The Inquiry Is Not Yet Public
The House Permanent Select Committee on Intelligence has begun, in the words of two committee staffers and one member of the panel speaking on condition of anonymity, a non-public inquiry into the executive branch's handling of telecommunications carrier compromise findings attributed to a state-affiliated actor commonly tracked in open reporting as Salt Typhoon. The inquiry's scope, according to those three sources, focuses less on the technical particulars of the intrusions and more on the timeline and the discipline of disclosure.
The members of the panel involved in the inquiry want to understand, in their words, why the executive branch's notifications to congressional oversight, to affected carriers, and to the broader telecommunications customer base lagged the available intelligence reporting by margins that two of the three sources described as significant.
The Timeline Question
The timeline question is the question that drives every congressional oversight inquiry, and it is the question that the executive branch is least comfortable answering on the record. The intelligence community knew about the intrusions before the carriers were notified. The carriers knew about the intrusions before their customers were notified. The customers, in the case of communications metadata for senior officials, knew last and least. The question is whether the gaps between those knowings were operationally necessary, were policy choices, or were institutional failures that the executive branch is now trying to retrofit into one of the first two categories.
A former senior official at the Cybersecurity and Infrastructure Security Agency, who is now affiliated with a think tank focused on cybersecurity policy, characterized the disclosure cadence as inconsistent with what the executive branch told the affected carriers it would be. The carriers had been led to expect notification on one cadence. They received notification on a slower cadence. That gap, the former official said, is the gap the committee is trying to understand.
What the Committee Has Requested
According to the staffers familiar with the inquiry, the committee has requested documents from the Office of the Director of National Intelligence, the Federal Bureau of Investigation's Cyber Division, the Cybersecurity and Infrastructure Security Agency, and the National Security Agency. The requests are formal but are not yet subpoenas. The committee's working assumption is that voluntary production will be faster than compulsory production, and that the executive branch has an institutional incentive to cooperate at this stage because the alternative is a more public version of the same inquiry later.
A spokesperson for the committee declined to comment when contacted about the inquiry. A senior member of the committee, in a separate interview, said the inquiry was being run with what the member described as appropriate restraint. The member said the committee's interest is in the architecture of disclosure rather than in any individual officer's conduct, and that the committee believes the architecture can be repaired without requiring a public confrontation if the executive branch engages in good faith.
The Senate Side
The Senate Select Committee on Intelligence is conducting its own parallel work. Two Senate staffers, speaking on condition of anonymity, said the Senate committee is taking a more documentary approach in the early phase, focused on collecting the underlying intelligence reporting and the executive branch's contemporaneous notifications to the affected carriers. The Senate committee has not yet decided, according to those staffers, whether to merge its work with the House inquiry or to keep the two on parallel tracks.
The two committees often coordinate informally on inquiries of this kind. The decision about whether to formally merge is typically made later in the process, when the staff-level fact gathering produces a clearer picture of where the gaps are and what kind of legislative response, if any, the gaps merit.
The Carrier Posture
The affected carriers, contacted for this story through their respective government affairs offices, declined to characterize the executive branch's notification timeline on the record. Two of the carriers, through officials who would discuss the matter only on background, said the notification cadence had been slower than they had been led to expect at the outset of the matter. A third carrier declined any comment, on the record or on background.
The carriers are in a difficult institutional position. Their cooperation with the executive branch's investigation is ongoing, and they have limited interest in airing the disclosure dispute publicly while the investigation is still active. The committee staffers familiar with the inquiry are aware of that constraint and have, according to the staffers themselves, calibrated their document requests accordingly.
What to Watch
The next inflection point is the executive branch's document production response, which is due in the coming weeks under the timeline the committee has set. If the production is full and timely, the committee will likely proceed with closed-session interviews of the relevant intelligence community officials. If the production is partial or delayed, the committee's leadership has, according to the member quoted above, signaled a willingness to escalate the request to formal subpoena.
Members of both committees are watching the response posture closely. The disclosure architecture for cyber intrusions affecting U.S. critical infrastructure is in the middle of being rewritten, in real time, by the way this inquiry resolves. The committees know it. The executive branch knows it. The carriers know it. The customers, for the most part, do not yet know it.




