US Congress Authorizes $3B to Replace Chinese Telecom Gear

[Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)US Congress Authorizes $3B to Replace Chinese Telecom Gear==========================================================Federal ‘Rip-and-Replace’ Program Gets Funding Boost in Defense Bill [Chris Riotta](https://www.govinfosecurity.com/authors/chris-riotta-i-6140) ([@chrisriotta](https://www.twitter.com/@chrisriotta)) • December 26, 2024 [](https://www.bankinfosecurity.com/us-congress-authorizes-3b-to-replace-chinese-telecom-gear-a-27160#disqus_thread) * * * * * [Credit Eligible](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* [](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* Get Permission* ![US Congress Authorizes $3B to Replace Chinese Telecom Gear](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/us-congress-authorizes-3b-to-replace-chinese-telecom-gear-showcase_image-1-a-27160.jpg) Experts have long said the FCC rip and replace program faced a $3 billion shortfall in funding to fully eradicate the threat. (Image: Shutterstock)Telecom firms could receive a cash infusion from a federal ‘rip-and-replace’ program aimed at scrapping Chinese networking gear amid a cyberespionage campaign targeting President-elect Donald Trump and other top U.S. political leaders.**See Also:** [How to Take the Complexity Out of Cybersecurity](https://www.govinfosecurity.com/interviews/how-to-take-complexity-out-cybersecurity-i-5426?rf=RAM_SeeAlso)The Federal Communications Commission has struggled with a $3 billion funding gap for helping small and rural carriers replace Chinese-made equipment (see: [*FCC Faces $3B Shortfall in Huawei Rip-and-Replace Program*](/fcc-seeks-more-funds-to-rip-replace-chinese-telecom-gear-a-19583)). President Joe Biden on Monday signed an $895 billion bipartisan spending package authorizing the needed funds to counter mounting national security threats from Chinese hacking campaigns like Volt Typhoon and Salt Typhoon. Congress must still appropriate the money in a separate bill before the communications agency can grant it to telecoms.The bill signing comes as experts warn Chinese hackers tied to Beijing’s foreign intelligence service remain entrenched in U.S. communications infrastructure, infiltrating major telecom networks to steal call records and sensitive law enforcement data. Cybersecurity and Infrastructure Security Agency officials recently told reporters it’s unclear when the threat will be fully eradicated while urging government leaders to avoid SMS-based multi-factor authentication and to set telecom PINs for sensitive operations (see: [*US CISA Endorses Encrypted Apps Amid Chinese Telecom Hack*](/us-cisa-endorses-encrypted-apps-amid-chinese-telecom-hack-a-27097)).FCC Chairwoman Jessica Rosenworcel celebrated the passage of the defense bill [statement](https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/doc-408316a1.pdf) noting how the rip-and-replace program ‘addresses the critical need to remove vulnerable and insecure equipment from U.S. networks.’ She added that ‘full funding will not only help protect our nation’s communications infrastructure but also ensure that rural communities who rely on these networks maintain vital connectivity.’The FCC’s Secure and Trusted Communications Networks Reimbursement Program was initially launched in 2020 and received $1.9 billion a year later to help small carriers replace Chinese-made equipment from companies like Huawei and ZTE, both flagged as national security threats. But experts warn federal agencies must step up efforts against escalating Chinese cyberthreats while noting the tech industry’s heavy reliance on Chinese manufacturing and software (see: [*US Agencies Urged to Combat Growing Chinese Cyberthreat*](/us-agencies-urged-to-combat-growing-chinese-cyberthreat-a-26858)).The 2025 NDAA prioritizes technology, cybersecurity and artificial intelligence, with provisions to strengthen supply chain resilience and accelerate federal adoption of emerging technologies. Beyond funding the rip-and-replace program, the bill also allocates $143.8 billion for science and tech research and launches pilot programs to advance AI use across the Defense Department (see: [*US Defense Bill Includes Major Focus on Tech, AI and Cyber*](/us-defense-bill-includes-major-focus-on-tech-ai-cyber-a-27028)). ![Chris Riotta](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/chris-riotta-largeImage-2-a-6140.jpg) #### [Chris Riotta](https://www.govinfosecurity.com/authors/chris-riotta-i-6140)*Managing Editor, GovInfoSecurity* Riotta is a journalist based in Washington, D.C. He earned his master’s degree from the Columbia University Graduate School of Journalism, where he served as 2021 class president. His reporting has appeared in NBC News, Nextgov/FCW, Newsweek Magazine, The Independent and more.[](https://twitter.com/@chrisriotta) [](mailto:criotta@ismg.io) ![Webinar | Prisma Access Browser: Boosting Security for Browser-Based Work](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-prisma-access-browser-boosting-security-for-browser-based-work-landing_page_image-2-w-5973.jpg) ##### [Webinar -| Prisma Access Browser: Boosting Security for Browser-Based Work](https://www.govinfosecurity.com/webinars/webinar-prisma-access-browser-boosting-security-for-browser-based-work-w-5982?rf=RAM_Resources)![OnDemand | Compliance and Cyber Resilience: Empowering Teams to Meet Security Standards](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-from-risk-to-resilience-elevating-cyber-awareness-human-risk-management-landing_page_image-2-w-5936.jpg) ##### [OnDemand -| Compliance and Cyber Resilience: Empowering Teams to Meet Security Standards](https://www.govinfosecurity.com/webinars/ondemand-compliance-cyber-resilience-empowering-teams-to-meet-security-w-5980?rf=RAM_Resources)![How Active Directory Security Drives Operational Resilience](https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/how-active-directory-security-drives-operational-resilience-pdf-7-w-14488.jpg) [whitepaper](https://www.govinfosecurity.com/whitepapers/how-active-directory-security-drives-operational-resilience-w-14488?rf=RAM_Resources)##### [How Active Directory Security Drives Operational Resilience](https://www.govinfosecurity.com/whitepapers/how-active-directory-security-drives-operational-resilience-w-14488?rf=RAM_Resources)![OnDemand | When AI Becomes Doctor, Nurse, and Security Guard](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-protecting-people-defending-data-in-healthcare-rise-ai-landing_page_image-6-w-5839.jpg) ##### [OnDemand -| When AI Becomes Doctor, Nurse, and Security Guard](https://www.govinfosecurity.com/webinars/ondemand-when-ai-becomes-doctor-nurse-security-guard-w-5974?rf=RAM_Resources)![9 Tips to Block Third-party Cyber Attacks](https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/nine-tips-to-block-third-party-cyber-attacks-pdf-7-w-14428.jpg) [whitepaper](https://www.govinfosecurity.com/whitepapers/9-tips-to-block-third-party-cyber-attacks-w-14428?rf=RAM_Resources)##### [9 Tips to Block Third-party Cyber Attacks](https://www.govinfosecurity.com/whitepapers/9-tips-to-block-third-party-cyber-attacks-w-14428?rf=RAM_Resources)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/us-congress-authorizes-3b-to-replace-chinese-telecom-gear-showcase_image-1-a-27160.jpg) [Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)##### [US Congress Authorizes $3B to Replace Chinese Telecom Gear](https://www.govinfosecurity.com/us-congress-authorizes-3b-to-replace-chinese-telecom-gear-a-27160)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/year-in-review-australia-expands-cyber-regulation-image_large-10-a-27159.jpg) [Geo-Specific](https://www.govinfosecurity.com/geo-specific-c-518)##### [Year In Review: Australia Expands Cyber Regulation](https://www.govinfosecurity.com/year-in-review-australia-expands-cyber-regulation-a-27159)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cryptohack-roundup-fbi-fingers-tradertraitor-for-308m-hack-showcase_image-3-a-27158.jpg) [Blockchain -& Cryptocurrency](https://www.govinfosecurity.com/blockchain-cryptocurrency-c-483)##### [Cryptohack Roundup: FBI Fingers TraderTraitor for $308M Hack](https://www.govinfosecurity.com/cryptohack-roundup-fbi-fingers-tradertraitor-for-308m-hack-a-27158)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/breach-roundup-cyberattack-disrupts-japan-airlines-showcase_image-1-a-27157.jpg) [Cybercrime](https://www.govinfosecurity.com/cybercrime-c-416)##### [Breach Roundup: Cyberattack Disrupts Japan Airlines](https://www.govinfosecurity.com/breach-roundup-cyberattack-disrupts-japan-airlines-a-27157)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/salt-security-tackles-api-risks-ai-powered-innovations-showcase_image-7-a-27141.jpg) [AI-Driven Security Operations](https://www.govinfosecurity.com/ai-driven-security-operations-c-926)##### [Salt Security Tackles API Risks with AI-Powered Innovations](https://www.govinfosecurity.com/salt-security-tackles-api-risks-ai-powered-innovations-a-27141)[Overview](https://www.govinfosecurity.com/webinars/risk-management-framework-learn-from-nist-w-255) * Twitter* Facebook* LinkedIn* * * From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:* Understand the current cyber threats to all public and private sector organizations;* Develop a multi-tiered risk management approach built upon governance, processes and information systems;* Implement NIST’s risk management framework, from defining risks to selecting, implementing and monitoring information security controls.Presented By————![Ron Ross](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg) [Presented By](/authors/ron-ross-i-558)—————————————#### [Ron Ross](/authors/ron-ross-i-558)*Sr. Computer Scientist -& Information Security Researcher, National Institute of Standards and Technology (NIST)*

Related Tags:
DEV-0391

UNC3236

Voltzite

Vanguard Panda

NAICS: 921 – Executive

Legislative

Other General Government Support

NAICS: 334 – Computer And Electronic Product Manufacturing

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

NAICS: 33 – Manufacturing – Metal

Electronics And Other

Associated Indicators: