{"id":14253,"date":"2024-12-06T19:44:56","date_gmt":"2024-12-06T18:44:56","guid":{"rendered":"http:\/\/plus.maciejpiasecki.info\/index.php\/2024\/12\/06\/proposed-rule-requires-stronger-security-barriers-for-us-carriers\/"},"modified":"2024-12-06T21:06:33","modified_gmt":"2024-12-06T20:06:33","slug":"proposed-rule-requires-stronger-security-barriers-for-us-carriers","status":"publish","type":"post","link":"https:\/\/plus.maciejpiasecki.info\/index.php\/2024\/12\/06\/proposed-rule-requires-stronger-security-barriers-for-us-carriers\/","title":{"rendered":"Proposed rule requires stronger security barriers for US carriers"},"content":{"rendered":"<p>The alleged Chinese infiltration of the US telecommunications infrastructure continues to leave its mark. US authorities are still working to expel all potential attackers. Meanwhile, a proposed rule by the FCC contemplates fines to US phone companies for not establishing sufficient security barriers.<br \/>\nUS phone companies could face fines for insufficient security measures<br \/>\nThe FCC has proposed a new rule that requires mobile carriers to effectively protect their networks against \u201cunlawful access or interception of communications.\u201d In addition, they will have to submit an annual report certifying the security measures they have taken. Anne Neuberger, deputy national security advisor, said that at least eight telecom providers were breached during the hacking campaign.<br \/>\n\u201cWhile the Commission\u2019s counterparts in the intelligence community are determining the scope and impact of the Salt Typhoon attack, we need to put in place a modern framework to help companies secure their networks and better prevent and respond to cyberattacks in the future,\u201d FCC Chair Jessica Rosenworcel said.<br \/>\nThe situation came to light in a Wall Street Journal report from October. The source named companies such as AT&amp;T, Verizon, and Lumen among those affected. A later report added that T-Mobile could also be on the list. However, the carrier denied this in an official statement. There were also reports claiming that T-Mobile had managed to stop the infiltration of its infrastructure before it happened.<br \/>\nHacking campaign has been going on for \u201clikely one to two years<br \/>\nInitial reports mentioned that the hacking campaign had been going on for at least eight months. However, Neuberger mentioned a period of \u201clikely one to two years\u201d for the attacks.\u00a0That said, she doesn\u2019t believe that \u201cany classified communications has been compromised\u201d so far. The FBI has identified Salt Typhoon, a hacker group associated with the PRC, as the perpetrators of the attacks.<br \/>\nThe telecoms breach sought to obtain confidential information that could endanger US national security, authorities say. The attackers targeted the campaign staff of the latest US presidential candidates. They also allegedly breached communication and surveillance tech used by law enforcement.<br \/>\nUS representatives have urged Department of Defense Inspector General Robert Storch to investigate the \u201cfailure to secure its unclassified telephone communications from foreign espionage.\u201d Any decision on the rule will have an immediate effect on US legislation. If the rule is approved, mobile carriers will be required to take immediate action to secure their networks. How long the rule will give telecoms to catch up is unknown.<br \/>\nThe post Proposed rule requires stronger security barriers for US carriers appeared first on Android Headlines.&#013;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plus.maciejpiasecki.info\/wp-content\/uploads\/2024\/12\/Internet-Security-And-Data-Pre-468618511-Large-jpeg.jpg\" width=\"1280\" height=\"672\">&#013;<br \/>\nSource: ndroidheadlines.com&#013;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The alleged Chinese infiltration of the US telecommunications infrastructure continues to leave its mark. US authorities are still working to [&hellip;]<\/p>\n","protected":false},"author":67,"featured_media":14254,"comment_status":"false","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"_links":{"self":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/14253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/comments?post=14253"}],"version-history":[{"count":1,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/14253\/revisions"}],"predecessor-version":[{"id":14255,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/14253\/revisions\/14255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media\/14254"}],"wp:attachment":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media?parent=14253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/categories?post=14253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/tags?post=14253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}