TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Chinese hackers breached US court wiretap systems, WSJ reports

24 pointsby pash7 months ago

4 comments

bananapub7 months ago
Building and having exist these mass targeted surveillance creates a risk that is pretty hard to mitigate - they’re meant to be secret even to most of the people operating the comms networks. It’s also creates a blame arbitrage risk - at least in the US, the reputation of all telcos is so in the garbage that they don’t have a huge incentive to keep things tight when doing things the government forces them to do.<p>Another related case was in the mid 2000s where someone did the same thing to Vodafone’s mobile network: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Greek_wiretapping_case_2004%E2%80%9305" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Greek_wiretapping_case_2004%E2...</a><p>Circumstantial evidence suggests it was the US in that case.
stufffer7 months ago
If a local police department wants phone records they have to go through the company&#x27;s legal compliance department.<p>The disturbing revelation here is that it sounds like the federal government has direct backdoor access to all these records without having to show any warrants.<p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Room_641A" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Room_641A</a>
评论 #41767520 未加载
评论 #41774747 未加载
hujun7 months ago
all network devices that terminates a subscriber (broadband or mobile) has a feature called LI: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Lawful_interception" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Lawful_interception</a>, which is required by law in almost all countries one requirement is that operation of LI feature is totally separate from normal network operator, so that even normal network admin are not supposed to know what kind of LI operation is ongoing...
ungreased06757 months ago
If true, this is a catastrophic cybersecurity failure. I’m feeling more like a Luddite every week. Systems like that maybe shouldn’t exist.
评论 #41757733 未加载