The Broken Cellular Network—And Who's Exploiting It

07.08.25 - 3 min read

From Chinese espionage to celebrity mobile carriers, today's telecom headlines all point to the same issue: commercial cellular infrastructure wasn't built for security. Cape breaks down what’s happening—and why fixing the network itself is the only real solution.

Cape on Cell Infrastructure Policy, published in The Hill

Cape CEO John Doyle makes the case for redesigning telecom infrastructure in a new op-ed for The Hill, connecting SignalGate, Ukraine’s drone comms, and global security risks to one underlying issue: the commercial cellular network is broken.

"We cannot turn back time to a world where strategic, essential communication only happens in a sensitive, compartmentalized information facility, or over private, dedicated networks. Rather than doubling down on outdated protocols, we need to fix the broken network on which the world runs—commercial cellular."

→ Read the full op-ed:

Trump Mobile and the Rise of Values-based Carriers

The Trump Organization's shows consumers want alternatives to traditional providers like Verizon and AT&T, and is part of a growing trend of celebrity-backed telecom carriers. It’s easier than ever to launch a “virtual” telecom or MVNO, but underneath that fresh branding is the same old telecom infrastructure—same vulnerabilities, same data brokers, same surveillance. No matter who your carrier is, if it's running on the same telecom rails, your data is still being harvested and monetized.

Cape is the only privacy-focused mobile carrier with the deep telecom infrastructure to back up our values. We operate our own mobile core—giving you real independence from the traditional carriers, and not just a rebranded experience.

Salt Typhoon is Still Active

The Chinese espionage campaign continues to dominate headlines with mixed messages about containment:

from AT&T and Verizon, challenging their claims that networks are secure. The campaign has expanded internationally, hitting and .

Meanwhile, the Salt Typhoon hackers are "largely contained" and "dormant"—but acknowledged they're difficult to fully remove because they can "create points of persistence" the longer they remain.

More Headlines in Mobile Security
    • Meta Confused by WhatsApp Ban for House Staffers WhatsApp was quietly banned for Congressional staff, but Meta says it wasn’t told why.

Want more stories like these? Subscribe to Cape’s newsletter .


Share it

SIGN UP TODAY

Cape your calls. Cape your location. Cape your life.
Get Cape
Stay informed about Cape
deals and insider info!
All provided information is protected by our Privacy Policy.
This site is secured by reCAPTCHA, which is subject to Google's Privacy Policy and Terms of Service.
Download Our App:
Follow Us: