Transcript
Justin Finelli (0:00)
I was at Davos last year in a cyber forum and one of the speakers was talking about Salt Typhoon. It was closed door, room of 60 cyber folks. And she said, wait, how many people know about this? It was 5 out of 60.
John Doyle (0:12)
What we learned was that China has infiltrated major telecommunications carriers in the US for all intents and purposes, fully. They can listen to the phone calls, the lawful intercept plugin points, they have control of those, and they can just turn along at any time and listen. I mean, what do you do on your phone? You know, how much of your life runs on your phone? Basically all of it. And what we continue to learn is that that's true for everybod, everybody in the United States. Rather than trying to ferret through the existing carriers on Guam and find all the China and try to get rid of it, let's just do a clean install of a telco on top of the existing physical infrastructure.
David Ulovich (0:44)
Just assume it's hostile.
John Doyle (0:45)
This was literally three months before the Salt Typhoon news broke and we learned that China had compromised the X1 interface of all these major telcos.
Justin Finelli (0:53)
The more folks who are kind of bringing connecting the dots, speaking the same language, I think the better off we all are from a national security and economic prosperity perspective.
Podcast Host/Narrator (1:03)
In late 2024, the United States confirmed that Chinese hackers had infiltrated every major American cellular carrier. The operation Salt Typhoon gave China access to lawful intercept systems, live phone calls and the communications of senior government officials. It was not a one time breach. It was the product of an industry wide failure in cybersecurity. Years before the story broke, a former Green Beret and Palantir executive had started building a new kind of cell network. One designed to operate securely on top of compromised physical infrastructure. The Navy was an early partner testing the technology on Guam before anyone outside the intelligence community fully grasped the scale of the threat. David Ulovich speaks with Justin Finelli, CTO of the Navy and John Doyle, Founder and CEO at cape.
David Ulovich (1:57)
Thank you guys for being here. We are very lucky to have Justin Pinelli, the CTO of the Navy, on his Tekken tour back with the Navy and in this role. And we have John Doyle, the founder and CEO of Cape, with us and we're going to have a terrific discussion about building for the country, building for the Navy, partnering with the Navy and all the technology transformation work that is going on at the Navy. So thanks guys for being with us today.
