawfare in 2015, "any phone switch sold in the US must include the ability to efficiently tap a large number of calls. And since the US represents such a major market, this means virtually every phone switch sold worldwide contains 'lawful intercept' functionality."
Two decades ago, that mandatory wiretapping capability was subverted by hackers targeting Vodafone Greece. They intercepted phone conversations of the country's prime minister and high political, law enforcement, and military officials, among others.
Which is to say that nobody appears to have learned anything between the 2004 hacking of government-mandated wiretapping capabilities at a Greek telecom and the 2024 hacking of government-mandated wiretapping capabilities at U.S. internet service providers. Well, unless we're counting the Chinese hackers. They seem to have learned quite a bit from the earlier experience.
It should be needless to say, but let's say it anyway: this was all predictable and preventable.
'The Problem With Backdoors'
"The problem with backdoors is known—any alternate channel devoted to access by one party will undoubtedly be discovered, accessed, and abused by another," David Ruiz of the internet security firm Malwarebytes Labs wrote in 2019. He noted that cybersecurity researchers had been making that argument for years. They've been repeating themselves for years because their warnings appear to fall on deaf ears.
Even some believers in backdoors on specific devices concede that building wiretapping into whole communications systems is too dangerous to contemplate. A 2019 paper from the Carnegie Endowment for Peace's Encryption Working Group thought "some forms of access to encrypted information, such as access to data at rest on mobile phones, should be further discussed," but cautioned that compromising the security of what it called "data in motion" (communications networks) "would create a massive target for criminal and foreign intelligence adversaries."
Such foreign intelligence adversaries, for instance, as hackers sponsored by the Chinese government to penetrate U.S. internet firms.
So, just how dangerous was the Salt Typhoon hack?
'A Potentially Catastrophic Breach'
"The widespread compromise is considered a potentially catastrophic security breach," adds The Wall Street Journal. "It appeared to be geared toward intelligence collection."
China's state-sponsored hackers are continuously targeting U.S. infrastructure, including water-treatment facilities and the electricity grid. They've also penetrated pipeline systems. "The PRC's targeting of our critical infrastructure is both broad and unrelenting," FBI Director Christopher Wray warned in April, referring to the People's Republic of China.
The U.S. Cybersecurity and Infrastructure Security Agency cautions that "PRC state-sponsored cyber actors are seeking to pre-position themselves on information technology (IT) networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States."
And yes, the U.S. government is probably returning the favor by hacking systems in China and elsewhere. But that will be cold comfort if the lights go out here because the feds essentially rolled out the red carpet for foreign infiltration of American networks.
The debate over information security has raged for years with people like Edward Snowden pointing out that law enforcement agencies can't be trusted with access to our communications, or to abide by the rules that theoretically define when and how they can snoop. Now we know that they aren't competent custodians of wiretapping systems that privacy advocates warned were open invitations to bad actors.
Salt Typhoon may have done enormous damage to American security by penetrating internet systems relied on by private individuals, businesses, utilities, and government agencies. If it leads to the end of government-mandated backdoors that offer easy access to hackers, some good could come of this.
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
Computer China virus
Shit may be a bit of a nit-pick, butt here goes anyway...
USA and other Governments Almighty SNOT listening to computer experts about this, and ignoring history? SNOT listening? You think THAT'S the whole of the story?
Ever hear of addiction? The alcoholic KNOWS that too much booze is bad for him or her... Addicts KNOW! Be it food, drugs, sex, gambling, twatever... Governments Almighty KNOW this shit, butt they're ADDICTED to being nosy snoops and power pigs!!! Telling them ANYTHING will SNOT suffice!!!
Chinese Hackers Used U.S. Government-Mandated Wiretap Systems
Sounds just like another free trade of information between business partners to me. Reason assures us that China is just like Wal-Mart, all they want to do is provide us with Always Low Price. Always.
Well at least in this instance we're being surveiled by people who are indifferent to us. Normally it's by people who actively hate us.
[squints] Can't tell if unclear about 'our' social and cultural identity or if unclear about China's feelings towards it.
Do you think the people who hate you, on either side of that pond hate you because your Mandarin Chicken recipe sucks? Because, I don't know what your distinction between 'actively hate' and 'passively dislike' is, but targeting of infrastructure, water, electricity, and oil doesn't sound like 'passive dislike' to me.
Nah, "it's just business." They don't know us well enough to truly hate us. The glowies hate us.
Regarding computer security, sounds like there is a chink in the armor.
A backdoor is a backdoor!
That’s right, and the ones that should most concern us are those within our own government who are able to dictate to us that we allow back doors into our systems so they can “protect us.”
I am a Control Systems Engineer and among other things, design complete networked industrial controls systems. I have told clients for years that given the risks of outside penetration of these systems in chemical plants, or any other industrial facility, the control system should not be connected to the business systems.
.
The genius' in IT always insist on it anyway. Apparently the continual hacking of employee and customer information does not convince them that their "security" systems are in fact insecure.
.
The only computer that can't be hacked via the internet is one not connected to the internet.
True even more now than it has ever been.
Sadly, the conclusion relies on two assumptions. First, the government will admit they were wrong/their plan was flawed with unintended consequences which should have been anticipated and second, they will relinquish power. Neither is likely to happen. We can always dream!
My thoughts, exactly. I read the last line and thought "dream on".
>>A backdoor for anybody is a backdoor for everybody.
insert tasteless ex-wife joke.
Demonstrating yet again that government officials couldn't care less about the security of the citizens they are pretending to serve - they only care about their own power and ease of intimidating us. My fellow Americans will never learn this.
Agreed.
A backdoor for anybody is a backdoor for everybody.
Sex work is work, Reason.
Those who would sell off Liberty for Security will get neither Liberty or Security.
Remember the half-way decent days when this line of thought was championed by the people?
Yeah but we hacked them twice as hard!…right?