US aims to ban Chinese technology in undersea telecommunications cables
WASHINGTON - The Federal Communications Commission said on Wednesday it plans to adopt rules to bar companies from connecting undersea submarine communication cables to the United States that include Chinese technology or equipment.
"We have seen submarine cable infrastructure threatened in recent years by foreign adversaries, like China," FCC Chair Brendan Carr said in a statement. "We are therefore taking action here to guard our submarine cables against foreign adversary ownership, and access as well as cyber and physical threats."
The United States has for years expressed concerns about China's role in handling network traffic and the potential for espionage. The U.S. has broad data security concerns about the network of more than 400 subsea cables that handle 99% of international internet traffic.
Since 2020, U.S. regulators have been instrumental in the cancellation of four cables whose backers had wanted to link the United States with Hong Kong.
The FCC last year said it was considering new rules governing undersea internet cables in the face of growing security concerns, as part of a review of regulations on the links that handle nearly all the world's online traffic. The FCC said it was considering barring the use of equipment or services in those undersea cable facilities from companies on an FCC list of companies deemed to pose threats to U.S, national security, including Huawei, ZTE China Telecom and China Mobile.
Carr said the FCC is taking action to "guard our submarine cables against foreign adversary ownership, and access as well as cyber and physical threats."
The FCC will also seek comment on additional measures to protect submarine cable security against foreign adversary equipment.
Top stories
Swipe. Select. Stay informed.
Singapore Over 600 Telegram groups in Singapore selling, advertising vapes removed by HSA
Singapore 2 weeks' jail for man caught smuggling over 1,800 vapes and pods into Singapore
Singapore Jail for man who fatally hit his daughter, 2, while driving van without licence
Sport 'Like being in a washing machine with 40 deg C water': Open water swimmers brave challenging conditions
Singapore Primary 1 registration: 38 primary schools to conduct ballot in Phase 2A
Singapore ComfortDelGro to introduce new taxi cancellation, waiting fee policy
Business Cathay Cineplexes gets fresh demands to pay up $3.3m debt for Century Square, Causeway Point outlets
Singapore Countering misinformation requires both laws and access to trusted news sources: Josephine Teo
The cutting of two fiber-optic undersea telecommunication cables in the Baltic Sea prompted investigations of possible sabotage.
In 2023 Taiwan accused two Chinese vessels of cutting the only two cables that support internet access on the Matsu Islands and Houthi attacks in the Red Sea may have been responsible for the cutting of three cables providing internet service to Europe and Asia. REUTERS

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Straits Times
an hour ago
- Straits Times
Chinese state-sponsored contract hacker arrested in Italy at US request: DOJ
Find out what's new on ST website and app. The US Department of Justice said a Chinese state-sponsored contract hacker was arrested last week in Italy at the request of Washington. WASHINGTON - The US Department of Justice said on July 8 a Chinese state-sponsored contract hacker was arrested last week in Italy at the request of Washington, but the arrested man claimed he is a victim of mistaken identity. Xu Zewei, 33, was arrested on July 3, the Justice Department said, adding a nine-count indictment was unsealed on July 8 in the Southern District of Texas alleging the involvement of that individual and a co-defendant in computer intrusions between February 2020 and June 2021. Xu was arrested in Milan, Italy, and will face extradition proceedings, the DOJ said in a statement. It alleged China's ministry of state security had directed theft of Covid-19 research and the exploitation of Microsoft email software vulnerabilities. The Chinese government has denied allegations of being involved. The Chinese embassy in Washington did not immediately respond to a request for comment. Xu's lawyer said on July 8 that he is a victim of mistaken identity, that his surname is quite common in China and that his mobile phone had been stolen in 2020. The 33-year-old IT manager at a Shanghai company appeared on July 8 before an appeals court in Milan, which will decide whether to send him to the United States. The man was arrested last week after he arrived at Milan's Malpensa airport for a holiday in Italy with his wife. Top stories Swipe. Select. Stay informed. Singapore Mindef, SAF units among those dealing with attack on S'pore's critical information infrastructure Asia How China's growing cyber-hacking capabilities have raised alarm around the world Asia Autogate glitch at Malaysia's major checkpoints causes chaos for S'porean and foreign travellers Singapore A deadly cocktail: Easy access, lax attitudes driving Kpod scourge in S'pore Singapore 'I thought it was an April Fool's joke': Teen addicted to Kpods on news that friend died Singapore Who decides when you can't? A guide on planning for end-of-life care Singapore Why hiring more teachers makes sense, even with falling student numbers Singapore Bukit Panjang LRT disruption: Train service resumes after power fault affects 13-station line US authorities allege that he was part of a team of hackers who tried to access a Covid-19 vaccine being developed by the University of Texas in 2020. The DOJ also says that in 2021, he was part of a cyber-espionage group known as Hafnium, which has alleged ties to the Chinese government and which "exploited zero-day vulnerabilities in US systems to steal additional research." Hafnium targeted over 60,000 US entities, according to the DOJ. The charges listed on the arrest warrant were wire fraud and aggravated identity theft, conspiracy to commit wire fraud and unauthorised access to protected computers. REUTERS


AsiaOne
2 hours ago
- AsiaOne
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam, Singapore News
SINGAPORE - The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886. Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors. These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives. "UNC3886 poses a serious threat to us, and has the potential to undermine our national security," said Mr Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre. "Even as we speak, UNC3886 is attacking our critical infrastructure right now." Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China. Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations - including those in the defence, technology and telecommunication sectors - on a global scale. APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks. Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners. Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: "The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets - vital infrastructure that delivers our essential services. "If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans." Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024. Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport. "There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected," he said. Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added. He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains. Trust and confidence in Singapore as a whole can also be affected, he added. "Businesses may shy away if they are unsure about our systems - whether the systems are clean, resilient, safe," he said. Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world," he said. "People want to get into our systems, to both influence us and threaten us." He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons. These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack. Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors. He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack. At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain. "We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace," he added. This article was first published in The Straits Times . Permission required for reproduction.


AsiaOne
2 hours ago
- AsiaOne
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam
SINGAPORE - The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886. Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors. These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives. "UNC3886 poses a serious threat to us, and has the potential to undermine our national security," said Mr Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre. "Even as we speak, UNC3886 is attacking our critical infrastructure right now." Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China. Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations - including those in the defence, technology and telecommunication sectors - on a global scale. APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks. Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners. Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: "The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets - vital infrastructure that delivers our essential services. "If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans." Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024. Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport. "There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected," he said. Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added. He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains. Trust and confidence in Singapore as a whole can also be affected, he added. "Businesses may shy away if they are unsure about our systems - whether the systems are clean, resilient, safe," he said. Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world," he said. "People want to get into our systems, to both influence us and threaten us." He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons. These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack. Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors. He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack. At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain. "We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace," he added. This article was first published in The Straits Times. Permission required for reproduction.