Thursday, March 27, 2025
HomeCyber Security NewsFCC Investigates Chinese Entities on US Government’s Prohibited List

FCC Investigates Chinese Entities on US Government’s Prohibited List

Published on

SIEM as a Service

Follow Us on Google News

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously identified as national security risks to ensure these companies are not circumventing U.S. regulations.

FCC Chairman Brendan Carr announced the move today as the first major initiative led by the newly established Council on National Security within the FCC.

The investigation focuses on companies that were added to the FCC’s Covered List due to security concerns, including Huawei Technologies, ZTE Corporation, Hytera Communications, Hangzhou Hikvision Digital Technology, Dahua Technology, and others.

These firms are allegedly aligned with the Chinese Communist Party (CCP) and are accused of engaging in activities that pose “unacceptable risks” to U.S. national security and communication networks.

Despite the restrictions imposed by the FCC, there are concerns that some of these entities may still be operating in the U.S., potentially exploiting regulatory gaps.

Investigation Details and Goals

To determine the extent of these companies’ U.S. operations, the FCC has issued Letters of Inquiry and subpoenas to the targeted entities.

The gathered information will help the commission assess their compliance with existing prohibitions and take necessary measures to safeguard U.S. telecommunications infrastructure.

Chairman Carr emphasized the FCC’s commitment to closing any loopholes that might allow prohibited entities to continue their operations.

“We have reason to believe that some of these companies are exploiting grey areas to continue their business in America. The Council on National Security will work swiftly, in collaboration with federal partners, to eliminate any vulnerabilities and uphold our national security,” Carr stated.

The investigation extends beyond these firms, seeking data on other companies that may be aiding their U.S. operations.

The FCC has pledged to take decisive action based on the findings to prevent untrustworthy actors from undermining its rules and jeopardizing the security of American networks.

This initiative builds on earlier FCC measures, which included placing the companies on the Covered List and revoking their authorizations to operate in regulated capacities.

The targeted entities have been accused of facilitating surveillance and espionage on behalf of the CCP.

Their inclusion on the Covered List is part of a broader effort to fortify U.S. communications networks against foreign threats.

The FCC’s proactive stance reflects its commitment to countering foreign interference and securing critical infrastructure.

As the investigation unfolds, the agency aims to ensure that any CCP-aligned operations are fully identified and halted.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL...

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer...

OpenAI Offers Up to $100,000 for Critical Infrastructure Vulnerability Reports

OpenAI has announced major updates to its cybersecurity initiatives. The company is expanding its...

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL...

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer...

OpenAI Offers Up to $100,000 for Critical Infrastructure Vulnerability Reports

OpenAI has announced major updates to its cybersecurity initiatives. The company is expanding its...