<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H7455674372864486B45F0E8F734953A5" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 HR 7208 IH: Preventing Remote Operations by Threatening Entities on Critical Technology for the Grid Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2026-01-22</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">119th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">H. R. 7208</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20260122">January 22, 2026</action-date><action-desc><sponsor name-id="C001120">Mr. Crenshaw</sponsor> introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name>, and in addition to the Committees on <committee-name committee-id="HFA00">Foreign Affairs</committee-name>, <committee-name committee-id="HGO00">Oversight and Government Reform</committee-name>, <committee-name committee-id="HWM00">Ways and Means</committee-name>, <committee-name committee-id="HIG00">Intelligence (Permanent Select)</committee-name>, and <committee-name committee-id="HHM00">Homeland Security</committee-name>, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned</action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To direct the Secretary of Commerce to submit a report assessing
      vulnerabilities to the electric grid in the United States from certain Internet-connected
 devices and applications, and for other purposes.</official-title></form><legis-body id="H3A87782AED7D4746815B394E39944ADB" style="OLC"><section id="H3B6BAD8C64FE44289804AD958412F520" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Preventing Remote Operations by Threatening Entities on Critical Technology for the Grid Act</short-title></quote> or the <quote><short-title>PROTECT the Grid Act</short-title></quote>.</text></section><section commented="no" display-inline="no-display-inline" id="HFD75DA161E94440DB31681BFC52BD28B"><enum>2.</enum><header>Findings; Purposes</header><subsection commented="no" display-inline="no-display-inline" id="H19FFB143196748B2A46B10A341C379FC"><enum>(a)</enum><header>Findings</header><text>Congress finds that—</text><paragraph id="HFC80C591A6784DD5A2802AE4BB96C9C9"> <enum>(1)</enum> <text>the rapid proliferation of high-wattage IoT devices, such as electric vehicle chargers, clothes dryers, smart air conditioners, water heaters, ovens, and similar appliances, has dramatically increased the number of connected devices in households in the United States;</text>
 </paragraph><paragraph id="H296A89849C28441A9C9ADEFBA2261658"><enum>(2)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="HE57E876275D249B9A468B5C5660E9BE1"><enum>(A)</enum><text>smart appliance applications and software platforms increasingly serve as remote control interfaces; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H821ADEE550D748708F00AB5954A6A837" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">when those applications and software platforms originate from companies operating under the jurisdiction or direction of foreign adversaries they offer a pathway for large-scale, coordinated manipulation of power demand, threatening grid stability;</text></subparagraph></paragraph><paragraph id="H6F69E6C102BA490BAB03E99A78734274"><enum>(3)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="H500621FF76F64297AFB7576C96BFF40F"><enum>(A)</enum><text>in certain foreign adversary jurisdictions, particularly the People’s Republic of China, private companies are subject to formal political oversight through mechanisms such as, in the case of the People’s Republic of China, embedded Chinese Communist Party committees and executive-level Chinese Communist Party leadership; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HC52109A371F145498C0BBCB932140F2A" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">those arrangements blur the lines between commercial activity and state-directed strategic interests;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H46ADDF7CDC594C099A2D82316108E164"><enum>(4)</enum><text display-inline="yes-display-inline">further elevating the risk to the United States electric grid is the 2017 Cybersecurity Law of the People’s Republic of China (commonly referred to as the <quote>Chinese Cybersecurity Law</quote>), which mandates that Chinese companies store customer data domestically and grant Chinese state authorities broad access to those data;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H5C3B7A55028D41BE8CF93137279CB111"><enum>(5)</enum><text display-inline="yes-display-inline">the legal and political structures described in paragraphs (3) and (4) increase the likelihood that connected home appliances could be leveraged by foreign adversaries to target critical infrastructure in the event of a conflict with the United States;</text></paragraph><paragraph id="H066099AB52C34A9DB16387A2C158CE7D"><enum>(6)</enum><text>companies controlled by foreign adversaries—</text><subparagraph commented="no" display-inline="no-display-inline" id="HABD8B688BB3E40EF90E55941B1AC6DF1"><enum>(A)</enum><text display-inline="yes-display-inline">are actively pursuing rapid deployment of high-wattage IoT devices that could be used to attack the electric grid in the United States; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H1785F73B9CEE4687BB13CDF9B8C34932"><enum>(B)</enum><text display-inline="yes-display-inline">control more than 25 percent of the major appliance industry in the United States, which provides an established platform for quickly deploying those high-wattage IoT devices;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H4D4034E1486D434FB918AF023C9F27A7"><enum>(7)</enum><text>through smart applications, companies controlled by foreign adversaries—</text><subparagraph commented="no" display-inline="no-display-inline" id="HAB6DEE75CD9F472B908FEE722691317C"><enum>(A)</enum><text display-inline="yes-display-inline">are actively collecting detailed consumer data on millions of people in the United States; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H2E80EBC09BA84069BF3D563C97781DE2"><enum>(B)</enum><text display-inline="yes-display-inline">have the ability to directly manipulate the demand of high-wattage devices on the electric grid;</text></subparagraph></paragraph><paragraph id="HAB66EA97664A4AE3804CE0F4FC1BBE5A"> <enum>(8)</enum> <text>as a result, foreign adversary-controlled applications for high-wattage IoT devices create significant risk of coordinated, deliberate, demand-manipulation attacks on the electric grid in the United States;</text>
 </paragraph><paragraph id="HC7C0EF91BEC948ECB657FC10319A66E3"><enum>(9)</enum><text>several academic studies from researchers at Princeton University, the Georgia Institute of Technology, and the University of California, Santa Cruz, point to significant risks of manipulation of demand via IoT (commonly referred to as <quote>MaDIoT</quote>) attacks to manipulate power demand on the electric grid that could result in large-scale blackouts and potential damage to the electric grid;</text></paragraph><paragraph id="H1463BEC683214CD48F47A6F06EAB6198"><enum>(10)</enum><text>it is therefore critical to protect energy infrastructure in the United States by ensuring that smart applications embedded in home appliances are secure and cannot serve as an entry point for foreign adversaries; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HC00D8DE8E1224846860943A3B5E1201D"><enum>(11)</enum><text display-inline="yes-display-inline">failing to address the vulnerabilities presented by those smart applications could lead to grid instability, frequency imbalances, cascading system failures, and, ultimately, catastrophic disruptions that jeopardize both public safety and the broader economy of the United States.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="HBCD64330FCE14DEDB76C5435261A820F"><enum>(b)</enum><header>Purposes</header><text>The purposes of this Act are—</text><paragraph commented="no" display-inline="no-display-inline" id="H0A357F1FF0894148857732C59157DDD5"><enum>(1)</enum><text display-inline="yes-display-inline">to harmonize and reinforce existing national security initiatives aimed at securing the domestic information and communications technology and services (commonly referred to as <quote>ICTS</quote>) supply chain against manipulation of demand, especially by the People’s Republic of China; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H4A239CC6BDAD4C5288579831D13F1EFE"><enum>(2)</enum><text display-inline="yes-display-inline">to direct the Secretary of Commerce, in consultation with other relevant Federal officials, to submit to Congress a report containing findings and recommendations to ensure that network-connected home appliances in households in the United States do not serve as a conduit for activities by foreign adversaries or jeopardize the stability of the electric grid in the United States.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="HA5467F397EA142ADAB8FAD0EF99A9C21"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="H993E83A6ACE544BFA696430AA9CB5748"><enum>(1)</enum><header>Consumer product</header><text>The term <quote>consumer product</quote> has the meaning given the term in section 3(a) of the Consumer Product Safety Act (<external-xref legal-doc="usc" parsable-cite="usc/15/2052">15 U.S.C. 2052(a)</external-xref>).</text></paragraph><paragraph id="HE2E3487B1F0A45BA8E1E6D8C4B568B35"><enum>(2)</enum><header>Covered entity</header><text>The term <term>covered entity</term> means an entity that—</text><subparagraph id="H82A2789860384FDF8E6D1C265DEC742C"><enum>(A)</enum><text>is subject to the jurisdiction of a foreign adversary;</text></subparagraph><subparagraph id="H635DFCC12E244DFFA8C340AD4F81A5D4"><enum>(B)</enum><text>is directly or indirectly operating on behalf of a foreign adversary; or</text></subparagraph><subparagraph id="HCC31138D999147C38B9CC147D6C4F1AE" commented="no" display-inline="no-display-inline"><enum>(C)</enum><text>is owned by, directly or indirectly controlled by, or otherwise subject to the direction or influence of, a foreign adversary.</text></subparagraph></paragraph><paragraph id="HCEFC81BF624D45C8A8492400ECD94B1D"><enum>(3)</enum><header>Critical infrastructure</header><text>The term <term>critical infrastructure</term> has the meaning given the term in subsection (e) of the Critical Infrastructures Protection Act of 2001 (<external-xref legal-doc="usc" parsable-cite="usc/42/5195c">42 U.S.C. 5195c</external-xref>).</text></paragraph><paragraph id="H874D5885BCEC4264B94D64FEFE3A1F91"><enum>(4)</enum><header>Foreign adversary</header><text>The term <term>foreign adversary</term> means any covered nation (as defined in section 4872(f) of title 10, United States Code).</text></paragraph><paragraph id="H6602F5FBD9F246FA9C817B68EDA045E2"><enum>(5)</enum><header>Foreign adversary-controlled application</header><text>The term <term>foreign adversary-controlled application</term> means a website, desktop application, mobile application, or augmented or immersive technology application that is operated, directly or indirectly (including through a parent, subsidiary, or affiliate (as those terms are defined in section 230.405 of title 17, Code of Federal Regulations (as in effect on the date of enactment of this Act))), by a covered entity.</text></paragraph><paragraph id="HC4692753DAFC43ACA9A9DDD22DF8EA5C"> <enum>(6)</enum> <header>High-wattage IoT device</header> <text>The term <term>high-wattage IoT device</term> means any Internet-connected appliance or device that is capable of consuming or controlling electrical power at a level exceeding 500 watts, regardless of whether the device is used or designed for use in residential or commercial applications.</text>
      </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H0416AFFB319F4CDA830890A8AF8829E3">
        <enum>(7)</enum>
        <header>IoT</header>
 <text>The term <term>IoT</term> means Internet of Things.</text> </paragraph><paragraph id="H25882172133548B3A1BAFF64825E61C2"><enum>(8)</enum><header>Relevant Federal official</header><text>The term <term>relevant Federal official</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="H17B41312551D4E7983AFBC63413E8323"><enum>(A)</enum><text display-inline="yes-display-inline">any Federal official described in section 1(a) of Executive Order 13873 (84 Fed. Reg. 22689; relating to securing the information and communications technology and services supply chain) (as in effect on the date of enactment of this Act) (or a designee of the applicable Federal official); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H4ADBE8712F1B4A7FB41E9B88B298228F"><enum>(B)</enum><text display-inline="yes-display-inline">the head (or a designee of the head) of any other Federal department or agency that, in the determination of the Secretary of Commerce, is relevant to the purposes of this Act.</text></subparagraph></paragraph></section><section commented="no" display-inline="no-display-inline" id="H420EF869AB434D758C01C51BEE6C4997"><enum>4.</enum><header>Report on national security risks posed by foreign adversary-controlled applications with the capability of controlling high-wattage IoT devices</header><subsection id="HD343F18B9CAF45919F26220AF1B96142"><enum>(a)</enum><header>In general</header><text>Not later than 270 days after the date of enactment of this Act, the Secretary of Commerce, in coordination with other relevant Federal officials, shall submit to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Energy and Commerce of the House of Representatives a report assessing the national security risks associated with foreign adversary-controlled applications with the ability to attack or undermine critical infrastructure in the United States.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="H5BE624405B2646DEA6A337BB634D8980"><enum>(b)</enum><header>Considerations</header><text display-inline="yes-display-inline">In preparing the report under subsection (a), the Secretary of Commerce shall consider, at a minimum—</text><paragraph id="H10157B55DDC04E399917544AA6A7C8D1"><enum>(1)</enum><text>the extent of deployment of high-wattage IoT devices across the United States;</text></paragraph><paragraph id="HF7EF42D885EE40C2B60B2054E54E7085"><enum>(2)</enum><text>risks relating to foreign adversary-controlled applications, especially those incorporated into consumer products that could be used to attack or otherwise destabilize the electric grid;</text></paragraph><paragraph id="HC5B4305E666A483EB65B02B8675929CA"><enum>(3)</enum><text>potential impacts of those risks and any other relevant vulnerabilities on national security, including the risks of frequency imbalances, cascading failures, and other disruptions to critical infrastructure; and</text></paragraph><paragraph id="H48E1DBF2D37745E2866567D5BD976C30"><enum>(4)</enum><text>public comments and input from industry experts, domestic producers, importers, consumer groups, and other stakeholders regarding the security of, and the extent of foreign influence over, foreign adversary-controlled applications and high-wattage IoT devices.</text></paragraph></subsection><subsection id="HDF4ED2ACC9F64C569A2F37F192A10CE2"><enum>(c)</enum><header>Recommendations</header><text>The report submitted under subsection (a) shall include recommendations for mitigation measures to address any identified national security risks, which may include—</text><paragraph id="HEA50F4685F5B43BAA6E026958583A0A9"><enum>(1)</enum><text>an assessment of how Executive Order 13873 (84 Fed. Reg. 22689; relating to securing the information and communications technology and services supply chain) (as in effect on the date of enactment of this Act) may be applied to IoT devices, as such devices apply to the electric grid, to include restrictions or conditions on transactions directly involving foreign adversary-controlled applications in high-wattage IoT devices;</text></paragraph><paragraph id="H8F1DD45E31584E2D9E8B8093516C03B8"><enum>(2)</enum><text>specifically restricting the procurement by the Federal Government of consumer products with a foreign adversary-controlled application;</text></paragraph><paragraph id="H11146EAA4EC641D493E414BC5F95E167"><enum>(3)</enum><text>certification or labeling requirements for high-wattage IoT devices; and</text></paragraph><paragraph id="HEAA1012527634069A586C649C5385FA3"><enum>(4)</enum><text>any other proposal, as determined necessary by the Secretary of Commerce, in consultation with other relevant Federal officials.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="HE792442FC82640C6886A987307D0F4D7"><enum>5.</enum><header>Codification of Executive Order 13873</header><subsection id="HEEA6C30D8CEE4AE9B22439809E3167E6"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The provisions of Executive Order 13873 (84 Fed. Reg. 22689; relating to securing the information and communications technology and services supply chain) (as in effect on the date of enactment of this Act) are enacted into law.</text></subsection><subsection id="H2B74B808EBCF41CF8FE9FE2A7E8DF460"><enum>(b)</enum><header>Publication</header><text>In publishing this Act in slip form and in the United States Statutes at Large pursuant to section 112 of title 1, United States Code, the Archivist of the United States shall include after the date of approval at the end an appendix setting forth the text of the Executive order referred to in subsection (a) (as in effect on the date of enactment of this Act).</text></subsection></section></legis-body></bill>

