Secure Internet Routing, 14006-14010 [2022-05121]

Download as PDF lotter on DSK11XQN23PROD with NOTICES1 14006 Federal Register / Vol. 87, No. 48 / Friday, March 11, 2022 / Notices providers of advanced communications services. See Public Law 116–260, Division N-Additional Coronavirus Response and Relief, Title IX-Broadband internet Access Service, §§ 901, 906, 134 Stat. 1182 (2020). The Commission has interpreted the term ‘‘provider of advanced communications service’’ to mean ‘‘facilities-based providers, whether fixed or mobile, with a broadband connection to end users with at least 200 kbps in one direction.’’ Second Report and Order, 35 FCC Rcd at 14332, para. 111. Participation in the Reimbursement Program is voluntary but compliance with the new information collection requirements is required to obtain Reimbursement Program support. The Commission adopted a Third Report and Order on July 13, 2021, implementing the amendments to the Secure Networks Act by the CAA for the Reimbursement Program. See Protecting Against National Security Threats to the Communications Supply Chain Through FCC Programs, WC Docket No. 18–89, Third Report and Order, FCC 21–86 (rel. July 14, 2021) (Third Report and Order). Separate from the Reimbursement Program, the Secure Networks Act requires all providers of advanced communications service to annually report, with exception, on whether they have purchased, rented, leased or otherwise obtained covered communications equipment or service on or after certain dates. 47 U.S.C. 1603(d)(2)(B). The Second Report and Order adopted a new information collection requirement to implement this statutory mandate. See Secure Networks Act § 5. If the provider certifies it does not have any covered equipment and services, then the provider is not required to subsequently file an annual report, unless it later obtains covered equipment and services. Second Report and Order, 35 FCC Rcd at 14370, at para. 215. The Commission therefore propose to revise this information collection, as well as Form 5460, to reflect this new requirement contained in the Public Notice released by the Bureau on August 3, 2021. This Public Notice, among other things, requires providers participating in the Reimbursement Program to notify the Commission of ownership changes using the FCC Form 5640 to ensure the accuracy of information on file for program participants when there is a change in ownership. VerDate Sep<11>2014 17:10 Mar 10, 2022 Jkt 256001 Federal Communications Commission. Marlene Dortch, Secretary, Office of the Secretary. [FR Doc. 2022–05120 Filed 3–10–22; 8:45 am] BILLING CODE 6712–01–P FEDERAL COMMUNICATIONS COMMISSION [PS Docket No. 22–90, FCC 22–18; FRS 75229] Secure Internet Routing Federal Communications Commission. ACTION: Request for comments. AGENCY: In this document, the Federal Communications Commission (FCC or the Commission) seeks comment on vulnerabilities threatening the security and integrity of the Border Gateway Protocol (BGP), which is central to the Internet’s global routing system, its impact on the transmission of data from email, e-commerce, and bank transactions to interconnected Voiceover Internet Protocol (VoIP) and 9–1– 1 calls, and how best to address them. DATES: Comments are due on or before April 11, 2022; and reply comments are due on or before May 10, 2022. ADDRESSES: You may submit comments, identified by PS Docket No. 22–90, by any of the following methods: • Electronic Filers: Comments may be filed electronically by accessing ECFS at https://www.fcc.gov/ecfs. • Paper Filers: Paper filings can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. • People with Disabilities: To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (tty). For detailed instructions for submitting comments and additional information on this proceeding, see the SUPPLEMENTARY INFORMATION section of this document. FOR FURTHER INFORMATION CONTACT: For additional information on this proceeding, contact James Wiley of the Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, at james.wiley@fcc.gov or (202) 418–1678 or Minsoo Kim of the Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, at minsoo.kim@fcc.gov or (202) 418–1739. SUMMARY: PO 00000 Frm 00046 Fmt 4703 Sfmt 4703 This is a summary of the Commission’s Notice of Inquiry, FCC 22–18, released February 28, 2022. The full text of this document is available at https://www.fcc.gov/ document/fcc-launches-inquiryinternet-routing-vulnerabilities. Ex Parte Rules. This proceeding shall be treated as a ‘‘permit-but-disclose’’ proceeding in accordance with the Commission’s ex parte rules. Although the rules do not generally require ex parte presentations to be treated as ‘‘permit but disclose’’ in Notice of Inquiry proceedings, the Commission exercises its discretion in this instance, and finds that the public interest is served by making ex parte presentations available to the public, in order to encourage a robust record. Persons making ex parte presentations must file a copy of any written presentation or a memorandum summarizing any oral presentation within two business days after the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all persons attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) summarize all data presented and arguments made during the presentation. If the presentation consisted in whole or in part of the presentation of data or arguments already reflected in the presenter’s written comments, memoranda, or other filings in the proceeding, the presenter may provide citations to such data or arguments in his or her prior comments, memoranda, or other filings (specifying the relevant page and/or paragraph numbers where such data or arguments can be found) in lieu of summarizing them in the memorandum. Documents shown or given to Commission staff during ex parte meetings are deemed to be written ex parte presentations and must be filed consistent with Rule 1.1206(b), 47 CFR 1.1206(b). Participants in this proceeding should familiarize themselves with the Commission’s ex parte rules. Confidentiality. The Commission recognizes that some comments could contain information that the submitter believes should not be made available to the general public because of commercial or national security reasons. Parties may request that such information be kept confidential, identifying the specific information sought to be kept confidential, providing the reasons for the request, and otherwise following the procedures set forth in section 0.459 of the SUPPLEMENTARY INFORMATION: E:\FR\FM\11MRN1.SGM 11MRN1 lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 87, No. 48 / Friday, March 11, 2022 / Notices Commission’s rules. If a party requests confidential treatment of a comment, it must file an original and one copy of the confidential version of the comment on paper, following the procedures below, and a public version of the filing that omits only the confidential information and is otherwise identical to the confidential version, using either the electronic filing or the filing-by-paper procedures below. Comment Filing Procedures. Interested parties may file comments and reply comments on or before the dates indicated on the first page of this document. Comments may be filed using the Commission’s Electronic Comment Filing System (ECFS) or by paper. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. • Paper Filers: Parties who choose to file by paper must file an original and one copy of each filing. Paper filings can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. • Effective March 19, 2020, and until further notice, the Commission no longer accepts any hand or messenger delivered filings. This is a temporary measure taken to help protect the health and safety of individuals, and to mitigate the transmission of COVID–19. See FCC Announces Closure of FCC Headquarters Open Window and Change in Hand-Delivery Policy, Public Notice, 35 FCC Rcd 2788 (2020), https:// www.fcc.gov/document/fcc-closesheadquarters-open-window-andchanges-hand-delivery-policy. • Commercial overnight mail (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 Junction Drive, Annapolis Junction, MD 20701. • U.S. Postal Service first-class, Express, and Priority mail must be addressed to 45 L Street NE, Washington, DC 20554. Availability of Documents. Comments, reply comments, and ex parte submissions will be publicly available online via ECFS. These documents will also be available for public inspection during regular business hours in the FCC Reference Information Center, when FCC Headquarters reopen to the public. People with Disabilities. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call VerDate Sep<11>2014 17:10 Mar 10, 2022 Jkt 256001 the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (tty). Synopsis 1. The Commission plays an important role in protecting the security of America’s communications networks and critical infrastructure. The Commission, in tandem with its federal partners, has urged the communications sector to defend against cyber threats, while also taking measures to reinforce our Nation’s readiness and to strengthen the cybersecurity of vital communications services and infrastructure, especially in light of Russia’s escalating actions inside of Ukraine. Today, the Commission builds on those efforts. With this Notice of Inquiry (Notice), the Commission seeks comment on vulnerabilities threatening the security and integrity of the Border Gateway Protocol (BGP), which is central to the internet’s global routing system, its impact on the transmission of data from email, e-commerce, and bank transactions to interconnected Voice-over Internet Protocol (VoIP) and 9–1–1 calls, and how best to address them. 2. BGP is the routing protocol used to exchange reachability information amongst independently managed networks on the internet. These independently managed networks (also termed ‘‘domains’’) loosely map to one or more ‘‘Autonomous Systems’’ (so termed because the administration of the network is the sole responsibility of a single, independent entity). BGP’s initial design, which remains widely deployed today, does not include security features to ensure trust in the information that it is used to exchange. BGP was designed at a time when the number of independently managed networks on the internet was low and the trust among them was high. As a result, a bad network actor may deliberately falsify BGP reachability information to redirect traffic to itself or through a specific third-party network, and prevent that traffic from reaching its intended recipient. When a bad actor directs traffic to be dropped in this way, it is commonly referred to as a ‘‘blackhole.’’ These ‘‘BGP hijacks’’ expose U.S. citizens’ personally identifiable information, enable theft, extortion, and state-level espionage, and disrupt otherwise-secure transactions. The Commission uses the term ‘‘BGP hijacking’’ to refer to any deliberate injection of routing information away from the optimal (or most secure) route, including both false route origination and path interception attacks. PO 00000 Frm 00047 Fmt 4703 Sfmt 4703 14007 3. Congress created the Commission, among other reasons, ‘‘for the purpose of the national defense [and] for the purpose of promoting safety of life and property through the use of wire and radio communications.’’ To obtain ‘‘maximum effectiveness from the use of radio and wire communications in connection with the safety of life and property,’’ the Communications Act of 1934, as amended, directs the Commission to ‘‘investigate and study all phases of the problem and the best methods of obtaining the cooperation and coordination’’ of such systems.’’ 4. The Commission has taken targeted steps to protect the nation’s communications infrastructure from potential security threats. Most recently, the Commission encouraged communications companies to review cybersecurity practices to defend against threats to critical infrastructure, sought comment on how the Commission can leverage its equipment authorization program to encourage device manufacturers to consider cybersecurity standards and guidelines, and acted in the public interest to deny and revoke the section 214 authority of certain carriers to provide telecommunications service in the United States. 5. Independently managed networks are essential to the daily functioning of critical infrastructure such as transportation, gas and electric power, water, and financial markets. These networks can be vulnerable to attack if they deploy a version of BGP at their borders that cannot verify the integrity or authenticity of routing information. These vulnerabilities have two main causes: (1) Validating a route’s origin; and (2) securing and validating the correct BGP path to a given destination. BGP’s vulnerabilities allow a network operator to accidentally or maliciously misconfigure its BGP routers to falsely advertise that its network contains the intended destination for certain internet traffic, or is on the path to that destination. By advertising incorrect routing information, a bad actor could spread incorrect information to other networks and cause traffic intended for the advertised destination to be misrouted to, or through, the bad actor’s network. Causing internet traffic to depart from its most efficient path is termed ‘‘BGP hijacking.’’ Although BGP hijacking can occur anywhere on the global internet, the Commission has an interest in minimizing or eliminating opportunities for it within its jurisdiction because it can potentially harm U.S. citizens, commerce, and public safety operations. 6. Russian network operators have been suspected of exploiting BGP’s E:\FR\FM\11MRN1.SGM 11MRN1 lotter on DSK11XQN23PROD with NOTICES1 14008 Federal Register / Vol. 87, No. 48 / Friday, March 11, 2022 / Notices vulnerability to hijacking, including instances in which traffic has been redirected through Russia without explanation. In late 2017, for example, traffic sent to and from Google, Facebook, Apple and Microsoft was briefly routed through an internet service provider in Russia. That same year, traffic from a number of financial institutions, including MasterCard, Visa, and others was also routed through a Russian government-controlled telecommunications company under ‘‘unexplained’’ circumstances. 7. Over the past two decades, internet stakeholders have developed new standards, specifications, and best practice recommendations intended to address the security risk that BGP poses. The Internet Engineering Task Force (IETF), the principal authority responsible for internet standards, has finalized several standards to reduce BGP vulnerabilities, including BGPsec, an extension to BGP that provides security for the path through which reachability information passes. The National Institute of Standards and Technology (NIST) has released a practice guide proposing a method of validating routes’ origins and recommendations for resilient exchange between independently managed networks. In 2017, the Internet Society launched Mutually Agreed Norms for Routing Security (MANRS), an organizational initiative with membership including over 700 network operators, Internet Service Providers, and enterprises, which aims to reduce or prevent route hijacking and denial of service attacks by requiring network operators to implement available tools and applicable IETF Best Common Practice standards. MANRS focuses on improving routing security by filtering routing advertisements to include only those likely to be relevant to the customer BGP router; enabling source IP address validation for customer networks; coordinating and sharing contact information for network operations center contacts through regional internet registries, and enabling routing information to be validated on a global scale. MANRS offers a tool called ‘‘MANRS Observatory’’ that aggregates data from trusted sources into a dashboard to help network operators improve the security of their networks. Similarly, the Commission’s Communications Security, Reliability, and Interoperability Council (CSRIC) has reported on best practices and recommendations to improve the security of BGP. The roman numerals following the name of federal advisory committee, ‘‘CSRIC,’’ enumerate the VerDate Sep<11>2014 17:10 Mar 10, 2022 Jkt 256001 successive years during which the Commission has chartered CSRIC to provide recommendations on selected topics. CSRIC III recommended that network operators ensure that BGP routers’ internet routing registries are accurate, complete, and up-to-date, and that network operators use a standardsbased approach for providing cryptographically secure registries of internet resources and routing authorizations, a Resource Public Key Infrastructure (RPKI). In this connection, the FCC sought comment on the implementation and effectiveness of the CSRIC III recommendations and/or alternatives that stakeholders have developed since the time of the CSRIC’s original work to address these challenges. CSRIC VI recommended that network operators support MANRS and IETF Best Common Practice standards. Notwithstanding this work, available information suggests that the voluntary adoption and deployment of such measures has been such that many of the independently managed networks that comprise the internet remain vulnerable because they have not taken advantage of these measures. 8. Scope of Inquiry. In this Notice, the Commission seeks comment on any steps that the Commission should consider taking to help protect and strengthen the nation’s communications network and other critical infrastructure from vulnerabilities posed by BGP, and how the Commission can best facilitate the implementation of industry standards and best practices to mitigate the potential harms posed by these vulnerabilities. In order to better understand the BGP ecosystem, the Commission seeks comment on the extent to which Internet Service Providers, public Internet Exchange Providers, and providers of interconnected VoIP service have deployed BGP routers in their networks. Do content delivery networks, and providers of cloud services operate BGP routers in their networks as well? What other types of entities operate BGP routers? The Commission recognizes that there are entities that do not operate BGP routers, but that are otherwise well positioned to support the development and implementation of BGP security practices. For example, there are several regional, national, and local internet registries that manage the allocation and registration of internet number resources, and support RPKIs. As an example, one such regional internet registry, the American Registry for Internet Numbers (ARIN) supports the roles of a digital certificate authority and acts as a repository for routing PO 00000 Frm 00048 Fmt 4703 Sfmt 4703 information and as a validator of RPKI data. Additionally, the Internet Corporation for Assigned Names and Numbers (ICANN), through its affiliate, Internet Assigned Numbers Authority (IANA), has responsibility for coordinating the internet’s unique identifiers. The Commission seeks comment on what role these and other entities, including vendors of BGP routers or other networking equipment, have in supporting the development and implementation of BGP security practices. What threats to internet routing should the Commission consider within the scope of this inquiry in addition to BGP hijacking? For example, to what extent could BGP security measures prevent pervasive monitoring? 9. Measuring BGP Security. The Commission seeks comment on whether industry has defined metrics for identifying BGP routing security incidents and for quantifying their scope and impact. To what extent are available tools, such as NIST’s RPKI Monitor, Automatic and Real-Time dEtection and Mitigation System (ARTEMIS), BGPstream, BGPMon, Kentik, and Traceroute, able to rapidly and accurately detect BGP hijacks or router misconfigurations? To what extent do these tools distinguish malicious routing changes from accidental ones? Do artificial intelligence and machine learning tools promise advancements in this area? 10. Deployment of BGP Security Measures. The Commission seeks comment on the security measures that have been developed and deployed by industry to secure BGP. In addition to the measures recommended by CSRIC III and VI (RPKI, MANRS, and applicable IETF Best Common Practice standards), BGPsec, and the NIST practice guide, what other standards, specifications, or best practices have been developed to address potential attacks that exploit BGP vulnerabilities? The Commission seeks comment on the extent to which network operators have implemented any of the available BGP security measures developed by industry. How effective are these measures in practice? The Commission seeks comment on how to assess, measure, demonstrate, or increase the effectiveness of these security measures. To the extent that network operators have not implemented security measures, the Commission seeks comment on why such measures have not been implemented. To the extent that network operators have implemented security measures, how effective have they been at mitigating E:\FR\FM\11MRN1.SGM 11MRN1 lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 87, No. 48 / Friday, March 11, 2022 / Notices the vulnerability? What obstacles have prevented them from doing so? 11. The Commission seeks comment on the extent to which RPKI, as implemented by other regional internet registries, effectively prevents BGP hijacking. To what extent do network operators take advantage of the RPKI services that regional internet registries offer by implementing RPKI in their networks? To what extent, if any, do network operators’ service level agreements affect the ability of network operators to drop traffic that RPKI deems invalid? How do regional internet registries maintain the certificate authority for the RPKIs in a way that mitigates the risk of a single point of failure vulnerable to distributed denial of service attacks? How do regional internet registries prevent conflicts among distributed RPKI trust anchors? 12. The Commission seeks comment on whether and to what extent network operators anticipate integrating BGPseccapable routers into their networks. The specification for the BGPsec extension to BGP became available in 2017, but it appears that BGPsec has not been widely deployed despite BGP’s known vulnerabilities. Why have network operators not taken more aggressive steps to adopt BGPsec? What particular obstacles or concerns about BGPsec have slowed their adoption? To what extent does the introduction of BGPsec routers potentially introduce compatibility issues among managed networks or introduce delays? 13. For network operators that currently participate in MANRS and comply with its requirements, including support for IETF Best Common Practice standards, the Commission seeks comment on the efficacy of such measures for preventing BGP hijacking. To what extent do the network operators that participate in MANRS support both its required and recommended routing security actions, as well as applicable IETF Best Common Practice standards on which those actions are based? To what extent do network operators participate in MANRS’ various programs, including its equipment vendor program, launched in 2021, which aims to enable routing security features on network equipment and provide support and training guidance to use them, or take advantage of the MANRS Observatory. 14. Commission’s Role. Ensuring continued U.S. leadership requires that the Commission explores opportunities to spur trustworthy innovation for more secure communications and critical infrastructure. The Commission has sought to promote the security of U.S. VerDate Sep<11>2014 17:10 Mar 10, 2022 Jkt 256001 networks and network equipment both by drawing attention to available resources and through exercise of its regulatory authority. Other federal agencies are engaged in cybersecurity and specifically BGP security, including NIST, the Department of Homeland Security, and the National Telecommunications and Information Administration. The Commission seeks comment on steps the Commission, in coordination with other federal agencies, could take to prevent BGP hijacking or otherwise promote secure internet routing. The Commission seeks comment on whether the Commission has a role in helping U.S. network operators deploy BGP security measures. If so, how can the Commission be most helpful? The Commission seeks comment on its authority to promote the security of internet routing through regulation, including as it may apply to wireless and wireline Internet Service Providers, Internet Exchange Providers, interconnected VoIP providers, operators of content delivery networks, cloud service providers, and other enterprise and organizational stakeholders. The Commission seeks comment on whether regulatory clarity could help network operators prioritize investments in the security of their networks. 15. The Commission seeks comment on the extent to which other nations’ telecommunications regulators and multistakeholder organizations have issued rules, guidance, or otherwise encouraged network operators, network security organizations, and equipment vendors to implement BGP security measures and on any lessons learned from those endeavors. The Commission seeks comment on the extent to which the effectiveness of BGP security measures may be related to international participation and coordination. 16. Costs and Benefits. The Commission seek comments on the onetime and ongoing costs of implementing the BGP security measures discussed herein. What capital and operational expenditures attend their implementation? Does the availability of a protocol for RPKI keep implementation costs low? Would network operators need to replace existing routers to support the BGPsec extension? Could support be enabled through a software upgrade, particularly for routers that are not considered to be ‘‘end-of-life’’? To what extent can network operators support MANRS’ required and recommended actions by updating their policies and practices, and without equipment replacement or software updates? What costs would PO 00000 Frm 00049 Fmt 4703 Sfmt 4703 14009 consumer likely experience from BGP security implementations, such as higher service costs or speed reductions? 17. The Commission seeks comment on whether the Commission should encourage industry to prioritize the deployment of BGP security measures within the networks on which critical infrastructure and emergency services rely, as a means of helping industry to control costs otherwise associated with a network-wide deployment. Would this or another phased or gradual implementation of BGP security measures be effective and help network operators to plan for and control implementation costs? 18. The Commission also seeks comment on the national security, economic, and public safety benefits of more secure internet routing, both within the U.S. and globally. What entities are particularly affected by threats to BGP security? To what extent would the security measures discussed herein be effective in mitigating BGP hijacking? What is the potential impact of mitigating BGP hijacking on U.S. national security and the U.S. economy? Have stakeholders attempted to quantify the benefits that secure internet routing could convey by protecting critical infrastructure, sensitive communications, and personally identifiable information? Have stakeholders attempted to quantify the benefits of secure internet routing in terms of the potential loss of Intellectual Property, communications delays, or disruptions that BGP’s unmitigated vulnerability represents? Have stakeholders attempted to measure or quantify the extent to which BGP hijacking poses a threat to life and property by disrupting 9–1–1 calls carried by providers of interconnected VoIP service? What other benefits could potentially accrue from this inquiry? 19. Digital Equity and Inclusion. Finally, the Commission, as part of its continuing effort to advance digital equity for all, including people of color, persons with disabilities, persons who live in rural or Tribal areas, and others who are or have been historically underserved, marginalized, or adversely affected by persistent poverty or inequality, invites comment on any equity-related considerations and benefits (if any) that may be associated with the proposals and issues discussed herein. Section 1 of the Communications Act of 1934 as amended provides that the FCC ‘‘regulat[es] interstate and foreign commerce in communication by wire and radio so as to make [such service] available, so far as possible, to all the E:\FR\FM\11MRN1.SGM 11MRN1 14010 Federal Register / Vol. 87, No. 48 / Friday, March 11, 2022 / Notices people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.’’ The term ‘‘equity’’ is used here consistent with Executive Order 13985 as the consistent and systematic fair, just, and impartial treatment of all individuals, including individuals who belong to underserved communities that have been denied such treatment, such as Black, Latino, and Indigenous and Native American persons, Asian Americans and Pacific Islanders and other persons of color; members of religious minorities; lesbian, gay, bisexual, transgender, and queer (LGBTQ+) persons; persons with disabilities; persons who live in rural areas; and persons otherwise adversely affected by persistent poverty or inequality. Specifically, the Commission seeks comment on how its proposals may promote or inhibit advances in diversity, equity, inclusion, and accessibility, as well the scope of the Commission’s relevant legal authority. 20. Authority for this Notice of Inquiry may be found in sections 1, 4(i)– (j), 4(n), 7, and 403 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 154(i)–(j), 154(n), 157 and Section 1.430 of the Commission’s rules, 47 CFR 1.430. Federal Communications Commission. Marlene H. Dortch, Secretary, Office of the Secretary. [FR Doc. 2022–05121 Filed 3–10–22; 8:45 am] BILLING CODE 6712–01–P FEDERAL COMMUNICATIONS COMMISSION [FR ID 76259] SES Performance Review Board Federal Communications Commission. AGENCY: ACTION: Notice. As required by the Civil Service Reform Act of 1978, Chairwoman Jessica Rosenworcel has appointed the following executives to the Senior Executive Service (SES) Performance Review Board (PRB): lotter on DSK11XQN23PROD with NOTICES1 SUMMARY: Trent Harkrader Debra Jordan Holly Saurer Federal Communications Commission. Katura Jackson, Federal Register Liaison Officer. [FR Doc. 2022–05229 Filed 3–10–22; 8:45 am] BILLING CODE 6712–01–P VerDate Sep<11>2014 17:10 Mar 10, 2022 Jkt 256001 FEDERAL COMMUNICATIONS COMMISSION [OMB 3060–1298; FR ID 75434] Information Collection Being Reviewed by the Federal Communications Commission Under Delegated Authority Federal Communications Commission. ACTION: Notice and request for comments. AGENCY: As part of its continuing effort to reduce paperwork burdens, and as required by the Paperwork Reduction Act (PRA) of 1995, the Federal Communications Commission (FCC or the Commission) invites the general public and other Federal agencies to take this opportunity to comment on the following information collection. Comments are requested concerning: Whether the proposed collection of information is necessary for the proper performance of the functions of the Commission, including whether the information shall have practical utility; the accuracy of the Commission’s burden estimate; ways to enhance the quality, utility, and clarity of the information collected; ways to minimize the burden of the collection of information on the respondents, including the use of automated collection techniques or other forms of information technology; and ways to further reduce the information collection burden on small business concerns with fewer than 25 employees. The FCC may not conduct or sponsor a collection of information unless it displays a currently valid control number. No person shall be subject to any penalty for failing to comply with a collection of information subject to the PRA that does not display a valid Office of Management and Budget (OMB) control number. DATES: Written PRA comments should be submitted on or before May 10, 2022. If you anticipate that you will be submitting comments, but find it difficult to do so within the period of time allowed by this notice, you should advise the contact listed below as soon as possible. ADDRESSES: Direct all PRA comments to Nicole Ongele, FCC, via email PRA@ fcc.gov and to nicole.ongele@fcc.gov. FOR FURTHER INFORMATION CONTACT: For additional information about the information collection, contact Nicole Ongele, (202) 418–2991. SUPPLEMENTARY INFORMATION: OMB Control No.: 3060–1298. SUMMARY: PO 00000 Frm 00050 Fmt 4703 Sfmt 4703 Title: Volunteer Service Agreement Form, FCC Form A–384. Form No.: FCC Form A–384. Type of Review: Extension of a currently approved collection. Respondents: Individuals or households. Number of Respondents and Responses: 140 respondents and 140 responses. Estimated Time Per Response: 0.25 hours. Frequency of Response: One-time reporting requirement. Obligation to Respond: Mandatory. The statutory authority to collect this information derives from 5 U.S.C. 3111, Acceptance of volunteer service. Certification of compliance with COVID–19 vaccine requirements for Federal workers derives from several sources, including most recently Executive Order 13991, Protecting the Federal Workforce and Requiring MaskWearing; Executive Order 14043, Requiring Coronavirus Disease 2019 Vaccination for Federal Employees; and OMB Memorandum M 21–15, COVID– 19 Safe Federal Workplace: Agency Model Safety Principles (Jan. 24, 2021), as amended. Total Annual Burden: 35 hours. Total Annual Cost: No Cost. Privacy Act Impact Assessment: Yes. Records of current and former Federal employees as defined in 5 U.S.C. 2105, including volunteers, grantees, and contract employees on whom the agency maintains records, are covered by OPM’s governmentwide System of Records Notice (SORN) OPM/GOVT–1 General Personnel Records, posted at https://www.opm.gov/informationmanagement/privacy-policy/sorn/opmsorn-govt-1-general-personnelrecords.pdf. The Privacy Impact Assessment (PIA) for the Electronic Official Personnel Folder is posted at https://www.opm.gov/informationmanagement/privacy-policy/privacypolicy/eopf-pia.pdf. Nature and Extent of Confidentiality: As Privacy Act-protected records, these records are kept confidential and will not be disclosed except under applicable Privacy Act exceptions, including the routine uses identified in the OPM/GOVT–1 SORN. Needs and Uses: The Civil Service Reform Act of 1978 authorized Federal agencies to establish programs designed to provide educationally related work assignments for students in a non-pay status. The Act provides that heads of agencies may accept, subject to regulations issued by the Office of Personnel Management, volunteer service for the United States if the service (1) is performed by a student, E:\FR\FM\11MRN1.SGM 11MRN1

Agencies

[Federal Register Volume 87, Number 48 (Friday, March 11, 2022)]
[Notices]
[Pages 14006-14010]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-05121]


-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

[PS Docket No. 22-90, FCC 22-18; FRS 75229]


Secure Internet Routing

AGENCY: Federal Communications Commission.

ACTION: Request for comments.

-----------------------------------------------------------------------

SUMMARY: In this document, the Federal Communications Commission (FCC 
or the Commission) seeks comment on vulnerabilities threatening the 
security and integrity of the Border Gateway Protocol (BGP), which is 
central to the Internet's global routing system, its impact on the 
transmission of data from email, e-commerce, and bank transactions to 
interconnected Voice-over Internet Protocol (VoIP) and 9-1-1 calls, and 
how best to address them.

DATES: Comments are due on or before April 11, 2022; and reply comments 
are due on or before May 10, 2022.

ADDRESSES: You may submit comments, identified by PS Docket No. 22-90, 
by any of the following methods:
     Electronic Filers: Comments may be filed electronically by 
accessing ECFS at https://www.fcc.gov/ecfs.
     Paper Filers: Paper filings can be sent by hand or 
messenger delivery, by commercial overnight courier, or by first-class 
or overnight U.S. Postal Service mail.
     People with Disabilities: To request materials in 
accessible formats for people with disabilities (braille, large print, 
electronic files, audio format), send an email to [email protected] or 
call the Consumer & Governmental Affairs Bureau at 202-418-0530 
(voice), 202-418-0432 (tty).
    For detailed instructions for submitting comments and additional 
information on this proceeding, see the SUPPLEMENTARY INFORMATION 
section of this document.

FOR FURTHER INFORMATION CONTACT: For additional information on this 
proceeding, contact James Wiley of the Cybersecurity and Communications 
Reliability Division, Public Safety and Homeland Security Bureau, at 
[email protected] or (202) 418-1678 or Minsoo Kim of the 
Cybersecurity and Communications Reliability Division, Public Safety 
and Homeland Security Bureau, at [email protected] or (202) 418-1739.

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Notice 
of Inquiry, FCC 22-18, released February 28, 2022. The full text of 
this document is available at https://www.fcc.gov/document/fcc-launches-inquiry-internet-routing-vulnerabilities.
    Ex Parte Rules. This proceeding shall be treated as a ``permit-but-
disclose'' proceeding in accordance with the Commission's ex parte 
rules. Although the rules do not generally require ex parte 
presentations to be treated as ``permit but disclose'' in Notice of 
Inquiry proceedings, the Commission exercises its discretion in this 
instance, and finds that the public interest is served by making ex 
parte presentations available to the public, in order to encourage a 
robust record. Persons making ex parte presentations must file a copy 
of any written presentation or a memorandum summarizing any oral 
presentation within two business days after the presentation (unless a 
different deadline applicable to the Sunshine period applies). Persons 
making oral ex parte presentations are reminded that memoranda 
summarizing the presentation must (1) list all persons attending or 
otherwise participating in the meeting at which the ex parte 
presentation was made, and (2) summarize all data presented and 
arguments made during the presentation. If the presentation consisted 
in whole or in part of the presentation of data or arguments already 
reflected in the presenter's written comments, memoranda, or other 
filings in the proceeding, the presenter may provide citations to such 
data or arguments in his or her prior comments, memoranda, or other 
filings (specifying the relevant page and/or paragraph numbers where 
such data or arguments can be found) in lieu of summarizing them in the 
memorandum. Documents shown or given to Commission staff during ex 
parte meetings are deemed to be written ex parte presentations and must 
be filed consistent with Rule 1.1206(b), 47 CFR 1.1206(b). Participants 
in this proceeding should familiarize themselves with the Commission's 
ex parte rules.
    Confidentiality. The Commission recognizes that some comments could 
contain information that the submitter believes should not be made 
available to the general public because of commercial or national 
security reasons. Parties may request that such information be kept 
confidential, identifying the specific information sought to be kept 
confidential, providing the reasons for the request, and otherwise 
following the procedures set forth in section 0.459 of the

[[Page 14007]]

Commission's rules. If a party requests confidential treatment of a 
comment, it must file an original and one copy of the confidential 
version of the comment on paper, following the procedures below, and a 
public version of the filing that omits only the confidential 
information and is otherwise identical to the confidential version, 
using either the electronic filing or the filing-by-paper procedures 
below.
    Comment Filing Procedures. Interested parties may file comments and 
reply comments on or before the dates indicated on the first page of 
this document. Comments may be filed using the Commission's Electronic 
Comment Filing System (ECFS) or by paper. All filings must be addressed 
to the Commission's Secretary, Office of the Secretary, Federal 
Communications Commission.
     Paper Filers: Parties who choose to file by paper must 
file an original and one copy of each filing. Paper filings can be sent 
by hand or messenger delivery, by commercial overnight courier, or by 
first-class or overnight U.S. Postal Service mail. All filings must be 
addressed to the Commission's Secretary, Office of the Secretary, 
Federal Communications Commission.
     Effective March 19, 2020, and until further notice, the 
Commission no longer accepts any hand or messenger delivered filings. 
This is a temporary measure taken to help protect the health and safety 
of individuals, and to mitigate the transmission of COVID-19. See FCC 
Announces Closure of FCC Headquarters Open Window and Change in Hand-
Delivery Policy, Public Notice, 35 FCC Rcd 2788 (2020), https://www.fcc.gov/document/fcc-closes-headquarters-open-window-and-changes-hand-delivery-policy.
     Commercial overnight mail (other than U.S. Postal Service 
Express Mail and Priority Mail) must be sent to 9050 Junction Drive, 
Annapolis Junction, MD 20701.
     U.S. Postal Service first-class, Express, and Priority 
mail must be addressed to 45 L Street NE, Washington, DC 20554.
    Availability of Documents. Comments, reply comments, and ex parte 
submissions will be publicly available online via ECFS. These documents 
will also be available for public inspection during regular business 
hours in the FCC Reference Information Center, when FCC Headquarters 
reopen to the public.
    People with Disabilities. To request materials in accessible 
formats for people with disabilities (braille, large print, electronic 
files, audio format), send an email to [email protected] or call the 
Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-
418-0432 (tty).

Synopsis

    1. The Commission plays an important role in protecting the 
security of America's communications networks and critical 
infrastructure. The Commission, in tandem with its federal partners, 
has urged the communications sector to defend against cyber threats, 
while also taking measures to reinforce our Nation's readiness and to 
strengthen the cybersecurity of vital communications services and 
infrastructure, especially in light of Russia's escalating actions 
inside of Ukraine. Today, the Commission builds on those efforts. With 
this Notice of Inquiry (Notice), the Commission seeks comment on 
vulnerabilities threatening the security and integrity of the Border 
Gateway Protocol (BGP), which is central to the internet's global 
routing system, its impact on the transmission of data from email, e-
commerce, and bank transactions to interconnected Voice-over Internet 
Protocol (VoIP) and 9-1-1 calls, and how best to address them.
    2. BGP is the routing protocol used to exchange reachability 
information amongst independently managed networks on the internet. 
These independently managed networks (also termed ``domains'') loosely 
map to one or more ``Autonomous Systems'' (so termed because the 
administration of the network is the sole responsibility of a single, 
independent entity). BGP's initial design, which remains widely 
deployed today, does not include security features to ensure trust in 
the information that it is used to exchange. BGP was designed at a time 
when the number of independently managed networks on the internet was 
low and the trust among them was high. As a result, a bad network actor 
may deliberately falsify BGP reachability information to redirect 
traffic to itself or through a specific third-party network, and 
prevent that traffic from reaching its intended recipient. When a bad 
actor directs traffic to be dropped in this way, it is commonly 
referred to as a ``blackhole.'' These ``BGP hijacks'' expose U.S. 
citizens' personally identifiable information, enable theft, extortion, 
and state-level espionage, and disrupt otherwise-secure transactions. 
The Commission uses the term ``BGP hijacking'' to refer to any 
deliberate injection of routing information away from the optimal (or 
most secure) route, including both false route origination and path 
interception attacks.
    3. Congress created the Commission, among other reasons, ``for the 
purpose of the national defense [and] for the purpose of promoting 
safety of life and property through the use of wire and radio 
communications.'' To obtain ``maximum effectiveness from the use of 
radio and wire communications in connection with the safety of life and 
property,'' the Communications Act of 1934, as amended, directs the 
Commission to ``investigate and study all phases of the problem and the 
best methods of obtaining the cooperation and coordination'' of such 
systems.''
    4. The Commission has taken targeted steps to protect the nation's 
communications infrastructure from potential security threats. Most 
recently, the Commission encouraged communications companies to review 
cybersecurity practices to defend against threats to critical 
infrastructure, sought comment on how the Commission can leverage its 
equipment authorization program to encourage device manufacturers to 
consider cybersecurity standards and guidelines, and acted in the 
public interest to deny and revoke the section 214 authority of certain 
carriers to provide telecommunications service in the United States.
    5. Independently managed networks are essential to the daily 
functioning of critical infrastructure such as transportation, gas and 
electric power, water, and financial markets. These networks can be 
vulnerable to attack if they deploy a version of BGP at their borders 
that cannot verify the integrity or authenticity of routing 
information. These vulnerabilities have two main causes: (1) Validating 
a route's origin; and (2) securing and validating the correct BGP path 
to a given destination. BGP's vulnerabilities allow a network operator 
to accidentally or maliciously misconfigure its BGP routers to falsely 
advertise that its network contains the intended destination for 
certain internet traffic, or is on the path to that destination. By 
advertising incorrect routing information, a bad actor could spread 
incorrect information to other networks and cause traffic intended for 
the advertised destination to be misrouted to, or through, the bad 
actor's network. Causing internet traffic to depart from its most 
efficient path is termed ``BGP hijacking.'' Although BGP hijacking can 
occur anywhere on the global internet, the Commission has an interest 
in minimizing or eliminating opportunities for it within its 
jurisdiction because it can potentially harm U.S. citizens, commerce, 
and public safety operations.
    6. Russian network operators have been suspected of exploiting 
BGP's

[[Page 14008]]

vulnerability to hijacking, including instances in which traffic has 
been redirected through Russia without explanation. In late 2017, for 
example, traffic sent to and from Google, Facebook, Apple and Microsoft 
was briefly routed through an internet service provider in Russia. That 
same year, traffic from a number of financial institutions, including 
MasterCard, Visa, and others was also routed through a Russian 
government-controlled telecommunications company under ``unexplained'' 
circumstances.
    7. Over the past two decades, internet stakeholders have developed 
new standards, specifications, and best practice recommendations 
intended to address the security risk that BGP poses. The Internet 
Engineering Task Force (IETF), the principal authority responsible for 
internet standards, has finalized several standards to reduce BGP 
vulnerabilities, including BGPsec, an extension to BGP that provides 
security for the path through which reachability information passes. 
The National Institute of Standards and Technology (NIST) has released 
a practice guide proposing a method of validating routes' origins and 
recommendations for resilient exchange between independently managed 
networks. In 2017, the Internet Society launched Mutually Agreed Norms 
for Routing Security (MANRS), an organizational initiative with 
membership including over 700 network operators, Internet Service 
Providers, and enterprises, which aims to reduce or prevent route 
hijacking and denial of service attacks by requiring network operators 
to implement available tools and applicable IETF Best Common Practice 
standards. MANRS focuses on improving routing security by filtering 
routing advertisements to include only those likely to be relevant to 
the customer BGP router; enabling source IP address validation for 
customer networks; coordinating and sharing contact information for 
network operations center contacts through regional internet 
registries, and enabling routing information to be validated on a 
global scale. MANRS offers a tool called ``MANRS Observatory'' that 
aggregates data from trusted sources into a dashboard to help network 
operators improve the security of their networks. Similarly, the 
Commission's Communications Security, Reliability, and Interoperability 
Council (CSRIC) has reported on best practices and recommendations to 
improve the security of BGP. The roman numerals following the name of 
federal advisory committee, ``CSRIC,'' enumerate the successive years 
during which the Commission has chartered CSRIC to provide 
recommendations on selected topics. CSRIC III recommended that network 
operators ensure that BGP routers' internet routing registries are 
accurate, complete, and up-to-date, and that network operators use a 
standards-based approach for providing cryptographically secure 
registries of internet resources and routing authorizations, a Resource 
Public Key Infrastructure (RPKI). In this connection, the FCC sought 
comment on the implementation and effectiveness of the CSRIC III 
recommendations and/or alternatives that stakeholders have developed 
since the time of the CSRIC's original work to address these 
challenges. CSRIC VI recommended that network operators support MANRS 
and IETF Best Common Practice standards. Notwithstanding this work, 
available information suggests that the voluntary adoption and 
deployment of such measures has been such that many of the 
independently managed networks that comprise the internet remain 
vulnerable because they have not taken advantage of these measures.
    8. Scope of Inquiry. In this Notice, the Commission seeks comment 
on any steps that the Commission should consider taking to help protect 
and strengthen the nation's communications network and other critical 
infrastructure from vulnerabilities posed by BGP, and how the 
Commission can best facilitate the implementation of industry standards 
and best practices to mitigate the potential harms posed by these 
vulnerabilities. In order to better understand the BGP ecosystem, the 
Commission seeks comment on the extent to which Internet Service 
Providers, public Internet Exchange Providers, and providers of 
interconnected VoIP service have deployed BGP routers in their 
networks. Do content delivery networks, and providers of cloud services 
operate BGP routers in their networks as well? What other types of 
entities operate BGP routers? The Commission recognizes that there are 
entities that do not operate BGP routers, but that are otherwise well 
positioned to support the development and implementation of BGP 
security practices. For example, there are several regional, national, 
and local internet registries that manage the allocation and 
registration of internet number resources, and support RPKIs. As an 
example, one such regional internet registry, the American Registry for 
Internet Numbers (ARIN) supports the roles of a digital certificate 
authority and acts as a repository for routing information and as a 
validator of RPKI data. Additionally, the Internet Corporation for 
Assigned Names and Numbers (ICANN), through its affiliate, Internet 
Assigned Numbers Authority (IANA), has responsibility for coordinating 
the internet's unique identifiers. The Commission seeks comment on what 
role these and other entities, including vendors of BGP routers or 
other networking equipment, have in supporting the development and 
implementation of BGP security practices. What threats to internet 
routing should the Commission consider within the scope of this inquiry 
in addition to BGP hijacking? For example, to what extent could BGP 
security measures prevent pervasive monitoring?
    9. Measuring BGP Security. The Commission seeks comment on whether 
industry has defined metrics for identifying BGP routing security 
incidents and for quantifying their scope and impact. To what extent 
are available tools, such as NIST's RPKI Monitor, Automatic and Real-
Time dEtection and Mitigation System (ARTEMIS), BGPstream, BGPMon, 
Kentik, and Traceroute, able to rapidly and accurately detect BGP 
hijacks or router misconfigurations? To what extent do these tools 
distinguish malicious routing changes from accidental ones? Do 
artificial intelligence and machine learning tools promise advancements 
in this area?
    10. Deployment of BGP Security Measures. The Commission seeks 
comment on the security measures that have been developed and deployed 
by industry to secure BGP. In addition to the measures recommended by 
CSRIC III and VI (RPKI, MANRS, and applicable IETF Best Common Practice 
standards), BGPsec, and the NIST practice guide, what other standards, 
specifications, or best practices have been developed to address 
potential attacks that exploit BGP vulnerabilities? The Commission 
seeks comment on the extent to which network operators have implemented 
any of the available BGP security measures developed by industry. How 
effective are these measures in practice? The Commission seeks comment 
on how to assess, measure, demonstrate, or increase the effectiveness 
of these security measures. To the extent that network operators have 
not implemented security measures, the Commission seeks comment on why 
such measures have not been implemented. To the extent that network 
operators have implemented security measures, how effective have they 
been at mitigating

[[Page 14009]]

the vulnerability? What obstacles have prevented them from doing so?
    11. The Commission seeks comment on the extent to which RPKI, as 
implemented by other regional internet registries, effectively prevents 
BGP hijacking. To what extent do network operators take advantage of 
the RPKI services that regional internet registries offer by 
implementing RPKI in their networks? To what extent, if any, do network 
operators' service level agreements affect the ability of network 
operators to drop traffic that RPKI deems invalid? How do regional 
internet registries maintain the certificate authority for the RPKIs in 
a way that mitigates the risk of a single point of failure vulnerable 
to distributed denial of service attacks? How do regional internet 
registries prevent conflicts among distributed RPKI trust anchors?
    12. The Commission seeks comment on whether and to what extent 
network operators anticipate integrating BGPsec-capable routers into 
their networks. The specification for the BGPsec extension to BGP 
became available in 2017, but it appears that BGPsec has not been 
widely deployed despite BGP's known vulnerabilities. Why have network 
operators not taken more aggressive steps to adopt BGPsec? What 
particular obstacles or concerns about BGPsec have slowed their 
adoption? To what extent does the introduction of BGPsec routers 
potentially introduce compatibility issues among managed networks or 
introduce delays?
    13. For network operators that currently participate in MANRS and 
comply with its requirements, including support for IETF Best Common 
Practice standards, the Commission seeks comment on the efficacy of 
such measures for preventing BGP hijacking. To what extent do the 
network operators that participate in MANRS support both its required 
and recommended routing security actions, as well as applicable IETF 
Best Common Practice standards on which those actions are based? To 
what extent do network operators participate in MANRS' various 
programs, including its equipment vendor program, launched in 2021, 
which aims to enable routing security features on network equipment and 
provide support and training guidance to use them, or take advantage of 
the MANRS Observatory.
    14. Commission's Role. Ensuring continued U.S. leadership requires 
that the Commission explores opportunities to spur trustworthy 
innovation for more secure communications and critical infrastructure. 
The Commission has sought to promote the security of U.S. networks and 
network equipment both by drawing attention to available resources and 
through exercise of its regulatory authority. Other federal agencies 
are engaged in cybersecurity and specifically BGP security, including 
NIST, the Department of Homeland Security, and the National 
Telecommunications and Information Administration. The Commission seeks 
comment on steps the Commission, in coordination with other federal 
agencies, could take to prevent BGP hijacking or otherwise promote 
secure internet routing. The Commission seeks comment on whether the 
Commission has a role in helping U.S. network operators deploy BGP 
security measures. If so, how can the Commission be most helpful? The 
Commission seeks comment on its authority to promote the security of 
internet routing through regulation, including as it may apply to 
wireless and wireline Internet Service Providers, Internet Exchange 
Providers, interconnected VoIP providers, operators of content delivery 
networks, cloud service providers, and other enterprise and 
organizational stakeholders. The Commission seeks comment on whether 
regulatory clarity could help network operators prioritize investments 
in the security of their networks.
    15. The Commission seeks comment on the extent to which other 
nations' telecommunications regulators and multistakeholder 
organizations have issued rules, guidance, or otherwise encouraged 
network operators, network security organizations, and equipment 
vendors to implement BGP security measures and on any lessons learned 
from those endeavors. The Commission seeks comment on the extent to 
which the effectiveness of BGP security measures may be related to 
international participation and coordination.
    16. Costs and Benefits. The Commission seek comments on the one-
time and ongoing costs of implementing the BGP security measures 
discussed herein. What capital and operational expenditures attend 
their implementation? Does the availability of a protocol for RPKI keep 
implementation costs low? Would network operators need to replace 
existing routers to support the BGPsec extension? Could support be 
enabled through a software upgrade, particularly for routers that are 
not considered to be ``end-of-life''? To what extent can network 
operators support MANRS' required and recommended actions by updating 
their policies and practices, and without equipment replacement or 
software updates? What costs would consumer likely experience from BGP 
security implementations, such as higher service costs or speed 
reductions?
    17. The Commission seeks comment on whether the Commission should 
encourage industry to prioritize the deployment of BGP security 
measures within the networks on which critical infrastructure and 
emergency services rely, as a means of helping industry to control 
costs otherwise associated with a network-wide deployment. Would this 
or another phased or gradual implementation of BGP security measures be 
effective and help network operators to plan for and control 
implementation costs?
    18. The Commission also seeks comment on the national security, 
economic, and public safety benefits of more secure internet routing, 
both within the U.S. and globally. What entities are particularly 
affected by threats to BGP security? To what extent would the security 
measures discussed herein be effective in mitigating BGP hijacking? 
What is the potential impact of mitigating BGP hijacking on U.S. 
national security and the U.S. economy? Have stakeholders attempted to 
quantify the benefits that secure internet routing could convey by 
protecting critical infrastructure, sensitive communications, and 
personally identifiable information? Have stakeholders attempted to 
quantify the benefits of secure internet routing in terms of the 
potential loss of Intellectual Property, communications delays, or 
disruptions that BGP's unmitigated vulnerability represents? Have 
stakeholders attempted to measure or quantify the extent to which BGP 
hijacking poses a threat to life and property by disrupting 9-1-1 calls 
carried by providers of interconnected VoIP service? What other 
benefits could potentially accrue from this inquiry?
    19. Digital Equity and Inclusion. Finally, the Commission, as part 
of its continuing effort to advance digital equity for all, including 
people of color, persons with disabilities, persons who live in rural 
or Tribal areas, and others who are or have been historically 
underserved, marginalized, or adversely affected by persistent poverty 
or inequality, invites comment on any equity-related considerations and 
benefits (if any) that may be associated with the proposals and issues 
discussed herein. Section 1 of the Communications Act of 1934 as 
amended provides that the FCC ``regulat[es] interstate and foreign 
commerce in communication by wire and radio so as to make [such 
service] available, so far as possible, to all the

[[Page 14010]]

people of the United States, without discrimination on the basis of 
race, color, religion, national origin, or sex.'' The term ``equity'' 
is used here consistent with Executive Order 13985 as the consistent 
and systematic fair, just, and impartial treatment of all individuals, 
including individuals who belong to underserved communities that have 
been denied such treatment, such as Black, Latino, and Indigenous and 
Native American persons, Asian Americans and Pacific Islanders and 
other persons of color; members of religious minorities; lesbian, gay, 
bisexual, transgender, and queer (LGBTQ+) persons; persons with 
disabilities; persons who live in rural areas; and persons otherwise 
adversely affected by persistent poverty or inequality. Specifically, 
the Commission seeks comment on how its proposals may promote or 
inhibit advances in diversity, equity, inclusion, and accessibility, as 
well the scope of the Commission's relevant legal authority.
    20. Authority for this Notice of Inquiry may be found in sections 
1, 4(i)-(j), 4(n), 7, and 403 of the Communications Act of 1934, as 
amended, 47 U.S.C. 151, 154(i)-(j), 154(n), 157 and Section 1.430 of 
the Commission's rules, 47 CFR 1.430.

Federal Communications Commission.
Marlene H. Dortch,
Secretary, Office of the Secretary.
[FR Doc. 2022-05121 Filed 3-10-22; 8:45 am]
BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.