Introduced:
Feb 27, 2025
Policy Area:
Science, Technology, Communications
Congress.gov:
Bill Statistics
17
Actions
4
Cosponsors
1
Summaries
6
Subjects
4
Text Versions
Yes
Full Text
AI Summary
AI Summary
No AI Summary Available
Click the button above to generate an AI-powered summary of this bill using Claude.
The summary will analyze the bill's key provisions, impact, and implementation details.
Error generating summary
Latest Action
Jul 15, 2025
Received in the Senate and Read twice and referred to the Committee on Commerce, Science, and Transportation.
Summaries (1)
Introduced in House
- Feb 27, 2025
00
<p><strong>Understanding Cybersecurity of Mobile Networks Act</strong></p><p>This bill requires the National Telecommunications and Information Administration to examine and report on the cybersecurity of mobile service networks and the vulnerability of these networks and mobile devices to cyberattacks and surveillance conducted by adversaries.</p><p>The report must include, among other items, (1) an assessment of the degree to which mobile service providers have addressed certain cybersecurity vulnerabilities; (2) a discussion of the degree to which these providers have implemented cybersecurity best practices and risk assessment frameworks; and (3) an estimate of the prevalence and efficacy of encryption and authentication algorithms and techniques.</p>
Actions (17)
Received in the Senate and Read twice and referred to the Committee on Commerce, Science, and Transportation.
Type: IntroReferral
| Source: Senate
Jul 15, 2025
Motion to reconsider laid on the table Agreed to without objection.
Type: Floor
| Source: House floor actions
| Code: H38310
Jul 14, 2025
6:56 PM
6:56 PM
On motion to suspend the rules and pass the bill Agreed to by the Yeas and Nays: (2/3 required): 360 - 10 (Roll no. 191). (text: CR H3209-3210: 7)
Type: Floor
| Source: House floor actions
| Code: H37300
Jul 14, 2025
6:56 PM
6:56 PM
Passed/agreed to in House: On motion to suspend the rules and pass the bill Agreed to by the Yeas and Nays: (2/3 required): 360 - 10 (Roll no. 191).
Type: Floor
| Source: Library of Congress
| Code: 8000
Jul 14, 2025
6:56 PM
6:56 PM
Considered as unfinished business. (consideration: CR H3230-3231: 4)
Type: Floor
| Source: House floor actions
| Code: H30000
Jul 14, 2025
6:30 PM
6:30 PM
At the conclusion of debate, the Yeas and Nays were demanded and ordered. Pursuant to the provisions of clause 8, rule XX, the Chair announced that further proceedings on the motion would be postponed.
Type: Floor
| Source: House floor actions
| Code: H37220
Jul 14, 2025
3:08 PM
3:08 PM
DEBATE - The House proceeded with forty minutes of debate on H.R. 1709.
Type: Floor
| Source: House floor actions
| Code: H8D000
Jul 14, 2025
3:00 PM
3:00 PM
Considered under suspension of the rules. (consideration: CR H3209-3211: 7)
Type: Floor
| Source: House floor actions
| Code: H30000
Jul 14, 2025
3:00 PM
3:00 PM
Mr. Latta moved to suspend the rules and pass the bill.
Type: Floor
| Source: House floor actions
| Code: H30300
Jul 14, 2025
3:00 PM
3:00 PM
Placed on the Union Calendar, Calendar No. 143.
Type: Calendars
| Source: House floor actions
| Code: H12410
Jun 30, 2025
Reported by the Committee on Energy and Commerce. H. Rept. 119-177.
Type: Committee
| Source: House floor actions
| Code: H12200
Jun 30, 2025
Reported by the Committee on Energy and Commerce. H. Rept. 119-177.
Type: Committee
| Source: Library of Congress
| Code: 5000
Jun 30, 2025
Ordered to be Reported by Voice Vote.
Type: Committee
| Source: House committee actions
| Code: H19000
Mar 4, 2025
Committee Consideration and Mark-up Session Held
Type: Committee
| Source: House committee actions
| Code: H15001
Mar 4, 2025
Referred to the House Committee on Energy and Commerce.
Type: IntroReferral
| Source: House floor actions
| Code: H11100
Feb 27, 2025
Introduced in House
Type: IntroReferral
| Source: Library of Congress
| Code: Intro-H
Feb 27, 2025
Introduced in House
Type: IntroReferral
| Source: Library of Congress
| Code: 1000
Feb 27, 2025
Subjects (6)
Computer security and identity theft
Congressional oversight
Consumer affairs
Homeland security
Science, Technology, Communications
(Policy Area)
Telephone and wireless communication
Cosponsors (4)
(R-IA)
May 6, 2025
May 6, 2025
(R-IN)
Mar 11, 2025
Mar 11, 2025
(R-PA)
Mar 10, 2025
Mar 10, 2025
(R-FL)
Feb 27, 2025
Feb 27, 2025
Text Versions (4)
Full Bill Text
Length: 9,118 characters
Version: Referred in Senate
Version Date: Jul 15, 2025
Last Updated: Nov 15, 2025 6:18 AM
[Congressional Bills 119th Congress]
[From the U.S. Government Publishing Office]
[H.R. 1709 Referred in Senate
(RFS) ]
<DOC>
119th CONGRESS
1st Session
H. R. 1709
_______________________________________________________________________
IN THE SENATE OF THE UNITED STATES
July 15, 2025
Received; read twice and referred to the Committee on Commerce,
Science, and Transportation
_______________________________________________________________________
AN ACT
To direct the Assistant Secretary of Commerce for Communications and
Information to submit to Congress a report examining the cybersecurity
of mobile service networks, and for other purposes.
Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
[From the U.S. Government Publishing Office]
[H.R. 1709 Referred in Senate
(RFS) ]
<DOC>
119th CONGRESS
1st Session
H. R. 1709
_______________________________________________________________________
IN THE SENATE OF THE UNITED STATES
July 15, 2025
Received; read twice and referred to the Committee on Commerce,
Science, and Transportation
_______________________________________________________________________
AN ACT
To direct the Assistant Secretary of Commerce for Communications and
Information to submit to Congress a report examining the cybersecurity
of mobile service networks, and for other purposes.
Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
SECTION 1.
This Act may be cited as the ``Understanding Cybersecurity of
Mobile Networks Act''.
SEC. 2.
(a) In General.--Not later than 1 year after the date of the
enactment of this Act, the Assistant Secretary, in consultation with
the Department of Homeland Security, shall submit to the Committee on
Energy and Commerce of the House of Representatives and the Committee
on Commerce, Science, and Transportation of the Senate a report
examining the cybersecurity of mobile service networks and the
vulnerability of such networks and mobile devices to cyberattacks and
surveillance conducted by adversaries.
(b) Matters To Be Included.--The report required by subsection
(a) shall include the following:
(1) An assessment of the degree to which providers of
mobile service have addressed, are addressing, or have not
addressed cybersecurity vulnerabilities (including
vulnerabilities the exploitation of which could lead to
surveillance conducted by adversaries) identified by academic
and independent researchers, multistakeholder standards and
technical organizations, industry experts, and Federal
agencies, including in relevant reports of--
(A) the National Telecommunications and Information
Administration;
(B) the National Institute of Standards and
Technology; and
(C) the Department of Homeland Security,
including--
(i) the Cybersecurity and Infrastructure
Security Agency; and
(ii) the Science and Technology
Directorate.
(2) A discussion of--
(A) the degree to which customers (including
consumers, companies, and government agencies) consider
cybersecurity as a factor when considering the purchase
of mobile service and mobile devices; and
(B) the commercial availability of tools,
frameworks, best practices, and other resources for
enabling such customers to evaluate cybersecurity risk
and price tradeoffs.
(3) A discussion of the degree to which providers of mobile
service have implemented cybersecurity best practices and risk
assessment frameworks.
(4) An estimate and discussion of the prevalence and
efficacy of encryption and authentication algorithms and
techniques used in each of the following:
(A) Mobile service.
(B) Mobile communications equipment or services.
(C) Commonly used mobile phones and other mobile
devices.
(D) Commonly used mobile operating systems and
communications software and applications.
(5) A discussion of the barriers for providers of mobile
service to adopt more efficacious encryption and authentication
algorithms and techniques and to prohibit the use of older
encryption and authentication algorithms and techniques with
established vulnerabilities in mobile service, mobile
communications equipment or services, and mobile phones and
other mobile devices.
(6) An estimate and discussion of the prevalence, usage,
and availability of technologies that authenticate legitimate
mobile service and mobile communications equipment or services
to which mobile phones and other mobile devices are connected.
(7) An estimate and discussion of the prevalence, costs,
commercial availability, and usage by adversaries in the United
States of cell site simulators (often known as international
mobile subscriber identity catchers) and other mobile service
surveillance and interception technologies.
(c) Consultation.--In preparing the report required by subsection
(a) , the Assistant Secretary shall, to the degree practicable, consult
with--
(1) the Federal Communications Commission;
(2) the National Institute of Standards and Technology;
(3) the intelligence community;
(4) the Cybersecurity and Infrastructure Security Agency of
the Department of Homeland Security;
(5) the Science and Technology Directorate of the
Department of Homeland Security;
(6) academic and independent researchers with expertise in
privacy, encryption, cybersecurity, and network threats;
(7) participants in multistakeholder standards and
technical organizations (including the 3rd Generation
Partnership Project and the Internet Engineering Task Force);
(8) international stakeholders, in coordination with the
Department of State as appropriate;
(9) providers of mobile service, including small providers
(or the representatives of such providers) and rural providers
(or the representatives of such providers);
(10) manufacturers, operators, and providers of mobile
communications equipment or services and mobile phones and
other mobile devices;
(11) developers of mobile operating systems and
communications software and applications; and
(12) other experts that the Assistant Secretary considers
appropriate.
(d) Scope of Report.--The Assistant Secretary shall--
(1) limit the report required by subsection
(a) to mobile
service networks;
(2) exclude consideration of 5G protocols and networks in
the report required by subsection
(a) ;
(3) limit the assessment required by subsection
(b)
(1) to
vulnerabilities that have been shown to be--
(A) exploited in non-laboratory settings; or
(B) feasibly and practicably exploitable in real-
world conditions; and
(4) consider in the report required by subsection
(a) vulnerabilities that have been effectively mitigated by
manufacturers of mobile phones and other mobile devices.
(e) Form of Report.--
(1) Classified information.--The report required by
subsection
(a) shall be produced in unclassified form but may
contain a classified annex.
(2) Potentially exploitable unclassified information.--The
Assistant Secretary shall redact potentially exploitable
unclassified information from the report required by subsection
(a) but shall provide an unredacted form of the report to the
committees described in such subsection.
(f)
=== Definitions. ===
-In this section:
(1) Adversary.--The term ``adversary'' includes--
(A) any unauthorized hacker or other intruder into
a mobile service network; and
(B) any foreign government or foreign nongovernment
person engaged in a long-term pattern or serious
instances of conduct significantly adverse to the
national security of the United States or security and
safety of United States persons.
(2) Assistant secretary.--The term ``Assistant Secretary''
means the Assistant Secretary of Commerce for Communications
and Information.
(3) Entity.--The term ``entity'' means a partnership,
association, trust, joint venture, corporation, group,
subgroup, or other organization.
(4) Intelligence community.--The term ``intelligence
community'' has the meaning given that term in
section 3 of the
National Security Act of 1947 (50 U.
National Security Act of 1947 (50 U.S.C. 3003).
(5) Mobile communications equipment or service.--The term
``mobile communications equipment or service'' means any
equipment or service that is essential to the provision of
mobile service.
(6) Mobile service.--The term ``mobile service'' means, to
the extent provided to United States customers, either or both
of the following services:
(A) Commercial mobile service (as defined in
(5) Mobile communications equipment or service.--The term
``mobile communications equipment or service'' means any
equipment or service that is essential to the provision of
mobile service.
(6) Mobile service.--The term ``mobile service'' means, to
the extent provided to United States customers, either or both
of the following services:
(A) Commercial mobile service (as defined in
section 332
(d) of the Communications Act of 1934 (47
U.
(d) of the Communications Act of 1934 (47
U.S.C. 332
(d) )).
(B) Commercial mobile data service (as defined in
U.S.C. 332
(d) )).
(B) Commercial mobile data service (as defined in
section 6001 of the Middle Class Tax Relief and Job
Creation Act of 2012 (47 U.
Creation Act of 2012 (47 U.S.C. 1401)).
(7) Person.--The term ``person'' means an individual or
entity.
(8) United states person.--The term ``United States
person'' means--
(A) an individual who is a United States citizen or
an alien lawfully admitted for permanent residence to
the United States;
(B) an entity organized under the laws of the
United States or any jurisdiction within the United
States, including a foreign branch of such an entity;
or
(C) any person in the United States.
Passed the House of Representatives July 14, 2025.
Attest:
KEVIN F. MCCUMBER,
Clerk.
(7) Person.--The term ``person'' means an individual or
entity.
(8) United states person.--The term ``United States
person'' means--
(A) an individual who is a United States citizen or
an alien lawfully admitted for permanent residence to
the United States;
(B) an entity organized under the laws of the
United States or any jurisdiction within the United
States, including a foreign branch of such an entity;
or
(C) any person in the United States.
Passed the House of Representatives July 14, 2025.
Attest:
KEVIN F. MCCUMBER,
Clerk.