C&T Subcommittee Hearing: Securing the Future of Telecommunications Infrastructure

House Subcommittee on Communications and Technology

2025-04-30

Loading video...

Source: Congress.gov

Summary

This subcommittee hearing focused on the critical importance of securing global communications infrastructure against a backdrop of increasing threats from foreign adversaries and evolving technologies, emphasizing the pervasive impact of these networks on national defense, economic stability, and daily life. Participants discussed various vulnerabilities, the need for robust security measures, and the roles of government and industry in protecting essential services and data from malicious actors[ 00:14:34-00:16:09 ]

[ 00:27:41-00:27:55 ] .

Themes

Threats to Communications Infrastructure

The security of communication networks is under severe threat, particularly from state-sponsored actors like China, Russia, North Korea, and Iran[ 00:16:09-00:16:34 ]

[ 00:43:31 ] . The "Salt Typhoon" operation, attributed to Chinese-backed hackers, infiltrated U.S. telecommunications networks, impacting at least nine providers and enabling the geolocation of millions and recording of calls from senior U.S. officials[ 00:16:39 ] . Beyond cyberattacks, physical disruptions, such as attacks on undersea cables, also pose a significant risk, capable of interrupting international data flows and causing widespread service degradation[ 00:17:16 ] [ 00:17:44 ] . These threats aim to steal sensitive data, commit fraud, establish surveillance footholds, and potentially disrupt critical services like financial systems and energy infrastructure.

Role of Satellite Technology

Satellite technology is increasingly vital, providing broadband, mission-critical services, and positioning, navigation, and timing data to various sectors, including the federal government. The industry is experiencing rapid innovation, with thousands of satellites in orbit supporting critical infrastructures like emergency services and national security. Satellites offer unique resilience benefits, such as resistance to terrestrial disasters and the ability to provide multi-orbit services for enhanced reliability. They also offer a crucial redundancy option for subsea cable failures, though they cannot fully replace the bandwidth capacity of fiber optics[ 02:14:31 ]

[ 01:25:51 ] .

Supply Chain Security and Domestic Manufacturing

Securing the communications infrastructure requires addressing supply chain vulnerabilities, particularly the reliance on foreign equipment and components[ 00:55:27 ]

. Initiatives like the Secure and Trusted Communications Network Reimbursement Program ("Rip and Replace") are crucial for removing insecure Chinese equipment from U.S. networks[ 00:18:05 ] . There is a recognized need to reshore critical manufacturing, especially for semiconductors, and build a domestic ecosystem for ICT components to reduce dependence on adversaries[ 00:55:29 ] . Standards like SCS 9001 are being developed to ensure products and services originate from trusted suppliers and incorporate security by design[ 01:00:23 ] .

Government's Role and Interagency Coordination

Effective cybersecurity requires strong collaboration between the government and the private sector, as private companies cannot defend against nation-state attacks alone[ 01:12:14 ]

. Concerns were raised about the lack of clarity regarding agency jurisdiction (CISA, DOD, FCC) over critical infrastructure security, which can impede threat responses[ 01:13:48 ] [ 01:15:33 ] . The importance of information sharing, streamlining regulatory processes, and providing liability protections for industry to share threat intelligence with the government was emphasized. The disbandment of the Cyber Safety Review Board and the federal cyber workforce cuts were highlighted as weakening national security and hampering the ability to learn from major incidents like Salt Typhoon[ 01:22:58 ] .

Emerging Technologies (AI, IoT) and Cybersecurity

New technologies like Artificial Intelligence (AI) and the Internet of Things (IoT) present both opportunities and threats to network security[ 00:14:53 ]

[ 00:51:52 ] . AI can be leveraged for vulnerability testing, anomaly detection, and real-time threat response in areas like satellite communications. However, AI also enhances adversaries' capabilities to process vast amounts of data, extract insights, and bypass cyber defenses, enabling even less sophisticated actors[ 02:33:37 ] . The proliferation of interconnected smart devices (IoT) in homes and critical sectors like the automotive industry creates new entry points for cyberattacks, underscoring the need for "security by design" and consumer awareness programs like the U.S. Cyber Trust Mark[ 00:58:46 ] [ 00:59:04 ] .

Undersea Cables

Undersea cables, carrying over 99% of internet traffic and trillions in financial transactions, are critical but vulnerable to both accidental damage and intentional sabotage by nefarious actors[ 00:17:16 ]

[ 00:17:34 ] . Increased redundancy through more cables and landing points is essential to prevent single points of failure. Challenges include lengthy permitting processes (sometimes taking hundreds of days), a shortage of repair ships, and the need for faster repair capabilities[ 01:25:16 ] . Streamlining permitting, possibly by designating a lead agency like NTIA and implementing a "trusted partner framework," could expedite deployment[ 01:57:47 ] [ 01:58:12 ] .

Tone of the Meeting

The meeting conveyed a tone of significant concern and urgency regarding the escalating threats to communications infrastructure[ 00:14:44 ]

[ 00:27:30 ] . While there was an overarching sense of the need for bipartisan cooperation to address national security challenges[ 01:52:12 ] , there was also sharp criticism directed at the current administration for perceived security failures, mismanagement, and actions that undermine cybersecurity efforts, such as workforce cuts and the misuse of unsecured communication channels by officials[ 00:28:09 ] . Speakers emphasized the critical importance of these networks and the potential for devastating consequences if vulnerabilities are not proactively addressed[ 00:15:45 ] .

Participants

Transcript

Subcommittee will come to order.  The chair recognizes himself for an opening statement.  Good morning.  Welcome to today's subcommittee hearing on global networks at risk, securing the future of communications infrastructure.  This topic has never been more pressing.  The United States is home to the world's leading companies and innovators who are driving the development of cutting edge technologies like artificial intelligence, the Internet of Things and next generation wireless technologies.  These innovations are critical not just to our economy,   but the future of global connectivity.  Communications are also central to our national defense.  This is a top of mind for me, especially as the representative of Fort Bragg, home of the US Army Special Forces and largest military base in the world.  Connectivity and secure communication networks are vital to maintaining our defense capabilities and keeping our nation safe.  Today, we rely on communications infrastructure in nearly every sector of our economy.  As Americans become more connected   It is increasingly important the equipment we buy, the networks we rely on are secure, resilient, and protected from malicious actors.  Unfortunately, the security of these networks is under threat.  The Chinese Communist Party, for example, has been investing heavily to develop unsecure communications equipment and exported around the world to assist in their espionage activities.   including in the United States.  The known vulnerabilities in many technologies produced by foreign adversaries pose a direct threat to the national security of the United States.  Last fall, we learned about Salt Typhoon, which may be the largest Chinese-backed telecommunications hack in our nation's history.  These hackers infiltrated U.S.  telecommunications companies' networks, impacting at least nine providers.   This infiltration enabled the hackers to geolocate millions of individuals and record phone calls and impacted senior U.S.  officials, including then President-elect Trump and Vice President-elect Vance.
In addition to these vulnerabilities, there are an increasing number of physical attacks on communications infrastructure, such as undersea cables.  These cables are responsible for carrying data traffic across oceans and are susceptible to damage by the elements   and unintentional acts such as anchors dragging along the sea floor.  But they've also been intentionally sabotaged.  And because of their physical location under the ocean, it can be difficult to monitor unauthorized access to these cables.  We must take decisive steps to address these threats.  I was proud to support funding for the Secure and Trusted Communications Network Reimbursement Program, which will support the removal of the remaining Chinese equipment in our communications networks.   Another key aspect of securing our communications infrastructure is the review of foreign investments in U.S.  networks.  Team Telecom is an interagency working group that reviews foreign investments in certain communications applications that come before the FCC.  Team Telecom assesses the national security risks, law enforcement, and other policy considerations   that may be associated with such investments.  While this process is important, applications often get bogged down by delays and bureaucratic hurdles.  We must find ways to make sure that national security concerns are addressed without hindering deployment.  Satellite technology also plays an increasingly important role in our communications infrastructure.  Satellites provide broadband services as well as mission critical services to critical infrastructure companies and the federal government.   Yet the regulations governing satellite operations have not kept pace with the growth in the industry.  Last Congress, this committee led bipartisan legislation to streamline regulatory processes for satellite operators.  And the Federal Communications Commission's adopted many of these reforms.   But more work remains to provide clarity and more certainty in the licensing process to ensure the U.S.  remains a leader in this sector as well.  We must meet these challenges head on.

Sign up for free to see the full transcript

Accounts help us prevent bots from abusing our site. Accounts are free and will allow you to access the full transcript.