GAO mulls cost evaluation of nationwide telecom hardware replacement

RichLegg/Getty Images

 

Connecting state and local government leaders

One major vulnerability exploited by China’s Salt Typhoon hacking unit is a Cisco hardware flaw that can’t be patched and requires physical replacement, according to a person with knowledge of the intrusions.

The nation’s top oversight office is considering penning a study to assess the cost of administering a far-reaching operation to rip out and replace swaths of at-risk or compromised telecommunications equipment owned by small communications providers around the country, according to a senior U.S. official.

The deliberations, which have not been previously reported, are fueled by an ongoing Chinese espionage intrusion into U.S. and allied telecommunications networks by Salt Typhoon, a hacking unit tied to Beijing’s Ministry of State Security that likely had unfettered access to key elements of America’s telecommunications backbone for around two years.

As part of the work, the U.S. Government Accountability Office would study the costs of undertaking such a project and, separately, would also evaluate security vulnerabilities impacting the telecommunications industry, said the official, who spoke on the condition of anonymity because they were not authorized to discuss the private deliberations.

Should President-elect Donald Trump’s national security team support this study, it could motivate his allies in Congress to greenlight what would likely be a multi-billion dollar effort to weed out troves of telecommunications hardware that’s been accessed or is at risk of being ensnared by Chinese hackers and other adversaries.

It’s not entirely clear when the study would commence, but GAO staff are anticipating that Congress will formally request that the work begin soon, the senior official said.

The Federal Communications Commission is already locked in an ongoing effort to help small, rural broadband providers remove and replace equipment made by Huawei and ZTE, a pair of Chinese telecom companies deemed an unsuitable security risk to U.S. networks. 

That “rip and replace” program was toplined with $2 billion in funding when it initially passed in 2020. Only last month did it receive an added $3 billion from Congress to cover a funding shortfall that the FCC had been flagging to lawmakers for months. 

This GAO study, however, would be significantly broader in scope. It would focus on the viability of discarding and replacing telecom equipment embedded across the entire nation, including hardware managed by smaller providers who were among the victims ensnared by Salt Typhoon. 

The Chinese cyberspies broke into the systems of major providers, including AT&T, Verizon and Lumen. They also accessed Charter Communications, Consolidated Communications and Windstream, the Wall Street Journal reported Saturday, citing people familiar with the matter. In total, the hackers infiltrated at least nine U.S. communications firms and dozens of others around the world. 

Telecommunications Industry Association CEO Dave Stehlin said in a statement that TIA has “consistently championed the use of trusted suppliers throughout our expansive network ecosystem, encompassing wireless, wireline, satellite, subsea cables and IoT networks” and added the trade group has advocated for rip and replace initiatives for several years.

The Competitive Carriers Association, which represents regional and rural wireless providers, declined to comment. The FCC and a staffer for incoming Republican leader Brendan Carr did not return a comment.

Multiple providers recently disclosed that Salt Typhoon was no longer in their networks. Still, several hundred organizations comprising telecom companies and other sectors were notified over the past couple of months that they may be at risk of compromise, Nextgov/FCW reported in December.

One of the major vulnerabilities exploited is a hardware flaw within Cisco equipment that cannot be patched with a software update and requires physical replacement, according to a person with knowledge of the intrusions.

“The [GAO] study is needed,” said the person, who was granted anonymity to be candid about their understanding of the hacks.

The government watchdog may also explore providers’ equipment supply chains. Beijing can legally compel companies that operate in China’s borders to hand over schematics about their products. Given its operating unit in mainland China, it’s likely that Chinese intelligence services had extensive knowledge about Cisco device architecture that allowed Salt Typhoon to later get inside, according to a congressional aide familiar with the hacks.

The Chinese cyber unit also exploited software vulnerabilities in Ivanti, Fortinent, Sophos and Microsoft Exchange Server systems.

Early glimpses of what a nationwide rip-and-replace initiative could involve are already taking shape. Officials are researching national security risks tied to China-owned router provider TP-Link, and are readying for a possible countrywide ban of the firm, which can be invoked under a Commerce Department authority created in Trump’s first term.

Commerce is also moving to jettison remaining operating units of China Telecom in the U.S., the New York Times reported last month.

“The risk to our telecommunications infrastructure has only grown since we discovered the threat posed by Huawei,” House Homeland Security Committee Chairman Mark Green, R-Tenn., said in a statement when asked about the study.

“Due to the widespread nature of this most recent intrusion by the CCP actor known as Salt Typhoon, it’s essential to fully evaluate the cost of creating a more resilient foundation for the telecommunications sector. This way, we can take concrete steps toward improving collective cyber defense across the government,” he added, referring to the Chinese Communist Party.

It’s unclear how such a sweeping rip and replace project would unfold, given society’s everyday reliance on phone systems for jobs, banking and other vital activities. Moreover, millions of Americans rely on major wireless providers for services that allow them to conduct phone calls, send text messages and browse the internet. 

Some telecom operators also have a strong presence in the federal space. AT&T, for instance, manages FirstNet, a public safety network used by first responders like firefighters and police officers. Data tied to FirstNet call logs was compromised in a separate 2022 breach, Nextgov/FCW reported in July.

The U.S. government’s communications equipment could also be scrutinized as part of the study. The fiscal year 2019 defense policy bill barred agencies from buying or using certain telecom or video surveillance equipment from several Chinese companies and their related business units, but equipment purchased before that law took effect is not considered.

Updating the vulnerable systems and security practices across the telecom industry would be a massive and costly undertaking. Modern-day telecom networks operate as a complex mix of antiquated technology from the past few decades integrated with contemporary digital infrastructure. In certain areas, protective measures were robust, but in others outdated hardware and lax security practices left vulnerabilities that Salt Typhoon identified and exploited.

Making matters more complex is the fact that Salt Typhoon also breached America’s “lawful intercept” systems that house wiretap requests used by law enforcement to surveil suspected criminals and spies. Telecom firms are required to engineer their networks for wiretapping under the Communications Assistance for Law Enforcement Act, or CALEA, which passed in 1994. The FCC oversees the law.

Over the years, wiretapping methods have shifted from analog procedures to streamlined digital systems. Today, law enforcement analysts can file requests for targets’ phone metadata directly to telecom operators. Many of those requests are processed at legal demand facilities that could be inadvertently swept up in the equipment replacement efforts.

Not all experts are confident that a mass rip and replace project would shore up U.S. communications security.

“Nothing I’ve seen of Salt Typhoon’s activity would suggest rip and replace would be a cost effective or efficient approach. Most of these intrusions took advantage of decades-old security architecture flaws and exploited known cyber hygiene issues like missing patches or vulnerable accounts and leaked passwords,” said Marc Rogers, a 35-year telecom security practitioner who worked with a major carrier on deploying, operating and securing its technology from the 1990s into the late 2010s.

“The first step should be to fix these [issues]. Exploitation of our carriers via old known flaws that have patches is an indefensible position,” he added.

Sen. Mark Warner, D-Va., who chairs the Senate Intelligence Committee, said replacing the hardware is a “necessary, but insufficient step.”

“Salt Typhoon demonstrated in a scary way how the aged telecommunications infrastructure on which Americans rely is highly fragile and extremely vulnerable,” he said in a statement that argued the need for minimum cybersecurity standards and for providers “to build their systems in ways that take into consideration security by design and not only speed to market.”

“I hope GAO will also include in their study the costs of doing such things,” Warner added.

China has repeatedly denied involvement in hacking activities against the U.S. and Western allies. Chinese embassy spokesperson Liu Pengyu told Nextgov/FCW that, during a meeting between President Biden and President Xi Jinping in Peru at the APEC Summit late last year, Xi said there’s no evidence supporting the “irrational claim” of cyberattacks from China. Biden raised the question to Xi in response to the Salt Typhoon hacks.

“The [People’s Republic of China] threat is probably the top threat that we’re addressing right now,” Brett Leatherman, the FBI’s deputy assistant director for cyber operations, said in a recent interview.

“All these PRC-based cyberattacks against the United States — they’re meant to either increase the PRC’s footprint on U.S. infrastructure for potentially some sort of wartime footing, as well as to conduct sophisticated espionage against the United States,” he added. “All of that is a threat to national security.”

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.