FCC Rolls Back ISP Cybersecurity Rules Despite China-Linked Hacking Threats

FCC Rescinds Key Cybersecurity Mandates for ISPs, Drawing Criticism for Weakening National Security

MEDIUM
November 24, 2025
4m read
Policy and ComplianceRegulatoryThreat Actor

Related Entities

Threat Actors

Salt Typhoon

Other

Verizon AT&TT-MobileLumen TechnologiesAnna M. Gomez

Full Report

Executive Summary

The U.S. Federal Communications Commission (FCC) has officially rescinded a set of cybersecurity regulations that had been imposed on Internet Service Providers (ISPs). The rules were originally created in response to a successful, long-term intrusion into major U.S. telecom networks by Salt Typhoon, a hacking group linked to the Chinese government. The FCC's decision to roll back these measures, which included minimum security standards and compliance reporting, has been met with significant criticism from within the commission and the security community, who argue that it weakens U.S. national security at a time of heightened cyber threats.


Regulatory Details

The rescinded regulations, established under the Biden Administration, were based on a Declaratory Ruling that interpreted the Communications Assistance for Law Enforcement Act (CALEA) to include obligations for network security. The key requirements that have now been eliminated were:

  • Minimum Security Standards: ISPs were obligated to implement a baseline of security controls to prevent unauthorized access to their networks.
  • Annual Compliance Certification: Carriers had to submit an annual certification to the FCC, attesting that they met the required security standards.
  • Legal Obligation: The security of ISP networks was legally defined as a core obligation under CALEA.

The current FCC leadership justified the reversal by stating the previous ruling was "unlawful and ineffective" and based on a "flawed legal analysis." The rollback effectively removes these specific federal mandates, shifting the responsibility for implementing such security measures back to the ISPs themselves.


Affected Organizations

The primary entities affected by this policy change are all U.S. Internet Service Providers, including major carriers that were previously targeted by Salt Typhoon, such as:

  • Verizon
  • AT&T
  • T-Mobile
  • Lumen Technologies

The decision also impacts U.S. national security agencies and the broader public, who rely on the security and integrity of this critical communications infrastructure.


Impact Assessment

The primary impact of this decision is a reduction in the federal regulatory burden on ISPs regarding cybersecurity. Proponents of the move may argue it removes ineffective red tape. However, critics, including FCC Commissioner Anna M. Gomez, argue it creates a significant security gap. By removing the mandate for minimum security standards and compliance verification, the FCC leaves the security of critical national infrastructure more reliant on the voluntary efforts of private companies. This occurs against a backdrop of persistent and sophisticated threats from nation-state actors like Salt Typhoon, for whom the FBI is offering a $10 million reward for information leading to their disruption. The decision could lead to a divergence in security postures among ISPs, potentially leaving parts of the nation's communication backbone more vulnerable to attack.


Enforcement & Penalties

With the rescission of the Declaratory Ruling, the specific enforcement mechanisms and penalties tied to these cybersecurity requirements under CALEA are no longer applicable. The FCC's direct authority to enforce these specific minimum security standards on ISPs has been relinquished. Future enforcement would likely rely on other existing, broader regulations or new legislation.


Compliance Guidance

For ISPs, the immediate compliance obligation related to the rescinded rules is removed. However, this does not eliminate the need for robust cybersecurity. The threat landscape that prompted the rules in the first place has not changed. The guidance for organizations is to not view this as a reason to de-invest in security. Instead, they should continue to align with established cybersecurity frameworks like the NIST Cybersecurity Framework, implement security best practices, and maintain vigilance against threats like Salt Typhoon. The reputational and financial damage from a major breach remains a powerful incentive for maintaining a strong security posture, even in the absence of these specific federal mandates.

Timeline of Events

1
November 24, 2025
This article was published

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

FCCISPCybersecurity PolicyRegulationSalt TyphoonCALEANational SecurityGovernment

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading