Topics

Latest

AI

Amazon

Article image

Image Credits:Celal Gunes/Anadolu / Getty Images

Apps

Biotech & Health

Climate

Cloud Computing

Commerce

Crypto

Enterprise

EVs

Fintech

Fundraising

Gadgets

Gaming

Google

Government & Policy

Hardware

Instagram

layoff

Media & Entertainment

Meta

Microsoft

privateness

Robotics

Security

Social

Space

inauguration

TikTok

Transportation

speculation

More from TechCrunch

event

Startup Battlefield

StrictlyVC

newssheet

Podcasts

Videos

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

Two U.S. senators are accusing the Department of Defense ( DOD ) of not doing enough to protect the communications of its military personnel , as the U.S. government contends with an ongoing Chinese hacking campaign target American phone and internet giants . The senators say the Department of Defense still relies too heavily on old - fashioned landline calls , and unencrypted cellular Call and text , which are vulnerable to spy by alien spies .

Democratic senator Ron Wyden from Oregon and Republican senator Eric Schmitt from Missouri specifically manoeuver to threat , such as the Taiwanese governing espionage mathematical group known as Salt Typhoon , which was recentlyaccused of breaking into major U.S. telecommunications provider , include AT&T and Verizon , to spot on Americans .

“ The widespread adoption of insecure , proprietary tools is the direct result of DOD leadership failing to require the exercise of default end - to - end encryption , a cybersecurity better pattern , as well as a loser to prioritize communication certificate when measure different communications platforms , ” the senatorswrote in a two-way letterto the Department of Defense ’s authorities watchdog . “ DOD ’s failure to secure its unclassified voice , video recording , and textbook communication with end - to - end encoding technology has left it needlessly vulnerable to foreign espionage . ”

The senator also cite SS7 , a decades - older communications protocol that sound toter around the world still used to route song and texts — and is routinely exploit for espionage — and its successor communications protocol , Diameter , as weakness that DOD employees are still vulnerable to , give that global telephone service have yet to embrace new method to protect even calls and texts in passage .

Wyden and Schmitt are postulate the DOD to reconsider its contracts with the U.S. telephone service , and instead “ renegotiate with the undertake wireless carrier , to require them to adopt meaningful cyber defenses against surveillance threats , and if requested , to share their third - company cybersecurity audit with DOD . ”

The senator ’ letter include two whitepapers — one from earlier in July and another from October — that the DOD sent to Wyden ’s office , react to a serial of questions related to the department ’s cybersecurity posture .

answer a head about SS7 , the DOD ’s main information officer concedes that DOD consort SS7 and Diameter are not secure , writing that “ there are limited protections ” against weakness   that the carrier themselves have . “ Therefore DOD managed mobile solutions encrypt data in passage to protect against inactive collection . ”

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

At the same time , the CIO wrote that the DOD has not conducted its own audit , instead swear on telecom providers own and third - party commissioned audits . The DOD , however , has not brush up those audit because the carriers regard them protect as attorney - client privileged information .

The CIO also admitted that the DOD has n’t disabled roaming or reject SS7 and Diameter traffic , even for DOD users in Russia , China , and other high - risk commonwealth that are have it off for deal cyberattacks on sound .

Jeffrey Castro , a spokesperson for the DOD ’s inspector general , told TechCrunch that the guard dog has received the alphabetic character and is review it .