Preloader Image

Should you have any questions regarding this matter, please contact Carri Bennet at [email protected], Marjorie Spivak at [email protected], or Stephen Sharbaugh at [email protected].

The Cybersecurity and Infrastructure Security Agency (CISA) has agreed to make public a report from 2022 about US telecommunications networks’ flawed security practices which relate to the Salt Typhoon attacks experienced by numerous communications carriers and continues to be an ongoing concern. 

Bottom Line: Succumbing to Congressional pressure, CISA Director of Public Affairs, Marci McCarthy, has said the agency plans to release the report with proper clearance though no date has been given when it will be released.

US Senator Ron Wyden (D-OR), a senior member of the Senate Intelligence Committee, has pushed for the release of the report for months and placed President Trump’s CISA nominee Sean Plankey in limbo. Senator Wyden intends to keep his hold in place until CISA releases the report accusing CISA of actively hiding information regarding telecom network insecurity. In a passionate speech on the Senate Floor Senator Wyden made his case resulting in a unanimous vote of support from the Senate.

While CISA allowed Senator Wyden to read the report in 2023, the full document has yet to be disclosed to the public which the Senator asserts is crucial. Wyden states that the report includes shocking details about national security threats to the country’s phone system that require immediate action. In short, Wyden accuses CISA of a multi-year cover up of phone companies’ negligent cybersecurity enabling China’s Salt Typhoon cyberspies to hack into telecom companies’ networks for espionage. Senator Wyden alleges that had the report been made public when written in 2022, Congress would have had ample time to require mandatory cybersecurity standards for phone companies to prevent the Salt Typhoon hacks.

This past week, the Senate overwhelmingly passed legislation introduced by Senator Wyden to require CISA to release the report within 30 days of being signed into law. However, the bill still needs House approval and then must be signed by President Trump before it takes effect. As noted above, the report will likely be released prior to that happening.

Background

In December 2024, the White House’s Deputy National Security Adviser for Cyber and Emerging Technology confirmed that foreign actors, sponsored by the People’s Republic of China, infiltrated at least nine U.S. communications companies. The attacks, allegedly conducted by China’s state-sponsored Salt Typhoon hacking group, compromised sensitive systems, and exposed vulnerabilities in critical telecommunications infrastructure.

All communications service providers across the U.S. are at risk to this threat, especially those located near a U.S. military facility. To combat this threat, it is important for communications service providers to adopt and implement cybersecurity best practices in alignment with the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework 2.0 and/or the Cybersecurity and Infrastructure Security Agency’s (CISA) Cross-Sector Cybersecurity Performance Goals.

In response to the Salt Typhoon threat, in January of this year, the FCC adopted a Declaratory Ruling and a Notice of Proposed Rulemaking (NPRM) to affirm and increase the cybersecurity obligations of communications service providers. The Declaratory Ruling clarifies that Section 105 of the Communications Assistance for Law Enforcement Act (CALEA) creates legal obligation for telecommunications carriers to secure their networks against unlawful access and interception. Telecommunications carriers’ duties under section 105 of CALEA extend not only to the equipment in use in their networks, but also how they manage their networks. Carriers must work to prevent any unauthorized interception or access into their network (and maintain records thereof). At a minimum, this includes basic cybersecurity hygiene practices such as changing default passwords, adopting multifactor authentication and implement access controls.  Falling short of fulfilling this statutory obligation may include failing to patch known vulnerabilities or not employing best practices that are known to be necessary in response to identified exploits.

The NPRM, if adopted, would require providers to adopt and implement cybersecurity and supply chain risk management plans as well as certify compliance with these plans annually to the FCC. The proposed rules would apply to a wide array of providers including facilities-based providers, broadcast stations, television stations, cable systems, AM & FM commercial radio operators, TRS providers, satellite communications providers, and all international section 214 authorization holders.  Participants of the FCC’s Enhanced A-CAM Program and NTIA’s BEAD Program are already subject to this requirement.

Conclusion

As cyber incidents are increasing, and additional FCC regulation is inevitable, communications service providers should consider creating both a cybersecurity and supply chain risk management plan as well as a cybersecurity incident response plan.  Such plans should reflect industry best practices outlined in federal guidance documents as described above.  Carriers should also review their cybersecurity liability insurance policies to ensure sufficient coverage, and review and update vendor and partner contracts to ensure they include provisions for incident response, liability, and retention of information.

Womble Bond Dickinson has developed a cybersecurity retainer that captures the above requirements to help you protect your network and also includes assistance with the fallout of a cyber incident or breach, such as insurance recovery and class action litigation.  

Please contact us for additional information on the WBD Cybersecurity Retainer.