Why You Should Use Encrypted Messaging: FBI Warns of Cybersecurity Threats For the Telecommunications Industry
April 9, 2026
The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have issued a strong warning to Americans: use encrypted messaging and phone calls to protect your communications. This urgent advisory stems from a growing wave of sophisticated cyber threats, particularly from foreign state-sponsored hackers. Breaches targeting U.S. telecommunications networks have exposed vulnerabilities that compromise both national security and personal privacy—underscoring the urgent need for stronger cybersecurity infrastructure, more proactive threat detection, and highly trained professionals.
Cybersecurity Breaches Expose Vulnerabilities
A series of cybersecurity breaches have exposed real vulnerabilities in cyber protections—especially on mobile devices and direct voice or text messaging. Salt Typhoon has been attributed to foreign hackers linked to China’s Ministry of State Security, which infiltrated major U.S. telecommunications networks, including AT&T, Verizon, and T-Mobile. These cybersecurity breaches exploited systemic vulnerabilities, enabling unauthorized access to call logs and intercepted live communications—even systems enforcing government wiretap requests.
Salt Typhoon's activities demonstrate abilities to exploit backdoor mechanisms and underscores the risks of weak cybersecurity in systems intended for secure communication. Foreign hacking groups have a history of employing advanced techniques, such as exploiting zero-day vulnerabilities and deploying sophisticated malware. These campaigns are often tied to espionage, targeting government entities, corporations, and critical infrastructure. The Salt Typhoon attack exemplifies this strategy, highlighting the persistent risk of malicious actors compromising sensitive communication systems.
Telecommunications: A Prime Target for Hackers
Telecommunications providers like Verizon and other major mobile retailers play a pivotal role in the nation’s infrastructure, yet they remain a prime target for hackers. Companies have faced scrutiny for their inability to prevent cybersecurity breaches, raising concerns about their reliability in protecting user data. Many of these vulnerabilities stem from outdated technologies still in use today.
For example, the SS7 protocol, a decades-old standard in telecommunications, contains well-documented security flaws that allow hackers to intercept calls and messages. While telecom providers have implemented patches and improvements, the underlying infrastructure still leaves users exposed to cybersecurity risks. Such systemic weaknesses highlight the urgent need for modernized security measures across the industry.
Protecting Communications with End-to-End Encryption
Encryption offers a robust defense against unauthorized access to communications. With end-to-end encryption, messages and calls are scrambled during transmission, ensuring that only the sender and recipient can access their content. Even if intercepted, encrypted communications remain indecipherable without the encryption key.
Apps like Signal, WhatsApp, and iMessage have emerged as leaders in providing this encryption by default. Unlike standard SMS or traditional phone calls, these encrypted platforms protect conversations from prying eyes, whether the threat comes from hackers or compromised network providers.
The FBI and CISA emphasize that encryption is no longer optional—it’s a necessity in the face of growing cyber threats. Here are some practical steps they suggest to safeguard your communications:
- Use apps like Signal, WhatsApp, or Telegram, which provide end-to-end encryption for both messages and calls.
- Add an extra layer of security to access your accounts by requiring a two-step verification.
- Avoid public Wi-Fi for communication or transactions, and use a virtual private network (VPN) if you must connect to these networks.
- Keep the software on your computer and mobile devices up-to-date to patch vulnerabilities that hackers could exploit.
- Enable features like encrypted backups in messaging apps to ensure that stored data remains secure.
- Avoid discussing confidential topics on unsecured platforms or networks.
Broader Implications for Cybersecurity
The Salt Typhoon attack and similar breaches underscore systemic vulnerabilities that require coordinated action from both the private and public sectors. Telecom providers must prioritize investments in cybersecurity, including adopting secure communication protocols and retiring outdated technologies like SS7. At the same time, policymakers should enforce stricter security standards and provide resources for infrastructure modernization.
For individuals, the rise of sophisticated hacking campaigns serves as a reminder that protecting personal data is a shared responsibility. By leveraging encryption tools and adhering to best practices, users can minimize their exposure to cyber threats.
The FBI and CISA’s warning is a call to action for Americans to take control of their digital privacy. Encrypted messaging and calls are not just tools for tech-savvy users—they are essential safeguards against a rapidly evolving threat landscape. By staying informed and proactive, individuals can protect themselves and contribute to a broader culture of cybersecurity resilience.
Cybersecurity Education at Capitol Tech
Capitol Technology University is a leader in cybersecurity education that offers cutting-edge programs that align closely with industry needs and emerging threats. Our curriculum emphasizes hands-on experience, critical thinking, and real-world problem solving, preparing students to tackle complex security challenges. Graduates gain more than technical expertise—they develop the leadership skills necessary to guide organizations, influence policy, and drive innovation in the rapidly evolving cybersecurity landscape.