In one of the most consequential regulatory decisions affecting U.S. cybersecurity in years, the Federal Communications Commission (FCC) has voted along party lines to eliminate federal rules requiring telecommunications companies to maintain minimum cybersecurity standards. The rollback—passed through a 2–1 vote by commissioners appointed during Donald Trump’s administration—has triggered a firestorm of criticism from cybersecurity experts, lawmakers, and national-security analysts who warn that the decision will leave already-vulnerable American telecom networks exposed to sophisticated foreign attacks.
This dramatic reversal arrives at a moment when the United States is still grappling with the fallout of Salt Typhoon—a China-backed hacking campaign that infiltrated more than 200 telecom carriers, including AT&T, Lumen, and Verizon, compromising sensitive communications, surveillance systems, and even lawful-intercept infrastructure.

Despite the gravity of the breach, the FCC has now dismantled the central policy response put in place by the previous administration, a move that many say leaves the nation unprepared for the next wave of state-sponsored cyber intrusions.
The vote reveals a widening ideological divide inside the FCC and underscores a tension that has long existed between regulatory oversight and industry lobbying, national security interests and deregulation politics, and voluntary cybersecurity standards versus enforceable obligations.
The implications extend far beyond the telecom industry. The integrity of the country’s communication backbone—911 systems, mobile carriers, rural broadband networks, and enterprise communication infrastructure—hinges on robust cybersecurity protections. The rollback forces the U.S. to face a difficult question:
Who should bear responsibility for defending the digital arteries of the nation—private industry or federal regulators?
A Shocking Reversal: How the FCC Dismantled Critical Safeguards
The cybersecurity rules at the center of this controversy were introduced as part of a broader strategy to harden America’s communications networks after a surge in cyberattacks against telecom carriers. The regulations required carriers to:
- Secure their networks from unauthorized access
- Protect communication interception systems
- Maintain baseline digital defenses aligned with modern threat patterns
- Report breaches of critical infrastructure in a timely manner
These were not considered overly restrictive or complex. If anything, cybersecurity professionals viewed them as basic hygiene measures that major U.S. telecom companies should have had in place long ago.
But on Thursday, FCC chairman Brendan Carr and Republican commissioner Olivia Trusty voted to nullify the rules, arguing that the regulation placed unnecessary burdens on telecom operators and could stifle innovation. Carr has long supported a deregulatory approach to the communications sector and framed the decision as necessary for reducing federal overreach.
Their stance was consistent with the industry lobbying narrative. The NCTA—the principal trade association for broadband and telecom providers—celebrated the rollback, calling the previous rules “prescriptive and counterproductive.” According to the organization, voluntary cooperation between telecom companies and the federal government is sufficient to manage cyber risks.
However, critics argue that voluntary guidelines are exactly what allowed failures like Salt Typhoon to unfold unchecked for years.
Commissioner Anna Gomez Raises Sharp Warning: “Handshake Agreements Cannot Stop State-Sponsored Hackers”
Standing as the lone dissenting voice, Democratic FCC commissioner Anna Gomez issued a scathing rebuke following the vote. She argued that removing the rules leaves the U.S. critically exposed at a time when cyberattacks from foreign adversaries are accelerating in complexity, frequency, and geopolitical intent.
Gomez emphasized that these regulations were not arbitrary—they were part of the only meaningful cybersecurity initiative the FCC had advanced since the Salt Typhoon breaches came to light.
She warned:
“Handshake agreements without teeth will not stop state-sponsored hackers in their quest to infiltrate our networks.”
Her statement highlights a core argument within the cybersecurity community:
Telecom networks are too critical to national security to rely on voluntary compliance.
The modern telco ecosystem is deeply interconnected. A weakness in one carrier can expose the entire communications grid. Gomez argued that without enforceable expectations and consequences, companies often lack the incentives to prioritize infrastructure-level cybersecurity—especially when cost-cutting and shareholder pressure dominate internal decision-making.
Salt Typhoon: A Wake-Up Call That Policymakers Largely Ignored
The decision to undo the cybersecurity rules becomes even more alarming in light of Salt Typhoon—a sprawling and highly sophisticated hacking campaign attributed to China’s state-sponsored cyber units.
Key findings from the Salt Typhoon investigation revealed:
- More than 200 U.S. telecom carriers were compromised
- Hackers accessed network architectures and subscriber communications
- Lawful interception systems—tools meant for FBI and law-enforcement surveillance—were infiltrated
- The campaign persisted for years without detection
- Attackers obtained data that could be weaponized for espionage, blackmail, monitoring political officials, and mapping U.S. infrastructure vulnerabilities
Several cybersecurity agencies described the operation as one of the largest breaches of telecommunications infrastructure in American history.
Senator Mark Warner, a respected voice on intelligence oversight, warned this week that the FCC’s rollback “leaves us without a credible plan” to address the vulnerabilities exposed by Salt Typhoon.
Senator Gary Peters, who oversees homeland security oversight, said he was “disturbed” by the decision and warned that eliminating minimum protections “will leave the American people exposed.”
Salt Typhoon represented not only a technical failure but a strategic failure—one that signaled how easily adversaries could exploit outdated security measures in widely-used telecom systems.
Yet instead of tightening regulations, the FCC has now loosened them.
The Broader Impact: A Telecom Ecosystem More Vulnerable Than Ever
1. National Security Implications
Telecommunications form the backbone of U.S. national security operations—everything from military communications, to critical infrastructure alert systems, to federal agency networks. Weakening the security requirements for these systems effectively widens the attack surface for adversaries.
Chinese, Russian, Iranian, and North Korean cyber units have historically targeted telco networks because:
- They are structurally complex
- They often rely on legacy systems
- They are slow to update or replace hardware
- They contain vast amounts of sensitive metadata
By rolling back oversight, the FCC has given adversaries what cybersecurity analysts describe as “strategic breathing room.”
2. Economic and Corporate Espionage Threats
Telecom carriers handle enormous volumes of corporate communications. Lax defenses create opportunities for attackers to intercept:
- Executive communications
- R&D intel
- M&A strategies
- Supply chain communications
- Industry secrets
China has been heavily involved in industrial espionage for decades, and telecom networks—if compromised—can serve as direct pipelines to corporate intelligence.
3. Risk to Everyday Consumers
Consumers rely on secure networks for:
- Online banking
- Telehealth
- Government services
- Authentication codes
- Private messaging
When telco infrastructure is vulnerable, so is every service built on top of it.
4. Infrastructure Interdependence
Telecommunications are deeply woven into power grids, transportation systems, financial networks, and emergency response infrastructure. Compromising telecom networks can trigger cascading failures across multiple sectors.
This is why most countries maintain strict cybersecurity rules for critical infrastructure providers.
The U.S. is now an exception.
Industry Applauds the Rollback—But At What Cost?
Telecom companies have long resisted regulatory cybersecurity requirements for a simple reason: they are expensive. Updating outdated hardware, hiring cybersecurity talent, auditing systems, and replacing legacy network components can cost billions across the industry.
The NCTA’s praise of the decision suggests that the industry appreciates the freedom from regulatory pressure—yet critics argue that cost savings today may turn into catastrophic losses tomorrow.
As seen in incidents like:
- The 2021 Colonial Pipeline ransomware attack
- The 2023 AT&T access breach
- The 2024 global telecom SIM-hijack wave
The financial and reputational costs of cyber intrusions often far exceed the cost of preventive measures.
Why the FCC’s Decision Matters More Than Ever
Cyberattacks are no longer isolated incidents—they are components of geopolitical strategy. Telecoms are one of the most lucrative attack surfaces for nation-state adversaries.
By eliminating binding obligations around cybersecurity, the FCC has fundamentally altered the risk landscape for:
- Government agencies
- Telecom operators
- Private enterprises
- Consumers
- Critical infrastructure sectors
This decision comes at a time when the cybersecurity ecosystem is calling for more oversight, not less. The rollback positions the U.S. behind other global powers like the EU, the U.K., and Japan, all of which have strengthened cybersecurity mandates in the last five years.
The consensus among experts is clear:
Telecom cybersecurity cannot rely solely on voluntary compliance.
The Road Ahead: What Can Be Done?
With the FCC stepping back from enforcement, cybersecurity experts and lawmakers are already proposing alternative pathways:
- Congressional legislation establishing minimum telco cybersecurity standards
- Mandatory reporting requirements for breaches affecting telecom infrastructure
- Incentivizing carriers to modernize outdated hardware
- Creating public-private cyber defense coalitions with binding authority
- Strengthening CISA’s oversight of telecom infrastructure
But all these solutions face political obstacles.
For now, carriers are largely free to set their own cybersecurity priorities—an environment reminiscent of the pre-2000s era that enabled large-scale telecom surveillance scandals.
The coming months will reveal whether Congress intervenes or whether telecom companies take voluntary steps to reassure regulators and the public.