1 00:00:01,300 --> 00:00:03,566 The White House said today that a broad Chinese 2 00:00:03,566 --> 00:00:07,600 hacking operation had infiltrated at least eight American telecommunication companies, 3 00:00:09,633 --> 00:00:12,933 and that none of them have managed to remove these Chinese hackers from their systems. 4 00:00:12,933 --> 00:00:15,633 Nick Schifrin has been following this all and joins us now. 5 00:00:15,633 --> 00:00:17,433 So, Nick, what did the White House say today? 6 00:00:17,433 --> 00:00:19,833 NICK SCHIFRIN: The White House gave new details on what is 7 00:00:19,833 --> 00:00:24,833 believed to be the largest hack on American telecommunications firms in U.S. history. 8 00:00:26,866 --> 00:00:30,600 As you said, Chinese hackers infiltrated at least eight communications firms in the 9 00:00:32,400 --> 00:00:35,466 United States and over the last one to two years -- quote -- "dozens" of 10 00:00:35,466 --> 00:00:40,433 telecommunications companies across Asia and Europe, and the hack was ongoing, 11 00:00:42,666 --> 00:00:45,633 Deputy National Security Adviser for Cyber and Emerging Technology Anne Neuberger said today. 12 00:00:48,933 --> 00:00:51,033 ANNE NEUBERGER, U.S. Deputy National Security Adviser for Cyber and Emerging Technology: The affected companies are all responding. Right now, 13 00:00:51,033 --> 00:00:53,966 we do not believe any have fully removed the Chinese actors from these networks. 14 00:00:53,966 --> 00:00:58,933 So the risk of -- there is a risk of ongoing compromises to communications. 15 00:01:00,366 --> 00:01:03,600 Until U.S. companies address the cybersecurity gaps, 16 00:01:03,600 --> 00:01:07,000 the Chinese are likely to maintain their access. 17 00:01:07,000 --> 00:01:10,066 NICK SCHIFRIN: Today, intelligence officials were on the Hill briefing all 18 00:01:10,066 --> 00:01:15,066 100 senators in a classified hearing about the Chinese hackers known as Salt Typhoon, 19 00:01:16,733 --> 00:01:20,100 and our Lisa Desjardins caught up with Texas Republican John Cornyn. 20 00:01:22,333 --> 00:01:25,333 SEN. JOHN CORNYN (R-TX): The Chinese Communist Party has infiltrated the telecommunication 21 00:01:25,333 --> 00:01:29,900 systems here in the United States in a dramatic and unprecedented sort of way. 22 00:01:31,133 --> 00:01:32,933 And it's a subject of tremendous concern. 23 00:01:32,933 --> 00:01:35,733 I'm sure you're going to hear more about it, because it affects a lot 24 00:01:35,733 --> 00:01:40,200 of people and a lot of -- not just in this country, but around the world. 25 00:01:40,200 --> 00:01:43,733 NICK SCHIFRIN: Yesterday, Geoff, a senior FBI official admitted the bureau still did 26 00:01:43,733 --> 00:01:47,933 not know how deeply the Chinese hackers had penetrated, even though the bureau had been 27 00:01:47,933 --> 00:01:52,900 investigating since the spring, and it could take years to know the true scope of the hack. 28 00:01:54,400 --> 00:01:56,933 GEOFF BENNETT: Do we know, though, who has been targeted? 29 00:01:56,933 --> 00:02:01,100 NICK SCHIFRIN: Intelligence officials describe three baskets or three groups of targets, 30 00:02:01,100 --> 00:02:06,100 essentially, number one, a large number of users whose phone metadata was stolen, 31 00:02:08,100 --> 00:02:11,033 number two, a small group of individuals whose audio calls and text messages were 32 00:02:11,033 --> 00:02:14,933 specifically targeted and successfully intercepted, number three, the portal that 33 00:02:14,933 --> 00:02:19,666 law enforcement uses to submit court orders to telecommunications and Internet service providers. 34 00:02:19,666 --> 00:02:24,100 And I want to keep that list up for the moment. On the first group, whose metadata was stolen, 35 00:02:24,100 --> 00:02:27,466 a senior administration official said today it was -- quote -- "a large number 36 00:02:27,466 --> 00:02:31,066 of Americans," but would not provide the number, but it had a -- quote -- "regional 37 00:02:31,066 --> 00:02:34,800 focus," suggesting it was designed to find members of the second group, 38 00:02:34,800 --> 00:02:39,800 whose calls were intercepted and included senior members of the Trump and Harris campaigns. 39 00:02:39,800 --> 00:02:41,933 A former intelligence official described to me, 40 00:02:41,933 --> 00:02:46,933 Geoff, that this is so hard because these are incredibly sophisticated state actors 41 00:02:49,133 --> 00:02:52,833 with limitless budget and limitless time. They are extraordinarily difficult to detect 42 00:02:52,833 --> 00:02:56,766 because they enter networks with stolen credentials, so as not to set off alarm 43 00:02:56,766 --> 00:03:01,033 bells. And if they detect any surveillance by the Americans, they simply stop moving. 44 00:03:01,033 --> 00:03:05,400 They can sit there and take as long as it takes, therefore avoiding detection. 45 00:03:05,400 --> 00:03:07,500 GEOFF BENNETT: And how has China responded to all of this? 46 00:03:07,500 --> 00:03:09,833 NICK SCHIFRIN: In a statement, Chinese Embassy spokesman Liu 47 00:03:09,833 --> 00:03:14,200 Pengyu told me that the U.S. claims were -- quote -- "disinformation." 48 00:03:14,200 --> 00:03:18,066 And he continued -- quote -- "China firmly opposes and combats all kinds 49 00:03:18,066 --> 00:03:22,266 of cyberattacks. The U.S. needs to stop its own cyberattacks against 50 00:03:22,266 --> 00:03:27,100 other countries and refrain from using cybersecurity to smear and slander China." 51 00:03:27,100 --> 00:03:31,500 The U.S., Geoff, is believed to conduct the same surveillance around the world, 52 00:03:31,500 --> 00:03:36,266 and I do use that term surveillance. U.S. officials use that term because this is 53 00:03:36,266 --> 00:03:40,600 not designed, as far as they can tell, to destroy any critical infrastructure. 54 00:03:40,600 --> 00:03:42,933 It is instead designed to conduct espionage, 55 00:03:42,933 --> 00:03:47,933 to collect information. No signs that any of this is being leaked online. As for solutions, 56 00:03:50,200 --> 00:03:53,600 Neuberger said today the only solution was to require companies to meet minimum cybersecurity 57 00:03:55,633 --> 00:04:00,500 guidelines. Right now, those guidelines are optional for these companies to meet. 58 00:04:00,500 --> 00:04:02,966 GEOFF BENNETT: All right, Nick Schifrin, thank you for this reporting. Appreciate it. 59 00:04:02,966 --> 00:04:03,533 NICK SCHIFRIN: Thank you. Thank you.