<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H2ECC03FA14B44A8882B03DC9B9FCF63D" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 HR 1709 IH: Understanding Cybersecurity of Mobile Networks Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2025-02-27</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">119th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 1709</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20250227">February 27, 2025</action-date><action-desc><sponsor name-id="L000601">Mr. Landsman</sponsor> (for himself and <cosponsor name-id="C001039">Mrs. Cammack</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To direct the Assistant Secretary of Commerce for Communications and Information to submit to Congress a report examining the cybersecurity of mobile service networks, and for other purposes.</official-title></form><legis-body id="H706B8680705242DB9CF18CBC36B769D8" style="OLC"><section id="HDB47CD60ED0047B694035745E6361A0E" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Understanding Cybersecurity of Mobile Networks Act</short-title></quote>.</text></section><section id="HC7255D10DDE14D1CB7D634122FA0ED26"><enum>2.</enum><header>Report on cybersecurity of mobile service networks</header><subsection id="HF51F97E29FF444E297BDB54739DB1741"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, the Assistant Secretary, in consultation with the Department of Homeland Security, shall submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report examining the cybersecurity of mobile service networks and the vulnerability of such networks and mobile devices to cyberattacks and surveillance conducted by adversaries.</text></subsection><subsection id="H9F6315D7694F4794BAB3CBAEAD0E8D52"><enum>(b)</enum><header>Matters To be included</header><text>The report required by subsection (a) shall include the following:</text><paragraph id="HCD8305215F5942E4BD28654DA65A27BA"><enum>(1)</enum><text>An assessment of the degree to which providers of mobile service have addressed, are addressing, or have not addressed cybersecurity vulnerabilities (including vulnerabilities the exploitation of which could lead to surveillance conducted by adversaries) identified by academic and independent researchers, multistakeholder standards and technical organizations, industry experts, and Federal agencies, including in relevant reports of—</text><subparagraph id="HD7CD1AD186A24727B4686E722B01AA39"><enum>(A)</enum><text>the National Telecommunications and Information Administration;</text></subparagraph><subparagraph id="HCB911609723D4EE78DA6D29A852AEA5F"><enum>(B)</enum><text>the National Institute of Standards and Technology; and</text></subparagraph><subparagraph id="H2B8B91524F8A4207902DE7C5511DA4D4"><enum>(C)</enum><text>the Department of Homeland Security, including—</text><clause id="HD4B17199C4DB4401A973B383F0FA92A1"><enum>(i)</enum><text>the Cybersecurity and Infrastructure Security Agency; and</text></clause><clause id="HD205BC5520844B9591A99573EDC91B6C"><enum>(ii)</enum><text>the Science and Technology Directorate.</text></clause></subparagraph></paragraph><paragraph id="H30BCB9FB362045AFA60C8198E625AF0F"><enum>(2)</enum><text>A discussion of—</text><subparagraph id="H6EA5439EC414443E985B4E831EB48226"><enum>(A)</enum><text>the degree to which customers (including consumers, companies, and government agencies) consider cybersecurity as a factor when considering the purchase of mobile service and mobile devices; and</text></subparagraph><subparagraph id="HE0A79F473BDC41FB99B4E39EAA6F0000"><enum>(B)</enum><text display-inline="yes-display-inline">the commercial availability of tools, frameworks, best practices, and other resources for enabling such customers to evaluate cybersecurity risk and price tradeoffs.</text></subparagraph></paragraph><paragraph id="H9C5BAA7FB16640518660FF1E3AA29FAE"><enum>(3)</enum><text>A discussion of the degree to which providers of mobile service have implemented cybersecurity best practices and risk assessment frameworks.</text></paragraph><paragraph id="H6CE2FE0AD09848F18DAC35593B7804FA"><enum>(4)</enum><text>An estimate and discussion of the prevalence and efficacy of encryption and authentication algorithms and techniques used in each of the following:</text><subparagraph id="HF4BAA118CA2C41EE9DE4FC434F4096FC"><enum>(A)</enum><text>Mobile service.</text></subparagraph><subparagraph id="H44EC4E05C6CE4D28ADEA2987844C6A10"><enum>(B)</enum><text>Mobile communications equipment or services.</text></subparagraph><subparagraph id="HE3DAC3500FF14C0C9BD59A723384C639"><enum>(C)</enum><text>Commonly used mobile phones and other mobile devices.</text></subparagraph><subparagraph id="H7BFD61A348644A3688EFB346315968B0"><enum>(D)</enum><text>Commonly used mobile operating systems and communications software and applications.</text></subparagraph></paragraph><paragraph id="HCA56348D9E274B4FA38909DCBE664762"><enum>(5)</enum><text display-inline="yes-display-inline">A discussion of the barriers for providers of mobile service to adopt more efficacious encryption and authentication algorithms and techniques and to prohibit the use of older encryption and authentication algorithms and techniques with established vulnerabilities in mobile service, mobile communications equipment or services, and mobile phones and other mobile devices.</text></paragraph><paragraph id="H84F65D25CEE8464C97A662721A1264A4"><enum>(6)</enum><text display-inline="yes-display-inline">An estimate and discussion of the prevalence, usage, and availability of technologies that authenticate legitimate mobile service and mobile communications equipment or services to which mobile phones and other mobile devices are connected.</text></paragraph><paragraph id="HC8A362885BFA458C8EAD8D1A2795DCE5"><enum>(7)</enum><text display-inline="yes-display-inline">An estimate and discussion of the prevalence, costs, commercial availability, and usage by adversaries in the United States of cell site simulators (often known as international mobile subscriber identity catchers) and other mobile service surveillance and interception technologies.</text></paragraph></subsection><subsection id="H6F23C2A6F29D417CAFAC44137A8E0295"><enum>(c)</enum><header>Consultation</header><text>In preparing the report required by subsection (a), the Assistant Secretary shall, to the degree practicable, consult with—</text><paragraph id="HF6767C799F4845B99F4DB323F25A3446"><enum>(1)</enum><text>the Federal Communications Commission;</text></paragraph><paragraph id="H2B21F4FB89514DC2AF7F6CC546ACA85D"><enum>(2)</enum><text>the National Institute of Standards and Technology;</text></paragraph><paragraph id="HC88D7F8088844DCE92144132B19F796B"><enum>(3)</enum><text>the intelligence community;</text></paragraph><paragraph id="H7F683AA3D9704BC6BF43458DF425D761"><enum>(4)</enum><text>the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security;</text></paragraph><paragraph id="H68D750EDAA634BFCBAB2535A833A909F"><enum>(5)</enum><text>the Science and Technology Directorate of the Department of Homeland Security;</text></paragraph><paragraph id="H4832CF8E00B74C61978FFC8C9B420B4C"><enum>(6)</enum><text>academic and independent researchers with expertise in privacy, encryption, cybersecurity, and network threats;</text></paragraph><paragraph id="HBB73D7B48889413E8E5C2B49365AE178"><enum>(7)</enum><text>participants in multistakeholder standards and technical organizations (including the 3rd Generation Partnership Project and the Internet Engineering Task Force);</text></paragraph><paragraph id="H1AA95FD06F9248D8A86427D5EDEFCE5B"><enum>(8)</enum><text>international stakeholders, in coordination with the Department of State as appropriate;</text></paragraph><paragraph id="HFF46E3FC5AE547158870323C662F475A"><enum>(9)</enum><text display-inline="yes-display-inline">providers of mobile service, including small providers (or the representatives of such providers) and rural providers (or the representatives of such providers);</text></paragraph><paragraph id="HA6E529B7258645BAB513C10BB6CF416B"><enum>(10)</enum><text>manufacturers, operators, and providers of mobile communications equipment or services and mobile phones and other mobile devices;</text></paragraph><paragraph id="H8055122C8D404A3098F2985244BBBB60"><enum>(11)</enum><text>developers of mobile operating systems and communications software and applications; and</text></paragraph><paragraph id="H6A8AC4B2B8124A30AEE1E3B7BA20CD6F"><enum>(12)</enum><text>other experts that the Assistant Secretary considers appropriate.</text></paragraph></subsection><subsection id="H5BB9952A73F24F6897ED0F645C4768F6"><enum>(d)</enum><header>Scope of report</header><text>The Assistant Secretary shall—</text><paragraph id="HE9EA1A59589C4ED89707BB97C013B597"><enum>(1)</enum><text>limit the report required by subsection (a) to mobile service networks;</text></paragraph><paragraph id="H1752F8E9539D477D87C9F8C5A69CFE6C"><enum>(2)</enum><text>exclude consideration of 5G protocols and networks in the report required by subsection (a);</text></paragraph><paragraph id="H0675E7DB4109473A9AE78F57705B4E08"><enum>(3)</enum><text>limit the assessment required by subsection (b)(1) to vulnerabilities that have been shown to be—</text><subparagraph id="HC415474310FF47488B85C4F77453D6B6"><enum>(A)</enum><text>exploited in non-laboratory settings; or</text></subparagraph><subparagraph id="H5280318CE48E4991A7A5B9ADB214011F"><enum>(B)</enum><text>feasibly and practicably exploitable in real-world conditions; and</text></subparagraph></paragraph><paragraph id="HA4D63C208306449F81E160E620099760"><enum>(4)</enum><text>consider in the report required by subsection (a) vulnerabilities that have been effectively mitigated by manufacturers of mobile phones and other mobile devices.</text></paragraph></subsection><subsection id="HDE47C3D72CF041A2A3F7C4B3C170CA7D"><enum>(e)</enum><header>Form of report</header><paragraph id="H1152370691DB43649BF0A09DF2A73E65"><enum>(1)</enum><header>Classified information</header><text>The report required by subsection (a) shall be produced in unclassified form but may contain a classified annex.</text></paragraph><paragraph id="HF65BFEE37E8C4A8B8697B901C3BDD779" commented="no"><enum>(2)</enum><header>Potentially exploitable unclassified information</header><text>The Assistant Secretary shall redact potentially exploitable unclassified information from the report required by subsection (a) but shall provide an unredacted form of the report to the committees described in such subsection.</text></paragraph></subsection><subsection id="HE398152767E34C5F935D3E1E1F365D34"><enum>(f)</enum><header>Definitions</header><text>In this section:</text><paragraph id="HEFBDEEFB4C274CC9B06DBD2680543C9B"><enum>(1)</enum><header>Adversary</header><text>The term <quote>adversary</quote> includes—</text><subparagraph id="HA9D8C02C919F44D9A6A140D2BB0065D7"><enum>(A)</enum><text>any unauthorized hacker or other intruder into a mobile service network; and</text></subparagraph><subparagraph id="H3CC852D496C6440DAB5871467538CFE4"><enum>(B)</enum><text>any foreign government or foreign nongovernment person engaged in a long-term pattern or serious instances of conduct significantly adverse to the national security of the United States or security and safety of United States persons.</text></subparagraph></paragraph><paragraph id="H05CCBF6A8E2A44978DDC18ED89871D64"><enum>(2)</enum><header>Assistant secretary</header><text>The term <quote>Assistant Secretary</quote> means the Assistant Secretary of Commerce for Communications and Information.</text></paragraph><paragraph id="HEBDD3B0D1C994617AAE774980A0DD06F"><enum>(3)</enum><header>Entity</header><text>The term <quote>entity</quote> means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization.</text></paragraph><paragraph id="HE1CD83F9B5C246269A89E00CAEC01761"><enum>(4)</enum><header>Intelligence community</header><text>The term <quote>intelligence community</quote> has the meaning given that term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="HE3829795BF27486699656797D9D68E0E"><enum>(5)</enum><header>Mobile communications equipment or service</header><text>The term <quote>mobile communications equipment or service</quote> means any equipment or service that is essential to the provision of mobile service.</text></paragraph><paragraph id="HC35C40662B084DA4AF0C3C14BE80C503"><enum>(6)</enum><header>Mobile service</header><text>The term <quote>mobile service</quote> means, to the extent provided to United States customers, either or both of the following services:</text><subparagraph id="H29D15D9DAD6D45CE8D280E9BE354A0A5"><enum>(A)</enum><text>Commercial mobile service (as defined in section 332(d) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/332">47 U.S.C. 332(d)</external-xref>)).</text></subparagraph><subparagraph id="HF1E00C4FCD574231B5BF0DB0099A5411"><enum>(B)</enum><text>Commercial mobile data service (as defined in section 6001 of the Middle Class Tax Relief and Job Creation Act of 2012 (<external-xref legal-doc="usc" parsable-cite="usc/47/1401">47 U.S.C. 1401</external-xref>)).</text></subparagraph></paragraph><paragraph id="HE46F80232B0940F4B2F559BB4E11A88D"><enum>(7)</enum><header>Person</header><text>The term <quote>person</quote> means an individual or entity.</text></paragraph><paragraph id="H3C34F991146849CB830DE56B6EF72A45"><enum>(8)</enum><header>United states person</header><text>The term <quote>United States person</quote> means—</text><subparagraph id="H89E377BA29A34200A0609DC58D692075"><enum>(A)</enum><text>an individual who is a United States citizen or an alien lawfully admitted for permanent residence to the United States;</text></subparagraph><subparagraph id="HFB361405DC1E4C8792BD14271DF15B35"><enum>(B)</enum><text>an entity organized under the laws of the United States or any jurisdiction within the United States, including a foreign branch of such an entity; or</text></subparagraph><subparagraph id="H835A9F1F43EA495598968D0E775A3B02"><enum>(C)</enum><text>any person in the United States.</text></subparagraph></paragraph></subsection></section></legis-body></bill> 

