Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches

The annual defense spending bill contains money the FCC has sought to use to reimburse telecommunications carriers for removing Chinese equipment.

The post Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches appeared first on CyberScoop.

Continue reading Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches

Wyden legislation would mandate FCC cybersecurity rules for telecoms

It would go beyond the FCC’s own proposal to regulate telecommunications carriers under federal wiretapping law.

The post Wyden legislation would mandate FCC cybersecurity rules for telecoms appeared first on CyberScoop.

Continue reading Wyden legislation would mandate FCC cybersecurity rules for telecoms

FCC, for first time, proposes cybersecurity rules tied to wiretapping law

The proposed rules are a response to Salt Typhoon’s breach of at least eight U.S. telecom companies.

The post FCC, for first time, proposes cybersecurity rules tied to wiretapping law appeared first on CyberScoop.

Continue reading FCC, for first time, proposes cybersecurity rules tied to wiretapping law

China Possibly Hacking US “Lawful Access” Backdoor

The Wall Street Journal is reporting that Chinese hackers (Salt Typhoon) penetrated the networks of US broadband providers, and might have accessed the backdoors that the federal government uses to execute court-authorized wiretap requests. Those backdoors have been mandated by law—CALEA—since 1994.

It’s a weird story. The first line of the article is: “A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers.” This implies that the attack wasn’t against the broadband providers directly, but against one of the intermediary companies that sit between the government CALEA requests and the broadband providers…

Continue reading China Possibly Hacking US “Lawful Access” Backdoor