#### [CSO](/security/cso/)**8** FCC to telcos: By law you must secure your networks from foreign spies. Get on it=================================================================================**8** Plus: Uncle Sam is cross with this one Chinese biz over Salt Typhoon mega-snooping———————————————————————————-[Jessica Lyons](/Author/Jessica-Lyons ‘Read more by this author’) Fri 17 Jan 2025 // 22:07 UTC [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it) [](https://twitter.com/intent/tweet?text=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it&url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it&summary=Plus%3a%20Uncle%20Sam%20is%20cross%20with%20this%20one%20Chinese%20biz%20over%20Salt%20Typhoon%20mega-snooping) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) Decades-old legislation requiring American telcos to lock down their systems to prevent foreign snoops from intercepting communications isn’t mere decoration on the pages of law books — it actually means carriers need to secure their networks, the FCC has huffed.On Thursday, the US regulator issued a formal ruling that states telecommunications carriers have a statutory obligation under section 105 of the nation’s Communications Assistance for Law Enforcement Act (CALEA) to secure their systems against unlawful access or interception of communications. Note that leaves the door open for the Feds to gain court-sanctioned access to people’s communications, typically for investigating crimes. Criminals and foreign adversaries, on the other hand at least, must be kept out. This clarification is effective immediately.This is part of Uncle Sam’s larger efforts to fend off [Chinese agents](https://www.theregister.com/2024/12/31/china_cyber_intrusions_2024/) breaking into America’s computer networks to gather intelligence. Beijing’s [Salt Typhoon](https://www.theregister.com/2024/12/09/white_house_salt_typhoon/) spies just recently compromised telcos including AT-&T and Verizon — giving the intruders the capability to geo-locate millions of subscribers, monitor their internet traffic, and record their phone calls — and before that, [federal networks](https://www.theregister.com/2025/01/15/salt_typhoon_us_govt_networks/). ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/cso&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z4t76kZ5YbOpfcgDwtU4NwAAAYY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0)Ironically enough, the snoops hijacked surveillance systems deployed by telcos under CALEA to allow the Feds to wiretap suspects and gather details about their online and digital activities; China turned our own spying apparatus on ourselves. ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/cso&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z4t76kZ5YbOpfcgDwtU4NwAAAYY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0)To give you an idea of the level of clusterfsck America is facing: FBI reckons Salt Typhoon stole months of their agents’ calls and text logs, according to Bloomberg, which [cited](https://www.bloomberg.com/news/articles/2025-01-16/fbi-has-warned-agents-it-believes-hackers-stole-their-call-logs?srnd=phx-technology-cybersecurity) a document that stated the crew compromised all FBI devices that were using AT-&T’s service for public safety agencies.The federal bureau declined to comment directly on the report, and instead told us: ‘The FBI continually adapts our operational and security practices as physical and digital threats evolve. The FBI has a solemn responsibility to protect the identity and safety of any individual who contacts the FBI and provides information every day that keeps the American people safe, often at risk to themselves.’ ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/cso&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z4t76kZ5YbOpfcgDwtU4NwAAAYY&t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0)We asked AT-&T if the report was correct, and the telco more or less confirmed it, signaling Salt Typhoon hit operations like the FBI after breaking into the telco’s network.’After criminals stole customer data last year, we worked closely with law enforcement to mitigate impact to government operations. We appreciate the thorough investigation, which resulted in multiple arrests and federal criminal indictments,’ a spokesperson told *The Register*. ‘Given the increasing threat from cybercriminals and nation-state actors, we continue to increase investments in security as well as monitor and remediate our networks.’ On Friday, the US Treasury Department imposed [sanctions](https://home.treasury.gov/news/press-releases/jy2792) on Yin Kecheng, who lives in Shanghai and was accused of being involved in the recent [Treasury network compromise](https://www.theregister.com/2025/01/10/china_treasury_foreign_investment/). The Feds also sanctioned Sichuan Juxinhe Network Technology, a Sichuan-based cybersecurity company alleged to have direct involvement in the Salt Typhoon intrusions.As more and more details emerge of Beijing smashing through the security of global networks, obviously in [competition with the NSA](https://www.theregister.com/2013/10/04/nsa_spying_statement/), calls to update CALEA, or simply enforce it, have increased.When [CALEA](https://www.fcc.gov/calea) was adopted in 1994, it required, as we quipped above, telecom providers to design their systems to comply with wiretapping requests from law enforcement. In 2006, the FCC expanded this mandate to cover broadband internet providers.The law also required all of these covered providers to secure their networks — but that point hasn’t been enforced.In addition to the formal ruling this week, the FCC issued a proposal requiring communications service providers to develop and implement comprehensive cybersecurity and supply chain risk management plans. These providers would also be required to submit an annual certification to the FCC confirming that these plans have been created, updated, and implemented.The proposed risk management plans must identify potential cyber threats, detail the controls in place or planned to mitigate these risks, and explain how these controls are effectively applied to their operations.’We believe that the mere act of creating, updating, and implementing cybersecurity and supply chain risk management plans would not be sufficient on its own, but rather that the cybersecurity and supply chain risk management plans must also be reasonable to avoid an independent breach of the proposed rules,’ the FCC wrote -[[PDF](https://docs.fcc.gov/public/attachments/FCC-25-9A1.pdf)-].’In response to Salt Typhoon, there has been a government-wide effort to understand the nature and extent of this breach, what needs to happen to rid this exposure in our networks, and the steps required to ensure it never happens again,’ FCC Chair Jessica Rosenworcel added in a statement.* [FCC boss urges speedy spectrum auction to fund ‘Rip’n’Replace’ of Chinese kit](https://www.theregister.com/2025/01/08/fcc_chief_urges_spectrum_auction/)* [China’s Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says](https://www.theregister.com/2025/01/15/salt_typhoon_us_govt_networks/)* [Blocking Chinese spies from intercepting calls? There ought to be a law](https://www.theregister.com/2024/12/11/telecom_cybersecurity_standards/)* [Encryption backdoor debate ‘done and dusted,’ former White House tech advisor says](https://www.theregister.com/2025/01/04/encryption_backdoor_debate/)Rosenworcel first [floated this plan](https://www.theregister.com/2024/12/06/salt_typhoon_fcc_proposal/) in December in response to the Chinese government spies breaking into telcos’ networks, accessing large volumes of customer metadata, and stealing a smaller number of people’s phone calls and text messages.The Salt Typhoon raids on American telecoms have raised concerns about the effectiveness of CALEA — particularly since carriers’ responsibilities to secure their networks under the law have not been consistently enforced. The security breaches have also reignited calls from lawmakers and privacy advocates to [reform](https://www.theregister.com/2024/12/11/telecom_cybersecurity_standards/) the decades-old law and eliminate provisions requiring the aforementioned government-mandated [wiretapping backdoors](https://www.theregister.com/2025/01/04/encryption_backdoor_debate/) in communications systems. Backdoors that adversaries are clearly happy to use against us.The Feds have historically argued law enforcement needs this wiretapping for crime-fighting and terrorism-preventing purposes.To be clear, the FCC proposal doesn’t touch the wiretap surveillance portion of the law. Instead, it focuses on strengthening protections for communications systems against modern cyber-threats.’Our existing rules are not modern,’ Rosenworcel said in a statement -[[PDF](https://docs.fcc.gov/public/attachments/DOC-408945A1.pdf)-]. ‘It is time we update them to reflect current threats so that we have a fighting chance to ensure that state-sponsored cyberattacks do not succeed.’The FCC ruling comes as CISA boss Jen Easterly this week revealed that Salt Typhoon was first detected on federal networks, before the spies burrowed into [AT-&T, Verizon](https://www.theregister.com/2024/12/30/att_verizon_confirm_salt_typhoon_breach/), and [other providers](https://www.theregister.com/2025/01/06/charter_consolidated_windstream_salt_typhoon/).’The FCC’s actions today are an important step in securing the nation’s telecommunications infrastructure against the very real threat posed by the PRC and other threat actors,’ Easterly said in a statement. ® [Whitepaper: Top 5 Tips For Navigating Your SASE Journey](https://go.theregister.com/tl/2386/-14369/top-5-tips-for-navigating-your-sase-journey?td=wptl2386bt) Share [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it) [](https://twitter.com/intent/tweet?text=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it&url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it&summary=Plus%3a%20Uncle%20Sam%20is%20cross%20with%20this%20one%20Chinese%20biz%20over%20Salt%20Typhoon%20mega-snooping) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) #### More about* [China](/Tag/China/)* [FCC](/Tag/FCC/)* [Security](/Tag/Security/) More like these × ### More about* [China](/Tag/China/)* [FCC](/Tag/FCC/)* [Security](/Tag/Security/)* [Telecommunications](/Tag/Telecommunications/) ### Narrower topics* [2FA](/Tag/2FA/)* [5G](/Tag/5G/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [AT-&T](/Tag/AT%26T/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [British Telecom](/Tag/British%20Telecom/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [China Mobile](/Tag/China%20Mobile/)* [China telecom](/Tag/China%20telecom/)* [China Unicom](/Tag/China%20Unicom/)* [CISO](/Tag/CISO/)* [Comcast](/Tag/Comcast/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Cyberspace Administration of China](/Tag/Cyberspace%20Administration%20of%20China/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [EE](/Tag/EE/)* [Emergency Services Network](/Tag/Emergency%20Services%20Network/)* [Encryption](/Tag/Encryption/)* [Ericsson](/Tag/Ericsson/)* [Exploit](/Tag/Exploit/)* [Firewall](/Tag/Firewall/)* [Great Firewall](/Tag/Great%20Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Hong Kong](/Tag/Hong%20Kong/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Information Technology and the People’s Republic of China](/Tag/Information%20Technology%20and%20the%20People%27s%20Republic%20of%20China/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [JD.com](/Tag/JD.com/)* [Kenna Security](/Tag/Kenna%20Security/)* [Mobile Network](/Tag/Mobile%20Network/)* [National Broadband Network](/Tag/National%20Broadband%20Network/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [NTT](/Tag/NTT/)* [Orange](/Tag/Orange/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Semiconductor Manufacturing International Corporation](/Tag/Semiconductor%20Manufacturing%20International%20Corporation/)* [Shenzhen](/Tag/Shenzhen/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [Telecommunications Act of 1996](/Tag/Telecommunications%20Act%20of%201996/)* [TETRA](/Tag/TETRA/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Uyghur Muslims](/Tag/Uyghur%20Muslims/)* [Verizon](/Tag/Verizon/)* [Vodafone](/Tag/Vodafone/)* [Voice over IP](/Tag/Voice%20over%20IP/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [APAC](/Tag/APAC/)* [Sector](/Tag/Sector/) #### More aboutShare [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it) [](https://twitter.com/intent/tweet?text=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it&url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=FCC%20to%20telcos%3a%20By%20law%20you%20must%20secure%20your%20networks%20from%20foreign%20spies.%20Get%20on%20it&summary=Plus%3a%20Uncle%20Sam%20is%20cross%20with%20this%20one%20Chinese%20biz%20over%20Salt%20Typhoon%20mega-snooping) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/01/17/fcc_telcos_calea/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) **8** COMMENTS #### More about* [China](/Tag/China/)* [FCC](/Tag/FCC/)* [Security](/Tag/Security/) More like these × ### More about* [China](/Tag/China/)* [FCC](/Tag/FCC/)* [Security](/Tag/Security/)* [Telecommunications](/Tag/Telecommunications/) ### Narrower topics* [2FA](/Tag/2FA/)* [5G](/Tag/5G/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [AT-&T](/Tag/AT%26T/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [British Telecom](/Tag/British%20Telecom/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [China Mobile](/Tag/China%20Mobile/)* [China telecom](/Tag/China%20telecom/)* [China Unicom](/Tag/China%20Unicom/)* [CISO](/Tag/CISO/)* [Comcast](/Tag/Comcast/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Cyberspace Administration of China](/Tag/Cyberspace%20Administration%20of%20China/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [EE](/Tag/EE/)* [Emergency Services Network](/Tag/Emergency%20Services%20Network/)* [Encryption](/Tag/Encryption/)* [Ericsson](/Tag/Ericsson/)* [Exploit](/Tag/Exploit/)* [Firewall](/Tag/Firewall/)* [Great Firewall](/Tag/Great%20Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Hong Kong](/Tag/Hong%20Kong/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Information Technology and the People’s Republic of China](/Tag/Information%20Technology%20and%20the%20People%27s%20Republic%20of%20China/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [JD.com](/Tag/JD.com/)* [Kenna Security](/Tag/Kenna%20Security/)* [Mobile Network](/Tag/Mobile%20Network/)* [National Broadband Network](/Tag/National%20Broadband%20Network/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [NTT](/Tag/NTT/)* [Orange](/Tag/Orange/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Semiconductor Manufacturing International Corporation](/Tag/Semiconductor%20Manufacturing%20International%20Corporation/)* [Shenzhen](/Tag/Shenzhen/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [Telecommunications Act of 1996](/Tag/Telecommunications%20Act%20of%201996/)* [TETRA](/Tag/TETRA/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Uyghur Muslims](/Tag/Uyghur%20Muslims/)* [Verizon](/Tag/Verizon/)* [Vodafone](/Tag/Vodafone/)* [Voice over IP](/Tag/Voice%20over%20IP/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [APAC](/Tag/APAC/)* [Sector](/Tag/Sector/) #### TIP US OFF[Send us news](https://www.theregister.com/Profile/contact/)[#### FCC boss urges speedy spectrum auction to fund ‘Rip’n’Replace’ of Chinese kitTelcos would effectively fund grants paid to protect national securityNetworks10 days -| 15](/2025/01/08/fcc_chief_urges_spectrum_auction/?td=keepreading) [#### More telcos confirm China Salt Typhoon security breaches as White House weighs inIntrusions allowed Beijing to ‘geolocate millions of individuals, record phone calls at will’Cyber-crime18 days -| 36](/2024/12/30/att_verizon_confirm_salt_typhoon_breach/?td=keepreading) [#### Encryption backdoor debate ‘done and dusted,’ former White House tech advisor saysinterview When the FBI urges E2EE, you know it’s serious businessCyber-crime14 days -| 72](/2025/01/04/encryption_backdoor_debate/?td=keepreading) [#### Where do European SMEs start when it comes to conquering the world?The answer is in DenmarkSponsored Feature](/2024/11/25/where_do_european_smes_start/?td=keepreading) [#### After China’s Salt Typhoon, the reconstruction starts nowOpinion If 40 years of faulty building gets blown down, don’t rebuild with the rubbleCyber-crime12 days -| 41](/2025/01/06/opinion_column_cybersec/?td=keepreading) [#### Charter, Consolidated, Windstream reportedly join China’s Salt Typhoon victim listSlow drip of compromised telecom networks continuesCyber-crime12 days -| 4](/2025/01/06/charter_consolidated_windstream_salt_typhoon/?td=keepreading) [#### Akamai to quit its CDN in China, seemingly not due to trouble from BeijingSecurity and cloud compute have so much more upside than the boring business of shifting bitsSecurity10 days -| 4](/2025/01/08/akamai_eol_china_cdn/?td=keepreading) [#### Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military basesGee, wonder why Beijing is so keen on the — checks notes — Committee on Foreign Investment in the USCyber-crime8 days -| 7](/2025/01/10/china_treasury_foreign_investment/?td=keepreading) [#### Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raidOFAC, Office of the Treasury Secretary feared hit in data-snarfing swoopCSO15 days -| 3](/2025/01/02/chinese_spies_targeted_sanctions_intel/?td=keepreading) [#### China’s cyber intrusions took a sinister turn in 2024From targeted espionage to pre-positioning – not that they are mutually exclusiveSecurity18 days -| 9](/2024/12/31/china_cyber_intrusions_2024/?td=keepreading) [#### China to probe US chip subsidies as export curbs rattle alliesBeijing investigating claims of unfair competition in mature semiconductorsSystems14 hrs -| 6](/2025/01/17/china_us_chip_subsidies/?td=keepreading) [#### Biden signs sweeping cybersecurity order, just in time for Trump to gut itAnalysis Ransomware, AI, secure software, digital IDs — there’s something for everyone in the presidential directivePublic Sector14 hrs -| 6](/2025/01/17/biden_cybersecurity_eo/?td=keepreading)
Related Tags:
NAICS: 517 – Telecommunications
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 51 – Information
Sodinokibi
REvil
Sodin
WanaCrypt0r
WanaCrypt
Associated Indicators: