119-hr5900

HR
✓ Complete Data

SCAM Act

Login to track bills
Introduced:
Oct 31, 2025

Bill Statistics

3
Actions
1
Cosponsors
0
Summaries
0
Subjects
1
Text Versions
Yes
Full Text

AI Summary

No AI Summary Available

Click the button above to generate an AI-powered summary of this bill using Claude.

The summary will analyze the bill's key provisions, impact, and implementation details.

Latest Action

Oct 31, 2025
Referred to the House Committee on Foreign Affairs.

Actions (3)

Referred to the House Committee on Foreign Affairs.
Type: IntroReferral | Source: House floor actions | Code: H11100
Oct 31, 2025
Introduced in House
Type: IntroReferral | Source: Library of Congress | Code: Intro-H
Oct 31, 2025
Introduced in House
Type: IntroReferral | Source: Library of Congress | Code: 1000
Oct 31, 2025

Cosponsors (1)

Text Versions (1)

Introduced in House

Oct 31, 2025

Full Bill Text

Length: 11,146 characters Version: Introduced in House Version Date: Oct 31, 2025 Last Updated: Nov 14, 2025 2:28 AM
[Congressional Bills 119th Congress]
[From the U.S. Government Publishing Office]
[H.R. 5900 Introduced in House

(IH) ]

<DOC>

119th CONGRESS
1st Session
H. R. 5900

To direct the Department of Defense to establish a joint task force to
investigate transnational cybercrimes, and for other purposes.

_______________________________________________________________________

IN THE HOUSE OF REPRESENTATIVES

October 31, 2025

Mr. Vindman (for himself and Mr. Baird) introduced the following bill;
which was referred to the Committee on Foreign Affairs

_______________________________________________________________________

A BILL

To direct the Department of Defense to establish a joint task force to
investigate transnational cybercrimes, and for other purposes.

Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
SECTION 1.

This Act may be cited as the ``Stopping Cross-border Attacks and
Manipulation Act'' or the ``SCAM Act''.
SEC. 2.

Congress finds the following:

(1) According to estimates from the United States Institute
of Peace, China-linked transnational organized crime

(TOC) groups operating ``fraud farms'' in Southeast Asia are stealing
nearly $43,800,000,000 annually through digital scams.

(2) These scams increasingly affect Americans,
disproportionately targeting populations such as the elderly
and socially isolated.

(3) According to the Federal Trade Commission

(FTC) , in
2024 alone--
(A) 246,783 scam text messages were reported,
resulting in $469,000,000 in losses to Americans;
(B) 371,664 scam emails were reported, leading to
$502,000,000 in losses to Americans; and
(C) 284,651 scam phone calls were reported, causing
$948,000,000 in losses to Americans.

(4) Transnational organized crime

(TOC) groups maintain
documented ties to the Chinese Communist Party

(CCP) . Chinese
officials and state-owned enterprises

(SOEs) have provided
direct support for the construction and operation of TOC-linked
facilities, raising serious concerns about a coordinated
campaign of foreign interference and sabotage.

(5) The CCP's involvement in TOC networks presents an
urgent national security threat. These networks funnel
financial assets and sensitive personal information of U.S.
citizens to a hostile foreign power, undermining both American
economic security and individual privacy.

(6) These criminal networks have deeply embedded themselves
into Southeast Asian economies, exerting destabilizing
influence across the region.

(7) Proceeds from these scams are used to fund warlords and
fuel ongoing civil conflicts, compounding regional instability.

(8) TOC networks have trafficked an estimated 300,000
individuals into cyber scam operations across Southeast Asia.
Victims, including United States citizens, are forced to work
under conditions that the U.S.-China Economic and Security
Review Commission compares to modern slavery. The United
Nations has warned that human trafficking tied to these scam
centers has reached the level of a humanitarian and human
rights crisis.

(9) The U.S.-China Economic and Security Review Commission
has acknowledged credible reports linking scam compounds in the
Philippines to Chinese espionage activity. These facilities are
being constructed near air bases strategically important to
U.S. operations, including Clark Air Base and Basa Air Base,
which is part of the Enhanced Defense Cooperation Agreement.
The Philippine intelligence community has provided compelling
evidence that these compounds have been used for surveillance
and cyber intrusions.

(10) The Chinese government has used the presence of
Chinese TOC networks in Southeast Asia to pressure regional
governments to allow a greater role for Chinese security
forces. This effort threatens national sovereignty and regional
stability.

(11) TOC networks endanger American defense priorities as
well as democracy, good governance, and stability around the
world by co-opting local elites, undermining law enforcement,
weakening state authority, and threatening the United States'
strategic interest in building a free and open Indo-Pacific.

(12) An effective response by the United States Government
will require a coordinated, whole-of-government effort that
draws on the competencies of Federal agencies in information
collection, financial enforcement, diplomatic engagement,
defense and intelligence preparedness, and law enforcement.
SEC. 3.

(a) Establishment.--

(1) In general.--The Secretary of Defense, acting through
the head of U.S. Cyber Command and in coordination with the
heads of other appropriate agencies, shall establish a joint
task force to coordinate efforts to investigate, disrupt, and
protect citizens of the United States from transnational
cybercrimes and foreign-operated scam networks, including
fraudulent text and direct messing centers and other digital
fraud schemes targeting citizens of the United States.

(2) Membership.--The task force shall, at a minimum, be
composed of--
(A) an official of the Department of State,
including--
(i) the Assistant Secretary for Emerging
Threats;
(ii) the Assistant Secretary for
International Narcotics and Law Enforcement;
and
(iii) the Assistant Secretary for
Democracy, Human Rights, and Labor;
(B) officials of the Department of Defense,
including U.S. Cyber Command and the National Mission
Force;
(C) an official of the Office of the Director of
National Intelligence;
(D) an official of the Federal Trade Commission;
(E) an official of the Federal Communications
Commission;
(F) officials of the Office of Foreign Assets
Control and the Financial Crimes Enforcement Network of
the Department of the Treasury;
(G) officials of the Department of Justice,
including officials from--
(i) the Criminal Division, including the
International Unit of the Money Laundering and
Asset Recovery Section;
(ii) the Office of International Affairs;
(iii) the National Security Division; and
(iv) the Office of the Cyber Ambassador;
(H) an official of the Federal Bureau of
Investigation's Internet Crime Complaint Center;
(I) representatives of State and local governments
that--
(i) are leading efforts to counter
cybercrimes; or
(ii) are disproportionately affected by
cybercrimes; and
(J) representatives of relevant expert non-profit
organizations.

(3) Leadership.--The members of the task force, in
consultation with the leadership of the Department of Defense,
may assign responsibility to an appropriate office within the
Department of Defense to serve as the lead for the task force
to coordinate the preparation and submission of the report
required by subsection
(c) and hold offices and agencies
responsible for implementation.

(b) Priority.--In carrying out its duties under subsection

(a) and
in preparing the report under subsection
(c) , the task force shall
prioritize work related to scam operations with ties to the Chinese
Communist Party in the Indo-Pacific region.
(c) Report.--Not later than one year after the date of enactment of
this Act, the task force established under subsection

(a) shall submit
to the Committees on Armed Services of the House of Representatives and
of the Senate a report--

(1) identifying emerging trends related to the scam
operations described in subsection

(a) that are tied to
international criminal organizations, including efforts to--
(A) scam and steal data from United States persons;
(B) cultivate relationships with adversarial
governments and foreign intelligence services;
(C) acquire land in proximity to United States
military installations and United States treaty allies'
and partners' military installations;
(D) leverage, collaborate with, or place foreign
nationals of concern in sensitive positions within
Indo-Pacific regional governments;
(E) undermine United States diplomatic engagement,
peacekeeping operations, and security cooperation
efforts throughout the world, with a priority on the
Indo-Pacific region;
(F) acquire territory or influence around critical
waterways; and
(G) construct militarily-capable infrastructure
such as airports;

(2) recommending policy options for the Federal Government,
Congress, and nongovernmental industry leaders to prevent and
penalize the scam operations described in subsection

(a) that
are tied to international criminal organizations, which may
include the use of sanctions, civil asset forfeiture, and
action in cyberspace in defense of the United States, its
persons, assets, and interests against the scam networks
described in subsection

(a) , including--
(A) protecting Americans' personal data and
financial assets;
(B) safeguarding the sovereignty of United States
allies and partners; and
(C) securing United States military installations
and United States treaty allies' and partners' military
installations located near known or suspected scam
compounds;

(3) proposing a framework for a whole-of-society approach
to support disproportionately affected demographic groups,
communications platforms, States, and localities impacted by
the scam networks described in subsection

(a) , including
methods for timely dissemination of scam-related information
and protective guidance through publicly accessible Federal
facilities (including United States Postal Service locations,
Social Security Administration field offices, military
installations, and Department of Veterans Affairs facilities)
and comparable State and local venues;

(4) including an assessment and updates of the overall
scale of scam centers in Southeast Asia and recent trendlines;

(5) information about how the Chinese Government is
exploiting the problem of scam centers to expand its security
presence and influence in the region; and

(6) information about government bodies, individual
government officials, militias, and corporations in Southeast
Asia that have ties to transnational criminal organizations or
profit from scam centers.
(d) Implementation.--The task force shall assist in the
implementation of any recommendations or proposals contained in the
report submitted under subsection
(c) .

(e) Sunset.--The authority under this section shall sunset on the
date that is 5 years after the date on which the task force submits the
report under subsection
(c) .
<all>