$ ~/archive/ play salt-typhoon
transcript_decrypted.log
0.0 Every phone call you make in America is
2.419 wire-tappable, not metaphorically, by federal law.
6.66 In 1994, the United States Congress passed a
11.14 statute called CALEA, the Communications Assistance for Law
15.82 Enforcement Act.
17.1 It required every telecommunications carrier in the country
20.879 to engineer a permanent surveillance interface into its
24.539 own infrastructure.
25.399 A door, mandated by Washington, into every conversation
29.96 routed through every American switch.
32.78 The door was built so the FBI could
35.32 listen when a judge signed a warrant.
37.899 In 2024, the United States government admitted that
42.039 someone else had been listening through it, for
44.52 at least two years, possibly longer.
47.52 The someone else was the Ministry of State
50.24 Security of the People's Republic of China.
54.16 This is the story.
55.399 This is the story of how the most
56.46 consequential intelligence breach in American history was not
59.979 a breach in the conventional sense.
61.859 The intruders did not bypass a security system.
65.06 They did not exploit a forgotten port.
67.42 They did not fish a careless administrator.
70.56 They walked through a door that the United
72.939 States government had legally required telecommunications companies to
76.959 maintain.
78.18 They walked through it for over two years.
81.2 They listened to whoever they wanted.
83.7 They took the list of everything.
85.4 They did everything they could to ensure that
85.48 every American, the FBI, was wiretapping.
88.26 And in late 2025, four years after the
91.76 initial intrusion, the experts who tracked this group
94.68 were no longer confident that they were gone.
97.379 This is Fragment Zero, Case File 43, Salt
101.42 Typhoon, and the door that Washington built.
104.579 To understand what was lost, you need to
107.599 understand what CALEA is, and why it exists.
111.719 In the early 1990s, the FBI faced a
115.019 problem.
115.379 American telecommunications were going digital.
118.56 The old analog phone networks, which the Bureau
121.68 had been wiretapping since the days of J.
123.879 Edgar Hoover, were being replaced by packet-switched
126.739 digital systems.
128.159 Cellular networks.
129.58 Internet protocols.
131.379 Encryption.
132.479 For the FBI, this represented an existential threat.
136.52 The Bureau's traditional wiretap capability depended on physical
140.319 access to copper lines, with digital switching intercepting
144.319 a single suspect's voice.
145.36 The Bureau's calls required cooperation from the carriers
147.759 themselves.
148.56 Cooperation that, in the early 90s, the carriers
151.78 were not legally required to provide.
154.159 The Bureau's solution was legislative.
157.479 In October 1994, after years of lobbying by
161.159 then, FBI Director Louis Frisch, Congress passed the
165.0 Communications Assistance for Law Enforcement Act.
167.659 CALEA was simple in its requirement, and revolutionary
170.879 in its implication.
172.139 Every telecommunications carrier operating in the United States
176.419 was required, by law, to design its switching
179.3 equipment in a way that allowed for real
181.419 -time interception of any subscriber's communications.
184.5 The carrier had to maintain a dedicated portal,
187.659 physically and logically separate from normal operations, through
191.68 which law enforcement could, upon presentation of a
194.639 court order, monitor any specified line.
197.439 The interception had to be invisible to the
199.9 subscriber.
200.599 It had to capture both calls.
202.139 Both call content and call metadata.
204.219 And the carrier was forbidden from disclosing the
206.879 existence of the interception.
208.439 The portal had a name and industry shorthand.
211.539 The LI system.
212.979 Lawful intercept.
214.68 By the year 2000, every major carrier in
218.319 the United States had built one.
220.36 AT&T.
221.419 Verizon.
222.52 Sprint.
223.219 T-Mobile.
224.479 CenturyTel.
225.379 The cable operators.
227.0 The regional bells.
228.439 Every switch in the country routed copy traffic.
231.219 When commanded, to an LI server.
233.759 The LI server, in turn, exposed an interface
237.06 to law enforcement.
238.4 This interface was, in essence, a back door.
243.139 Security researchers had warned about CALEA for decades.
246.78 The argument was straightforward and obvious.
249.979 A door that exists for one party can
252.259 be opened by another.
253.539 A wiretap interface designed for the FBI is,
257.18 structurally, a wiretap interface.
259.319 If a foreign intelligence service gains access to
262.54 it, they get the same capability the FBI
264.879 has, with one difference.
266.8 The FBI requires a court order.
269.36 A foreign intelligence service does not.
271.759 For 30 years, this warning was treated as
275.3 theoretical.
277.54 In May of 2024, the Federal Bureau of
281.22 Investigation began a quiet internal investigation.
285.62 The trigger has never been publicly disclosed in
288.92 full.
289.139 What is known is that signals analysts at
292.54 the Bureau, working with counterparts at the Cybersecurity
295.439 and Infrastructure Security Agency,
297.74 detected anomalous traffic patterns on the networks of
301.139 multiple American internet service providers.
303.839 The traffic was small.
305.759 It was encrypted.
307.019 It moved through tunnels constructed inside the carrier's
310.339 own backbone infrastructure.
312.019 And it appeared to be originating from inside
314.699 the carrier's lawful intercept systems.
316.819 The Bureau opened a counterintelligence inquiry.
321.12 The investigation was classified at the highest levels.
324.899 The carriers were notified individually.
327.68 They were instructed not to disclose the existence
330.48 of the inquiry to their customers, their shareholders,
333.24 or the press.
334.339 For three months, the United States government quietly
337.54 monitored a foreign intelligence operation that was monitoring
340.959 the United States government.
343.86 On August 27, 2024,
346.819 the silence broke.
348.839 The Washington Post published a story stating that
352.259 Chinese state-affiliated hackers had penetrated multiple major
356.06 American internet service providers
357.839 by exploiting a zero-day vulnerability in software
360.819 produced by a company called Versa Networks.
363.8 The story was thin on attribution and thinner
367.06 on consequence.
368.1 It read like a routine cybersecurity report.
371.399 It was not a routine cybersecurity report.
374.74 On September 25,
376.819 the Wall Street Journal published the story that
379.18 the Bureau had been trying to suppress.
381.62 The hackers were not random.
383.639 They were a group that Microsoft's threat intelligence
386.279 team had been tracking for years under a
388.62 codename.
389.339 The codename was Salt Typhoon.
391.579 And the companies they had penetrated included AT
394.54 &T, Verizon, and Lumen Technologies,
397.699 three of the four largest internet backbone operators
400.939 in the United States.
402.72 Ten days later, on October 5,
405.22 the Journal followed with a detail that no
407.98 one in the intelligence community wanted to see
410.54 in print.
411.5 Salt Typhoon had specifically targeted the Kilia interfaces.
417.889 The technical mechanism by which Salt Typhoon achieved
420.759 this is not exotic.
422.6 It is mundane in a way that makes
424.579 it more disturbing.
426.009 The group's primary entry point into American telecommunications
429.98 networks
430.339 was a vulnerability in Cisco's IOS XE operating
434.5 system,
435.18 the firmware that runs on the majority of
437.66 enterprise and carrier-grade routers in the United
440.379 States.
441.079 The vulnerability was cataloged as CVE-2023-2198.
446.86 The Common Vulnerability Scoring System rated its severity
450.379 at 10.0,
451.8 the maximum possible score.
453.759 The maximum possible score.
456.259 CVE-2023-2198 allowed an obvious
460.319 and unauthenticated remote attacker to create an administrative
463.22 account
463.98 on any vulnerable Cisco device exposed to the
467.019 internet.
467.56 No exploit chain, no credentials required.
470.8 The attacker simply sent a specially crafted web
473.72 request
474.079 to the device's management interface,
476.36 and the device responded by creating a new
478.699 account with full administrative privileges.
481.939 Cisco disclosed the vulnerability in October of 2023.
485.96 By the time the disclosure occurred,
487.759 over 10,000 Cisco devices on the public
491.1 internet were already compromised.
493.74 Salt Typhoon was among the operators using the
496.959 exploit.
497.62 The group complemented it with several other Cisco
500.639 vulnerabilities,
501.74 CVE-20,
503.759 1801-71 in the Smart Install service,
507.06 CVE-20-23-22,
509.56 2273 in IOS XE management,
512.759 and CVE-2024-20-0399 in NXOS.
517.759 To maintain access even as individual flaws were
520.679 patched,
521.559 what they did with that access was the
524.159 part that mattered.
525.74 Once inside a router,
527.559 Salt Typhoon operators used a Cisco feature called
530.919 Guest Shell
531.779 to execute Linux containers on the device.
534.6 The containers gave them a complete Unix environment
537.82 running inside the router itself,
540.019 invisible to standard monitoring tools.
542.46 From the Guest Shell,
544.159 they established generic routing encapsulation tunnels,
547.139 GRE tunnels,
548.659 back to infrastructure they controlled.
550.6 The tunnels appeared to network administrators
552.82 as normal carrier-to-carrier traffic.
555.46 Inside the tunnels,
556.74 they exfiltrated everything.
558.419 To move laterally across the carrier networks,
561.779 Salt Typhoon used the simple network management protocol,
565.44 NANagement,
566.48 the same protocol that network engineers use
569.22 to monitor their own equipment.
571.32 SNMP credentials,
572.98 harvested from the initial compromised routers,
575.58 gave them access to things like
577.139 thousands of additional devices.
579.12 When investigators eventually analyzed the recovered tooling,
583.2 they identified malware that Kaspersky Lab
586.22 had been tracking under the name Demodex.
589.72 Demodex is a Windows kernel-mode rootkit.
592.82 It operates below the level
594.6 at which standard endpoint security software can detect
597.62 it.
598.019 It modifies kernel data structures
600.34 to hide processes, files, and network connections.
603.98 Once installed on an administrator workstation,
607.139 it gives the operator complete
608.6 and undetectable control of the system.
611.889 The group also developed custom tooling
614.5 specifically for the Lawful Intercept environment.
617.96 The exact capabilities of this tooling remain classified.
622.139 What is publicly known is that,
624.24 by the time of discovery,
625.899 Salt Typhoon had achieved persistent
627.98 and unmonitored access to the systems
630.58 through which American telecommunications carriers
633.36 fulfilled FBI wiretap orders.
637.86 What did they take?
639.779 The most consequential single piece of information
642.7 that Salt Typhoon extracted from the LI systems
645.2 was the target list itself.
647.6 When a federal judge in the United States
650.159 authorizes a wiretap on an American resident,
653.46 the order is transmitted to the relevant
655.7 telecommunications carrier.
657.36 The carrier configures its LI system
659.879 to copy that subscriber's traffic
661.7 to a designated FBI server.
664.22 The carrier keeps a record of every active
666.86 interception, which numbers are under surveillance,
669.759 when each order began, when each order expires.
673.659 This record exists for accounting purposes.
676.419 It allows the carrier to bill the Bureau
678.679 for the interception.
680.0 It allows compliance auditors to verify
682.519 that interceptions are tied to valid court orders.
685.6 It allows the Bureau to track which of
688.0 its own operations
688.879 are running through which carrier.
691.039 It also exists in one consolidated place per
694.679 carrier.
695.08 And it is, in aggregate, a complete list
698.659 of every American citizen, foreign agent,
701.539 or foreign visitor currently under federal surveillance.
705.139 According to multiple sources in the intelligence community,
709.179 Salt Typhoon obtained this list across
711.279 all nine carriers it compromised.
713.86 Read that sentence again.
716.419 A foreign intelligence service obtained
718.519 the complete list of every individual being wiretapped
722.279 by United States law enforcement,
724.139 including counterintelligence targets.
726.799 Which is to say, every Chinese intelligence asset
730.299 that the FBI had identified inside the United
733.139 States
733.659 and was actively monitoring.
735.98 Salt Typhoon now had the names of those
738.62 assets.
739.539 Every undercover human source the Bureau was running.
743.019 Every penetration target.
744.96 Every foreign agent who had been turned
747.299 and was operating under American direction.
749.919 The list of who the Bureau knew was
751.919 a spy.
752.299 In a single intrusion,
754.7 the People's Republic of China
756.58 gained the entire counterintelligence picture
759.34 of its principal adversary.
762.059 Beyond the target list,
763.58 Salt Typhoon obtained operational data
765.919 on at least 40 high-profile individuals.
768.98 Among them, members of the staff
771.24 of the Kamala Harris 2024 presidential campaign.
774.659 Then former President Donald Trump.
777.179 His running mate, J.D.
778.84 Vance.
779.36 According to Deputy National Security Advisor
781.98 Ann Neuberger, speaking publicly in December 2024,
785.799 a large number of additional individuals
788.08 Neuberger described them as
790.0 government targets of interest,
791.72 also had communications data accessed.
794.72 For most of these individuals,
796.94 the access included call detail records.
799.879 The metadata of every phone call they had
802.659 made
803.019 or received over a period of months.
805.74 Who they spoke to.
807.34 When.
808.12 For how long.
809.44 From what location.
810.72 For fewer than 100 individuals,
813.7 the access extended to the actual content
816.5 of calls and text messages.
818.759 Over 1 million subscribers had metadata
821.679 extracted from their carrier records.
823.799 The majority were located
825.44 in the Washington, D.C.
826.919 metropolitan area.
829.84 When the United States government
831.779 first identified Salt Typhoon's penetration
834.34 of American telecommunications,
836.58 the public estimate was that
838.44 nine carriers had been compromised.
840.72 The nine were
842.48 AT&T,
843.58 Verizon,
844.639 T-Mobile,
845.72 Charter Communications,
847.159 operating under the brand Spectrum,
849.259 Lumen Technologies,
851.019 Consolidated Communications,
852.779 Windstream Holdings.
854.22 A Canadian telecommunications operator,
856.779 never publicly named,
858.24 breached separately in February 2025,
860.94 and in June 2025,
863.179 the satellite communications operator Viasat.
866.22 The estimate has expanded.
868.72 In August 2025,
870.159 the Federal Bureau of Investigation
872.779 issued a statement updating its assessment
875.379 of Salt Typhoon's footprint.
877.159 By that date,
878.44 the Bureau stated that the group had compromised
880.62 at least 200 organizations across 80 countries.
884.539 Telecommunications companies remained
886.179 the principal target type.
887.74 But the list now included
889.179 managed service providers,
890.94 cloud infrastructure operators,
892.6 lodging and hospitality networks,
894.539 government agencies,
895.74 and, in at least one publicly disclosed instance,
898.82 a United States Army
900.1 National Guard component.
901.639 In November 2025,
904.379 the Australian Signals Directorate
906.48 issued a public warning that Salt Typhoon
909.08 had been probing critical infrastructure networks
911.44 within Australia.
912.72 In December 2025,
914.919 intrusions linked to the group
916.62 were detected within networks operated by committees
919.7 of the United States House of Representatives.
922.32 These detections occurred a full year
924.84 after Verizon and AT&T had publicly stated,
927.96 in December 2024,
929.299 that the threat actor had been removed
931.62 from their networks.
932.82 The statements may have been accurate
935.179 as to the specific access vectors Salt Typhoon
938.379 had been using at the moment of containment.
941.059 They were not accurate as to the broader
943.379 operation.
944.44 The group had simply pivoted.
948.48 The official American response to Salt Typhoon
951.84 has progressed in three phases.
954.059 The first phase,
955.58 immediate and largely invisible to the public,
958.399 consisted of forensic remediation
960.5 across the nine identified carriers.
963.019 This work was performed primarily
965.139 by the security firm Mandiant
967.179 under contract to the affected operators.
969.659 The remediation involved
971.2 firmware rebuilds,
972.72 configuration audits,
973.94 credential rotation across millions
975.879 of network devices,
977.22 and the construction of new monitoring infrastructure
979.639 capable of detecting GRE tunnel anomalies
982.62 and unauthorized guest shell execution.
986.159 The second phase consisted of sanctions
988.399 and indictments.
989.639 In January 2025,
992.019 the United States Department of the Treasury
994.159 sanctioned three Chinese technology firms
996.919 identified as material contributors
999.2 to Salt Typhoon's operations,
1001.82 Sichuan Juxinhe Network Technology Company Limited,
1005.299 Beijing Huanyu Tiancheng Information Technology Company Limited,
1009.559 and Sichuan Juxinruijie Network Technology Company Limited.
1014.0 The Treasury designation alleged
1016.059 that these firms operated
1017.779 as commercial contractors
1019.179 to the Ministry of State Security
1020.82 and provided the technical infrastructure used
1023.519 in the carrier compromises.
1025.44 The third phase has been congressional.
1028.42 Senator Maria Cantwell,
1030.259 ranking member of the Senate Commerce Committee,
1032.68 has sent multiple letters demanding
1034.559 detailed remediation reports from the carriers.
1037.48 As of February 2026,
1039.859 she stated publicly that the carriers
1041.9 had hired Mandiant to conduct security assessments,
1045.019 but that Mandiant had not yet provided
1047.4 the requested reports to her office.
1049.579 In parallel,
1051.019 the Federal Communications Commission,
1053.059 under new leadership appointed in 2025,
1056.18 rescinded a set of cybersecurity rules
1058.4 that had been drafted in the final months
1060.539 of the previous administration
1061.7 in direct response to Salt Typhoon.
1064.48 The rescinded rules would have required
1066.559 telecommunications carriers
1067.98 to implement specific minimum security controls,
1071.119 including mandatory encryption of CALEA interfaces
1073.94 and mandatory logging of access
1076.2 to lawful intercept systems.
1078.299 The Commission's stated rationale for rescission
1080.98 was that the rules represented regulatory overreach.
1084.339 The result, as of early 2026,
1087.539 is that the regulatory environment
1089.259 under which Salt Typhoon initially operated
1091.94 remains substantially unchanged.
1094.38 The vulnerabilities that the group exploited
1096.799 have been patched at the individual device level.
1099.579 The structural conditions
1100.96 that made the exploitation possible
1102.819 government-mandated wiretap interfaces,
1106.2 voluntary security standards,
1108.019 fragmented oversight,
1109.48 remain in place,
1110.959 remain in place.
1112.9 Ann Neuberger,
1113.92 in her final public remarks
1115.259 before leaving government in January 2025,
1118.5 characterized Salt Typhoon as
1120.779 one of the most consequential cyber espionage campaigns
1124.16 ever directed against the United States.
1126.98 A former National Security Agency analyst
1129.779 named Terry Dunlap,
1131.42 speaking to reporters in 2025,
1133.74 described the campaign as a component
1136.2 of what he called China's 100-year strategy.
1139.46 The phrase has been used
1140.94 by Chinese state strategic doctrine documents
1143.339 to describe long-term great power competition
1146.099 extending across multiple generations.
1148.819 The Chinese embassy in New Zealand
1150.98 asked about Salt Typhoon by reporters in November
1154.019 2025,
1155.279 described the allegations as
1157.259 unfounded and irresponsible smears.
1161.46 There is a lesson here
1163.38 that the technical reports
1164.779 and congressional hearings
1166.42 do not state directly.
1168.92 A backdoor mandated by a government
1171.46 is not a backdoor for that government alone.
1174.14 It is a backdoor.
1176.66 Cryptographers and security engineers
1178.7 have been making this argument since the 1990s.
1181.779 The argument was applied to
1183.599 Kalia when Kalia was being drafted.
1185.7 It was applied to the Clipper chip
1187.559 when the Clinton administration proposed
1189.5 key escrow for encrypted communications.
1192.46 It was applied to the going dark debate
1194.779 when the FBI demanded weakened encryption in the
1197.48 2010s.
1198.319 In each instance,
1199.7 the argument was dismissed by lawmakers
1201.779 as alarmist, hypothetical,
1203.779 and contrary to the practical needs of law
1206.18 enforcement.
1207.259 Salt Typhoon is the empirical refutation.
1210.4 The same architectural choice
1212.48 that allowed an FBI agent in Newark
1215.0 to listen to a drug trafficker's phone call
1217.44 allowed an MSS officer in Beijing
1220.119 to listen to a presidential candidate's phone call.
1223.2 The same compliance decision
1224.779 that allowed a carrier to bill the federal
1227.24 government
1227.72 for its surveillance work
1228.94 allowed a foreign intelligence service
1230.98 to extract the complete operational picture
1233.539 of American counterintelligence.
1235.539 The same interface that enabled lawful interception
1238.74 enabled unlawful interception.
1241.119 They are not two interfaces.
1243.099 They are one interface,
1244.66 used by whoever holds the credentials.
1246.819 The Chinese intelligence service
1248.819 held the credentials for at least two years.
1251.94 It may still hold them.
1253.66 In intelligence work,
1255.48 there is a concept called burned access,
1258.2 a compromised position from which an adversary,
1261.14 even after being identified,
1263.039 retains the ability to operate
1264.94 because the cost of fully eliminating their access
1267.859 exceeds the cost of tolerating it.
1270.579 Removing Salt Typhoon completely
1272.42 from American telecommunications infrastructure
1274.579 would require the rebuilding,
1276.799 from scratch,
1277.68 of the wiretap apparatus
1279.44 that 30 years of federal law has constructed
1281.92 across the entire United States.
1283.66 Every router,
1286.72 every switch,
1287.839 every lawful intercept appliance.
1290.279 It would require the carriers,
1292.539 voluntarily or under regulatory compulsion,
1295.559 to commit billions of dollars
1297.4 and several years of operational disruption
1299.819 to the project.
1300.98 It would require the Federal Bureau of Investigation
1304.039 to operate during the transition
1306.0 with substantially degraded interception capability.
1309.68 The political will to do this
1312.18 does not exist.
1313.599 It would require the Federal Bureau of Investigation
1313.64 to understand this.
1314.5 The Salt Typhoon operators understand this.
1317.14 The Ministry of State Security understands this.
1320.2 The Federal Bureau of Investigation understands this.
1323.519 The carriers understand this.
1326.0 The American public,
1327.68 who continues to make phone calls
1329.4 on the same networks every day,
1331.319 has not been told.
1334.24 The story of Salt Typhoon does not have
1336.759 a resolution.
1337.619 The group is still operating.
1339.4 The interfaces it exploited are still in place.
1342.019 The legal architecture that mandated those interfaces
1345.279 has not been revised.
1347.019 The most recent public indication
1349.339 of Salt Typhoon's continued activity
1351.579 came in December 2025,
1354.059 when intrusions associated with the group
1356.539 were detected within networks
1358.14 operated by committees of the
1360.2 United States House of Representatives.
1362.2 The committees in question
1363.72 have not been publicly identified.
1365.92 The duration of the access prior to detection
1368.779 has not been publicly disclosed.
1371.0 What we know is this.
1373.079 In 1994,
1374.64 the United States government passed a law
1376.5 requiring every American telecommunications carrier
1379.539 to construct a permanent surveillance capability
1381.759 into its own network.
1383.579 The capability was justified
1385.4 as a tool of domestic law enforcement.
1387.98 It was built.
1389.18 It was maintained.
1390.559 For three decades,
1392.079 it operated as intended.
1394.48 In or around 2022,
1396.519 an adversary of the United States
1398.539 obtained access to that capability.
1401.0 The adversary used it to monitor
1403.119 American government officials,
1404.88 political candidates,
1406.299 intelligence sources,
1407.46 and ordinary citizens
1408.72 for at least two years before being detected.
1411.579 The detection did not result in the adversary's
1414.559 removal.
1415.14 It resulted in the adversarial's identification.
1418.2 The adversary remains active.
1420.839 The capability remains in place.
1423.519 This is Fragment Zero, Case File 43, Salt
1427.68 Typhoon.
1428.74 Subscribe.
1429.5 Turn on notifications.
1432.18 Because the next time someone tells you
1434.4 that a backdoor for law enforcement
1436.079 is only a backdoor for law enforcement,
1438.7 you will know what that promise is worth.
1441.279 We will be watching.
1442.819 We will be listening.
1444.66 We are not the only ones.

China Was Listening To Trumps Phone Calls For Two Years. Then They Took The FBIs Target List.

RELATED INVESTIGATIONS
RELATED INVESTIGATIONS