SECURING THE TELECOMMUNICATIONS BACKBONE: BEST PRACTICES FOR SOCSSAFEGUARDING