Promoting Technological Solutions To Combat Contraband Wireless Device Use in Correctional Facilities, 22780-22797 [2017-09886]

Download as PDF jstallworth on DSK7TPTVN1PROD with PROPOSALS 22780 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules postage-paid envelope, the remitter will receive a date-stamped return receipt acknowledging the Copyright Office’s receipt of the enclosed submission. The completed copies of Form TCS and the self-addressed, postage-paid envelope must be included in the same package as the submitted notice. A return receipt confirms the Office’s receipt of the submission as of the date indicated, but does not establish eligibility for, or the date of, recordation. (iii) Remitter certification. Whether making an electronic or paper submission, the remitter must certify that he or she has appropriate authority to submit the notice for recordation and that all information submitted to the Office by the remitter is true, accurate, and complete to the best of the remitter’s knowledge. (3) Date of recordation. The date of recordation is the date when all of the elements required for recordation, including the prescribed fee and, if required, the statement of service referred to in paragraph (f)(2)(ii) of this section, have been received in the Copyright Office. After recordation, the notice, including any accompanying statement, is returned to the sender with a certificate of recordation. (4) Effect of recordation. The fact that the Office has recorded the notice does not mean that it is otherwise sufficient under the law. Recordation of a notice of termination by the Copyright Office is without prejudice to any party claiming that the legal and formal requirements for effectuating termination (including service of the notice of termination) have not been met, including before a court of competent jurisdiction. (5) Parties to bear consequences of inaccuracies. For purposes of indexing recorded notices in the Copyright Office’s public catalog, the Office will rely on the information provided by the remitter via either the electronic recordation system or Form TCS (along with any accompanying statement of service, if provided). The grantors and grantees associated with the notice of termination, including any successors in interest, will bear the consequences, if any, of any inaccuracies in the information the remitter has provided. Dated: May 10, 2017. Sarang V. Damle, General Counsel and Associate Register of Copyrights. [FR Doc. 2017–09810 Filed 5–17–17; 8:45 am] BILLING CODE 1410–30–P VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 20 [GN Docket No. 13–111; FCC 17–25] Promoting Technological Solutions To Combat Contraband Wireless Device Use in Correctional Facilities Federal Communications Commission. ACTION: Proposed rule. AGENCY: In this document, the Federal Communications Commission seeks additional comment on a broad range of steps the Commission can take to help eliminate the problem of contraband wireless devices in correctional facilities. In particular, the Commission proposes a process for wireless providers to disable contraband wireless devices once they have been identified. The Commission seeks comment on additional methods and technologies that might prove successful in combating contraband device use in correctional facilities, and on various other proposals related to the authorization process for contraband interdiction systems and the deployment of these systems. DATES: Interested parties may file comments on or before June 19, 2017, and reply comments on or before July 17, 2017. ADDRESSES: You may submit comments, identified by GN Docket No. 13–111, by any of the following methods: D Electronic Filers: Comments may be filed electronically using the Internet by accessing the Commission’s Electronic Comment Filing System (ECFS): https:// fjallfoss.fcc.gov/ecfs2/. See Electronic Filing of Documents in Rulemaking Proceedings, 63 FR 24121 (1998). D Paper Filers: Parties who choose to file by paper must file an original and one copy of each filing. Generally if more than one docket or rulemaking number appears in the caption of this proceeding, filers must submit two additional copies for each additional docket or rulemaking number. Commenters are only required to file copies in GN Docket No. 13–111. D Filings can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. D All hand-delivered or messengerdelivered paper filings for the Commission’s Secretary must be SUMMARY: PO 00000 Frm 00019 Fmt 4702 Sfmt 4702 delivered to FCC Headquarters at 445 12th St. SW., Room TW–A325, Washington, DC 20554. The filing hours are 8:00 a.m. to 7:00 p.m. All hand deliveries must be held together with rubber bands or fasteners. Any envelopes and boxes must be disposed of before entering the building. D Commercial overnight mail (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9300 East Hampton Drive, Capitol Heights, MD 20743. D U.S. Postal Service first-class, Express, and Priority mail must be addressed to 445 12th Street SW., Washington, DC 20554. People with Disabilities: To request materials in accessible formats for people with disabilities (Braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (TTY). FOR FURTHER INFORMATION CONTACT: Melissa Conway, Melissa.Conway@ fcc.gov, of the Wireless Telecommunications Bureau, Mobility Division, (202) 418–2887. For additional information concerning the PRA information collection requirements contained in this document, contact Cathy Williams at (202) 418–2918 or send an email to PRA@fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s Further Notice of Proposed Rulemaking (FNPRM) in GN Docket No. 13–111, FCC 17–25, released on March 24, 2017. The complete text of the FNPRM is available for viewing via the Commission’s ECFS Web site by entering the docket number, GN Docket No. 13–111. The complete text of the FNPRM is also available for public inspection and copying from 8:00 a.m. to 4:30 p.m. Eastern Time (ET) Monday through Thursday or from 8:00 a.m. to 11:30 a.m. ET on Fridays in the FCC Reference Information Center, 445 12th Street SW., Room CY–B402, Washington, DC 20554, telephone 202– 488–5300, fax 202–488–5563. This proceeding shall continue to be treated as a ‘‘permit-but-disclose’’ proceeding in accordance with the Commission’s ex parte rules (47 CFR 1.1200 et seq.). Persons making ex parte presentations must file a copy of any written presentation or a memorandum summarizing any oral presentation within two business days after the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all persons E:\FR\FM\18MYP1.SGM 18MYP1 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules jstallworth on DSK7TPTVN1PROD with PROPOSALS attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) summarize all data presented and arguments made during the presentation. If the presentation consisted in whole or in part of the presentation of data or arguments already reflected in the presenter’s written comments, memoranda or other filings in the proceeding, the presenter may provide citations to such data or arguments in his or her prior comments, memoranda, or other filings (specifying the relevant page and/or paragraph numbers where such data or arguments can be found) in lieu of summarizing them in the memorandum. Documents shown or given to Commission staff during ex parte meetings are deemed to be written ex parte presentations and must be filed consistent with rule 1.1206(b). In proceedings governed by rule 1.49(f) or for which the Commission has made available a method of electronic filing, written ex parte presentations and memoranda summarizing oral ex parte presentations, and all attachments thereto, must be filed through the electronic comment filing system available for that proceeding, and must be filed in their native format (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should familiarize themselves with the Commission’s ex parte rules. The Commission will send a copy of the FNPRM in a report to be sent to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). I. FNPRM 1. The use of contraband wireless devices in correctional facilities to engage in criminal activity poses a significant and growing security challenge to correctional facility administrators, law enforcement authorities, and the general public. 2. As a general matter, there are primarily two categories of technological solutions currently deployed today in the U.S. to address the issue of contraband wireless device use in correctional facilities: Managed access and detection. A managed access system (MAS) is a micro-cellular, private network that typically operates on spectrum already licensed to wireless providers offering commercial subscriber services in geographic areas that include a correctional facility. These systems analyze transmissions to and from wireless devices to determine whether the device is authorized or unauthorized by the correctional facility VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 for purposes of accessing wireless carrier networks. A MAS utilizes base stations that are optimized to capture all voice, text, and data communications within the system coverage area. When a wireless device attempts to connect to the network from within the coverage area of the MAS, the system crosschecks the identifying information of the device against a database that lists wireless devices authorized to operate in the coverage area. Authorized devices are allowed to communicate normally (i.e., transmit and receive voice, text, and data) with the commercial wireless network, while transmissions to or from unauthorized devices are terminated. A MAS is capable of being programmed not to interfere with 911 calls. The systems may also provide an alert to the user notifying the user that the device is unauthorized. A correctional facility or third party at a correctional facility may operate a MAS if authorized by the Commission, and this authorization has, to date, involved agreements with the wireless providers serving the geographic area within which the correctional facility is located, as well as spectrum leasing applications approved by the Commission. 3. Detection systems are used to detect devices within a correctional facility by locating, tracking, and identifying radio signals originating from a device. Traditionally, detection systems use passive, receive-only technologies that do not transmit radio signals and do not require separate Commission authorization. However, detection systems have evolved with the capability of transmitting radio signals to not only locate a wireless devices, but also to obtain device identifying information. These types of advanced transmitting detection systems also operate on frequencies licensed to wireless providers and require separate Commission authorization, also typically through the filing of spectrum leasing applications reflecting wireless provider agreement. 4. The Commission has taken a variety of steps to facilitate the deployment of technologies by those seeking to combat the use of contraband wireless devices in correctional facilities, including authorizing spectrum leases between CMRS providers 1 and MAS providers and granting Experimental Special 1 Unless otherwise specifically clarified herein, for purposes of the FNPRM, we use the terms CMRS provider, wireless provider, and wireless carrier interchangeably. These terms typically refer to entities that offer and provide subscriber-based services to customers through Commission licenses held on commercial spectrum in geographic areas that might include correctional facilities. PO 00000 Frm 00020 Fmt 4702 Sfmt 4702 22781 Temporary Authority (STA) for testing managed access technologies, and also through outreach and joint efforts with federal and state partners and industry to facilitate development of viable solutions. In addition, Commission staff has worked with stakeholder groups, including our federal agency partners, wireless providers, technology providers, and corrections agencies, to encourage the development of technological solutions to combat contraband wireless device use while avoiding interference with legitimate communications. 5. On May 1, 2013, the Commission issued the Notice of Proposed Rulemaking (NPRM) (78 FR 36469, June 18, 2013) in this proceeding in order to examine various technological solutions to the contraband problem and proposals to facilitate the deployment of these technologies. In the NPRM, the Commission proposed to require CMRS licensees to terminate service to detected contraband wireless devices within correctional facilities pursuant to a qualifying request from an authorized party and sought comment on any other proposals that would facilitate the deployment of traditional detection systems. Technology has evolved such that many advanced detection systems are designed to transmit radio signals typically already licensed to wireless providers in areas that include correctional facilities. Consequently, operators of these types of advanced detection systems require Commission authorization. Accordingly, we will refer to any system that transmits radio communication signals comprised of one or more stations used only in a correctional facility exclusively to prevent transmissions to or from contraband wireless devices within the boundaries of the facility and/or to obtain identifying information from such contraband wireless devices as a Contraband Interdiction System (CIS).2 By definition, therefore, the processes proposed in the FNPRM are limited to correctional facilities’ use. 2 For purposes of the FNPRM, ‘‘contraband wireless device’’ refers to any wireless device, including the physical hardware or part of a device—such as a subscriber identification module (SIM)—that is used within a correctional facility in violation of federal, state, or local law, or a correctional facility rule, regulation, or policy. We use the phrase ‘‘correctional facility’’ to refer to any facility operated or overseen by federal, state, or local authorities that houses or holds criminally charged or convicted inmates for any period of time, including privately owned and operated correctional facilities that operate through contracts with federal, state, or local jurisdictions. E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22782 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules Disabling Contraband Wireless Devices in Correctional Facilities 6. In the NPRM, the Commission sought comment on each of the steps involved in the process of terminating service to contraband wireless devices, including the information that the correctional facility must transmit to the provider to effectuate termination, the timing for carrier termination, the method of authenticating a termination request, and other issues. CellAntenna has proposed a termination process that includes minimum standards for detection equipment, the form of notice to the carrier, and a carrier response process that consists of a set of deadlines for responding, based on the volume of reports or inquiries the carrier receives concerning contraband wireless devices. Under this staged response obligation, the carriers would have a longer time to respond if they receive a large number of requests, ranging from one hour to 24 hours after receipt of notice. CellAntenna encourages the Commission to determine a ‘‘reasonable’’ time frame for service suspension. 7. Commenting parties focused substantially on the issue of liability associated with termination, and their alternative proposal that termination should be required only pursuant to a court order. Wireless carriers expressed concern that the proposed termination process would require carriers to investigate requests and risk erroneous termination, which could endanger safety and create potential liability. Instead, the carriers argue, the Commission should amend its proposed termination rules to require that requests to terminate be executed pursuant to an order from a court of relevant jurisdiction. Other commenters, however, reject the notion that courtordered termination is necessary in order to protect carriers from liability in the event of erroneous termination, and argue that the Commission’s role in managing the public’s use of spectrum empowers it to require carriers to terminate service to unlawful devices, irrespective of whether the request is made by the FCC, a court order, or upon the request of an authorized prison official. 8. We seek further comment on a Commission rule-based process regarding the disabling of contraband wireless devices where certain criteria are met, including a determination of system eligibility and a validation process for qualifying requests designed to address many wireless provider concerns. We clarify that a disabling process would involve participation by VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 stakeholders to effectively implement a Commission directive to disable such devices, and would in no way represent a delegation of authority to others to compel such disabling. We recognize that wireless providers favor a courtordered termination process as an alternative, but requiring court orders might be unnecessarily burdensome. Based on the comments filed in the record, moreover, it is far from clear that a CMRS provider that terminates service to a particular device based on a qualifying request would be exposed to any form of liability. Indeed, we welcome comment from CMRS providers on the scope of their existing authority under their contracts and terms of service with consumers to terminate service. Commenters who agree with the view that a court-ordered approach is preferable should specifically address why termination pursuant to a federal requirement, i.e., Commission directive, does not address liability concerns as well as termination pursuant to court order. We note that the current record does not sufficiently demonstrate that reliance on the wireless providers’ alternative courtordered approach in lieu of the proposed rule-based approach discussed below would achieve one of the Commission’s overall goals in this proceeding of facilitating a comprehensive, nationwide solution. We also note that the record does not reflect persuasive evidence of successful voluntary termination of service to contraband wireless devices in correctional facilities by the CMRS licensees, even where there is evidence of a growing problem. 9. To the extent commenters continue to support a court-ordered approach, we seek specific comment on the particulars of the requested courtordered process to evaluate and compare it to a Commission disabling process: Who is qualified to seek a court order and with what specific information or evidence? To whom is the request submitted and how is the court order implemented? How can existing processes carriers use for addressing law enforcement requests/ subpoenas apply in the contraband wireless device context? Does the success of a court-ordered process depend on the extent to which a particular state has criminalized wireless device use in correctional facilities? Additionally, given the acknowledged nationwide scope and growth of the contraband wireless device problem, how would CIS and wireless providers navigate the myriad fora through which requests for PO 00000 Frm 00021 Fmt 4702 Sfmt 4702 termination might flow, potentially requiring engagement with a wide variety of state or federal district attorneys’ offices; federal, state or county courts; or local magistrates? In this regard, we seek examples of successfully issued and implemented court orders terminating service to contraband wireless devices, as well as demonstrations that court orders can be effective at scale and not overly burdensome or time-consuming to obtain and effectuate in this context. 10. Commission Authority. In the NPRM, the Commission stated its belief that the Commission has authority under section 303 to require CMRS licensees to terminate service to contraband wireless devices. AT&T recognizes the Commission’s authority pursuant to section 303 to require termination, but argues that deactivation must be ordered by a court or the FCC because the Commission cannot lawfully delegate its statutory authority to a third party, such as a state corrections officer. In response, Boeing and Triple Dragon reject AT&T’s position, arguing that the proposed termination process does not raise any issues of delegation, as the Commission has clear authority to require carriers to terminate service to unauthorized devices upon receiving a Commissionmandated qualifying request. Section 303 provides the Commission authority to adopt rules requiring CMRS carriers to disable contraband wireless devices (see 47 U.S.C. 303; see also 154(i)). Pursuant to section 303(b), the Commission is required to prescribe the nature of the service to be rendered by each class of licensed stations and each station within any class. Additionally, section 303(d) requires the Commission to determine the location of classes of stations or individual stations, and section 303(h) grants the Commission the authority to establish areas or zones to be served by any station. When tied together with section 303(r), which requires the Commission to make such rules and regulations and prescribe such restrictions and conditions, not inconsistent with law, as may be necessary to carry out the provisions of this chapter, these provisions empower the Commission to address these issues. 11. Further, with respect to wireless carrier arguments that any proposal for requests by departments of corrections based on CIS-collected data seeking disabling of contraband wireless devices is an unlawful delegation of authority, we clarify that any such request would be pursuant to an adopted Commission rule mandating disabling where certain criteria are met. Such criteria, as discussed in detail below, include E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules various factors involving the deployment of CIS technologies. The Commission’s authority under section 303 to regulate the use of spectrum in the public interest necessarily includes the authority to promulgate rules requiring regulated entities to terminate unlawful use of spectrum where certain indicia are met. We seek comment on a process by which carriers would be required to disable contraband devices identified through CIS systems deemed eligible by the Commission. The Commission would not be delegating decision-making authority regarding the disabling of contraband wireless devices. 12. Disabling of Contraband Wireless Devices in Correctional Facilities. We seek comment on a process whereby CMRS licensees would disable contraband wireless devices in correctional facilities detected by an eligible CIS when they receive a qualifying request from an authorized party. We seek comment on a range of issues, including CIS eligibility, what constitutes a qualifying request, and specifics regarding the carrier disabling process. We clarify that CIS systems operating solely to prevent calls and other communications from contraband wireless devices, described in the Notice as MASs, would not be subject to these eligibility criteria, unless the department of corrections/CIS provider seeks to use the information received from such a system to request, through Commission rules, contraband wireless device disabling. 13. Numerous individual state departments of corrections support the Commission’s proposal to mandate termination of service to contraband wireless devices. For example, the Chief Information Officer of the Texas Department of Criminal Justice encourages implementation of a termination of service process, including criteria establishing a maximum allowable time limit for termination of service upon proper notification by an authorized correctional official. The Minnesota Department of Corrections supports a nationally standardized protocol for identifying contraband wireless devices and notification to the carrier. The Florida Department of Corrections also supports the standardization of information required to be provided by correctional facilities to service providers for termination of service and of the method of submission of information. The Mississippi Department of Corrections supports a Commission mandate to terminate service to contraband wireless devices, noting that it has made efforts to VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 terminate service by seeking court orders with the cooperation of some wireless providers, that not all providers have been cooperative, and that a Commission rule would save time and resources used in obtaining a court order. 14. Several commenters express concern regarding the validation process and accuracy of termination information relayed to the carriers to implement termination of service to contraband wireless devices in correctional facilities. The carriers assert that the record simply does not contain sufficient information to define a process for termination at this time. AT&T suggests that there must be a validation process whereby carriers have the opportunity to confirm the accuracy of the termination information. AT&T is concerned that if there is not an FCC or court order compelling termination, the carrier bears the responsibility for deciding whether to terminate service to a particular device. Verizon also expresses significant concern regarding the dearth of carrier experience with handling termination requests. Verizon contends that carriers have material concerns regarding the ability of detection systems to accurately identify contraband devices, the security and authenticity of the termination requests being transmitted to carriers, and the potential liability of carriers for erroneous termination. Verizon believes that carriers require accurate information about the MIN and the device MDN,3 and therefore the Commission should review and certify managed access and detection systems. Verizon also recommends that termination requests be transmitted via secure transmission paths such as secure web portals that already exist to receive court-ordered termination requests. 15. Furthermore, Verizon claims that, due to the lack of information in the record, it is impossible at this time to determine important details about termination requests, such as how many entities will be making such requests, how frequently those requests will be made, and how many devices carriers will be asked to terminate in each request. As a result, Verizon states, carriers have no way of assessing the costs of processing termination requests or the systems that will have to be in place. CTIA concurs that, in light of the complexities in the termination proposal, the Commission should certify detection systems and validate that a 3 MIN is the mobile identification number and MDN is the mobile directory number. The MIN and the MDN are used by CDMA devices. PO 00000 Frm 00022 Fmt 4702 Sfmt 4702 22783 detection system is working properly and capturing accurate, necessary information regarding the unauthorized devices. One managed access provider, CellBlox, opposes proposals to require termination of service to contraband wireless devices not only as unworkable and burdensome to correctional facilities, but also as raising too many unanswered questions regarding the specifics of the termination process. 16. Tecore is a proponent of MASs as the preferred solution to the contraband problem, but is not opposed to detection and termination solutions used in conjunction with MAS, if the Commission establishes the specifics for a termination process. To the extent that the Commission decides to mandate termination procedures, Tecore implores the Commission to define specific information that the correctional facility must transmit to the carrier in order to effectuate a termination, including device information, criteria for concluding that a device is contraband, a defined interface for accepting or rejecting a request, a defined timeframe, and procedures for protesting or reinstating an invalid termination. 17. Triple Dragon supports Commission regulations governing the detection and termination of service to contraband wireless devices and urges the Commission to revise its rules to accommodate an equipment certification process for detection systems. With regard to the timeframe for carriers to terminate service subsequent to a request, Triple Dragon suggests that immediate termination is necessary for public safety and that termination should be based on clear data indicating that the device is operating in violation of federal or state law or prison policy. Boeing contends that performance standards or additional technical requirements for passive detection systems are unnecessary and impractical. Boeing highlights that, despite numerous and lengthy trials of detection technology at various facilities around the country, there have been no reports of misidentification. Indeed, Boeing believes that there is a lack of evidence to warrant the imposition of technical requirements for detection systems, noting that the record does not show an appreciable risk of misidentification, nor does it support the imposition of burdensome technical standards to address this hypothetical risk. 18. Other stakeholders encourage the Commission to foster the development of all solutions to combat contraband wireless devices in correctional facilities, including detection and E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22784 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules termination. The supporters of termination include providers of inmate calling services. Securus recommends that the Commission should not preclude any of these alternatives and should support the testing and implementation of all these options. Further, Securus suggests that the FCC should take a firm stance that CMRS providers must cooperate with correctional facilities to quickly terminate service to detected contraband devices. GTL supports the Commission’s proposal to require wireless carriers to terminate service to contraband wireless devices, without the need for a court order. GEO, a private manager and operator of correctional facilities, agrees with the Commission’s proposal to require carriers to terminate service to contraband wireless devices within one hour of receipt of notice from a qualifying authority. GEO recommends a broad definition of qualifying authority that would include wardens of both private and public correctional facilities. ACA urges the Commission to permit the corrections community to employ every possible tool in the toolbox to combat contraband wireless devices in correctional facilities, including immediate termination of service by carriers upon notification by any public safety agency pursuant to a standardized process. Acknowledging the carriers’ concern about potential liability for erroneous termination, ACA suggests that the Commission adopt rules granting carriers protection while acting in good faith and for public safety to further protect the carriers above and beyond the language in the customer contracts. 19. After careful consideration of the record, we seek further comment on a process whereby CMRS licensees would disable contraband wireless devices in correctional facilities detected by an eligible CIS pursuant to a qualifying request that includes, inter alia, specific identifying information regarding the device and the correctional facility. We seek to ensure that any disabling process will completely disable the contraband device itself and render it unusable, not simply terminate service to the device as the Commission had originally proposed in the NPRM. We seek comment on whether a process should include a required FCC determination of eligibility of CISs to ensure the systems satisfy minimum performance standards, appropriate means of requesting the disabling, and specifics regarding the required carrier response. We seek specific comment on all aspects of the process as well as the VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 costs and benefits of their implementation. 20. Eligibility of CISs. We seek to ensure that the systems detecting contraband wireless devices first meet certain minimum performance standards in order to minimize the risk of disabling a non-contraband wireless device. We therefore seek comment on whether it is necessary to determine in advance whether a CIS meets the threshold for eligibility to be the basis for a subsequent qualifying request for device disabling, which might facilitate contracts between stakeholders, for example departments of corrections and CIS providers, and appropriate spectrum leasing arrangements, typically between CIS providers and wireless providers. We envision that any eligibility determination would not at this stage assess the CIS’s characteristics related to a specific deployment at a certain correctional facility, but rather a CIS’s overall methodology for system design and data analysis that could be included in a qualifying request, where more specific requirements must be met for device disabling. We seek comment on whether a CIS operator seeking wireless provider disabling of contraband wireless devices in a correctional facility should first be deemed an eligible CIS by the Commission, and whether the Commission should periodically issue public notices listing all eligible CISs. We seek comment on the following potential criteria for determining eligibility: (1) All radio transmitters used as part of the CIS have appropriate equipment authorization pursuant to Commission rules; (2) the CIS is designed and will be configured to locate devices solely within a correctional facility,4 can secure and protect the collected information, and is capable of being programmed not to interfere with emergency 911 calls; and (3) the methodology to be used in analyzing data collected by the CIS is sufficiently robust to provide a high degree of certainty that the particular wireless device subject to a later disabling request is in fact located within a correctional facility. We also seek comment on the appropriate format for requesting eligibility, taking into consideration our goal of reducing burdens and increasing administrative efficiency. 21. We seek further comment on the costs, benefits, and burdens to potential 4 To comply with this criteria, a CIS operator may need to employ a range of mitigation techniques that might vary depending on the location of the correctional facility, as rural v. urban facilities differ substantially regarding their proximity to the general public. PO 00000 Frm 00023 Fmt 4702 Sfmt 4702 stakeholders of requiring CIS eligibility before qualifying disabling requests can be made to wireless providers and whether the stated eligibility criteria adequately address concerns expressed in the record regarding improper functioning of CIS systems and inaccurately identifying contraband devices. If commenters disagree, we seek comment on what additional eligibility criteria would ensure the accuracy and authenticity of CISs. For example, should we require testing or demonstrations at a specific correctional facility prior to making a CIS eligibility determination? If so, what type of tests would be appropriate? How should signals be measured and what criteria should be used to evaluate such tests? Importantly, should such a testing requirement be part of the initial eligibility assessment or should it part of what constitutes a qualifying request? If testing were part of a general eligibility assessment, would such additional testing at a specific site be unduly burdensome or unnecessarily delay or undermine either state RFP processes or spectrum lease negotiations? Would parties enter into agreements and lease arrangements where a CIS had not yet been deemed eligible? Should we require that a CIS be able to identify the location of a wireless device to within a certain distance? Is such an accuracy requirement unnecessary or would it be beneficial in assessing the merits of a CIS design and reducing the risk of capturing noncontraband devices? Should any eligibility determination be subject to a temporal component, for example, requiring a representation on an annual basis that the basic system design and data analysis methodology have not materially changed, and should the CIS operator be required to provide the Commission with periodic updates on substantial system changes, upgrades, or redesign of location technology? Should eligibility be contingent on the submission of periodic reports detailing any incidents during the applicable period where devices were erroneously disabled? Should the eligibility criteria be different depending on whether the facility is in a rural or urban area, or whether the CIS provider, the correctional facility, or the CMRS licensee is large or small? Commenters should be specific in justifying any proposed additional minimum standards for CIS eligibility, including the costs and benefits to stakeholders. 22. Qualifying Request. In addition to ensuring that CISs meet certain performance standards in order to minimize the risk of error, we also seek E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules to ensure that an authorized party provides the information necessary for a wireless provider to disable contraband wireless devices. We seek comment on potentially requiring CMRS licensees to comply with a disabling process upon receipt of a qualifying request made in writing and transmitted via a verifiable transmission mechanism.5 We seek comment on whether the qualifying request must be transmitted (1) by the Commission (including, potentially, by the contraband wireless device ombudsperson referenced above), upon the request of a Designated Correctional Facility Official (DCFO); or (2) by the DCFO. We seek comment on whether we should define the DCFO as a state or local official responsible for the facility where the contraband device is located. We seek specific comment on the costs and benefits of these two approaches to the transmission of the qualifying request, both in terms of timeliness and any perceived liability concerns. 23. We seek comment on whether carrier concerns about the authenticity of termination requests are best addressed by requiring that a request to disable be initiated by a state or local official responsible for the correctional facility, who arguably has more responsibility and oversight in the procurement of a CIS for correctional facilities than a warden or other prison official or employee, as suggested in the record. A review of our ULS and OET databases reflects that, to date, requests for Commission authorization of CISs have only been in state correctional facilities, but we seek to facilitate a wide range of deployments where possible to achieve a more nationwide solution, including within federal and/or local correctional facilities that may seek to deploy CIS. We also seek specific comment on the extent to which, as Verizon claims, carriers have existing secure electronic means used to receive court-ordered termination requests, which could be leveraged to transmit and receive disabling requests from correctional facilities that employ CISs. 24. We seek comment on whether a qualifying disabling request should include a number of certifications by the DCFO, as well as device and correctional facility information. Should the DCFO certify in the qualifying request that (1) an eligible CIS was used in the correctional facility, and include evidence of such eligibility; (2) the CIS is authorized for operation through a license or Commission approved lease 5 A verifiable transmission mechanism is a reliable electronic means of communicating a disabling requesting that will provide certainty regarding the identity of both the sending and receiving parties. VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 agreement, referencing the applicable ULS identifying information; (3) the DCFO has contacted all CMRS licensees providing service in the area of the correctional facility for which it will seek device disabling in order to establish a verifiable transmission mechanism for making qualifying requests and for receiving notifications from the licensee; and (4) it has substantial evidence that the contraband wireless device was used in the correctional facility, and that such use was observed within the 30 day period immediately prior to the date of submitting the request? We seek comment on this process and any methods in which the Commission can facilitate interaction between the authorized party and the CMRS licensees during the design, deployment, and testing of CISs. For example, would it be useful for the Commission to maintain a list of DCFOs? What role could the contraband ombudsperson play in facilitating the interaction between DCFOs and CMRS licensees? 25. Finally, we seek comment on whether a qualifying request should include specific identifying information regarding the device and the correctional facility. Should the request include device identifiers sufficient to uniquely describe the device in question and the licensee providing CMRS service to the device? We seek comment on whether including the CMRS licensee is warranted if the request is made directly to the Commission, but unnecessary if the request is made directly from a DCFO to the CMRS licensee able to confirm that the device is a subscriber on its network. With regard to device identifiers, we seek specific comment on whether other details are necessary in addition to identifiers that uniquely describe the specific devices, such as make and model of the device or the mode of device utilization at the time of detection. Is it relevant whether the device—at the time of detection—was making an incoming or outgoing voice call, incoming or outgoing SMS text or MMS (multimedia) message, or downloading or uploading data? 26. We seek additional comment on whether other details are necessary in terms of location and time identifiers, such as latitude and longitude to the nearest tenth of a second, or frequency band(s) of usage during the detection period, in order to accurately identify and disable the device. Is it necessary to require that a request include specific identifiers to accurately identify and disable the device, or would providing the flexibility to include alternative PO 00000 Frm 00024 Fmt 4702 Sfmt 4702 22785 information to accommodate changes in technology be appropriate, and what types of alternative information would further our goal of an efficient disabling process? Specifically, what is necessary to accurately identify and disable the device? For example, common mobile identifiers include international mobile equipment identifier (IMEI) and the international mobile subscriber identity (IMSI), used by GSM, UMTS, and LTE devices; and electronic serial number (ESN), mobile identification number (MIN), and mobile directory number (MDN), used by CDMA devices. Should additional information be required to accurately identify a specific wireless device for requested disabling? Are there significant differences in the identifying information of current wireless devices (e.g., android, iOS, windows) that must be accounted for? We seek to minimize burdens for those providing information, by only requiring what is essential to properly disable. 27. We seek comment on whether there are commonalities that would permit standardized information sharing, while still taking into account the full range of devices, operating systems, and carriers. We also seek comment on the appropriate format of a qualifying request to streamline the process and reduce administrative burdens. Would it be more efficient for carriers to develop a common data format so that corrections facilities, through a DCFO, are not required to develop a different format for each wireless provider? Should any of these possible requirements vary depending on whether the wireless provider is small or large? 28. In comments, Tecore raises the concern that SIM cards can be easily replaced so that devices are only temporarily deactivated. The record indicates that termination of service alone may be an incomplete solution capable of inmate exploitation. We therefore seek comment on a potentially more effective approach to ensure that not only is service terminated to the detected contraband device, but also that the device is rendered unusable on that carrier’s network. We seek comment on the technical feasibility of a disabling process, including the costs and benefits of implementation, as well as any impact on 911 calls. We note that a disabled device will not have 911 calling capability, whereas a service terminated device would maintain 911 calling capability pursuant to the Commission’s current rules regarding E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22786 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules non-service initialized (NSI) phones.6 Should we maintain the requirement that CMRS carriers keep 911 capability for disabled contraband phones, subject to the outcome of the NSI proceeding? What are the costs and benefits to stakeholders of such a requirement? 29. We seek comment on whether a qualifying request should also include correctional facility identifiers, including the name of the correctional facility, the street address of the correctional facility, the latitude and longitude coordinates sufficient to describe the boundaries of the correctional facility, and the call signs of the Commission licenses and/or leases authorizing the CIS. Would this information provide sufficiently accurate information about the correctional facility to ensure that the carrier can restrict the disabling of wireless devices to those that are located within that facility? 30. Disabling Process. As a preliminary matter, we seek to ensure that such requests can be transmitted in an expeditious manner and to have confidence that the request will be received and acted upon. Should the CMRS licensee be required to provide a point of contact suitable for receiving qualifying requests to disable contraband wireless devices in correctional facilities? We also recognize the need to safeguard legitimate devices from being disabled. Accordingly, we seek comment on what steps, if any, the CMRS licensee should take to verify the information received, whether customer outreach should be part of the process, and the time frame within which the steps must be taken. We seek information to assist us in determining what level of carrier investigation, if any, is warranted to determine whether there is clear evidence that the device sought to be disabled is not contraband. We also seek comment on what level of customer outreach, if any, would ensure that the disabling request is not erroneous. 31. With regard to customer outreach, we again seek comment on a range of approaches, including the carrier immediately disabling without any customer outreach, the carrier contacting the subscriber of record through any available means (e.g., text, phone, email) and providing a reasonable amount of time prior to disabling for the customer to demonstrate that the disabling request is in error. We seek comment on whether a particular alternative enables inmates 6 The Commission has proposed revising its rules to sunset, after a six month period, the requirement that NSI phones be 911 capable. VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 to evade device disabling. Each of these approaches impacts carrier response time and the ability to address, however unlikely, disabling errors. If some level of carrier investigation or customer outreach is warranted, should we provide CMRS licensees a method to reject a qualifying request if it is determined the wireless device in question is not contraband? 32. We seek comment on whether the CMRS licensee should provide notification to the DCFO within a reasonable time period that it has either disabled the device or rejected the request. We seek comment on what the reasonable time period should be for this notification, whether the licensee must provide an explanation for the rejection, and whether the DCFO can contest the rejection. We seek comment on all aspects of a disabling process regarding verification of disabling requests, particularly the costs and benefits to the wireless providers, CIS operators, and the correctional facilities. 33. Timeframe for Disabling. We seek comment on various options for the appropriate timeframe for disabling a contraband wireless device, or rejecting the request if appropriate, each of which might be impacted by the range of potential levels of carrier investigation in independently verifying a disabling request and engaging in customer outreach. CellAntenna recommends a staged obligation between one hour and 24 hours depending on the volume of requests, and other commenters suggest immediate action or action within one hour. These positions would be consistent with CMRS licensees disabling devices without any independent investigation or, at best, after a brief period of research using readily available resources, but achieve the goal of promptly disabling contraband wireless devices. In contrast, if carriers disable devices following exhaustive research or customer outreach, a period of seven days or more would likely be more appropriate. While providing greater assurance that the disabling is not an error, a longer period allows further use of an identified contraband phone. 34. If the carrier attempts to contact the device’s subscriber of record to permit a legitimate user the opportunity to demonstrate that the device is not contraband, how long should the user have to respond and does this notification requirement unnecessarily prolong device disabling? To what extent could a longer notification period increase the risk of inadvertently tipping off the user of a contraband device and thereby create opportunities for malefactors to cause harm or PO 00000 Frm 00025 Fmt 4702 Sfmt 4702 circumvent the correctional facility’s efforts to address the illegal use? We seek specific comment regarding what periods of time are required in order to adequately balance the public safety needs with wireless provider concerns. We also seek comment on whether small entities face any special or unique issues with respect to disabling devices such that they would require additional time to comply. 35. Finally, we seek comment on the methods available to ensure that any process for determining CIS eligibility minimizes the risk of disabling customers’ devices that are not located within correctional facilities, and any related costs and benefits. Are there contractual provisions in existing contracts between CMRS providers and their customers that address this or similar issues? We seek comment on what period of time would be reasonable to expect a CMRS licensee to reactivate a disabled device. For example, what methods of discovery will sufficiently confirm that a wireless device is not contraband? Is 24 hours a reasonable period to resolve potential errors and how extensive is the burden on subscribers to remain disabled for that period? What is the most efficient method of notifying the carriers of errors, if originating from parties outside a correctional facility, and of notifying subscribers of reactivation? 36. In the NPRM, the Commission also sought comment on CellAntenna’s proposal that we adopt a rule to insulate carriers from any legal liability for wrongful termination, while noting that wireless carriers’ current end user licensing agreements may already protect the carriers. We seek further comment on this proposal. Specifically, we seek comment on whether the Commission should create a safe harbor by rule for wireless providers that comply with the federal process for disabling phones in correctional facilities. How broadly should that safe harbor be written, and should it apply only to wireless providers that comply with every aspect of the rules we adopt or also those that act in good-faith to carry out the disablement process? Does the Commission have authority to adopt a safe harbor? Is our authority to adopt the rules at issue sufficient to create a safe harbor? Are there other provisions of the Communications Act not previously discussed that would authorize a safe harbor? And what, if any, downsides are there to creating a safe harbor for wireless providers that comply with federal law? 37. In the NPRM, the Commission also sought comment on the extent to which providers or operators of managed E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules access or detection systems comply with section 705 if they divulge or publish the existence of a communication for the purpose of operating the system, and whether such providers or operators are entitled to receive communications under section 705. Section 705 of the Act generally prohibits, except as authorized under Chapter 119, Title 18 of the U.S. Code, any person ‘‘receiving, assisting in receiving, transmitting, or assisting in transmitting, any interstate or foreign communication by wire or radio’’ from divulging or publishing the ‘‘existence, contents, substance, purport, effect or meaning thereof’’ to another person other than through authorized channels (47 U.S.C. 605(a)). Additionally, Chapter 206, Title 18 of the U.S. Code, generally prohibits the use of pen register and trap and trace devices without a court order, subject to several exceptions including where a provider of a communications service obtains the consent of the user (18 U.S.C. 3121–3127). The Commission sought comment on whether any of the proposals regarding detection and MASs would implicate the pen register and trap and trace devices chapter of Title 18 of the U.S. Code. 38. ShawnTech believes that the operation of its MASs is in compliance with federal and state law concerning the use of pen register and trap and trace devices, but expresses concern that detection systems that function to terminate service to contraband devices may not be in compliance. In addition to the questions the Commission asked in the NPRM, we seek comment on whether and to what extent a system used to request wireless provider disabling of a contraband wireless device pursuant to a Commission rule raises issues under Title 18 or section 705 that may be different from those raised by MAS implementation. 39. Some commenters in response to the NPRM also have raised concerns about the applicability of the privacy obligations under section 222 of the Communications Act (47 U.S.C. 222). After review of the record, we do not find that comments submitted in response to the NPRM demonstrate that section 222 would prohibit a carrier from complying with a Commission rule mandating a disabling process. To the extent commenters maintain a contrary view, we seek comment on this issue clearly providing support for such a position and on any other relationship of section 222 to the FNPRM. Notification to CIS Operators of Carrier Technical Changes 40. In the NPRM, the Commission sought comment generally on proposals VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 submitted by interested parties regarding rule changes intended to expedite the deployment of MASs, including GTL’s proposal to impose network upgrade notification obligations on carriers. In its original petition, GTL requested that the Commission adopt rules that require CMRS providers to notify MAS operators or prison administrators in advance of any network changes likely to impact the MAS and negotiate in good faith on the implementation timing of the change. The reason for the requirement, GTL explained, is that rapid technological evolution impacts the effectiveness of a MAS and could render them ineffective; for example, network changes such as changing power levels or antenna patterns could impact proper operation of the system. In its comments, ACA supports this notification requirement. 41. In its comments, MSS suggests that effective implementation of MAS requires mandatory coordination of network changes with the MAS operator. As an example, MSS cites the impact of a technical change such as a switch from 3G to 4G at a given base station for a given band. At the same time, MSS notes the possibility that carriers may find the coordination of network changes with MAS operators burdensome. Tecore has highlighted the importance of communicating with the carriers regarding changes in technologies and the need to modify MAS deployments to respond to those changes, which occur frequently. GTL has also reiterated the challenges it faces in keeping pace with the software changes required to respond to rapidly changing wireless technology. GTL suggests that policies must ensure that wireless carriers are active participants in the effort to eliminate contraband cellphone use. 42. We acknowledge that the effectiveness of CIS systems depends on coordination between CMRS licensees, CIS operators, and correctional facilities, yet we recognize that any carrier notification requirement must not be overly burdensome or costly or have a negative impact on consumers. T-Mobile claims that the record on this issue is in need of further development, and that a notification requirement could impede carrier network management flexibility and could delay the rollout of new technologies which would negatively impact consumers and carriers. 43. We recognize that a notification requirement that is too broad in scope, resulting in the need to send notifications possibly on a daily basis for minor technical changes, could be PO 00000 Frm 00026 Fmt 4702 Sfmt 4702 22787 unduly burdensome on CMRS licensees. We also recognize that lack of notice to CIS operators of certain types of carrier system changes could potentially result in the CIS not providing the strongest signal in the correctional facility, compromising the system’s effectiveness if contraband communications pass directly to the carrier network. Accordingly, in the FNPRM, we seek comment on the appropriate scope of a notification requirement. Would it be appropriate to require CMRS licensees that are parties to lease arrangements for CISs in correctional facilities to provide written notification to the CIS operator in advance of adding new frequency band(s) to their service offerings or deploying a new air interface technology (e.g., a carrier that previously offered CDMA technology deploying LTE) so that CISs can be timely upgraded to prevent spectrum gaps in the system that could be exploited by users of contraband wireless devices? To what extent should we require notification for additional types of carrier network changes, as GTL proposed, and if so, what specific network changes (e.g., transmitter power or antenna modifications) should be included? We seek specific comment on what other carrier network changes implemented without notice to CIS providers could render the systems in the correctional facilities ineffective, while also seeking comment on whether it is unduly burdensome to require notification for every routine carrier network modification. Would it be feasible to adopt a rule requiring a CMRS licensee providing service at a correctional facility to notify a CIS provider in advance of any network change likely to impact the CIS? We seek comment on AT&T’s position that CIS providers should be required to respond within 24 hours to any notification from a CMRS licensee that the CIS is causing adverse effects to the carrier’s network. 44. We also seek comment on how far in advance the notification should be sent from the CMRS licensee to the CIS operator in order to allow for sufficient time to upgrade the CIS and enable continuous successful CIS operation with no spectrum gaps. Is a 90 day advance notification requirement reasonable? Would a 30 day advance notification requirement allow sufficient time for upgrades? Finally, we seek comment on whether and to what extent CMRS licensees are currently coordinating with CIS operators in this regard. For example, T-Mobile states that a notification requirement will not provide any benefit and is unnecessary E:\FR\FM\18MYP1.SGM 18MYP1 22788 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules jstallworth on DSK7TPTVN1PROD with PROPOSALS because CIS providers conduct spectrum scans as part of daily operations to detect new bands and technologies and air interfaces in use and already coordinate this scanning with CMRS licensees. We seek comment on the costs and benefits of any suggested notification requirements. Other Technological Solutions 45. In the NPRM, the Commission invited comment on other technological solutions to address the problem of contraband wireless devices in correctional facilities, including those solutions discussed in previously filed documents referred to in the NPRM. 46. ‘‘Quiet Zones.’’ In response to the NPRM seeking comment regarding alternative technological solutions to the contraband problem, some commenters suggest that the Commission mandate ‘‘dead zones’’ or ‘‘quiet zones’’ in and around correctional facilities. Although the proposals vary somewhat from a technical perspective and are referred to by different names, the common goal seems to be the creation of areas in which communications are not authorized such that contraband wireless devices in correctional facilities would not receive service from a wireless provider. 47. CellAntenna’s position is that the Commission has authority to modify spectrum licenses to create areas, such as in correctional facilities, in which wireless services are not authorized. CellAntenna refers to NTCH’s recommendation for ‘‘quiet zones’’ where no licensee would be authorized to provide services. CellAntenna suggests that, given the variability in geography, each local correctional facility should be allowed to determine its need for a ‘‘no service’’ zone and petition the Commission to establish the ‘‘no service’’ zone and procedures for the registration of complaints of interference outside of the zones. Despite the fact that CellAntenna references NTCH’s comments, NTCH’s plan for the designation of ‘‘quiet zones’’ similar to radio astronomy or other research facilities to cover correctional facilities appears to differ from CellAntenna’s ‘‘no service’’ zones because, according to NTCH’s plan, there would be an official entity responsible for preventing unauthorized communications and for offering service over authorized frequencies in the prison area, called the ‘‘Prison Service Provider.’’ NCIC suggests that the Commission create ‘‘dead zones’’ around correctional facilities in which carriers would be required to prevent the signal from reaching the correctional VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 facility. GTL agrees that the Commission should explore the creation of ‘‘dead zones’’ or ‘‘quiet zones.’’ 48. Similar to a ‘‘no service’’ zone, MSS proposes an alternative approach called geolocation-based denial (GBD) which permits a correctional facility to request that the Commission declare the facility outside the service area of all CMRS carriers if the facility has at least 300 meters of space in all directions between secure areas accessible by inmates and areas with unrestricted public access. MSS describes GBD as a low-risk solution that will address highly problematic rural maximum security prisons. ACA supports the creation of ‘‘quiet zones’’ and GBD. 49. The carriers oppose the ‘‘quiet zone’’-like proposals. AT&T opposes NCIC’s proposal to create ‘‘quiet zones’’ around correctional facilities in which carriers are unauthorized to provide wireless service, claiming that a quiet zone would prevent the completion of legitimate emergency calls from the correctional facility and vicinity within the quiet zone. Even in rural areas, Verizon suggests, legitimate communications in the areas around prisons could be impacted. In opposing the idea of a quiet or exclusion zone, Verizon argues that these proposals would indiscriminately prevent legitimate communications, including public safety communications from being completed both inside and outside the prison grounds. CTIA opposes the establishment of quiet zones because they would unnecessarily complicate wireless network design and be an intrusion on licensees’ exclusive spectrum rights. 50. In the FNPRM, we seek additional comment on the proposals in the record for the mandatory creation of ‘‘quiet zones’’ or ‘‘no service’’ zones in order to help us better understand the similarities and differences among the proposals and receive more detailed information in the record regarding how the zones would be created from a legal and technical perspective. What are the methods wireless providers would use to create the quiet zone, including technical criteria used to define the zone? Should there be a field strength limit on the perimeter of the zone and, if so, what is the appropriate limit? Would the limits set forth in Commission rule 15.109 (47 CFR 15.109) applicable to unintentional radiators be appropriate and how would this be measured? Or would a different criterion, such as 15 dBu, be appropriate to ensure calls outside the perimeter could be completed while not providing the ability for connection to the network inside the perimeter? How would such PO 00000 Frm 00027 Fmt 4702 Sfmt 4702 a limit impact carrier network design? Again, we request that commenters elaborate on the role of the Commission in the creation of these zones and the legal basis for their establishment. We query whether ‘‘quiet zones’’ could be created voluntarily or whether there is a legal bar to their creation in the absence of Commission action. We also seek comment on the application of ‘‘geo-fencing’’ in the contraband wireless device context and how it differs from a ‘‘quiet zone.’’ Just as geofencing software can prevent drones from flying over a specific location, could geo-fencing be used to create a virtual perimeter around a correctional facility such that wireless devices would be disabled within the geo-fence? We seek comment on whether geofencing could be used to create zones within which contraband wireless devices would be inoperable and whether this technology would permit the delivery of emergency calls within the zone or interfere with other legitimate communications outside the geo-fence. 51. Network-Based Solution. Relatedly, we seek comment on the concept of requiring CMRS licensees to identify and disable contraband wireless devices in correctional facilities using their own network elements, including base stations and handsets/devices. As technology evolves, CMRS licensees are acquiring new and better ways of more accurately determining the precise location of a wireless device. Indeed, the Commission addressed the technological advances and need to improve location accuracy in the context of emergency 911 calling when it adopted E911 location accuracy deadlines aimed at enhancing PSAPs’ ability to accurately identify the location of wireless 911 callers when indoors. In order to meet the Commission’s requirements over the next several years, carriers will be required to deploy technology capable of locating wireless devices to within certain distances or coordinates. We also know that carriers currently have ways of determining the location of a wireless device using an analysis of call records or Global Positioning System (GPS) technology. In fact, more than 20 states have enacted legislation based on the Kelsey Smith Act (H.R. 4889, 114th Cong., 2d Sess. (2016)) that requires carriers to give law enforcement call location information in an emergency involving the risk of death or serious injury. Further, there are device applications (e.g., Uber or Google Maps) that enable the identification of the location of the device through GPS E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules technology located in the device. Given the improved and evolving capability of carriers to identify the location of wireless devices, we seek comment on whether existing methodologies could also be effective in the context of contraband wireless devices in correctional facilities. We acknowledge that an approach relying solely on GPS technology may not be effective inside correctional facilities if the GPS capability can be disabled or if GPS signals are insufficient within the correctional facility. Further, we note that a carrier’s ability to identify the location based on network (not device GPS) data is affected by the number, location, and orientation of carrier base stations in the area. That said, we seek comment on whether it is possible for CMRS licensees to use their own network elements to determine that a wireless device is in a correctional facility, and what are the costs and benefits of such a process. 52. If we require CMRS licensees to identify wireless devices in correctional facilities using their own network elements, should we require carriers to recognize whether contraband wireless devices are persistently used in a correctional facility located in the carrier’s geographic service area and to disable them using their own resources? How should we define ‘‘persistently’’? How would the carriers determine that a wireless device in a correctional facility is, in fact, contraband? Should the carriers be required to have an internal process in place whereby they could reactivate a device disabled in error? If a network-based solution is feasible, should we require it only if a particular correctional facility requests this approach as opposed to the solution of requiring CMRS licensees to disable devices pursuant to qualifying requests as described above? Do particular types of wireless devices or carrier air interfaces present unique challenges? We seek comment on the implementation, technical, and other issues associated with this carrier network-based solution as well as the costs and benefits associated with this potential solution. In particular, what would the costs be to carriers of complying with a mandate of having to locate contraband wireless devices in all correctional facilities nationwide? Finally, we seek comment on whether the network-based solution described herein raises any privacy concerns, including the privacy obligations under section 222 of the Communications Act. 53. Beacon Technology. We also seek comment on technologies that are intended to disable contraband wireless devices in correctional facilities using VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 the interaction of a beacon system set up in the correctional facility with software embedded in the wireless devices. Essentially, these types of technologies rely on a system of beacons creating a restricted zone in a correctional facility, such that any wireless device in the zone will not operate. One of the benefits of this approach is that this technology would appear to render the phone unusable by an inmate for any purpose. In other words, some of the technologies discussed above could prevent an inmate from placing a call, but they may not prevent the inmate from using the phone for taking videos or otherwise sharing or disseminating information that itself could pose a threat to public safety. We thus also seek comment on whether this type of technology—or elements thereof—can and should be incorporated into any other approach the Commission may take. For example, should we consider requiring that phones be rendered completely unusable as part of our implementation of another solution, including the network-based solution discussed above. 54. At the same time, it appears that beacon-based technologies would function effectively only if all wireless carriers perform a system update to include the software for all existing and future wireless devices, and all mobile device manufacturers include the software in all devices. We seek comment on this technological solution, including costs and benefits of its implementation. Would this solution require legislation to ensure that all wireless carriers and wireless device manufacturers include the software in the wireless devices? In the absence of legislation, how would the Commission ensure wireless carrier and device manufacturer cooperation and pursuant to what authority would the Commission be acting? How would compliance be enforced? Should it be incorporated as part of the Commission’s equipment certification requirements or be made part of an industry certification process? Would a ‘‘system update’’ actually accomplish the goal of ensuring that all wireless devices currently in existence get updated with the software? Would the beacon system in the correctional facility permit 911 or E911 calls from the restricted zone to be connected? Is a voluntary solution possible between the carriers and the providers of beacon technology? 55. We welcome comment on any other new technologies designed to combat the problem of contraband wireless devices in correctional facilities and what regulatory steps the PO 00000 Frm 00028 Fmt 4702 Sfmt 4702 22789 Commission could take to assist in the development and deployment of these new technologies. We seek comment on what additional steps the Commission could take to address the contraband cellphone problem, for example, educational efforts designed to highlight available solutions, other expertise, or additional ways in which we can coordinate stakeholder efforts. II. Procedural Matters Initial Paperwork Reduction Act Analysis 56. The FNPRM contains proposed new information collection requirements. The Commission, as part of its continuing effort to reduce paperwork burdens, invites the general public and OMB to comment on the information collection requirements contained in this document, as required by PRA. In addition, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4), the Commission seeks specific comment on how it might ‘‘further reduce the information collection burden for small business concerns with fewer than 25 employees.’’ Initial Regulatory Flexibility Act Analysis 57. As required by the Regulatory Flexibility Act of 1980 (5 U.S.C. 603), the Commission has prepared an Initial Regulatory Flexibility Analysis (IRFA) of the possible significant economic impact on small entities of the policies and rules proposed in this document. We request written public comment on the IRFA. Comments must be filed in accordance with the same deadlines as comments filed in response to the FNPRM as set forth on the first page of this document, and have a separate and distinct heading designating them as responses to the IRFA. The Commission’s Consumer and Governmental Affairs Bureau, Reference Information Center, will send a copy of the FNPRM, including the IRFA, to the Chief Counsel for Advocacy of the Small Business Administration. 58. Need for, and Objectives of, the Proposed Rules. The FNPRM seeks comment on methods to provide additional tools to combat contraband wireless devices in correctional facilities. It is clear that inmate possession of wireless devices is a serious threat to the safety and welfare of correctional facility employees and the general public. First, as a safeguard to ensure coordination between CMRS licensees and CIS operators, the Commission seeks comment on a E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22790 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules requirement that CMRS licensees that are parties to lease arrangements for CIS in correctional facilities provide written notification to the CIS operator no later than 90 days in advance of adding new frequency band(s) to its service offerings or deploying a new air interface technology (e.g., a carrier that previously offered CDMA deploying LTE), unless a different timeframe is agreed to by both parties. The Commission seeks comment on the appropriate timing, costs, and alternatives to such a notice requirement. The FNPRM seeks comments on the types of notice protocol CMRS licensees might already have in place, and whether and how those procedures could be used to satisfy any notice requirement. 59. The FNPRM seeks comment on a requirement that CMRS providers disable a contraband wireless devices found by a CIS to be in correctional facilities pursuant to a qualifying request from an authorized party. The FNPRM seeks comment on a process that would include a CIS eligibility determination to ensure the systems satisfy minimum performance standards, appropriate means of requesting the disabling, and specifics regarding the required carrier response. The Commission seeks comment on maintaining a public list of all eligible CISs to facilitate expeditious lease transactions for those seeking to deploy systems resulting in requests for contraband wireless device disabling. We seek comment on the following criteria for determining eligibility: (1) The CIS has appropriate equipment authorization pursuant to Commission rules; (2) the CIS is designed and will be configured to locate devices solely within a correctional facility, secure and protect the collected information, and avoid interfering with emergency 911 calls; and (3) the methodology to be used in analyzing data collected by the CIS is sufficiently robust to provide a high degree of certainty that the particular wireless device is in fact located within a correctional facility. The Commission also seeks comment on these standards, and whether additional standards may be required for accuracy 60. To ensure that an authorized party provides the information necessary for a wireless provider to disable the contraband wireless devices, the Commission seeks comment on a requirement that CMRS licensees comply with a disabling process upon receipt of a qualifying request made in writing and transmitted via a verifiable transmission mechanism. The Commission seeks comment on whether the qualifying request must be VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 transmitted (1) by the Commission upon the request of a Designated Correctional Facility Official (DCFO); or (2) by the DCFO. We seek comment on whether we should define the DCFO as a state or local official responsible for the facility where the contraband device is located. In order for the request to disable a contraband device to be a qualifying request, the Commission also seeks comment on a requirement that the DCFO certify in the qualifying request that: (1) An eligible CIS was used in the correctional facility, and include evidence of such eligibility; (2) the CIS is authorized for operation through a license or Commission approved lease agreement, referencing the applicable ULS identifying information; (3) the DCFO has contacted all CMRS licensees providing service in the area of the correctional facility for which it will seek device disabling in order to establish a verifiable transmission mechanism for making qualifying requests and for receiving notifications from the licensee; and (4) it has substantial evidence that the contraband wireless device was used in the correctional facility, and that such use was observed within the 30 day period immediately prior to the date of submitting the request. The Commission seeks comment on these requirements and any methods to facilitate interaction between the authorized party and the CMRS licensees during design, deployment, and testing of CISs. 61. In the FNPRM, the Commission seeks comment on whether a qualifying request should include specific identifying information regarding the device and the correctional facility. Importantly, the Commission asks whether the request should include device identifiers sufficient to uniquely describe the device in question and the licensee providing CMRS service to the device. With regard to device identifiers, the Commission seeks specific comment on whether other details are necessary in addition to identifiers that uniquely describe the specific devices, such as make and model of the device or the mode of device utilization at the time of detection. The FNPRM also seeks comment on whether a qualifying request should also include correctional facility identifiers, including the name of the correctional facility, the street address of the correctional facility, the latitude and longitude coordinates sufficient to describe the boundaries of the correctional facility, and the call signs of the Commission licenses and/or leases authorizing the CIS. 62. In considering a process whereby CMRS licensees disable contraband PO 00000 Frm 00029 Fmt 4702 Sfmt 4702 wireless devices upon receiving a qualifying request, the Commission recognizes the need to safeguard legitimate devices from being disabled to the greatest extent possible. Accordingly, the FNPRM seeks comment on the appropriate steps, if any, the CMRS licensee should take to verify the information received, whether customer outreach should be part of the process, and the time frame within which the steps must be taken. The Commission seeks comment on a requirement that, if the DCFO is the authorized party transmitting the qualifying request to the CMRS licensees, then the CMRS licensee must provide a point of contact suitable for receiving qualifying requests to disable contraband wireless devices in correctional facilities. With regard to carrier investigations, the Commission seeks comment on a range of possible options, including requiring the carrier to immediately disable the wireless devices upon receipt of a qualifying request from an authorized party without conducing any investigation; requiring the carrier to conduct brief research of readily accessible data prior to disabling or to respond to a series of Commission questions regarding the status of the wireless device to determine its status; or requiring the carrier to use all data at its disposal prior to disabling. The FNPRM seeks comment on all aspects of the disabling process regarding verification of disabling requests, particularly the costs and benefits to the wireless providers, CIS operators, and the correctional facilities. 63. With respect to the appropriate timeframe for disabling a contraband wireless device, or rejecting the request if appropriate, the Commission seeks comment on various options, each of which might be impacted by the range of potential levels of carrier investigation in independently verifying a disabling request and customer outreach. The Commission believes that appropriate timeframes should strike a reasonable balance between the need for prompt action to disable a contraband device potentially used for criminal purposes, and licensee resources required to either verify and implement, or reasonably reject a qualifying request. 64. While the Commission seeks comment on a CIS eligibility process that will substantially ensure that only contraband wireless devices located within correctional facilities are identified for carrier disabling, we also recognize that in limited instances a non-contraband device in close proximity to a correctional facility might be mistakenly identified as E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules contraband and disabled in error. In the event of such an error, the Commission seeks comment on what timely and efficient methods wireless providers can implement to minimize customer inconvenience to resume service to the device. 65. The Commission has considered various alternatives, including a court order process or a voluntary carrier termination process, on which it seeks comment. The Commission sought comment on a proposal seeking adoption of a rule to insulate carriers from any legal liability for wrongful termination. The Commission noted that wireless carriers’ current end user licensing agreements may already protect the carriers, but seeks further comment on this proposal, and on whether the Commission should create a safe harbor by rule for wireless providers that comply with the federal process for disabling phones in correctional facilities. The Commission also seeks comment on whether and to what extent a system used to request wireless provider disabling of a contraband wireless device pursuant to a Commission rule raises issues under Title 18 of the U.S. Code or section 705 of the Communications Act, as amended (Act), that may be different from those raised by MAS implementation. The Commission does not find that the record supports the position that section 222 of the Act would prohibit a carrier from complying with a disabling process, but seeks comment on the issue to the extent commenters maintain a contrary view. 66. In the alternative, the Commission seeks comment on additional technological means of combating contraband devices, including imposition of quiet zones around correctional facilities, network-based solutions, and incorporation of beacon technology into wireless handsets that would provide a software method of disabling functionality within correctional facilities 67. Legal Basis. The legal basis for any action that may be taken pursuant to the FNPRM is contained in sections 2, 4(i), 4(j), 301, 302, 303, 307, 308, 309, 310, and 332 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 154(j), 301, 302a, 303, 307, 308, 309, 310, and 332. 68. Description and Estimate of the Number of Small Entities to Which the Proposed Rules Will Apply. The RFA directs agencies to provide a description of, and where feasible, an estimate of the number of small entities that may be affected by the proposed rules, if adopted (15 U.S.C. 603(b)(3)). The RFA generally defines the term ‘‘small VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 entity’’ as having the same meaning as the terms ‘‘small business,’’ ‘‘small organization,’’ and ‘‘small governmental jurisdiction’’ (5 U.S.C. 601(6)). In addition, the term ‘‘small business’’ has the same meaning as the term ‘‘smallbusiness concern’’ under the Small Business Act (5 U.S.C. 601(3)). A ‘‘small-business concern’’ is one which: (1) Is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the SBA (5 U.S.C. 601(3)). 69. Small Businesses, Small Organizations, Small Governmental Jurisdictions. Our actions, over time, may affect small entities that are not easily categorized at present. We therefore describe here, at the outset, three comprehensive small entity size standards that could be directly affected herein. First, while there are industry specific size standards for small businesses that are used in the regulatory flexibility analysis, according to data from the SBA’s Office of Advocacy, in general a small business is an independent business having fewer than 500 employees. These types of small businesses represent 99.9% of all businesses in the United States which translates to 28.8 million businesses. Next, the type of small entity described as a ‘‘small organization’’ is generally ‘‘any not-for-profit enterprise which is independently owned and operated and is not dominant in its field.’’ Nationwide, as of 2007, there were approximately 1,621,215 small organizations. Finally, the small entity described as a ‘‘small governmental jurisdiction’’ is defined generally as ‘‘governments of cities, towns, townships, villages, school districts, or special districts, with a population of less than fifty thousand.’’ U.S. Census Bureau data published in 2012 indicate that there were 89,476 local governmental jurisdictions in the United States. We estimate that, of this total, as many as 88,761 entities may qualify as ‘‘small governmental jurisdictions.’’ Thus, we estimate that most governmental jurisdictions are small. 70. Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired PO 00000 Frm 00030 Fmt 4702 Sfmt 4702 22791 telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry. The SBA has developed a small business size standard for Wired Telecommunications Carriers, which consists of all such companies having 1,500 or fewer employees. U.S. Census data for 2012 shows that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Thus, under this size standard, the majority of firms in this industry can be considered small. 71. Neither the Commission nor the SBA has developed a definition for Interexchange Carriers. The closest NAICS Code category is Wired Telecommunications Carriers and the applicable small business size standard under SBA rules consists of all such companies having 1,500 or fewer employees. U.S. Census data for 2012 indicates that 3,117 firms operated during that year. Of that number, 3,083 operated with fewer than 1,000 employees. According to internally developed Commission data, 359 companies reported that their primary telecommunications service activity was the provision of interexchange services. Of this total, an estimated 317 have 1,500 or fewer employees. Consequently, the Commission estimates that the majority of interexchange service providers are small entities that may be affected by the rules adopted. 72. The SBA has not developed a small business size standard specifically for Local Resellers. The SBA category of Telecommunications Resellers is the closest NAICs code category for local resellers. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. Under the SBA size standard, such a business is small if it has 1,500 or fewer employees. U.S. Census data for 2012 show that 1,341 firms provided E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22792 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules resale services during that year. Of that number, 1,341 operated with fewer than 1,000 employees. Thus, under this category and the associated small business size standard, the majority of these resellers can be considered small entities. According to Commission data, 213 carriers have reported that they are engaged in the provision of local resale services. Of these, an estimated 211 have 1,500 or fewer employees and two have more than 1,500 employees. Consequently, the Commission estimates that the majority of local resellers are small entities that may be affected by the rules adopted. 73. Toll Resellers. The SBA has not developed a small business size standard specifically for the category of Toll Resellers. The SBA category of Telecommunications Resellers is the closest NAICs code category for toll resellers. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. Under the SBA size standard, such a business is small if it has 1,500 or fewer employees. U.S. Census data for 2012 show that 1,341 firms provided resale services during that year. Of that number, 1,341 operated with fewer than 1,000 employees. Thus, under this category and the associated small business size standard, the majority of these resellers can be considered small entities. According to Commission data, 881 carriers have reported that they are engaged in the provision of toll resale services. Of these, an estimated 857 have 1,500 or fewer employees and 24 have more than 1,500 employees. Consequently, the Commission estimates that the majority of toll resellers are small entities that may be affected by the rules adopted. 74. Other Toll Carriers. Neither the Commission nor the SBA has developed a size standard for small businesses specifically applicable to Other Toll Carriers. This category includes toll carriers that do not fall within the categories of interexchange carriers, operator service providers, prepaid calling card providers, satellite service carriers, or toll resellers. The closest applicable size standard under SBA rules is for Wired Telecommunications Carriers and the applicable small VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 business size standard under SBA rules consists of all such companies having 1,500 or fewer employees. U.S. Census data for 2012 indicates that 3,117 firms operated during that year. Of that number, 3,083 operated with fewer than 1,000 employees. According to Commission data, 284 companies reported that their primary telecommunications service activity was the provision of other toll carriage. Of these, an estimated 279 have 1,500 or fewer employees and five have more than 1,500 employees. Consequently, the Commission estimates that most Other Toll Carriers are small entities that may be affected by the rules and policies adopted. 75. 800 and 800-Like Service Subscribers. Neither the Commission nor the SBA has developed a small business size standard specifically for 800 and 800-like service (toll free) subscribers. The appropriate size standard under SBA rules is for the category Telecommunications Resellers. Under that size standard, such a business is small if it has 1,500 or fewer employees. The most reliable source of information regarding the number of these service subscribers appears to be data the Commission collects on the 800, 888, 877, and 866 numbers in use. According to our data, as of September 2009, the number of 800 numbers assigned was 7,860,000; the number of 888 numbers assigned was 5,588,687; the number of 877 numbers assigned was 4,721,866; and the number of 866 numbers assigned was 7,867,736. We do not have data specifying the number of these subscribers that are not independently owned and operated or have more than 1,500 employees, and thus are unable at this time to estimate with greater precision the number of toll free subscribers that would qualify as small businesses under the SBA size standard. Consequently, we estimate that there are 7,860,000 or fewer small entity 800 subscribers; 5,588,687 or fewer small entity 888 subscribers; 4,721,866 or fewer small entity 877 subscribers; and 7,867,736 or fewer small entity 866 subscribers. 76. Wireless Telecommunications Carriers (except Satellite). This industry comprises establishments engaged in operating and maintaining switching and transmission facilities to provide communications via the airwaves. Establishments in this industry have spectrum licenses and provide services using that spectrum, such as cellular services, paging services, wireless internet access, and wireless video services. The appropriate size standard under SBA rules is that such a business is small if it has 1,500 or fewer PO 00000 Frm 00031 Fmt 4702 Sfmt 4702 employees. For this industry, U.S. Census data for 2012 show that there were 967 firms that operated for the entire year. Of this total, 955 firms had employment of 999 or fewer employees and 12 had employment of 1000 employees or more. Thus under this category and the associated size standard, the Commission estimates that the majority of wireless telecommunications carriers (except satellite) are small entities. 77. Broadband Personal Communications Service. The broadband personal communications service (PCS) spectrum is divided into six frequency blocks designated A through F, and the Commission has held auctions for each block. The Commission defined ‘‘small entity’’ for Blocks C and F as an entity that has average gross revenues of $40 million or less in the three previous calendar years. For Block F, an additional classification for ‘‘very small business’’ was added and is defined as an entity that, together with its affiliates, has average gross revenues of not more than $15 million for the preceding three calendar years. These standards defining ‘‘small entity’’ in the context of broadband PCS auctions have been approved by the SBA. No small businesses, within the SBA-approved small business size standards bid successfully for licenses in Blocks A and B. There were 90 winning bidders that qualified as small entities in the Block C auctions. A total of 93 small and very small business bidders won approximately 40 percent of the 1,479 licenses for Blocks D, E, and F. In 1999, the Commission re-auctioned 347 C, E, and F Block licenses. There were 48 small business winning bidders. In 2001, the Commission completed the auction of 422 C and F Broadband PCS licenses in Auction 35. Of the 35 winning bidders in this auction, 29 qualified as ‘‘small’’ or ‘‘very small’’ businesses. Subsequent events, concerning Auction 35, including judicial and agency determinations, resulted in a total of 163 C and F Block licenses being available for grant. In 2005, the Commission completed an auction of 188 C block licenses and 21 F block licenses in Auction 58. There were 24 winning bidders for 217 licenses. Of the 24 winning bidders, 16 claimed small business status and won 156 licenses. In 2007, the Commission completed an auction of 33 licenses in the A, C, and F Blocks in Auction 71. Of the 14 winning bidders, six were designated entities. In 2008, the Commission completed an auction of 20 E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules Broadband PCS licenses in the C, D, E and F block licenses in Auction 78. 78. Advanced Wireless Services. AWS Services (1710–1755 MHz and 2110– 2155 MHz bands (AWS–1); 1915–1920 MHz, 1995–2000 MHz, 2020–2025 MHz and 2175–2180 MHz bands (AWS–2); 2155–2175 MHz band (AWS–3)). For the AWS–1 bands, the Commission has defined a ‘‘small business’’ as an entity with average annual gross revenues for the preceding three years not exceeding $40 million, and a ‘‘very small business’’ as an entity with average annual gross revenues for the preceding three years not exceeding $15 million. For AWS–2 and AWS–3, although we do not know for certain which entities are likely to apply for these frequencies, we note that the AWS–1 bands are comparable to those used for cellular service and personal communications service. The Commission has not yet adopted size standards for the AWS–2 or AWS–3 bands but proposes to treat both AWS–2 and AWS–3 similarly to broadband PCS service and AWS–1 service due to the comparable capital requirements and other factors, such as issues involved in relocating incumbents and developing markets, technologies, and services. 79. Specialized Mobile Radio. The Commission awards small business bidding credits in auctions for Specialized Mobile Radio (‘‘SMR’’) geographic area licenses in the 800 MHz and 900 MHz bands to entities that had revenues of no more than $15 million in each of the three previous calendar years. The Commission awards very small business bidding credits to entities that had revenues of no more than $3 million in each of the three previous calendar years. The SBA has approved these small business size standards for the 800 MHz and 900 MHz SMR Services. The Commission has held auctions for geographic area licenses in the 800 MHz and 900 MHz bands. The 900 MHz SMR auction was completed in 1996. Sixty bidders claiming that they qualified as small businesses under the $15 million size standard won 263 geographic area licenses in the 900 MHz SMR band. The 800 MHz SMR auction for the upper 200 channels was conducted in 1997. Ten bidders claiming that they qualified as small businesses under the $15 million size standard won 38 geographic area licenses for the upper 200 channels in the 800 MHz SMR band. A second auction for the 800 MHz band was conducted in 2002 and included 23 BEA licenses. One bidder claiming small business status won five licenses. 80. The auction of the 1,053 800 MHz SMR geographic area licenses for the VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 General Category channels was conducted in 2000. Eleven bidders won 108 geographic area licenses for the General Category channels in the 800 MHz SMR band qualified as small businesses under the $15 million size standard. In an auction completed in 2000, a total of 2,800 Economic Area licenses in the lower 80 channels of the 800 MHz SMR service were awarded. Of the 22 winning bidders, 19 claimed small business status and won 129 licenses. Thus, combining all three auctions, 40 winning bidders for geographic licenses in the 800 MHz SMR band claimed status as small business. 81. In addition, there are numerous incumbent site-by-site SMR licensees and licensees with extended implementation authorizations in the 800 and 900 MHz bands. We do not know how many firms provide 800 MHz or 900 MHz geographic area SMR pursuant to extended implementation authorizations, nor how many of these providers have annual revenues of no more than $15 million. One firm has over $15 million in revenues. In addition, we do not know how many of these firms have 1500 or fewer employees. We assume, for purposes of this analysis, that all of the remaining existing extended implementation authorizations are held by small entities, as that small business size standard is approved by the SBA. 82. Lower 700 MHz Band Licenses. The Commission previously adopted criteria for defining three groups of small businesses for purposes of determining their eligibility for special provisions such as bidding credits. The Commission defined a ‘‘small business’’ as an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years. A ‘‘very small business’’ is defined as an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. Additionally, the lower 700 MHz Service had a third category of small business status for Metropolitan/ Rural Service Area (MSA/RSA) licenses—‘‘entrepreneur’’—which is defined as an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $3 million for the preceding three years. The SBA approved these small size standards. An auction of 740 licenses (one license in each of the 734 MSAs/RSAs and one license in each of the six Economic Area Groupings (EAGs)) commenced on August 27, 2002, and closed on September 18, PO 00000 Frm 00032 Fmt 4702 Sfmt 4702 22793 2002. Of the 740 licenses available for auction, 484 licenses were won by 102 winning bidders. Seventy-two of the winning bidders claimed small business, very small business or entrepreneur status and won a total of 329 licenses. A second auction commenced on May 28, 2003, closed on June 13, 2003, and included 256 licenses: 5 EAG licenses and 476 Cellular Market Area licenses. Seventeen winning bidders claimed small or very small business status and won 60 licenses, and nine winning bidders claimed entrepreneur status and won 154 licenses. On July 26, 2005, the Commission completed an auction of 5 licenses in the Lower 700 MHz band (Auction No. 60). There were three winning bidders for five licenses. All three winning bidders claimed small business status. 83. In 2007, the Commission reexamined its rules governing the 700 MHz band. An auction of 700 MHz licenses commenced January 24, 2008 and closed on March 18, 2008, which included, 176 Economic Area licenses in the A Block, 734 Cellular Market Area licenses in the B Block, and 176 EA licenses in the E Block. Twenty winning bidders, claiming small business status (those with attributable average annual gross revenues that exceed $15 million and do not exceed $40 million for the preceding three years) won 49 licenses. Thirty-three winning bidders claiming very small business status (those with attributable average annual gross revenues that do not exceed $15 million for the preceding three years) won 325 licenses. 84. Upper 700 MHz Band Licenses. On January 24, 2008, the Commission commenced Auction 73 in which several licenses in the Upper 700 MHz band were available for licensing: 12 Regional Economic Area Grouping licenses in the C Block, and one nationwide license in the D Block. The auction concluded on March 18, 2008, with 3 winning bidders claiming very small business status (those with attributable average annual gross revenues that do not exceed $15 million for the preceding three years) and winning five licenses. 85. Satellite Telecommunications. This category comprises firms ‘‘primarily engaged in providing telecommunications services to other establishments in the telecommunications and broadcasting industries by forwarding and receiving communications signals via a system of satellites or reselling satellite telecommunications.’’ The category has a small business size standard of $32.5 million or less in average annual E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22794 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules receipts, under SBA rules. For this category, U.S. Census Bureau data for 2012 show that there were a total of 333 firms that operated for the entire year. Of this total, 299 firms had annual receipts of less than $25 million. Consequently, we estimate that the majority of satellite telecommunications providers are small entities. 86. All Other Telecommunications. The ‘‘All Other Telecommunications’’ category is comprised of establishments that are primarily engaged in providing specialized telecommunications services, such as satellite tracking, communications telemetry, and radar station operation. This industry also includes establishments primarily engaged in providing satellite terminal stations and associated facilities connected with one or more terrestrial systems and capable of transmitting telecommunications to, and receiving telecommunications from, satellite systems. Establishments providing Internet services or voice over Internet protocol (VoIP) services via clientsupplied telecommunications connections are also included in this industry. The SBA has developed a small business size standard for ‘‘All Other Telecommunications,’’ which consists of all such firms with gross annual receipts of $32.5 million or less. For this category, U.S. Census data for 2012 show that there were 1,442 firms that operated for the entire year. Of these firms, a total of 1,400 had gross annual receipts of less than $25 million. Thus, a majority of ‘‘All Other Telecommunications’’ firms potentially affected by the rules adopted can be considered small. 87. Other Communications Equipment Manufacturing. This industry comprises establishments primarily engaged in manufacturing communications equipment (except telephone apparatus, and radio and television broadcast, and wireless communications equipment). Examples of such manufacturing include fire detection and alarm systems manufacturing, Intercom systems and equipment manufacturing, and signals (e.g., highway, pedestrian, railway, traffic) manufacturing. The SBA has established a size standard for this industry as 750 employees or less. Census data for 2012 show that 383 establishments operated in that year. Of that number, 379 operated with less than 500 employees. Based on that data, we conclude that the majority of Other Communications Equipment Manufacturers are small. 88. Radio and Television Broadcasting and Wireless Communications Equipment Manufacturing. This VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 industry comprises establishments primarily engaged in manufacturing radio and television broadcast and wireless communications equipment. Examples of products made by these establishments are: Transmitting and receiving antennas, cable television equipment, GPS equipment, pagers, cellular phones, mobile communications equipment, and radio and television studio and broadcasting equipment. The SBA has established a size standard for this industry of 750 employees or less. U.S. Census data for 2012 show that 841 establishments operated in this industry in that year. Of that number, 819 establishments operated with less than 500 employees. Based on this data, we conclude that a majority of manufacturers in this industry is small. 89. Engineering Services. This industry comprises establishments primarily engaged in applying physical laws and principles of engineering in the design, development, and utilization of machines, materials, instruments, structures, process, and systems. The assignments undertaken by these establishments may involve any of the following activities: Provision of advice, preparation of feasibility studies, preparation of preliminary and final plans and designs, provision of technical services during the construction or installation phase, inspection and evaluation of engineering projects, and related services. The SBA deems engineering services firms to be small if they have $15 million or less in annual receipts, except military and aerospace equipment and military weapons engineering establishments are deemed small if they have $38 million or less in annual receipts. According to U.S. Census Bureau data for 2012, there were 49,092 establishments in this category that operated the full year. Of the 49,092 establishments, 45,848 had less than $10 million in receipts and 3,244 had $10 million or more in annual receipts. Accordingly, the Commission estimates that a majority of engineering service firms are small. 90. Search, Detection, Navigation, Guidance, Aeronautical, and Nautical System Instrument Manufacturing. This U.S. industry comprises establishments primarily engaged in manufacturing search, detection, navigation, guidance, aeronautical, and nautical systems and instruments. Examples of products made by these establishments are aircraft instruments (except engine), flight recorders, navigational instruments and systems, radar systems and equipment, and sonar systems and equipment. The SBA has established a PO 00000 Frm 00033 Fmt 4702 Sfmt 4702 size standard for this industry of 1,250 employees or less. Data from the 2012 Economic Census show 588 establishments operated during that year. Of that number, 533 establishments operated with less than 500 employees. Based on this data, we conclude that the majority of manufacturers in this industry are small. 91. Security Guards and Patrol Services. The U.S. Census Bureau defines this category to include ‘‘establishments primarily engaged in providing guard and patrol services.’’ The SBA deems security guards and patrol services firms to be small if they have $18.5 million or less in annual receipts. According to U.S. Census Bureau data for 2012, there were 8,742 establishments in operation the full year. Of the 8,842 establishments, 8,276 had less than $10 million while 466 had more than $10 million in annual receipts. Accordingly, the Commission estimates that a majority of firms in this category are small. 92. All Other Support Services. This U.S. industry comprises establishments primarily engaged in providing day-today business and other organizational support services (except office administrative services, facilities support services, employment services, business support services, travel arrangement and reservation services, security and investigation services, services to buildings and other structures, packaging and labeling services, and convention and trade show organizing services). The SBA deems all other support services firms to be small if they have $11 million or less in annual receipts. According to U.S. Census Bureau data for 2012, there were 11,178 establishments in operation the full year. Of the 11,178 establishments, 10,886 had less than $10 million while 292 had greater than $10 million in annual receipts. Accordingly, the Commission estimates that a majority of firms in this category are small. 93. Correctional Institutions (State and Federal Facilities). This industry comprises government establishments primarily engaged in managing and operating correctional institutions. The Department of Justice’s Bureau of Justice Statistics (BJS) collects and publishes census information on adult correctional facilities operating under state or federal authority as well as private and local facilities operating under contract to house inmates for federal or state correctional authorities. The types of facilities included in the census data from BJS are prisons and prison farms; prison hospitals; centers for medical treatment and psychiatric E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules confinement; boot camps; centers for reception; diagnosis; classification; alcohol and drug treatment; community correctional facilities; facilities for parole violators and other persons returned to custody; institutions for youthful offenders; and institutions for geriatric inmates. 94. While neither the SBA nor the Commission have developed a size standard for this category, the size standard for a small facility in the BJS census data is one that has an average daily population (ADP) of less than 500 inmates. The latest BJS census data available shows that as of December 30, 2005 there were a total of 1821 correctional facilities operating under state or local federal authority. Of that number more than half of the facilities or a total 946 facilities had an average daily population of less than 500 inmates. Based on this data a majority of ‘‘Governmental Correctional Institutions’’ potentially affected by the rules adopted can be considered small. 95. Facilities Support Services. This industry comprises establishments primarily engaged in providing operating staff to perform a combination of support services within a client’s facilities. Establishments providing facilities (except computer and/or data processing) operation support services and establishments providing private jail services or operating correctional facilities (i.e., jails) on a contract or fee basis are included in this industry. Establishments in this industry typically provide a combination of services, such as janitorial, maintenance, trash disposal, guard and security, mail routing, reception, laundry, and related services to support operations within facilities. These establishments provide operating staff to carry out these support activities, but are not involved with or responsible for the core business or activities of the client. The SBA has developed a small business size standard for ‘‘Facilities Support Services,’’ which consists of all such firms with gross annual receipts of $38.5 million or less. For this category, U.S. Census data for 2012 shows that there were 5,344 firms that operated for the entire year. Of these firms, 4,882 had gross annual receipts of less than $10 million and 462 had gross annual receipts of $10 million or more. Based on this data a majority of ‘‘Facilities Support Services’’ firms potentially affected by the rules adopted can be considered small. 96. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small Entities. In the FNPRM, the Commission seeks public comment on methods to VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 improve the viability of technologies used to combat contraband wireless devices in correctional facilities. The potential process is prospective in that it would only apply if an entity avails itself of managed access or detection technologies. There are three classes of small entities that might be impacted: Providers of wireless services, providers or operators of managed access or detection systems, and correctional facilities. 97. For small entities that are providers of wireless services and enter into lease arrangements with CIS operators, the Commission seeks notice on a requirement that those entities provide advance notice prior to certain changes in the CMRS licensee’s network. We seek comment on limiting the notice requirement to particular changes in the carrier’s network—e.g., additions of new frequency bands—in order to ensure the notice requirement does not result in an unnecessary burden on CMRS licensees, but seek comment on what other notice requirements might be necessary to ensure effective CIS operation. The FNPRM also seeks comment on a process whereby CMRS providers would disable contraband wireless devices detected within a correctional facility upon receipt of a qualifying request. In order to receive qualifying requests, the FNPRM seeks comment on a requirement that CMRS licensees who enter into lease arrangements with CIS operators to have a verifiable transmittal mechanism in place and, upon request, provide a DCFO with a point of contact suitable for receiving qualifying requests. We note that some carriers may already have such secure portals in place for receipt of similar requests. The costs of complying with a disabling process would vary depending on the level of investigation required of carriers upon receiving a qualifying request. The Commission seeks comment on this issue, but notes that several carriers already have internal procedures for disabling contraband wireless devices pursuant to court orders, which could be modified to accommodate a disabling process. Nevertheless, these requirements would likely require the allocation of resources to tailor internal processes, including some level of additional staffing. 98. The FNPRM also contemplates the option of requiring CMRS licensees to perform varying levels of customer outreach upon receiving a qualifying request, or after disabling a contraband wireless device. The Commission seeks comment on the costs and benefits of this proposal, but notes carriers may PO 00000 Frm 00034 Fmt 4702 Sfmt 4702 22795 already have mechanisms in place for customer outreach. 99. The Commission seeks to streamline the process for identification, notification, and disabling of contraband devices to the greatest extent possible, while also ensuring the accuracy, security, and efficiency of such a process. Therefore, the FNPRM seeks comment on a process that would require small entity CIS operators, as well as all other CIS operators, to be deemed eligible and provide various pieces of required information along with a qualifying request for disabling a contraband device to the wireless carriers. Specifically, in order to be eligible, the Commission asks whether a CIS operator should demonstrate the following: (1) The CIS has appropriate equipment authorization pursuant to Commission rules; (2) the CIS is designed and will be configured to locate devices solely within a correctional facility, secure and protect the collected information, and avoid interfering with emergency 911 calls; and (3) the methodology to be used in analyzing data collected by the CIS is sufficiently robust to provide a high degree of certainty that the particular wireless device is in fact located within a correctional facility. 100. The Commission seeks comment on an eligibility process that would apply equally to all CIS operators, irrespective of size. We note that a mandatory process for disabling contraband wireless devices identified using detection systems does not currently exist, and, without adoption of a process like that considered in the FNPRM, is subject to the discretion of wireless carriers to voluntarily disable devices. It is possible that an outgrowth of the questions asked and responses received could result in additional requirements for being deemed an eligible CIS, submitting qualifying requests, and disabling contraband devices. This may also require some level of recordkeeping to ensure that contraband wireless devices, and not legitimate devices, are disabled. To the extent the process would impose these requirements, they would be necessary to ensure that legitimate wireless users are not impacted by the operation of CISs, which should be the minimum performance objective for any detection system. Therefore, while these requirements might impose some compliance or recordkeeping obligations, they would be a necessary predicate for the operation of a detection system. 101. In the FNPRM, we also seek comment on requiring correctional facilities wishing to use CIS as a means E:\FR\FM\18MYP1.SGM 18MYP1 jstallworth on DSK7TPTVN1PROD with PROPOSALS 22796 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules of combatting contraband cellphones use inside the prison to designate a DCFO. The Commission seeks comment on whether qualifying requests should be transmitted either by the Commission upon the request of the DCFO, or by the DCFO. If the DCFO is to transmit the requests, the Commission also seeks comment on a requirement that the DCFO certify in the qualifying request that: (1) An eligible CIS was used in the correctional facility, and include evidence of such eligibility; (2) the CIS is authorized for operation through a license or Commission approved lease agreement, referencing the applicable ULS identifying information; (3) the DCFO has contacted all CMRS licensees providing service in the area of the correctional facility for which it will seek device disabling in order to establish a verifiable transmission mechanism for making qualifying requests and for receiving notifications from the licensee; and (4) it has substantial evidence that the contraband wireless device was used in the correctional facility, and that such use was observed within the 30 day period immediately prior to the date of submitting the request. It is possible that an outgrowth of the questions asked and responses received could result in additional reporting and recordkeeping requirements on the DCFO and its respective correctional facility. The goal of imposing such requirements on the DCFO, however, would be to provide an efficient means of communication among CIS operators, correctional facilities, and CMRS providers, and to ensure the accuracy and legitimacy of any termination process. 102. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives Considered. The RFA requires an agency to describe any significant, specifically small business, alternatives that it has considered in reaching its proposed approach, which may include the following four alternatives (among others): ‘‘(1) The establishment of differing compliance or reporting requirements or timetables that take into account the resources available to small entities; (2) the clarification, consolidation, or simplification of compliance and reporting requirements under the rule for small entities; (3) the use of performance rather than design standards; and (4) an exemption from coverage of the rule, or any part thereof for small entities.’’ 103. First, in the FNPRM, the Commission contemplates the possibility that the obligations considered might create additional compliance costs on CMRS licensees VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 and CIS operators, both large and small. However, the Commission seeks comment on the specific criteria and timetables that should be required, and the associated costs and benefits in order to facilitate informed decisions in the final rules. Specifically, the Commission considers a range of timeframes in which CMRS licensees would be required to respond to qualifying requests and seeks comment on the resource and staff demands associated with those timeframes. With respect to the demands on CIS operators, the FNPRM considers a range of certifications and necessary information to be included with qualifying requests, and seeks comment on which pieces of information are important to accurately identify contraband wireless devices. Commenters are asked whether small entities face any special or unique issues with respect to terminating service to devices, and whether they would require additional time to take such action. In doing so, the Commission seeks to ensure the accuracy, security, and efficiency of the identification and disabling process, while also minimizing compliance burdens to the greatest extent possible. 104. Second, to limit the economic impact of a notice requirement, we seek comment on the types of network changes that should require advanced notification to CIS providers. While the Commission emphasizes the importance of cooperation between CIS operators and CMRS providers at every stage of CIS deployment, we also recognize the potential for overly burdensome notice requirements that would require notice upon making any network changes, even those that are unlikely to negatively impact the CIS. 105. Third, in order to clarify and simplify compliance and reporting requirements for small entities, as well as all other impacted entities, the Commission intends to designate a single point of contact at the Commission to serve as the ombudsperson on contraband wireless device issues. The ombudsperson’s duties may include, as necessary, providing assistance to CIS operators in connecting with CMRS licensees, playing a role in identifying required CIS filings for a given correctional facility, facilitating the required Commission filings, thereby reducing regulatory burdens, and resolving issues that may arise during the leasing process. The ombudsperson will also conduct outreach and maintain a dialogue with all stakeholders on the issues important to furthering a solution to the problem of contraband wireless PO 00000 Frm 00035 Fmt 4702 Sfmt 4702 device use in correctional facilities. Finally, the ombudsperson, in conjunction with WTB, will maintain Web page with a list of active CIS operators and locations where CIS has been deployed. The appointment of an ombudsperson provides an important resource for small entities to understand and comply with any CIS-related requirements. 106. While the FNPRM considers a requirement that CISs be deemed eligible prior to making a qualifying request, the Commission does not seek comment on any specific design standard. Instead, the Commission seeks comment on the elements of detection systems and identification methods that contribute to the accuracy and reliability of a particular CIS. The FNPRM asks whether the standard should differ between rural and urban areas, or between large and small detection system providers or operators. 107. Finally, the FNPRM does not propose any exemption for small entities. The Commission finds an overriding public interest in preventing the illicit use of contraband wireless devices by prisoners to perpetuate criminal enterprises. The CIS eligibility requirement discussed in the FNPRM would be vital to the accuracy and reliability of the information ultimately used to disable contraband wireless devices, regardless of the size of the entity obtaining that information. Further, to the extent that a small entity could be exempt from a disabling requirement, it would reduce the overall effectiveness of a CIS. If inmates discover that a wireless provider whose service area includes the correctional facility does not disable contraband wireless devices within the facility, inmates will accordingly use only that service. Therefore, while the Further Notice seeks comment on alternative considerations for the overall identification and disabling process to accommodate the needs and resources of small entities, an exemption would be contrary to the Commission’s overarching goal of combatting contraband wireless devices in wireless facilities. 108. Federal Rules That May Duplicate, Overlap, or Conflict With the Proposed Rules. The FNPRM seeks comment on the application and relevance of sections 705 and 222 of the Act and Title 18 of the U.S. Code. Congressional Review Act 109. The Commission will send a copy of the FNPRM to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). E:\FR\FM\18MYP1.SGM 18MYP1 Federal Register / Vol. 82, No. 95 / Thursday, May 18, 2017 / Proposed Rules III. Ordering Clauses 110. It is ordered that, pursuant to the authority contained in sections 1, 2, 4(i), 4(j), 301, 302, 303, 307, 308, 309, 310, and 332 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 154(j), 301, 302a, 303, 307, 308, 309, 310, and 332, the FNPRM in GN Docket No. 13–111 is adopted. 111. It is further ordered that, pursuant to applicable procedures set forth in sections 1.415 and 1.419 of the Commission’s rules, 47 CFR 1.415, 1.419, interested parties may file comments on the FNPRM on or before 30 days after publication in the Federal Register and reply comments on or before 60 days after publication in the Federal Register. 112. It is further ordered that, pursuant to section 801(a)(1)(A) of the Congressional Review Act, 5 U.S.C. 801(a)(1)(A), the Commission shall send a copy of the FNPRM to Congress and to the Government Accountability Office. 113. It is further ordered that the Commission’s Consumer & Governmental Affairs Bureau, Reference Information Center, shall send a copy of the FNPRM, including the Initial Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration. List of Subjects in 47 CFR Part 20 Communications common carriers, Radio. Federal Communications Commission. Marlene H. Dortch, Secretary. Proposed Rules For the reasons discussed in the preamble, the Federal Communications Commission proposes to further amend 47 CFR part 20, as amended in a final rule published elsewhere in this issue of the Federal Register, as set forth below: PART 20—COMMERCIAL MOBILE RADIO SERVICES 1. The authority citation for part 20 continues to read as follows: jstallworth on DSK7TPTVN1PROD with PROPOSALS ■ Authority: 47 U.S.C. 151, 152(a), 154(i), 157, 160, 201, 214, 222, 251(e), 301, 302, 303, 303(b), 303(r), 307, 307(a), 309, 309(j)(3), 316, 316(a), 332, 610, 615, 615a, 615b, 615c, unless otherwise noted. 2. Amend § 20.23 by adding paragraph (b) to read as follows: ■ § 20.23 Contraband wireless devices in correctional facilities. * * * * * (b) Disabling contraband wireless devices. A Designated Correctional VerDate Sep<11>2014 12:41 May 17, 2017 Jkt 241001 Facility Official may request that a CMRS licensee disable a contraband wireless device in a correctional facility detected by a Contraband Interdiction System as described below. (1) Licensee obligation. A licensee providing CMRS service must: (i) Upon request of a Designated Correctional Facility Official, provide a point of contact suitable for receiving qualifying requests to disable devices; and (ii) Upon request of a Designated Correctional Facility Office to disable a contraband wireless devices, verify that the request is a qualifying request and, if so, permanently disable the device. (2) Qualifying request. A qualifying request must be made in writing via a verifiable transmission mechanism, contain the certifications in paragraph (3) of this section and the device and correctional facility identifying information in paragraph (4) of this section, and be signed by a Designated Correctional Facility Official. For purposes of this section, a Designated Correctional Facility Official means a state or local official responsible for the correctional facility where the contraband device is located. (3) Certifications. A qualifying request must include the following certifications by the Designated Correctional Facility Official: (i) The CIS used to identify the device is authorized for operation through a Commission license or approved lease agreement, referencing the applicable ULS identifying information; (ii) The Designated Correctional Facility Official has contacted all CMRS licensees providing service in the area of the correctional facility in order to establish a verifiable transmission mechanism for making qualifying requests and for receiving notifications from the CMRS licensee; (iii) The Designated Correctional Facility Official has substantial evidence that the contraband wireless device was used in the correctional facility, and that such use was observed within the 30 day period immediately prior to the date of submitting the request; and (iv) The CIS used to identify the device is an Eligible CIS as defined in paragraph (5) of this section. The Designated Correctional Facility Official must include a copy of a FCC Public Notice listing the eligible CIS. (4) Device and correctional facility identifying information. The request must identify the device to be disabled and correctional facility by providing the following information: (i) Identifiers sufficient to uniquely describe the device in question; PO 00000 Frm 00036 Fmt 4702 Sfmt 4702 22797 (ii) Licensee providing CMRS service to the device; (iii) Name of correctional facility; (iv) Street address of correctional facility; (v) Latitude and longitude coordinates sufficient to describe the boundaries of the correctional facility; and (vi) Call signs of FCC Licenses and/or Leases authorizing the CIS. (5) Eligible CIS. (i) In order to be listed on a FCC Public Notice as an Eligible CIS, a CIS operator must demonstrate to the Commission that: (A) All radio transmitters used as part of the CIS have appropriate equipment authorization pursuant to Commission rules; (B) The CIS is designed and will be configured to locate devices solely within a correctional facility, secure and protect the collected information, and is capable of being programmed not to interfere with emergency 911 calls; and (C) The methodology to be used in analyzing data collected by the CIS is sufficiently robust to provide a high degree of certainty that the particular wireless device is in fact located within a correctional facility. (ii) Periodically, the Commission will issue Public Notices listing all Eligible CISs. [FR Doc. 2017–09886 Filed 5–17–17; 8:45 am] BILLING CODE 6712–01–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration 50 CFR Part 216 [Docket No. 170303228–7228–01] RIN 0648–BG71 Subsistence Taking of Northern Fur Seals on the Pribilof Islands; Summary of Fur Seal Harvests for 2014–2016 and Proposed Annual Subsistence Harvest Needs for 2017–2019 National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice of availability; request for comments. AGENCY: Pursuant to the regulations governing the subsistence taking of North Pacific fur seals (Callorhinus ursinus) (northern fur seals), this document summarizes the annual fur seal subsistence harvests on St. George and St. Paul Islands (the Pribilof Islands) in Alaska for 2014–2016 and proposes annual estimates of northern SUMMARY: E:\FR\FM\18MYP1.SGM 18MYP1

Agencies

[Federal Register Volume 82, Number 95 (Thursday, May 18, 2017)]
[Proposed Rules]
[Pages 22780-22797]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2017-09886]


=======================================================================
-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Part 20

[GN Docket No. 13-111; FCC 17-25]


Promoting Technological Solutions To Combat Contraband Wireless 
Device Use in Correctional Facilities

AGENCY: Federal Communications Commission.

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: In this document, the Federal Communications Commission seeks 
additional comment on a broad range of steps the Commission can take to 
help eliminate the problem of contraband wireless devices in 
correctional facilities. In particular, the Commission proposes a 
process for wireless providers to disable contraband wireless devices 
once they have been identified. The Commission seeks comment on 
additional methods and technologies that might prove successful in 
combating contraband device use in correctional facilities, and on 
various other proposals related to the authorization process for 
contraband interdiction systems and the deployment of these systems.

DATES: Interested parties may file comments on or before June 19, 2017, 
and reply comments on or before July 17, 2017.

ADDRESSES: You may submit comments, identified by GN Docket No. 13-111, 
by any of the following methods:
    [ssquf] Electronic Filers: Comments may be filed electronically 
using the Internet by accessing the Commission's Electronic Comment 
Filing System (ECFS): https://fjallfoss.fcc.gov/ecfs2/. See Electronic 
Filing of Documents in Rulemaking Proceedings, 63 FR 24121 (1998).
    [ssquf] Paper Filers: Parties who choose to file by paper must file 
an original and one copy of each filing. Generally if more than one 
docket or rulemaking number appears in the caption of this proceeding, 
filers must submit two additional copies for each additional docket or 
rulemaking number. Commenters are only required to file copies in GN 
Docket No. 13-111.
    [ssquf] Filings can be sent by hand or messenger delivery, by 
commercial overnight courier, or by first-class or overnight U.S. 
Postal Service mail. All filings must be addressed to the Commission's 
Secretary, Office of the Secretary, Federal Communications Commission.
    [ssquf] All hand-delivered or messenger-delivered paper filings for 
the Commission's Secretary must be delivered to FCC Headquarters at 445 
12th St. SW., Room TW-A325, Washington, DC 20554. The filing hours are 
8:00 a.m. to 7:00 p.m. All hand deliveries must be held together with 
rubber bands or fasteners. Any envelopes and boxes must be disposed of 
before entering the building.
    [ssquf] Commercial overnight mail (other than U.S. Postal Service 
Express Mail and Priority Mail) must be sent to 9300 East Hampton 
Drive, Capitol Heights, MD 20743.
    [ssquf] U.S. Postal Service first-class, Express, and Priority mail 
must be addressed to 445 12th Street SW., Washington, DC 20554.
    People with Disabilities: To request materials in accessible 
formats for people with disabilities (Braille, large print, electronic 
files, audio format), send an email to fcc504@fcc.gov or call the 
Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-
418-0432 (TTY).

FOR FURTHER INFORMATION CONTACT: Melissa Conway, 
Melissa.Conway@fcc.gov, of the Wireless Telecommunications Bureau, 
Mobility Division, (202) 418-2887. For additional information 
concerning the PRA information collection requirements contained in 
this document, contact Cathy Williams at (202) 418-2918 or send an 
email to PRA@fcc.gov.

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's 
Further Notice of Proposed Rulemaking (FNPRM) in GN Docket No. 13-111, 
FCC 17-25, released on March 24, 2017. The complete text of the FNPRM 
is available for viewing via the Commission's ECFS Web site by entering 
the docket number, GN Docket No. 13-111. The complete text of the FNPRM 
is also available for public inspection and copying from 8:00 a.m. to 
4:30 p.m. Eastern Time (ET) Monday through Thursday or from 8:00 a.m. 
to 11:30 a.m. ET on Fridays in the FCC Reference Information Center, 
445 12th Street SW., Room CY-B402, Washington, DC 20554, telephone 202-
488-5300, fax 202-488-5563.
    This proceeding shall continue to be treated as a ``permit-but-
disclose'' proceeding in accordance with the Commission's ex parte 
rules (47 CFR 1.1200 et seq.). Persons making ex parte presentations 
must file a copy of any written presentation or a memorandum 
summarizing any oral presentation within two business days after the 
presentation (unless a different deadline applicable to the Sunshine 
period applies). Persons making oral ex parte presentations are 
reminded that memoranda summarizing the presentation must (1) list all 
persons

[[Page 22781]]

attending or otherwise participating in the meeting at which the ex 
parte presentation was made, and (2) summarize all data presented and 
arguments made during the presentation. If the presentation consisted 
in whole or in part of the presentation of data or arguments already 
reflected in the presenter's written comments, memoranda or other 
filings in the proceeding, the presenter may provide citations to such 
data or arguments in his or her prior comments, memoranda, or other 
filings (specifying the relevant page and/or paragraph numbers where 
such data or arguments can be found) in lieu of summarizing them in the 
memorandum. Documents shown or given to Commission staff during ex 
parte meetings are deemed to be written ex parte presentations and must 
be filed consistent with rule 1.1206(b). In proceedings governed by 
rule 1.49(f) or for which the Commission has made available a method of 
electronic filing, written ex parte presentations and memoranda 
summarizing oral ex parte presentations, and all attachments thereto, 
must be filed through the electronic comment filing system available 
for that proceeding, and must be filed in their native format (e.g., 
.doc, .xml, .ppt, searchable .pdf). Participants in this proceeding 
should familiarize themselves with the Commission's ex parte rules.
    The Commission will send a copy of the FNPRM in a report to be sent 
to Congress and the Government Accountability Office pursuant to the 
Congressional Review Act, see 5 U.S.C. 801(a)(1)(A).

I. FNPRM

    1. The use of contraband wireless devices in correctional 
facilities to engage in criminal activity poses a significant and 
growing security challenge to correctional facility administrators, law 
enforcement authorities, and the general public.
    2. As a general matter, there are primarily two categories of 
technological solutions currently deployed today in the U.S. to address 
the issue of contraband wireless device use in correctional facilities: 
Managed access and detection. A managed access system (MAS) is a micro-
cellular, private network that typically operates on spectrum already 
licensed to wireless providers offering commercial subscriber services 
in geographic areas that include a correctional facility. These systems 
analyze transmissions to and from wireless devices to determine whether 
the device is authorized or unauthorized by the correctional facility 
for purposes of accessing wireless carrier networks. A MAS utilizes 
base stations that are optimized to capture all voice, text, and data 
communications within the system coverage area. When a wireless device 
attempts to connect to the network from within the coverage area of the 
MAS, the system cross-checks the identifying information of the device 
against a database that lists wireless devices authorized to operate in 
the coverage area. Authorized devices are allowed to communicate 
normally (i.e., transmit and receive voice, text, and data) with the 
commercial wireless network, while transmissions to or from 
unauthorized devices are terminated. A MAS is capable of being 
programmed not to interfere with 911 calls. The systems may also 
provide an alert to the user notifying the user that the device is 
unauthorized. A correctional facility or third party at a correctional 
facility may operate a MAS if authorized by the Commission, and this 
authorization has, to date, involved agreements with the wireless 
providers serving the geographic area within which the correctional 
facility is located, as well as spectrum leasing applications approved 
by the Commission.
    3. Detection systems are used to detect devices within a 
correctional facility by locating, tracking, and identifying radio 
signals originating from a device. Traditionally, detection systems use 
passive, receive-only technologies that do not transmit radio signals 
and do not require separate Commission authorization. However, 
detection systems have evolved with the capability of transmitting 
radio signals to not only locate a wireless devices, but also to obtain 
device identifying information. These types of advanced transmitting 
detection systems also operate on frequencies licensed to wireless 
providers and require separate Commission authorization, also typically 
through the filing of spectrum leasing applications reflecting wireless 
provider agreement.
    4. The Commission has taken a variety of steps to facilitate the 
deployment of technologies by those seeking to combat the use of 
contraband wireless devices in correctional facilities, including 
authorizing spectrum leases between CMRS providers \1\ and MAS 
providers and granting Experimental Special Temporary Authority (STA) 
for testing managed access technologies, and also through outreach and 
joint efforts with federal and state partners and industry to 
facilitate development of viable solutions. In addition, Commission 
staff has worked with stakeholder groups, including our federal agency 
partners, wireless providers, technology providers, and corrections 
agencies, to encourage the development of technological solutions to 
combat contraband wireless device use while avoiding interference with 
legitimate communications.
---------------------------------------------------------------------------

    \1\ Unless otherwise specifically clarified herein, for purposes 
of the FNPRM, we use the terms CMRS provider, wireless provider, and 
wireless carrier interchangeably. These terms typically refer to 
entities that offer and provide subscriber-based services to 
customers through Commission licenses held on commercial spectrum in 
geographic areas that might include correctional facilities.
---------------------------------------------------------------------------

    5. On May 1, 2013, the Commission issued the Notice of Proposed 
Rulemaking (NPRM) (78 FR 36469, June 18, 2013) in this proceeding in 
order to examine various technological solutions to the contraband 
problem and proposals to facilitate the deployment of these 
technologies. In the NPRM, the Commission proposed to require CMRS 
licensees to terminate service to detected contraband wireless devices 
within correctional facilities pursuant to a qualifying request from an 
authorized party and sought comment on any other proposals that would 
facilitate the deployment of traditional detection systems. Technology 
has evolved such that many advanced detection systems are designed to 
transmit radio signals typically already licensed to wireless providers 
in areas that include correctional facilities. Consequently, operators 
of these types of advanced detection systems require Commission 
authorization. Accordingly, we will refer to any system that transmits 
radio communication signals comprised of one or more stations used only 
in a correctional facility exclusively to prevent transmissions to or 
from contraband wireless devices within the boundaries of the facility 
and/or to obtain identifying information from such contraband wireless 
devices as a Contraband Interdiction System (CIS).\2\ By definition, 
therefore, the processes proposed in the FNPRM are limited to 
correctional facilities' use.
---------------------------------------------------------------------------

    \2\ For purposes of the FNPRM, ``contraband wireless device'' 
refers to any wireless device, including the physical hardware or 
part of a device--such as a subscriber identification module (SIM)--
that is used within a correctional facility in violation of federal, 
state, or local law, or a correctional facility rule, regulation, or 
policy. We use the phrase ``correctional facility'' to refer to any 
facility operated or overseen by federal, state, or local 
authorities that houses or holds criminally charged or convicted 
inmates for any period of time, including privately owned and 
operated correctional facilities that operate through contracts with 
federal, state, or local jurisdictions.

---------------------------------------------------------------------------

[[Page 22782]]

Disabling Contraband Wireless Devices in Correctional Facilities

    6. In the NPRM, the Commission sought comment on each of the steps 
involved in the process of terminating service to contraband wireless 
devices, including the information that the correctional facility must 
transmit to the provider to effectuate termination, the timing for 
carrier termination, the method of authenticating a termination 
request, and other issues. CellAntenna has proposed a termination 
process that includes minimum standards for detection equipment, the 
form of notice to the carrier, and a carrier response process that 
consists of a set of deadlines for responding, based on the volume of 
reports or inquiries the carrier receives concerning contraband 
wireless devices. Under this staged response obligation, the carriers 
would have a longer time to respond if they receive a large number of 
requests, ranging from one hour to 24 hours after receipt of notice. 
CellAntenna encourages the Commission to determine a ``reasonable'' 
time frame for service suspension.
    7. Commenting parties focused substantially on the issue of 
liability associated with termination, and their alternative proposal 
that termination should be required only pursuant to a court order. 
Wireless carriers expressed concern that the proposed termination 
process would require carriers to investigate requests and risk 
erroneous termination, which could endanger safety and create potential 
liability. Instead, the carriers argue, the Commission should amend its 
proposed termination rules to require that requests to terminate be 
executed pursuant to an order from a court of relevant jurisdiction. 
Other commenters, however, reject the notion that court-ordered 
termination is necessary in order to protect carriers from liability in 
the event of erroneous termination, and argue that the Commission's 
role in managing the public's use of spectrum empowers it to require 
carriers to terminate service to unlawful devices, irrespective of 
whether the request is made by the FCC, a court order, or upon the 
request of an authorized prison official.
    8. We seek further comment on a Commission rule-based process 
regarding the disabling of contraband wireless devices where certain 
criteria are met, including a determination of system eligibility and a 
validation process for qualifying requests designed to address many 
wireless provider concerns. We clarify that a disabling process would 
involve participation by stakeholders to effectively implement a 
Commission directive to disable such devices, and would in no way 
represent a delegation of authority to others to compel such disabling. 
We recognize that wireless providers favor a court-ordered termination 
process as an alternative, but requiring court orders might be 
unnecessarily burdensome. Based on the comments filed in the record, 
moreover, it is far from clear that a CMRS provider that terminates 
service to a particular device based on a qualifying request would be 
exposed to any form of liability. Indeed, we welcome comment from CMRS 
providers on the scope of their existing authority under their 
contracts and terms of service with consumers to terminate service. 
Commenters who agree with the view that a court-ordered approach is 
preferable should specifically address why termination pursuant to a 
federal requirement, i.e., Commission directive, does not address 
liability concerns as well as termination pursuant to court order. We 
note that the current record does not sufficiently demonstrate that 
reliance on the wireless providers' alternative court-ordered approach 
in lieu of the proposed rule-based approach discussed below would 
achieve one of the Commission's overall goals in this proceeding of 
facilitating a comprehensive, nationwide solution. We also note that 
the record does not reflect persuasive evidence of successful voluntary 
termination of service to contraband wireless devices in correctional 
facilities by the CMRS licensees, even where there is evidence of a 
growing problem.
    9. To the extent commenters continue to support a court-ordered 
approach, we seek specific comment on the particulars of the requested 
court-ordered process to evaluate and compare it to a Commission 
disabling process: Who is qualified to seek a court order and with what 
specific information or evidence? To whom is the request submitted and 
how is the court order implemented? How can existing processes carriers 
use for addressing law enforcement requests/subpoenas apply in the 
contraband wireless device context? Does the success of a court-ordered 
process depend on the extent to which a particular state has 
criminalized wireless device use in correctional facilities? 
Additionally, given the acknowledged nationwide scope and growth of the 
contraband wireless device problem, how would CIS and wireless 
providers navigate the myriad fora through which requests for 
termination might flow, potentially requiring engagement with a wide 
variety of state or federal district attorneys' offices; federal, state 
or county courts; or local magistrates? In this regard, we seek 
examples of successfully issued and implemented court orders 
terminating service to contraband wireless devices, as well as 
demonstrations that court orders can be effective at scale and not 
overly burdensome or time-consuming to obtain and effectuate in this 
context.
    10. Commission Authority. In the NPRM, the Commission stated its 
belief that the Commission has authority under section 303 to require 
CMRS licensees to terminate service to contraband wireless devices. 
AT&T recognizes the Commission's authority pursuant to section 303 to 
require termination, but argues that deactivation must be ordered by a 
court or the FCC because the Commission cannot lawfully delegate its 
statutory authority to a third party, such as a state corrections 
officer. In response, Boeing and Triple Dragon reject AT&T's position, 
arguing that the proposed termination process does not raise any issues 
of delegation, as the Commission has clear authority to require 
carriers to terminate service to unauthorized devices upon receiving a 
Commission-mandated qualifying request. Section 303 provides the 
Commission authority to adopt rules requiring CMRS carriers to disable 
contraband wireless devices (see 47 U.S.C. 303; see also 154(i)). 
Pursuant to section 303(b), the Commission is required to prescribe the 
nature of the service to be rendered by each class of licensed stations 
and each station within any class. Additionally, section 303(d) 
requires the Commission to determine the location of classes of 
stations or individual stations, and section 303(h) grants the 
Commission the authority to establish areas or zones to be served by 
any station. When tied together with section 303(r), which requires the 
Commission to make such rules and regulations and prescribe such 
restrictions and conditions, not inconsistent with law, as may be 
necessary to carry out the provisions of this chapter, these provisions 
empower the Commission to address these issues.
    11. Further, with respect to wireless carrier arguments that any 
proposal for requests by departments of corrections based on CIS-
collected data seeking disabling of contraband wireless devices is an 
unlawful delegation of authority, we clarify that any such request 
would be pursuant to an adopted Commission rule mandating disabling 
where certain criteria are met. Such criteria, as discussed in detail 
below, include

[[Page 22783]]

various factors involving the deployment of CIS technologies. The 
Commission's authority under section 303 to regulate the use of 
spectrum in the public interest necessarily includes the authority to 
promulgate rules requiring regulated entities to terminate unlawful use 
of spectrum where certain indicia are met. We seek comment on a process 
by which carriers would be required to disable contraband devices 
identified through CIS systems deemed eligible by the Commission. The 
Commission would not be delegating decision-making authority regarding 
the disabling of contraband wireless devices.
    12. Disabling of Contraband Wireless Devices in Correctional 
Facilities. We seek comment on a process whereby CMRS licensees would 
disable contraband wireless devices in correctional facilities detected 
by an eligible CIS when they receive a qualifying request from an 
authorized party. We seek comment on a range of issues, including CIS 
eligibility, what constitutes a qualifying request, and specifics 
regarding the carrier disabling process. We clarify that CIS systems 
operating solely to prevent calls and other communications from 
contraband wireless devices, described in the Notice as MASs, would not 
be subject to these eligibility criteria, unless the department of 
corrections/CIS provider seeks to use the information received from 
such a system to request, through Commission rules, contraband wireless 
device disabling.
    13. Numerous individual state departments of corrections support 
the Commission's proposal to mandate termination of service to 
contraband wireless devices. For example, the Chief Information Officer 
of the Texas Department of Criminal Justice encourages implementation 
of a termination of service process, including criteria establishing a 
maximum allowable time limit for termination of service upon proper 
notification by an authorized correctional official. The Minnesota 
Department of Corrections supports a nationally standardized protocol 
for identifying contraband wireless devices and notification to the 
carrier. The Florida Department of Corrections also supports the 
standardization of information required to be provided by correctional 
facilities to service providers for termination of service and of the 
method of submission of information. The Mississippi Department of 
Corrections supports a Commission mandate to terminate service to 
contraband wireless devices, noting that it has made efforts to 
terminate service by seeking court orders with the cooperation of some 
wireless providers, that not all providers have been cooperative, and 
that a Commission rule would save time and resources used in obtaining 
a court order.
    14. Several commenters express concern regarding the validation 
process and accuracy of termination information relayed to the carriers 
to implement termination of service to contraband wireless devices in 
correctional facilities. The carriers assert that the record simply 
does not contain sufficient information to define a process for 
termination at this time. AT&T suggests that there must be a validation 
process whereby carriers have the opportunity to confirm the accuracy 
of the termination information. AT&T is concerned that if there is not 
an FCC or court order compelling termination, the carrier bears the 
responsibility for deciding whether to terminate service to a 
particular device. Verizon also expresses significant concern regarding 
the dearth of carrier experience with handling termination requests. 
Verizon contends that carriers have material concerns regarding the 
ability of detection systems to accurately identify contraband devices, 
the security and authenticity of the termination requests being 
transmitted to carriers, and the potential liability of carriers for 
erroneous termination. Verizon believes that carriers require accurate 
information about the MIN and the device MDN,\3\ and therefore the 
Commission should review and certify managed access and detection 
systems. Verizon also recommends that termination requests be 
transmitted via secure transmission paths such as secure web portals 
that already exist to receive court-ordered termination requests.
---------------------------------------------------------------------------

    \3\ MIN is the mobile identification number and MDN is the 
mobile directory number. The MIN and the MDN are used by CDMA 
devices.
---------------------------------------------------------------------------

    15. Furthermore, Verizon claims that, due to the lack of 
information in the record, it is impossible at this time to determine 
important details about termination requests, such as how many entities 
will be making such requests, how frequently those requests will be 
made, and how many devices carriers will be asked to terminate in each 
request. As a result, Verizon states, carriers have no way of assessing 
the costs of processing termination requests or the systems that will 
have to be in place. CTIA concurs that, in light of the complexities in 
the termination proposal, the Commission should certify detection 
systems and validate that a detection system is working properly and 
capturing accurate, necessary information regarding the unauthorized 
devices. One managed access provider, CellBlox, opposes proposals to 
require termination of service to contraband wireless devices not only 
as unworkable and burdensome to correctional facilities, but also as 
raising too many unanswered questions regarding the specifics of the 
termination process.
    16. Tecore is a proponent of MASs as the preferred solution to the 
contraband problem, but is not opposed to detection and termination 
solutions used in conjunction with MAS, if the Commission establishes 
the specifics for a termination process. To the extent that the 
Commission decides to mandate termination procedures, Tecore implores 
the Commission to define specific information that the correctional 
facility must transmit to the carrier in order to effectuate a 
termination, including device information, criteria for concluding that 
a device is contraband, a defined interface for accepting or rejecting 
a request, a defined timeframe, and procedures for protesting or 
reinstating an invalid termination.
    17. Triple Dragon supports Commission regulations governing the 
detection and termination of service to contraband wireless devices and 
urges the Commission to revise its rules to accommodate an equipment 
certification process for detection systems. With regard to the 
timeframe for carriers to terminate service subsequent to a request, 
Triple Dragon suggests that immediate termination is necessary for 
public safety and that termination should be based on clear data 
indicating that the device is operating in violation of federal or 
state law or prison policy. Boeing contends that performance standards 
or additional technical requirements for passive detection systems are 
unnecessary and impractical. Boeing highlights that, despite numerous 
and lengthy trials of detection technology at various facilities around 
the country, there have been no reports of misidentification. Indeed, 
Boeing believes that there is a lack of evidence to warrant the 
imposition of technical requirements for detection systems, noting that 
the record does not show an appreciable risk of misidentification, nor 
does it support the imposition of burdensome technical standards to 
address this hypothetical risk.
    18. Other stakeholders encourage the Commission to foster the 
development of all solutions to combat contraband wireless devices in 
correctional facilities, including detection and

[[Page 22784]]

termination. The supporters of termination include providers of inmate 
calling services. Securus recommends that the Commission should not 
preclude any of these alternatives and should support the testing and 
implementation of all these options. Further, Securus suggests that the 
FCC should take a firm stance that CMRS providers must cooperate with 
correctional facilities to quickly terminate service to detected 
contraband devices. GTL supports the Commission's proposal to require 
wireless carriers to terminate service to contraband wireless devices, 
without the need for a court order. GEO, a private manager and operator 
of correctional facilities, agrees with the Commission's proposal to 
require carriers to terminate service to contraband wireless devices 
within one hour of receipt of notice from a qualifying authority. GEO 
recommends a broad definition of qualifying authority that would 
include wardens of both private and public correctional facilities. ACA 
urges the Commission to permit the corrections community to employ 
every possible tool in the toolbox to combat contraband wireless 
devices in correctional facilities, including immediate termination of 
service by carriers upon notification by any public safety agency 
pursuant to a standardized process. Acknowledging the carriers' concern 
about potential liability for erroneous termination, ACA suggests that 
the Commission adopt rules granting carriers protection while acting in 
good faith and for public safety to further protect the carriers above 
and beyond the language in the customer contracts.
    19. After careful consideration of the record, we seek further 
comment on a process whereby CMRS licensees would disable contraband 
wireless devices in correctional facilities detected by an eligible CIS 
pursuant to a qualifying request that includes, inter alia, specific 
identifying information regarding the device and the correctional 
facility. We seek to ensure that any disabling process will completely 
disable the contraband device itself and render it unusable, not simply 
terminate service to the device as the Commission had originally 
proposed in the NPRM. We seek comment on whether a process should 
include a required FCC determination of eligibility of CISs to ensure 
the systems satisfy minimum performance standards, appropriate means of 
requesting the disabling, and specifics regarding the required carrier 
response. We seek specific comment on all aspects of the process as 
well as the costs and benefits of their implementation.
    20. Eligibility of CISs. We seek to ensure that the systems 
detecting contraband wireless devices first meet certain minimum 
performance standards in order to minimize the risk of disabling a non-
contraband wireless device. We therefore seek comment on whether it is 
necessary to determine in advance whether a CIS meets the threshold for 
eligibility to be the basis for a subsequent qualifying request for 
device disabling, which might facilitate contracts between 
stakeholders, for example departments of corrections and CIS providers, 
and appropriate spectrum leasing arrangements, typically between CIS 
providers and wireless providers. We envision that any eligibility 
determination would not at this stage assess the CIS's characteristics 
related to a specific deployment at a certain correctional facility, 
but rather a CIS's overall methodology for system design and data 
analysis that could be included in a qualifying request, where more 
specific requirements must be met for device disabling. We seek comment 
on whether a CIS operator seeking wireless provider disabling of 
contraband wireless devices in a correctional facility should first be 
deemed an eligible CIS by the Commission, and whether the Commission 
should periodically issue public notices listing all eligible CISs. We 
seek comment on the following potential criteria for determining 
eligibility: (1) All radio transmitters used as part of the CIS have 
appropriate equipment authorization pursuant to Commission rules; (2) 
the CIS is designed and will be configured to locate devices solely 
within a correctional facility,\4\ can secure and protect the collected 
information, and is capable of being programmed not to interfere with 
emergency 911 calls; and (3) the methodology to be used in analyzing 
data collected by the CIS is sufficiently robust to provide a high 
degree of certainty that the particular wireless device subject to a 
later disabling request is in fact located within a correctional 
facility. We also seek comment on the appropriate format for requesting 
eligibility, taking into consideration our goal of reducing burdens and 
increasing administrative efficiency.
---------------------------------------------------------------------------

    \4\ To comply with this criteria, a CIS operator may need to 
employ a range of mitigation techniques that might vary depending on 
the location of the correctional facility, as rural v. urban 
facilities differ substantially regarding their proximity to the 
general public.
---------------------------------------------------------------------------

    21. We seek further comment on the costs, benefits, and burdens to 
potential stakeholders of requiring CIS eligibility before qualifying 
disabling requests can be made to wireless providers and whether the 
stated eligibility criteria adequately address concerns expressed in 
the record regarding improper functioning of CIS systems and 
inaccurately identifying contraband devices. If commenters disagree, we 
seek comment on what additional eligibility criteria would ensure the 
accuracy and authenticity of CISs. For example, should we require 
testing or demonstrations at a specific correctional facility prior to 
making a CIS eligibility determination? If so, what type of tests would 
be appropriate? How should signals be measured and what criteria should 
be used to evaluate such tests? Importantly, should such a testing 
requirement be part of the initial eligibility assessment or should it 
part of what constitutes a qualifying request? If testing were part of 
a general eligibility assessment, would such additional testing at a 
specific site be unduly burdensome or unnecessarily delay or undermine 
either state RFP processes or spectrum lease negotiations? Would 
parties enter into agreements and lease arrangements where a CIS had 
not yet been deemed eligible? Should we require that a CIS be able to 
identify the location of a wireless device to within a certain 
distance? Is such an accuracy requirement unnecessary or would it be 
beneficial in assessing the merits of a CIS design and reducing the 
risk of capturing non-contraband devices? Should any eligibility 
determination be subject to a temporal component, for example, 
requiring a representation on an annual basis that the basic system 
design and data analysis methodology have not materially changed, and 
should the CIS operator be required to provide the Commission with 
periodic updates on substantial system changes, upgrades, or redesign 
of location technology? Should eligibility be contingent on the 
submission of periodic reports detailing any incidents during the 
applicable period where devices were erroneously disabled? Should the 
eligibility criteria be different depending on whether the facility is 
in a rural or urban area, or whether the CIS provider, the correctional 
facility, or the CMRS licensee is large or small? Commenters should be 
specific in justifying any proposed additional minimum standards for 
CIS eligibility, including the costs and benefits to stakeholders.
    22. Qualifying Request. In addition to ensuring that CISs meet 
certain performance standards in order to minimize the risk of error, 
we also seek

[[Page 22785]]

to ensure that an authorized party provides the information necessary 
for a wireless provider to disable contraband wireless devices. We seek 
comment on potentially requiring CMRS licensees to comply with a 
disabling process upon receipt of a qualifying request made in writing 
and transmitted via a verifiable transmission mechanism.\5\ We seek 
comment on whether the qualifying request must be transmitted (1) by 
the Commission (including, potentially, by the contraband wireless 
device ombudsperson referenced above), upon the request of a Designated 
Correctional Facility Official (DCFO); or (2) by the DCFO. We seek 
comment on whether we should define the DCFO as a state or local 
official responsible for the facility where the contraband device is 
located. We seek specific comment on the costs and benefits of these 
two approaches to the transmission of the qualifying request, both in 
terms of timeliness and any perceived liability concerns.
---------------------------------------------------------------------------

    \5\ A verifiable transmission mechanism is a reliable electronic 
means of communicating a disabling requesting that will provide 
certainty regarding the identity of both the sending and receiving 
parties.
---------------------------------------------------------------------------

    23. We seek comment on whether carrier concerns about the 
authenticity of termination requests are best addressed by requiring 
that a request to disable be initiated by a state or local official 
responsible for the correctional facility, who arguably has more 
responsibility and oversight in the procurement of a CIS for 
correctional facilities than a warden or other prison official or 
employee, as suggested in the record. A review of our ULS and OET 
databases reflects that, to date, requests for Commission authorization 
of CISs have only been in state correctional facilities, but we seek to 
facilitate a wide range of deployments where possible to achieve a more 
nationwide solution, including within federal and/or local correctional 
facilities that may seek to deploy CIS. We also seek specific comment 
on the extent to which, as Verizon claims, carriers have existing 
secure electronic means used to receive court-ordered termination 
requests, which could be leveraged to transmit and receive disabling 
requests from correctional facilities that employ CISs.
    24. We seek comment on whether a qualifying disabling request 
should include a number of certifications by the DCFO, as well as 
device and correctional facility information. Should the DCFO certify 
in the qualifying request that (1) an eligible CIS was used in the 
correctional facility, and include evidence of such eligibility; (2) 
the CIS is authorized for operation through a license or Commission 
approved lease agreement, referencing the applicable ULS identifying 
information; (3) the DCFO has contacted all CMRS licensees providing 
service in the area of the correctional facility for which it will seek 
device disabling in order to establish a verifiable transmission 
mechanism for making qualifying requests and for receiving 
notifications from the licensee; and (4) it has substantial evidence 
that the contraband wireless device was used in the correctional 
facility, and that such use was observed within the 30 day period 
immediately prior to the date of submitting the request? We seek 
comment on this process and any methods in which the Commission can 
facilitate interaction between the authorized party and the CMRS 
licensees during the design, deployment, and testing of CISs. For 
example, would it be useful for the Commission to maintain a list of 
DCFOs? What role could the contraband ombudsperson play in facilitating 
the interaction between DCFOs and CMRS licensees?
    25. Finally, we seek comment on whether a qualifying request should 
include specific identifying information regarding the device and the 
correctional facility. Should the request include device identifiers 
sufficient to uniquely describe the device in question and the licensee 
providing CMRS service to the device? We seek comment on whether 
including the CMRS licensee is warranted if the request is made 
directly to the Commission, but unnecessary if the request is made 
directly from a DCFO to the CMRS licensee able to confirm that the 
device is a subscriber on its network. With regard to device 
identifiers, we seek specific comment on whether other details are 
necessary in addition to identifiers that uniquely describe the 
specific devices, such as make and model of the device or the mode of 
device utilization at the time of detection. Is it relevant whether the 
device--at the time of detection--was making an incoming or outgoing 
voice call, incoming or outgoing SMS text or MMS (multimedia) message, 
or downloading or uploading data?
    26. We seek additional comment on whether other details are 
necessary in terms of location and time identifiers, such as latitude 
and longitude to the nearest tenth of a second, or frequency band(s) of 
usage during the detection period, in order to accurately identify and 
disable the device. Is it necessary to require that a request include 
specific identifiers to accurately identify and disable the device, or 
would providing the flexibility to include alternative information to 
accommodate changes in technology be appropriate, and what types of 
alternative information would further our goal of an efficient 
disabling process? Specifically, what is necessary to accurately 
identify and disable the device? For example, common mobile identifiers 
include international mobile equipment identifier (IMEI) and the 
international mobile subscriber identity (IMSI), used by GSM, UMTS, and 
LTE devices; and electronic serial number (ESN), mobile identification 
number (MIN), and mobile directory number (MDN), used by CDMA devices. 
Should additional information be required to accurately identify a 
specific wireless device for requested disabling? Are there significant 
differences in the identifying information of current wireless devices 
(e.g., android, iOS, windows) that must be accounted for? We seek to 
minimize burdens for those providing information, by only requiring 
what is essential to properly disable.
    27. We seek comment on whether there are commonalities that would 
permit standardized information sharing, while still taking into 
account the full range of devices, operating systems, and carriers. We 
also seek comment on the appropriate format of a qualifying request to 
streamline the process and reduce administrative burdens. Would it be 
more efficient for carriers to develop a common data format so that 
corrections facilities, through a DCFO, are not required to develop a 
different format for each wireless provider? Should any of these 
possible requirements vary depending on whether the wireless provider 
is small or large?
    28. In comments, Tecore raises the concern that SIM cards can be 
easily replaced so that devices are only temporarily deactivated. The 
record indicates that termination of service alone may be an incomplete 
solution capable of inmate exploitation. We therefore seek comment on a 
potentially more effective approach to ensure that not only is service 
terminated to the detected contraband device, but also that the device 
is rendered unusable on that carrier's network. We seek comment on the 
technical feasibility of a disabling process, including the costs and 
benefits of implementation, as well as any impact on 911 calls. We note 
that a disabled device will not have 911 calling capability, whereas a 
service terminated device would maintain 911 calling capability 
pursuant to the Commission's current rules regarding

[[Page 22786]]

non-service initialized (NSI) phones.\6\ Should we maintain the 
requirement that CMRS carriers keep 911 capability for disabled 
contraband phones, subject to the outcome of the NSI proceeding? What 
are the costs and benefits to stakeholders of such a requirement?
---------------------------------------------------------------------------

    \6\ The Commission has proposed revising its rules to sunset, 
after a six month period, the requirement that NSI phones be 911 
capable.
---------------------------------------------------------------------------

    29. We seek comment on whether a qualifying request should also 
include correctional facility identifiers, including the name of the 
correctional facility, the street address of the correctional facility, 
the latitude and longitude coordinates sufficient to describe the 
boundaries of the correctional facility, and the call signs of the 
Commission licenses and/or leases authorizing the CIS. Would this 
information provide sufficiently accurate information about the 
correctional facility to ensure that the carrier can restrict the 
disabling of wireless devices to those that are located within that 
facility?
    30. Disabling Process. As a preliminary matter, we seek to ensure 
that such requests can be transmitted in an expeditious manner and to 
have confidence that the request will be received and acted upon. 
Should the CMRS licensee be required to provide a point of contact 
suitable for receiving qualifying requests to disable contraband 
wireless devices in correctional facilities? We also recognize the need 
to safeguard legitimate devices from being disabled. Accordingly, we 
seek comment on what steps, if any, the CMRS licensee should take to 
verify the information received, whether customer outreach should be 
part of the process, and the time frame within which the steps must be 
taken. We seek information to assist us in determining what level of 
carrier investigation, if any, is warranted to determine whether there 
is clear evidence that the device sought to be disabled is not 
contraband. We also seek comment on what level of customer outreach, if 
any, would ensure that the disabling request is not erroneous.
    31. With regard to customer outreach, we again seek comment on a 
range of approaches, including the carrier immediately disabling 
without any customer outreach, the carrier contacting the subscriber of 
record through any available means (e.g., text, phone, email) and 
providing a reasonable amount of time prior to disabling for the 
customer to demonstrate that the disabling request is in error. We seek 
comment on whether a particular alternative enables inmates to evade 
device disabling. Each of these approaches impacts carrier response 
time and the ability to address, however unlikely, disabling errors. If 
some level of carrier investigation or customer outreach is warranted, 
should we provide CMRS licensees a method to reject a qualifying 
request if it is determined the wireless device in question is not 
contraband?
    32. We seek comment on whether the CMRS licensee should provide 
notification to the DCFO within a reasonable time period that it has 
either disabled the device or rejected the request. We seek comment on 
what the reasonable time period should be for this notification, 
whether the licensee must provide an explanation for the rejection, and 
whether the DCFO can contest the rejection. We seek comment on all 
aspects of a disabling process regarding verification of disabling 
requests, particularly the costs and benefits to the wireless 
providers, CIS operators, and the correctional facilities.
    33. Timeframe for Disabling. We seek comment on various options for 
the appropriate timeframe for disabling a contraband wireless device, 
or rejecting the request if appropriate, each of which might be 
impacted by the range of potential levels of carrier investigation in 
independently verifying a disabling request and engaging in customer 
outreach. CellAntenna recommends a staged obligation between one hour 
and 24 hours depending on the volume of requests, and other commenters 
suggest immediate action or action within one hour. These positions 
would be consistent with CMRS licensees disabling devices without any 
independent investigation or, at best, after a brief period of research 
using readily available resources, but achieve the goal of promptly 
disabling contraband wireless devices. In contrast, if carriers disable 
devices following exhaustive research or customer outreach, a period of 
seven days or more would likely be more appropriate. While providing 
greater assurance that the disabling is not an error, a longer period 
allows further use of an identified contraband phone.
    34. If the carrier attempts to contact the device's subscriber of 
record to permit a legitimate user the opportunity to demonstrate that 
the device is not contraband, how long should the user have to respond 
and does this notification requirement unnecessarily prolong device 
disabling? To what extent could a longer notification period increase 
the risk of inadvertently tipping off the user of a contraband device 
and thereby create opportunities for malefactors to cause harm or 
circumvent the correctional facility's efforts to address the illegal 
use? We seek specific comment regarding what periods of time are 
required in order to adequately balance the public safety needs with 
wireless provider concerns. We also seek comment on whether small 
entities face any special or unique issues with respect to disabling 
devices such that they would require additional time to comply.
    35. Finally, we seek comment on the methods available to ensure 
that any process for determining CIS eligibility minimizes the risk of 
disabling customers' devices that are not located within correctional 
facilities, and any related costs and benefits. Are there contractual 
provisions in existing contracts between CMRS providers and their 
customers that address this or similar issues? We seek comment on what 
period of time would be reasonable to expect a CMRS licensee to 
reactivate a disabled device. For example, what methods of discovery 
will sufficiently confirm that a wireless device is not contraband? Is 
24 hours a reasonable period to resolve potential errors and how 
extensive is the burden on subscribers to remain disabled for that 
period? What is the most efficient method of notifying the carriers of 
errors, if originating from parties outside a correctional facility, 
and of notifying subscribers of reactivation?
    36. In the NPRM, the Commission also sought comment on 
CellAntenna's proposal that we adopt a rule to insulate carriers from 
any legal liability for wrongful termination, while noting that 
wireless carriers' current end user licensing agreements may already 
protect the carriers. We seek further comment on this proposal. 
Specifically, we seek comment on whether the Commission should create a 
safe harbor by rule for wireless providers that comply with the federal 
process for disabling phones in correctional facilities. How broadly 
should that safe harbor be written, and should it apply only to 
wireless providers that comply with every aspect of the rules we adopt 
or also those that act in good-faith to carry out the disablement 
process? Does the Commission have authority to adopt a safe harbor? Is 
our authority to adopt the rules at issue sufficient to create a safe 
harbor? Are there other provisions of the Communications Act not 
previously discussed that would authorize a safe harbor? And what, if 
any, downsides are there to creating a safe harbor for wireless 
providers that comply with federal law?
    37. In the NPRM, the Commission also sought comment on the extent 
to which providers or operators of managed

[[Page 22787]]

access or detection systems comply with section 705 if they divulge or 
publish the existence of a communication for the purpose of operating 
the system, and whether such providers or operators are entitled to 
receive communications under section 705. Section 705 of the Act 
generally prohibits, except as authorized under Chapter 119, Title 18 
of the U.S. Code, any person ``receiving, assisting in receiving, 
transmitting, or assisting in transmitting, any interstate or foreign 
communication by wire or radio'' from divulging or publishing the 
``existence, contents, substance, purport, effect or meaning thereof'' 
to another person other than through authorized channels (47 U.S.C. 
605(a)). Additionally, Chapter 206, Title 18 of the U.S. Code, 
generally prohibits the use of pen register and trap and trace devices 
without a court order, subject to several exceptions including where a 
provider of a communications service obtains the consent of the user 
(18 U.S.C. 3121-3127). The Commission sought comment on whether any of 
the proposals regarding detection and MASs would implicate the pen 
register and trap and trace devices chapter of Title 18 of the U.S. 
Code.
    38. ShawnTech believes that the operation of its MASs is in 
compliance with federal and state law concerning the use of pen 
register and trap and trace devices, but expresses concern that 
detection systems that function to terminate service to contraband 
devices may not be in compliance. In addition to the questions the 
Commission asked in the NPRM, we seek comment on whether and to what 
extent a system used to request wireless provider disabling of a 
contraband wireless device pursuant to a Commission rule raises issues 
under Title 18 or section 705 that may be different from those raised 
by MAS implementation.
    39. Some commenters in response to the NPRM also have raised 
concerns about the applicability of the privacy obligations under 
section 222 of the Communications Act (47 U.S.C. 222). After review of 
the record, we do not find that comments submitted in response to the 
NPRM demonstrate that section 222 would prohibit a carrier from 
complying with a Commission rule mandating a disabling process. To the 
extent commenters maintain a contrary view, we seek comment on this 
issue clearly providing support for such a position and on any other 
relationship of section 222 to the FNPRM.

Notification to CIS Operators of Carrier Technical Changes

    40. In the NPRM, the Commission sought comment generally on 
proposals submitted by interested parties regarding rule changes 
intended to expedite the deployment of MASs, including GTL's proposal 
to impose network upgrade notification obligations on carriers. In its 
original petition, GTL requested that the Commission adopt rules that 
require CMRS providers to notify MAS operators or prison administrators 
in advance of any network changes likely to impact the MAS and 
negotiate in good faith on the implementation timing of the change. The 
reason for the requirement, GTL explained, is that rapid technological 
evolution impacts the effectiveness of a MAS and could render them 
ineffective; for example, network changes such as changing power levels 
or antenna patterns could impact proper operation of the system. In its 
comments, ACA supports this notification requirement.
    41. In its comments, MSS suggests that effective implementation of 
MAS requires mandatory coordination of network changes with the MAS 
operator. As an example, MSS cites the impact of a technical change 
such as a switch from 3G to 4G at a given base station for a given 
band. At the same time, MSS notes the possibility that carriers may 
find the coordination of network changes with MAS operators burdensome. 
Tecore has highlighted the importance of communicating with the 
carriers regarding changes in technologies and the need to modify MAS 
deployments to respond to those changes, which occur frequently. GTL 
has also reiterated the challenges it faces in keeping pace with the 
software changes required to respond to rapidly changing wireless 
technology. GTL suggests that policies must ensure that wireless 
carriers are active participants in the effort to eliminate contraband 
cellphone use.
    42. We acknowledge that the effectiveness of CIS systems depends on 
coordination between CMRS licensees, CIS operators, and correctional 
facilities, yet we recognize that any carrier notification requirement 
must not be overly burdensome or costly or have a negative impact on 
consumers. T-Mobile claims that the record on this issue is in need of 
further development, and that a notification requirement could impede 
carrier network management flexibility and could delay the rollout of 
new technologies which would negatively impact consumers and carriers.
    43. We recognize that a notification requirement that is too broad 
in scope, resulting in the need to send notifications possibly on a 
daily basis for minor technical changes, could be unduly burdensome on 
CMRS licensees. We also recognize that lack of notice to CIS operators 
of certain types of carrier system changes could potentially result in 
the CIS not providing the strongest signal in the correctional 
facility, compromising the system's effectiveness if contraband 
communications pass directly to the carrier network. Accordingly, in 
the FNPRM, we seek comment on the appropriate scope of a notification 
requirement. Would it be appropriate to require CMRS licensees that are 
parties to lease arrangements for CISs in correctional facilities to 
provide written notification to the CIS operator in advance of adding 
new frequency band(s) to their service offerings or deploying a new air 
interface technology (e.g., a carrier that previously offered CDMA 
technology deploying LTE) so that CISs can be timely upgraded to 
prevent spectrum gaps in the system that could be exploited by users of 
contraband wireless devices? To what extent should we require 
notification for additional types of carrier network changes, as GTL 
proposed, and if so, what specific network changes (e.g., transmitter 
power or antenna modifications) should be included? We seek specific 
comment on what other carrier network changes implemented without 
notice to CIS providers could render the systems in the correctional 
facilities ineffective, while also seeking comment on whether it is 
unduly burdensome to require notification for every routine carrier 
network modification. Would it be feasible to adopt a rule requiring a 
CMRS licensee providing service at a correctional facility to notify a 
CIS provider in advance of any network change likely to impact the CIS? 
We seek comment on AT&T's position that CIS providers should be 
required to respond within 24 hours to any notification from a CMRS 
licensee that the CIS is causing adverse effects to the carrier's 
network.
    44. We also seek comment on how far in advance the notification 
should be sent from the CMRS licensee to the CIS operator in order to 
allow for sufficient time to upgrade the CIS and enable continuous 
successful CIS operation with no spectrum gaps. Is a 90 day advance 
notification requirement reasonable? Would a 30 day advance 
notification requirement allow sufficient time for upgrades? Finally, 
we seek comment on whether and to what extent CMRS licensees are 
currently coordinating with CIS operators in this regard. For example, 
T-Mobile states that a notification requirement will not provide any 
benefit and is unnecessary

[[Page 22788]]

because CIS providers conduct spectrum scans as part of daily 
operations to detect new bands and technologies and air interfaces in 
use and already coordinate this scanning with CMRS licensees. We seek 
comment on the costs and benefits of any suggested notification 
requirements.

Other Technological Solutions

    45. In the NPRM, the Commission invited comment on other 
technological solutions to address the problem of contraband wireless 
devices in correctional facilities, including those solutions discussed 
in previously filed documents referred to in the NPRM.
    46. ``Quiet Zones.'' In response to the NPRM seeking comment 
regarding alternative technological solutions to the contraband 
problem, some commenters suggest that the Commission mandate ``dead 
zones'' or ``quiet zones'' in and around correctional facilities. 
Although the proposals vary somewhat from a technical perspective and 
are referred to by different names, the common goal seems to be the 
creation of areas in which communications are not authorized such that 
contraband wireless devices in correctional facilities would not 
receive service from a wireless provider.
    47. CellAntenna's position is that the Commission has authority to 
modify spectrum licenses to create areas, such as in correctional 
facilities, in which wireless services are not authorized. CellAntenna 
refers to NTCH's recommendation for ``quiet zones'' where no licensee 
would be authorized to provide services. CellAntenna suggests that, 
given the variability in geography, each local correctional facility 
should be allowed to determine its need for a ``no service'' zone and 
petition the Commission to establish the ``no service'' zone and 
procedures for the registration of complaints of interference outside 
of the zones. Despite the fact that CellAntenna references NTCH's 
comments, NTCH's plan for the designation of ``quiet zones'' similar to 
radio astronomy or other research facilities to cover correctional 
facilities appears to differ from CellAntenna's ``no service'' zones 
because, according to NTCH's plan, there would be an official entity 
responsible for preventing unauthorized communications and for offering 
service over authorized frequencies in the prison area, called the 
``Prison Service Provider.'' NCIC suggests that the Commission create 
``dead zones'' around correctional facilities in which carriers would 
be required to prevent the signal from reaching the correctional 
facility. GTL agrees that the Commission should explore the creation of 
``dead zones'' or ``quiet zones.''
    48. Similar to a ``no service'' zone, MSS proposes an alternative 
approach called geolocation-based denial (GBD) which permits a 
correctional facility to request that the Commission declare the 
facility outside the service area of all CMRS carriers if the facility 
has at least 300 meters of space in all directions between secure areas 
accessible by inmates and areas with unrestricted public access. MSS 
describes GBD as a low-risk solution that will address highly 
problematic rural maximum security prisons. ACA supports the creation 
of ``quiet zones'' and GBD.
    49. The carriers oppose the ``quiet zone''-like proposals. AT&T 
opposes NCIC's proposal to create ``quiet zones'' around correctional 
facilities in which carriers are unauthorized to provide wireless 
service, claiming that a quiet zone would prevent the completion of 
legitimate emergency calls from the correctional facility and vicinity 
within the quiet zone. Even in rural areas, Verizon suggests, 
legitimate communications in the areas around prisons could be 
impacted. In opposing the idea of a quiet or exclusion zone, Verizon 
argues that these proposals would indiscriminately prevent legitimate 
communications, including public safety communications from being 
completed both inside and outside the prison grounds. CTIA opposes the 
establishment of quiet zones because they would unnecessarily 
complicate wireless network design and be an intrusion on licensees' 
exclusive spectrum rights.
    50. In the FNPRM, we seek additional comment on the proposals in 
the record for the mandatory creation of ``quiet zones'' or ``no 
service'' zones in order to help us better understand the similarities 
and differences among the proposals and receive more detailed 
information in the record regarding how the zones would be created from 
a legal and technical perspective. What are the methods wireless 
providers would use to create the quiet zone, including technical 
criteria used to define the zone? Should there be a field strength 
limit on the perimeter of the zone and, if so, what is the appropriate 
limit? Would the limits set forth in Commission rule 15.109 (47 CFR 
15.109) applicable to unintentional radiators be appropriate and how 
would this be measured? Or would a different criterion, such as 15 dBu, 
be appropriate to ensure calls outside the perimeter could be completed 
while not providing the ability for connection to the network inside 
the perimeter? How would such a limit impact carrier network design? 
Again, we request that commenters elaborate on the role of the 
Commission in the creation of these zones and the legal basis for their 
establishment. We query whether ``quiet zones'' could be created 
voluntarily or whether there is a legal bar to their creation in the 
absence of Commission action. We also seek comment on the application 
of ``geo-fencing'' in the contraband wireless device context and how it 
differs from a ``quiet zone.'' Just as geo-fencing software can prevent 
drones from flying over a specific location, could geo-fencing be used 
to create a virtual perimeter around a correctional facility such that 
wireless devices would be disabled within the geo-fence? We seek 
comment on whether geo-fencing could be used to create zones within 
which contraband wireless devices would be inoperable and whether this 
technology would permit the delivery of emergency calls within the zone 
or interfere with other legitimate communications outside the geo-
fence.
    51. Network-Based Solution. Relatedly, we seek comment on the 
concept of requiring CMRS licensees to identify and disable contraband 
wireless devices in correctional facilities using their own network 
elements, including base stations and handsets/devices. As technology 
evolves, CMRS licensees are acquiring new and better ways of more 
accurately determining the precise location of a wireless device. 
Indeed, the Commission addressed the technological advances and need to 
improve location accuracy in the context of emergency 911 calling when 
it adopted E911 location accuracy deadlines aimed at enhancing PSAPs' 
ability to accurately identify the location of wireless 911 callers 
when indoors. In order to meet the Commission's requirements over the 
next several years, carriers will be required to deploy technology 
capable of locating wireless devices to within certain distances or 
coordinates. We also know that carriers currently have ways of 
determining the location of a wireless device using an analysis of call 
records or Global Positioning System (GPS) technology. In fact, more 
than 20 states have enacted legislation based on the Kelsey Smith Act 
(H.R. 4889, 114th Cong., 2d Sess. (2016)) that requires carriers to 
give law enforcement call location information in an emergency 
involving the risk of death or serious injury. Further, there are 
device applications (e.g., Uber or Google Maps) that enable the 
identification of the location of the device through GPS

[[Page 22789]]

technology located in the device. Given the improved and evolving 
capability of carriers to identify the location of wireless devices, we 
seek comment on whether existing methodologies could also be effective 
in the context of contraband wireless devices in correctional 
facilities. We acknowledge that an approach relying solely on GPS 
technology may not be effective inside correctional facilities if the 
GPS capability can be disabled or if GPS signals are insufficient 
within the correctional facility. Further, we note that a carrier's 
ability to identify the location based on network (not device GPS) data 
is affected by the number, location, and orientation of carrier base 
stations in the area. That said, we seek comment on whether it is 
possible for CMRS licensees to use their own network elements to 
determine that a wireless device is in a correctional facility, and 
what are the costs and benefits of such a process.
    52. If we require CMRS licensees to identify wireless devices in 
correctional facilities using their own network elements, should we 
require carriers to recognize whether contraband wireless devices are 
persistently used in a correctional facility located in the carrier's 
geographic service area and to disable them using their own resources? 
How should we define ``persistently''? How would the carriers determine 
that a wireless device in a correctional facility is, in fact, 
contraband? Should the carriers be required to have an internal process 
in place whereby they could reactivate a device disabled in error? If a 
network-based solution is feasible, should we require it only if a 
particular correctional facility requests this approach as opposed to 
the solution of requiring CMRS licensees to disable devices pursuant to 
qualifying requests as described above? Do particular types of wireless 
devices or carrier air interfaces present unique challenges? We seek 
comment on the implementation, technical, and other issues associated 
with this carrier network-based solution as well as the costs and 
benefits associated with this potential solution. In particular, what 
would the costs be to carriers of complying with a mandate of having to 
locate contraband wireless devices in all correctional facilities 
nationwide? Finally, we seek comment on whether the network-based 
solution described herein raises any privacy concerns, including the 
privacy obligations under section 222 of the Communications Act.
    53. Beacon Technology. We also seek comment on technologies that 
are intended to disable contraband wireless devices in correctional 
facilities using the interaction of a beacon system set up in the 
correctional facility with software embedded in the wireless devices. 
Essentially, these types of technologies rely on a system of beacons 
creating a restricted zone in a correctional facility, such that any 
wireless device in the zone will not operate. One of the benefits of 
this approach is that this technology would appear to render the phone 
unusable by an inmate for any purpose. In other words, some of the 
technologies discussed above could prevent an inmate from placing a 
call, but they may not prevent the inmate from using the phone for 
taking videos or otherwise sharing or disseminating information that 
itself could pose a threat to public safety. We thus also seek comment 
on whether this type of technology--or elements thereof--can and should 
be incorporated into any other approach the Commission may take. For 
example, should we consider requiring that phones be rendered 
completely unusable as part of our implementation of another solution, 
including the network-based solution discussed above.
    54. At the same time, it appears that beacon-based technologies 
would function effectively only if all wireless carriers perform a 
system update to include the software for all existing and future 
wireless devices, and all mobile device manufacturers include the 
software in all devices. We seek comment on this technological 
solution, including costs and benefits of its implementation. Would 
this solution require legislation to ensure that all wireless carriers 
and wireless device manufacturers include the software in the wireless 
devices? In the absence of legislation, how would the Commission ensure 
wireless carrier and device manufacturer cooperation and pursuant to 
what authority would the Commission be acting? How would compliance be 
enforced? Should it be incorporated as part of the Commission's 
equipment certification requirements or be made part of an industry 
certification process? Would a ``system update'' actually accomplish 
the goal of ensuring that all wireless devices currently in existence 
get updated with the software? Would the beacon system in the 
correctional facility permit 911 or E911 calls from the restricted zone 
to be connected? Is a voluntary solution possible between the carriers 
and the providers of beacon technology?
    55. We welcome comment on any other new technologies designed to 
combat the problem of contraband wireless devices in correctional 
facilities and what regulatory steps the Commission could take to 
assist in the development and deployment of these new technologies. We 
seek comment on what additional steps the Commission could take to 
address the contraband cellphone problem, for example, educational 
efforts designed to highlight available solutions, other expertise, or 
additional ways in which we can coordinate stakeholder efforts.

II. Procedural Matters

Initial Paperwork Reduction Act Analysis

    56. The FNPRM contains proposed new information collection 
requirements. The Commission, as part of its continuing effort to 
reduce paperwork burdens, invites the general public and OMB to comment 
on the information collection requirements contained in this document, 
as required by PRA. In addition, pursuant to the Small Business 
Paperwork Relief Act of 2002, Public Law 107-198, see 44 U.S.C. 
3506(c)(4), the Commission seeks specific comment on how it might 
``further reduce the information collection burden for small business 
concerns with fewer than 25 employees.''

Initial Regulatory Flexibility Act Analysis

    57. As required by the Regulatory Flexibility Act of 1980 (5 U.S.C. 
603), the Commission has prepared an Initial Regulatory Flexibility 
Analysis (IRFA) of the possible significant economic impact on small 
entities of the policies and rules proposed in this document. We 
request written public comment on the IRFA. Comments must be filed in 
accordance with the same deadlines as comments filed in response to the 
FNPRM as set forth on the first page of this document, and have a 
separate and distinct heading designating them as responses to the 
IRFA. The Commission's Consumer and Governmental Affairs Bureau, 
Reference Information Center, will send a copy of the FNPRM, including 
the IRFA, to the Chief Counsel for Advocacy of the Small Business 
Administration.
    58. Need for, and Objectives of, the Proposed Rules. The FNPRM 
seeks comment on methods to provide additional tools to combat 
contraband wireless devices in correctional facilities. It is clear 
that inmate possession of wireless devices is a serious threat to the 
safety and welfare of correctional facility employees and the general 
public. First, as a safeguard to ensure coordination between CMRS 
licensees and CIS operators, the Commission seeks comment on a

[[Page 22790]]

requirement that CMRS licensees that are parties to lease arrangements 
for CIS in correctional facilities provide written notification to the 
CIS operator no later than 90 days in advance of adding new frequency 
band(s) to its service offerings or deploying a new air interface 
technology (e.g., a carrier that previously offered CDMA deploying 
LTE), unless a different timeframe is agreed to by both parties. The 
Commission seeks comment on the appropriate timing, costs, and 
alternatives to such a notice requirement. The FNPRM seeks comments on 
the types of notice protocol CMRS licensees might already have in 
place, and whether and how those procedures could be used to satisfy 
any notice requirement.
    59. The FNPRM seeks comment on a requirement that CMRS providers 
disable a contraband wireless devices found by a CIS to be in 
correctional facilities pursuant to a qualifying request from an 
authorized party. The FNPRM seeks comment on a process that would 
include a CIS eligibility determination to ensure the systems satisfy 
minimum performance standards, appropriate means of requesting the 
disabling, and specifics regarding the required carrier response. The 
Commission seeks comment on maintaining a public list of all eligible 
CISs to facilitate expeditious lease transactions for those seeking to 
deploy systems resulting in requests for contraband wireless device 
disabling. We seek comment on the following criteria for determining 
eligibility: (1) The CIS has appropriate equipment authorization 
pursuant to Commission rules; (2) the CIS is designed and will be 
configured to locate devices solely within a correctional facility, 
secure and protect the collected information, and avoid interfering 
with emergency 911 calls; and (3) the methodology to be used in 
analyzing data collected by the CIS is sufficiently robust to provide a 
high degree of certainty that the particular wireless device is in fact 
located within a correctional facility. The Commission also seeks 
comment on these standards, and whether additional standards may be 
required for accuracy
    60. To ensure that an authorized party provides the information 
necessary for a wireless provider to disable the contraband wireless 
devices, the Commission seeks comment on a requirement that CMRS 
licensees comply with a disabling process upon receipt of a qualifying 
request made in writing and transmitted via a verifiable transmission 
mechanism. The Commission seeks comment on whether the qualifying 
request must be transmitted (1) by the Commission upon the request of a 
Designated Correctional Facility Official (DCFO); or (2) by the DCFO. 
We seek comment on whether we should define the DCFO as a state or 
local official responsible for the facility where the contraband device 
is located. In order for the request to disable a contraband device to 
be a qualifying request, the Commission also seeks comment on a 
requirement that the DCFO certify in the qualifying request that: (1) 
An eligible CIS was used in the correctional facility, and include 
evidence of such eligibility; (2) the CIS is authorized for operation 
through a license or Commission approved lease agreement, referencing 
the applicable ULS identifying information; (3) the DCFO has contacted 
all CMRS licensees providing service in the area of the correctional 
facility for which it will seek device disabling in order to establish 
a verifiable transmission mechanism for making qualifying requests and 
for receiving notifications from the licensee; and (4) it has 
substantial evidence that the contraband wireless device was used in 
the correctional facility, and that such use was observed within the 30 
day period immediately prior to the date of submitting the request. The 
Commission seeks comment on these requirements and any methods to 
facilitate interaction between the authorized party and the CMRS 
licensees during design, deployment, and testing of CISs.
    61. In the FNPRM, the Commission seeks comment on whether a 
qualifying request should include specific identifying information 
regarding the device and the correctional facility. Importantly, the 
Commission asks whether the request should include device identifiers 
sufficient to uniquely describe the device in question and the licensee 
providing CMRS service to the device. With regard to device 
identifiers, the Commission seeks specific comment on whether other 
details are necessary in addition to identifiers that uniquely describe 
the specific devices, such as make and model of the device or the mode 
of device utilization at the time of detection. The FNPRM also seeks 
comment on whether a qualifying request should also include 
correctional facility identifiers, including the name of the 
correctional facility, the street address of the correctional facility, 
the latitude and longitude coordinates sufficient to describe the 
boundaries of the correctional facility, and the call signs of the 
Commission licenses and/or leases authorizing the CIS.
    62. In considering a process whereby CMRS licensees disable 
contraband wireless devices upon receiving a qualifying request, the 
Commission recognizes the need to safeguard legitimate devices from 
being disabled to the greatest extent possible. Accordingly, the FNPRM 
seeks comment on the appropriate steps, if any, the CMRS licensee 
should take to verify the information received, whether customer 
outreach should be part of the process, and the time frame within which 
the steps must be taken. The Commission seeks comment on a requirement 
that, if the DCFO is the authorized party transmitting the qualifying 
request to the CMRS licensees, then the CMRS licensee must provide a 
point of contact suitable for receiving qualifying requests to disable 
contraband wireless devices in correctional facilities. With regard to 
carrier investigations, the Commission seeks comment on a range of 
possible options, including requiring the carrier to immediately 
disable the wireless devices upon receipt of a qualifying request from 
an authorized party without conducing any investigation; requiring the 
carrier to conduct brief research of readily accessible data prior to 
disabling or to respond to a series of Commission questions regarding 
the status of the wireless device to determine its status; or requiring 
the carrier to use all data at its disposal prior to disabling. The 
FNPRM seeks comment on all aspects of the disabling process regarding 
verification of disabling requests, particularly the costs and benefits 
to the wireless providers, CIS operators, and the correctional 
facilities.
    63. With respect to the appropriate timeframe for disabling a 
contraband wireless device, or rejecting the request if appropriate, 
the Commission seeks comment on various options, each of which might be 
impacted by the range of potential levels of carrier investigation in 
independently verifying a disabling request and customer outreach. The 
Commission believes that appropriate timeframes should strike a 
reasonable balance between the need for prompt action to disable a 
contraband device potentially used for criminal purposes, and licensee 
resources required to either verify and implement, or reasonably reject 
a qualifying request.
    64. While the Commission seeks comment on a CIS eligibility process 
that will substantially ensure that only contraband wireless devices 
located within correctional facilities are identified for carrier 
disabling, we also recognize that in limited instances a non-contraband 
device in close proximity to a correctional facility might be 
mistakenly identified as

[[Page 22791]]

contraband and disabled in error. In the event of such an error, the 
Commission seeks comment on what timely and efficient methods wireless 
providers can implement to minimize customer inconvenience to resume 
service to the device.
    65. The Commission has considered various alternatives, including a 
court order process or a voluntary carrier termination process, on 
which it seeks comment. The Commission sought comment on a proposal 
seeking adoption of a rule to insulate carriers from any legal 
liability for wrongful termination. The Commission noted that wireless 
carriers' current end user licensing agreements may already protect the 
carriers, but seeks further comment on this proposal, and on whether 
the Commission should create a safe harbor by rule for wireless 
providers that comply with the federal process for disabling phones in 
correctional facilities. The Commission also seeks comment on whether 
and to what extent a system used to request wireless provider disabling 
of a contraband wireless device pursuant to a Commission rule raises 
issues under Title 18 of the U.S. Code or section 705 of the 
Communications Act, as amended (Act), that may be different from those 
raised by MAS implementation. The Commission does not find that the 
record supports the position that section 222 of the Act would prohibit 
a carrier from complying with a disabling process, but seeks comment on 
the issue to the extent commenters maintain a contrary view.
    66. In the alternative, the Commission seeks comment on additional 
technological means of combating contraband devices, including 
imposition of quiet zones around correctional facilities, network-based 
solutions, and incorporation of beacon technology into wireless 
handsets that would provide a software method of disabling 
functionality within correctional facilities
    67. Legal Basis. The legal basis for any action that may be taken 
pursuant to the FNPRM is contained in sections 2, 4(i), 4(j), 301, 302, 
303, 307, 308, 309, 310, and 332 of the Communications Act of 1934, as 
amended, 47 U.S.C. 151, 152, 154(i), 154(j), 301, 302a, 303, 307, 308, 
309, 310, and 332.
    68. Description and Estimate of the Number of Small Entities to 
Which the Proposed Rules Will Apply. The RFA directs agencies to 
provide a description of, and where feasible, an estimate of the number 
of small entities that may be affected by the proposed rules, if 
adopted (15 U.S.C. 603(b)(3)). The RFA generally defines the term 
``small entity'' as having the same meaning as the terms ``small 
business,'' ``small organization,'' and ``small governmental 
jurisdiction'' (5 U.S.C. 601(6)). In addition, the term ``small 
business'' has the same meaning as the term ``small-business concern'' 
under the Small Business Act (5 U.S.C. 601(3)). A ``small-business 
concern'' is one which: (1) Is independently owned and operated; (2) is 
not dominant in its field of operation; and (3) satisfies any 
additional criteria established by the SBA (5 U.S.C. 601(3)).
    69. Small Businesses, Small Organizations, Small Governmental 
Jurisdictions. Our actions, over time, may affect small entities that 
are not easily categorized at present. We therefore describe here, at 
the outset, three comprehensive small entity size standards that could 
be directly affected herein. First, while there are industry specific 
size standards for small businesses that are used in the regulatory 
flexibility analysis, according to data from the SBA's Office of 
Advocacy, in general a small business is an independent business having 
fewer than 500 employees. These types of small businesses represent 
99.9% of all businesses in the United States which translates to 28.8 
million businesses. Next, the type of small entity described as a 
``small organization'' is generally ``any not-for-profit enterprise 
which is independently owned and operated and is not dominant in its 
field.'' Nationwide, as of 2007, there were approximately 1,621,215 
small organizations. Finally, the small entity described as a ``small 
governmental jurisdiction'' is defined generally as ``governments of 
cities, towns, townships, villages, school districts, or special 
districts, with a population of less than fifty thousand.'' U.S. Census 
Bureau data published in 2012 indicate that there were 89,476 local 
governmental jurisdictions in the United States. We estimate that, of 
this total, as many as 88,761 entities may qualify as ``small 
governmental jurisdictions.'' Thus, we estimate that most governmental 
jurisdictions are small.
    70. Wired Telecommunications Carriers. The U.S. Census Bureau 
defines this industry as establishments primarily engaged in operating 
and/or providing access to transmission facilities and infrastructure 
that they own and/or lease for the transmission of voice, data, text, 
sound, and video using wired communications networks. Transmission 
facilities may be based on a single technology or a combination of 
technologies. Establishments in this industry use the wired 
telecommunications network facilities that they operate to provide a 
variety of services, such as wired telephony services, including VoIP 
services, wired (cable) audio and video programming distribution, and 
wired broadband internet services. By exception, establishments 
providing satellite television distribution services using facilities 
and infrastructure that they operate are included in this industry. The 
SBA has developed a small business size standard for Wired 
Telecommunications Carriers, which consists of all such companies 
having 1,500 or fewer employees. U.S. Census data for 2012 shows that 
there were 3,117 firms that operated that year. Of this total, 3,083 
operated with fewer than 1,000 employees. Thus, under this size 
standard, the majority of firms in this industry can be considered 
small.
    71. Neither the Commission nor the SBA has developed a definition 
for Interexchange Carriers. The closest NAICS Code category is Wired 
Telecommunications Carriers and the applicable small business size 
standard under SBA rules consists of all such companies having 1,500 or 
fewer employees. U.S. Census data for 2012 indicates that 3,117 firms 
operated during that year. Of that number, 3,083 operated with fewer 
than 1,000 employees. According to internally developed Commission 
data, 359 companies reported that their primary telecommunications 
service activity was the provision of interexchange services. Of this 
total, an estimated 317 have 1,500 or fewer employees. Consequently, 
the Commission estimates that the majority of interexchange service 
providers are small entities that may be affected by the rules adopted.
    72. The SBA has not developed a small business size standard 
specifically for Local Resellers. The SBA category of 
Telecommunications Resellers is the closest NAICs code category for 
local resellers. The Telecommunications Resellers industry comprises 
establishments engaged in purchasing access and network capacity from 
owners and operators of telecommunications networks and reselling wired 
and wireless telecommunications services (except satellite) to 
businesses and households. Establishments in this industry resell 
telecommunications; they do not operate transmission facilities and 
infrastructure. Mobile virtual network operators (MVNOs) are included 
in this industry. Under the SBA size standard, such a business is small 
if it has 1,500 or fewer employees. U.S. Census data for 2012 show that 
1,341 firms provided

[[Page 22792]]

resale services during that year. Of that number, 1,341 operated with 
fewer than 1,000 employees. Thus, under this category and the 
associated small business size standard, the majority of these 
resellers can be considered small entities. According to Commission 
data, 213 carriers have reported that they are engaged in the provision 
of local resale services. Of these, an estimated 211 have 1,500 or 
fewer employees and two have more than 1,500 employees. Consequently, 
the Commission estimates that the majority of local resellers are small 
entities that may be affected by the rules adopted.
    73. Toll Resellers. The SBA has not developed a small business size 
standard specifically for the category of Toll Resellers. The SBA 
category of Telecommunications Resellers is the closest NAICs code 
category for toll resellers. The Telecommunications Resellers industry 
comprises establishments engaged in purchasing access and network 
capacity from owners and operators of telecommunications networks and 
reselling wired and wireless telecommunications services (except 
satellite) to businesses and households. Establishments in this 
industry resell telecommunications; they do not operate transmission 
facilities and infrastructure. Mobile virtual network operators (MVNOs) 
are included in this industry. Under the SBA size standard, such a 
business is small if it has 1,500 or fewer employees. U.S. Census data 
for 2012 show that 1,341 firms provided resale services during that 
year. Of that number, 1,341 operated with fewer than 1,000 employees. 
Thus, under this category and the associated small business size 
standard, the majority of these resellers can be considered small 
entities. According to Commission data, 881 carriers have reported that 
they are engaged in the provision of toll resale services. Of these, an 
estimated 857 have 1,500 or fewer employees and 24 have more than 1,500 
employees. Consequently, the Commission estimates that the majority of 
toll resellers are small entities that may be affected by the rules 
adopted.
    74. Other Toll Carriers. Neither the Commission nor the SBA has 
developed a size standard for small businesses specifically applicable 
to Other Toll Carriers. This category includes toll carriers that do 
not fall within the categories of interexchange carriers, operator 
service providers, prepaid calling card providers, satellite service 
carriers, or toll resellers. The closest applicable size standard under 
SBA rules is for Wired Telecommunications Carriers and the applicable 
small business size standard under SBA rules consists of all such 
companies having 1,500 or fewer employees. U.S. Census data for 2012 
indicates that 3,117 firms operated during that year. Of that number, 
3,083 operated with fewer than 1,000 employees. According to Commission 
data, 284 companies reported that their primary telecommunications 
service activity was the provision of other toll carriage. Of these, an 
estimated 279 have 1,500 or fewer employees and five have more than 
1,500 employees. Consequently, the Commission estimates that most Other 
Toll Carriers are small entities that may be affected by the rules and 
policies adopted.
    75. 800 and 800-Like Service Subscribers. Neither the Commission 
nor the SBA has developed a small business size standard specifically 
for 800 and 800-like service (toll free) subscribers. The appropriate 
size standard under SBA rules is for the category Telecommunications 
Resellers. Under that size standard, such a business is small if it has 
1,500 or fewer employees. The most reliable source of information 
regarding the number of these service subscribers appears to be data 
the Commission collects on the 800, 888, 877, and 866 numbers in use. 
According to our data, as of September 2009, the number of 800 numbers 
assigned was 7,860,000; the number of 888 numbers assigned was 
5,588,687; the number of 877 numbers assigned was 4,721,866; and the 
number of 866 numbers assigned was 7,867,736. We do not have data 
specifying the number of these subscribers that are not independently 
owned and operated or have more than 1,500 employees, and thus are 
unable at this time to estimate with greater precision the number of 
toll free subscribers that would qualify as small businesses under the 
SBA size standard. Consequently, we estimate that there are 7,860,000 
or fewer small entity 800 subscribers; 5,588,687 or fewer small entity 
888 subscribers; 4,721,866 or fewer small entity 877 subscribers; and 
7,867,736 or fewer small entity 866 subscribers.
    76. Wireless Telecommunications Carriers (except Satellite). This 
industry comprises establishments engaged in operating and maintaining 
switching and transmission facilities to provide communications via the 
airwaves. Establishments in this industry have spectrum licenses and 
provide services using that spectrum, such as cellular services, paging 
services, wireless internet access, and wireless video services. The 
appropriate size standard under SBA rules is that such a business is 
small if it has 1,500 or fewer employees. For this industry, U.S. 
Census data for 2012 show that there were 967 firms that operated for 
the entire year. Of this total, 955 firms had employment of 999 or 
fewer employees and 12 had employment of 1000 employees or more. Thus 
under this category and the associated size standard, the Commission 
estimates that the majority of wireless telecommunications carriers 
(except satellite) are small entities.
    77. Broadband Personal Communications Service. The broadband 
personal communications service (PCS) spectrum is divided into six 
frequency blocks designated A through F, and the Commission has held 
auctions for each block. The Commission defined ``small entity'' for 
Blocks C and F as an entity that has average gross revenues of $40 
million or less in the three previous calendar years. For Block F, an 
additional classification for ``very small business'' was added and is 
defined as an entity that, together with its affiliates, has average 
gross revenues of not more than $15 million for the preceding three 
calendar years. These standards defining ``small entity'' in the 
context of broadband PCS auctions have been approved by the SBA. No 
small businesses, within the SBA-approved small business size standards 
bid successfully for licenses in Blocks A and B. There were 90 winning 
bidders that qualified as small entities in the Block C auctions. A 
total of 93 small and very small business bidders won approximately 40 
percent of the 1,479 licenses for Blocks D, E, and F. In 1999, the 
Commission re-auctioned 347 C, E, and F Block licenses. There were 48 
small business winning bidders. In 2001, the Commission completed the 
auction of 422 C and F Broadband PCS licenses in Auction 35. Of the 35 
winning bidders in this auction, 29 qualified as ``small'' or ``very 
small'' businesses. Subsequent events, concerning Auction 35, including 
judicial and agency determinations, resulted in a total of 163 C and F 
Block licenses being available for grant. In 2005, the Commission 
completed an auction of 188 C block licenses and 21 F block licenses in 
Auction 58. There were 24 winning bidders for 217 licenses. Of the 24 
winning bidders, 16 claimed small business status and won 156 licenses. 
In 2007, the Commission completed an auction of 33 licenses in the A, 
C, and F Blocks in Auction 71. Of the 14 winning bidders, six were 
designated entities. In 2008, the Commission completed an auction of 20

[[Page 22793]]

Broadband PCS licenses in the C, D, E and F block licenses in Auction 
78.
    78. Advanced Wireless Services. AWS Services (1710-1755 MHz and 
2110-2155 MHz bands (AWS-1); 1915-1920 MHz, 1995-2000 MHz, 2020-2025 
MHz and 2175-2180 MHz bands (AWS-2); 2155-2175 MHz band (AWS-3)). For 
the AWS-1 bands, the Commission has defined a ``small business'' as an 
entity with average annual gross revenues for the preceding three years 
not exceeding $40 million, and a ``very small business'' as an entity 
with average annual gross revenues for the preceding three years not 
exceeding $15 million. For AWS-2 and AWS-3, although we do not know for 
certain which entities are likely to apply for these frequencies, we 
note that the AWS-1 bands are comparable to those used for cellular 
service and personal communications service. The Commission has not yet 
adopted size standards for the AWS-2 or AWS-3 bands but proposes to 
treat both AWS-2 and AWS-3 similarly to broadband PCS service and AWS-1 
service due to the comparable capital requirements and other factors, 
such as issues involved in relocating incumbents and developing 
markets, technologies, and services.
    79. Specialized Mobile Radio. The Commission awards small business 
bidding credits in auctions for Specialized Mobile Radio (``SMR'') 
geographic area licenses in the 800 MHz and 900 MHz bands to entities 
that had revenues of no more than $15 million in each of the three 
previous calendar years. The Commission awards very small business 
bidding credits to entities that had revenues of no more than $3 
million in each of the three previous calendar years. The SBA has 
approved these small business size standards for the 800 MHz and 900 
MHz SMR Services. The Commission has held auctions for geographic area 
licenses in the 800 MHz and 900 MHz bands. The 900 MHz SMR auction was 
completed in 1996. Sixty bidders claiming that they qualified as small 
businesses under the $15 million size standard won 263 geographic area 
licenses in the 900 MHz SMR band. The 800 MHz SMR auction for the upper 
200 channels was conducted in 1997. Ten bidders claiming that they 
qualified as small businesses under the $15 million size standard won 
38 geographic area licenses for the upper 200 channels in the 800 MHz 
SMR band. A second auction for the 800 MHz band was conducted in 2002 
and included 23 BEA licenses. One bidder claiming small business status 
won five licenses.
    80. The auction of the 1,053 800 MHz SMR geographic area licenses 
for the General Category channels was conducted in 2000. Eleven bidders 
won 108 geographic area licenses for the General Category channels in 
the 800 MHz SMR band qualified as small businesses under the $15 
million size standard. In an auction completed in 2000, a total of 
2,800 Economic Area licenses in the lower 80 channels of the 800 MHz 
SMR service were awarded. Of the 22 winning bidders, 19 claimed small 
business status and won 129 licenses. Thus, combining all three 
auctions, 40 winning bidders for geographic licenses in the 800 MHz SMR 
band claimed status as small business.
    81. In addition, there are numerous incumbent site-by-site SMR 
licensees and licensees with extended implementation authorizations in 
the 800 and 900 MHz bands. We do not know how many firms provide 800 
MHz or 900 MHz geographic area SMR pursuant to extended implementation 
authorizations, nor how many of these providers have annual revenues of 
no more than $15 million. One firm has over $15 million in revenues. In 
addition, we do not know how many of these firms have 1500 or fewer 
employees. We assume, for purposes of this analysis, that all of the 
remaining existing extended implementation authorizations are held by 
small entities, as that small business size standard is approved by the 
SBA.
    82. Lower 700 MHz Band Licenses. The Commission previously adopted 
criteria for defining three groups of small businesses for purposes of 
determining their eligibility for special provisions such as bidding 
credits. The Commission defined a ``small business'' as an entity that, 
together with its affiliates and controlling principals, has average 
gross revenues not exceeding $40 million for the preceding three years. 
A ``very small business'' is defined as an entity that, together with 
its affiliates and controlling principals, has average gross revenues 
that are not more than $15 million for the preceding three years. 
Additionally, the lower 700 MHz Service had a third category of small 
business status for Metropolitan/Rural Service Area (MSA/RSA) 
licenses--``entrepreneur''--which is defined as an entity that, 
together with its affiliates and controlling principals, has average 
gross revenues that are not more than $3 million for the preceding 
three years. The SBA approved these small size standards. An auction of 
740 licenses (one license in each of the 734 MSAs/RSAs and one license 
in each of the six Economic Area Groupings (EAGs)) commenced on August 
27, 2002, and closed on September 18, 2002. Of the 740 licenses 
available for auction, 484 licenses were won by 102 winning bidders. 
Seventy-two of the winning bidders claimed small business, very small 
business or entrepreneur status and won a total of 329 licenses. A 
second auction commenced on May 28, 2003, closed on June 13, 2003, and 
included 256 licenses: 5 EAG licenses and 476 Cellular Market Area 
licenses. Seventeen winning bidders claimed small or very small 
business status and won 60 licenses, and nine winning bidders claimed 
entrepreneur status and won 154 licenses. On July 26, 2005, the 
Commission completed an auction of 5 licenses in the Lower 700 MHz band 
(Auction No. 60). There were three winning bidders for five licenses. 
All three winning bidders claimed small business status.
    83. In 2007, the Commission reexamined its rules governing the 700 
MHz band. An auction of 700 MHz licenses commenced January 24, 2008 and 
closed on March 18, 2008, which included, 176 Economic Area licenses in 
the A Block, 734 Cellular Market Area licenses in the B Block, and 176 
EA licenses in the E Block. Twenty winning bidders, claiming small 
business status (those with attributable average annual gross revenues 
that exceed $15 million and do not exceed $40 million for the preceding 
three years) won 49 licenses. Thirty-three winning bidders claiming 
very small business status (those with attributable average annual 
gross revenues that do not exceed $15 million for the preceding three 
years) won 325 licenses.
    84. Upper 700 MHz Band Licenses. On January 24, 2008, the 
Commission commenced Auction 73 in which several licenses in the Upper 
700 MHz band were available for licensing: 12 Regional Economic Area 
Grouping licenses in the C Block, and one nationwide license in the D 
Block. The auction concluded on March 18, 2008, with 3 winning bidders 
claiming very small business status (those with attributable average 
annual gross revenues that do not exceed $15 million for the preceding 
three years) and winning five licenses.
    85. Satellite Telecommunications. This category comprises firms 
``primarily engaged in providing telecommunications services to other 
establishments in the telecommunications and broadcasting industries by 
forwarding and receiving communications signals via a system of 
satellites or reselling satellite telecommunications.'' The category 
has a small business size standard of $32.5 million or less in average 
annual

[[Page 22794]]

receipts, under SBA rules. For this category, U.S. Census Bureau data 
for 2012 show that there were a total of 333 firms that operated for 
the entire year. Of this total, 299 firms had annual receipts of less 
than $25 million. Consequently, we estimate that the majority of 
satellite telecommunications providers are small entities.
    86. All Other Telecommunications. The ``All Other 
Telecommunications'' category is comprised of establishments that are 
primarily engaged in providing specialized telecommunications services, 
such as satellite tracking, communications telemetry, and radar station 
operation. This industry also includes establishments primarily engaged 
in providing satellite terminal stations and associated facilities 
connected with one or more terrestrial systems and capable of 
transmitting telecommunications to, and receiving telecommunications 
from, satellite systems. Establishments providing Internet services or 
voice over Internet protocol (VoIP) services via client-supplied 
telecommunications connections are also included in this industry. The 
SBA has developed a small business size standard for ``All Other 
Telecommunications,'' which consists of all such firms with gross 
annual receipts of $32.5 million or less. For this category, U.S. 
Census data for 2012 show that there were 1,442 firms that operated for 
the entire year. Of these firms, a total of 1,400 had gross annual 
receipts of less than $25 million. Thus, a majority of ``All Other 
Telecommunications'' firms potentially affected by the rules adopted 
can be considered small.
    87. Other Communications Equipment Manufacturing. This industry 
comprises establishments primarily engaged in manufacturing 
communications equipment (except telephone apparatus, and radio and 
television broadcast, and wireless communications equipment). Examples 
of such manufacturing include fire detection and alarm systems 
manufacturing, Intercom systems and equipment manufacturing, and 
signals (e.g., highway, pedestrian, railway, traffic) manufacturing. 
The SBA has established a size standard for this industry as 750 
employees or less. Census data for 2012 show that 383 establishments 
operated in that year. Of that number, 379 operated with less than 500 
employees. Based on that data, we conclude that the majority of Other 
Communications Equipment Manufacturers are small.
    88. Radio and Television Broadcasting and Wireless Communications 
Equipment Manufacturing. This industry comprises establishments 
primarily engaged in manufacturing radio and television broadcast and 
wireless communications equipment. Examples of products made by these 
establishments are: Transmitting and receiving antennas, cable 
television equipment, GPS equipment, pagers, cellular phones, mobile 
communications equipment, and radio and television studio and 
broadcasting equipment. The SBA has established a size standard for 
this industry of 750 employees or less. U.S. Census data for 2012 show 
that 841 establishments operated in this industry in that year. Of that 
number, 819 establishments operated with less than 500 employees. Based 
on this data, we conclude that a majority of manufacturers in this 
industry is small.
    89. Engineering Services. This industry comprises establishments 
primarily engaged in applying physical laws and principles of 
engineering in the design, development, and utilization of machines, 
materials, instruments, structures, process, and systems. The 
assignments undertaken by these establishments may involve any of the 
following activities: Provision of advice, preparation of feasibility 
studies, preparation of preliminary and final plans and designs, 
provision of technical services during the construction or installation 
phase, inspection and evaluation of engineering projects, and related 
services. The SBA deems engineering services firms to be small if they 
have $15 million or less in annual receipts, except military and 
aerospace equipment and military weapons engineering establishments are 
deemed small if they have $38 million or less in annual receipts. 
According to U.S. Census Bureau data for 2012, there were 49,092 
establishments in this category that operated the full year. Of the 
49,092 establishments, 45,848 had less than $10 million in receipts and 
3,244 had $10 million or more in annual receipts. Accordingly, the 
Commission estimates that a majority of engineering service firms are 
small.
    90. Search, Detection, Navigation, Guidance, Aeronautical, and 
Nautical System Instrument Manufacturing. This U.S. industry comprises 
establishments primarily engaged in manufacturing search, detection, 
navigation, guidance, aeronautical, and nautical systems and 
instruments. Examples of products made by these establishments are 
aircraft instruments (except engine), flight recorders, navigational 
instruments and systems, radar systems and equipment, and sonar systems 
and equipment. The SBA has established a size standard for this 
industry of 1,250 employees or less. Data from the 2012 Economic Census 
show 588 establishments operated during that year. Of that number, 533 
establishments operated with less than 500 employees. Based on this 
data, we conclude that the majority of manufacturers in this industry 
are small.
    91. Security Guards and Patrol Services. The U.S. Census Bureau 
defines this category to include ``establishments primarily engaged in 
providing guard and patrol services.'' The SBA deems security guards 
and patrol services firms to be small if they have $18.5 million or 
less in annual receipts. According to U.S. Census Bureau data for 2012, 
there were 8,742 establishments in operation the full year. Of the 
8,842 establishments, 8,276 had less than $10 million while 466 had 
more than $10 million in annual receipts. Accordingly, the Commission 
estimates that a majority of firms in this category are small.
    92. All Other Support Services. This U.S. industry comprises 
establishments primarily engaged in providing day-to-day business and 
other organizational support services (except office administrative 
services, facilities support services, employment services, business 
support services, travel arrangement and reservation services, security 
and investigation services, services to buildings and other structures, 
packaging and labeling services, and convention and trade show 
organizing services). The SBA deems all other support services firms to 
be small if they have $11 million or less in annual receipts. According 
to U.S. Census Bureau data for 2012, there were 11,178 establishments 
in operation the full year. Of the 11,178 establishments, 10,886 had 
less than $10 million while 292 had greater than $10 million in annual 
receipts. Accordingly, the Commission estimates that a majority of 
firms in this category are small.
    93. Correctional Institutions (State and Federal Facilities). This 
industry comprises government establishments primarily engaged in 
managing and operating correctional institutions. The Department of 
Justice's Bureau of Justice Statistics (BJS) collects and publishes 
census information on adult correctional facilities operating under 
state or federal authority as well as private and local facilities 
operating under contract to house inmates for federal or state 
correctional authorities. The types of facilities included in the 
census data from BJS are prisons and prison farms; prison hospitals; 
centers for medical treatment and psychiatric

[[Page 22795]]

confinement; boot camps; centers for reception; diagnosis; 
classification; alcohol and drug treatment; community correctional 
facilities; facilities for parole violators and other persons returned 
to custody; institutions for youthful offenders; and institutions for 
geriatric inmates.
    94. While neither the SBA nor the Commission have developed a size 
standard for this category, the size standard for a small facility in 
the BJS census data is one that has an average daily population (ADP) 
of less than 500 inmates. The latest BJS census data available shows 
that as of December 30, 2005 there were a total of 1821 correctional 
facilities operating under state or local federal authority. Of that 
number more than half of the facilities or a total 946 facilities had 
an average daily population of less than 500 inmates. Based on this 
data a majority of ``Governmental Correctional Institutions'' 
potentially affected by the rules adopted can be considered small.
    95. Facilities Support Services. This industry comprises 
establishments primarily engaged in providing operating staff to 
perform a combination of support services within a client's facilities. 
Establishments providing facilities (except computer and/or data 
processing) operation support services and establishments providing 
private jail services or operating correctional facilities (i.e., 
jails) on a contract or fee basis are included in this industry. 
Establishments in this industry typically provide a combination of 
services, such as janitorial, maintenance, trash disposal, guard and 
security, mail routing, reception, laundry, and related services to 
support operations within facilities. These establishments provide 
operating staff to carry out these support activities, but are not 
involved with or responsible for the core business or activities of the 
client. The SBA has developed a small business size standard for 
``Facilities Support Services,'' which consists of all such firms with 
gross annual receipts of $38.5 million or less. For this category, U.S. 
Census data for 2012 shows that there were 5,344 firms that operated 
for the entire year. Of these firms, 4,882 had gross annual receipts of 
less than $10 million and 462 had gross annual receipts of $10 million 
or more. Based on this data a majority of ``Facilities Support 
Services'' firms potentially affected by the rules adopted can be 
considered small.
    96. Description of Projected Reporting, Recordkeeping, and Other 
Compliance Requirements for Small Entities. In the FNPRM, the 
Commission seeks public comment on methods to improve the viability of 
technologies used to combat contraband wireless devices in correctional 
facilities. The potential process is prospective in that it would only 
apply if an entity avails itself of managed access or detection 
technologies. There are three classes of small entities that might be 
impacted: Providers of wireless services, providers or operators of 
managed access or detection systems, and correctional facilities.
    97. For small entities that are providers of wireless services and 
enter into lease arrangements with CIS operators, the Commission seeks 
notice on a requirement that those entities provide advance notice 
prior to certain changes in the CMRS licensee's network. We seek 
comment on limiting the notice requirement to particular changes in the 
carrier's network--e.g., additions of new frequency bands--in order to 
ensure the notice requirement does not result in an unnecessary burden 
on CMRS licensees, but seek comment on what other notice requirements 
might be necessary to ensure effective CIS operation. The FNPRM also 
seeks comment on a process whereby CMRS providers would disable 
contraband wireless devices detected within a correctional facility 
upon receipt of a qualifying request. In order to receive qualifying 
requests, the FNPRM seeks comment on a requirement that CMRS licensees 
who enter into lease arrangements with CIS operators to have a 
verifiable transmittal mechanism in place and, upon request, provide a 
DCFO with a point of contact suitable for receiving qualifying 
requests. We note that some carriers may already have such secure 
portals in place for receipt of similar requests. The costs of 
complying with a disabling process would vary depending on the level of 
investigation required of carriers upon receiving a qualifying request. 
The Commission seeks comment on this issue, but notes that several 
carriers already have internal procedures for disabling contraband 
wireless devices pursuant to court orders, which could be modified to 
accommodate a disabling process. Nevertheless, these requirements would 
likely require the allocation of resources to tailor internal 
processes, including some level of additional staffing.
    98. The FNPRM also contemplates the option of requiring CMRS 
licensees to perform varying levels of customer outreach upon receiving 
a qualifying request, or after disabling a contraband wireless device. 
The Commission seeks comment on the costs and benefits of this 
proposal, but notes carriers may already have mechanisms in place for 
customer outreach.
    99. The Commission seeks to streamline the process for 
identification, notification, and disabling of contraband devices to 
the greatest extent possible, while also ensuring the accuracy, 
security, and efficiency of such a process. Therefore, the FNPRM seeks 
comment on a process that would require small entity CIS operators, as 
well as all other CIS operators, to be deemed eligible and provide 
various pieces of required information along with a qualifying request 
for disabling a contraband device to the wireless carriers. 
Specifically, in order to be eligible, the Commission asks whether a 
CIS operator should demonstrate the following: (1) The CIS has 
appropriate equipment authorization pursuant to Commission rules; (2) 
the CIS is designed and will be configured to locate devices solely 
within a correctional facility, secure and protect the collected 
information, and avoid interfering with emergency 911 calls; and (3) 
the methodology to be used in analyzing data collected by the CIS is 
sufficiently robust to provide a high degree of certainty that the 
particular wireless device is in fact located within a correctional 
facility.
    100. The Commission seeks comment on an eligibility process that 
would apply equally to all CIS operators, irrespective of size. We note 
that a mandatory process for disabling contraband wireless devices 
identified using detection systems does not currently exist, and, 
without adoption of a process like that considered in the FNPRM, is 
subject to the discretion of wireless carriers to voluntarily disable 
devices. It is possible that an outgrowth of the questions asked and 
responses received could result in additional requirements for being 
deemed an eligible CIS, submitting qualifying requests, and disabling 
contraband devices. This may also require some level of recordkeeping 
to ensure that contraband wireless devices, and not legitimate devices, 
are disabled. To the extent the process would impose these 
requirements, they would be necessary to ensure that legitimate 
wireless users are not impacted by the operation of CISs, which should 
be the minimum performance objective for any detection system. 
Therefore, while these requirements might impose some compliance or 
recordkeeping obligations, they would be a necessary predicate for the 
operation of a detection system.
    101. In the FNPRM, we also seek comment on requiring correctional 
facilities wishing to use CIS as a means

[[Page 22796]]

of combatting contraband cellphones use inside the prison to designate 
a DCFO. The Commission seeks comment on whether qualifying requests 
should be transmitted either by the Commission upon the request of the 
DCFO, or by the DCFO. If the DCFO is to transmit the requests, the 
Commission also seeks comment on a requirement that the DCFO certify in 
the qualifying request that: (1) An eligible CIS was used in the 
correctional facility, and include evidence of such eligibility; (2) 
the CIS is authorized for operation through a license or Commission 
approved lease agreement, referencing the applicable ULS identifying 
information; (3) the DCFO has contacted all CMRS licensees providing 
service in the area of the correctional facility for which it will seek 
device disabling in order to establish a verifiable transmission 
mechanism for making qualifying requests and for receiving 
notifications from the licensee; and (4) it has substantial evidence 
that the contraband wireless device was used in the correctional 
facility, and that such use was observed within the 30 day period 
immediately prior to the date of submitting the request. It is possible 
that an outgrowth of the questions asked and responses received could 
result in additional reporting and recordkeeping requirements on the 
DCFO and its respective correctional facility. The goal of imposing 
such requirements on the DCFO, however, would be to provide an 
efficient means of communication among CIS operators, correctional 
facilities, and CMRS providers, and to ensure the accuracy and 
legitimacy of any termination process.
    102. Steps Taken To Minimize the Significant Economic Impact on 
Small Entities, and Significant Alternatives Considered. The RFA 
requires an agency to describe any significant, specifically small 
business, alternatives that it has considered in reaching its proposed 
approach, which may include the following four alternatives (among 
others): ``(1) The establishment of differing compliance or reporting 
requirements or timetables that take into account the resources 
available to small entities; (2) the clarification, consolidation, or 
simplification of compliance and reporting requirements under the rule 
for small entities; (3) the use of performance rather than design 
standards; and (4) an exemption from coverage of the rule, or any part 
thereof for small entities.''
    103. First, in the FNPRM, the Commission contemplates the 
possibility that the obligations considered might create additional 
compliance costs on CMRS licensees and CIS operators, both large and 
small. However, the Commission seeks comment on the specific criteria 
and timetables that should be required, and the associated costs and 
benefits in order to facilitate informed decisions in the final rules. 
Specifically, the Commission considers a range of timeframes in which 
CMRS licensees would be required to respond to qualifying requests and 
seeks comment on the resource and staff demands associated with those 
timeframes. With respect to the demands on CIS operators, the FNPRM 
considers a range of certifications and necessary information to be 
included with qualifying requests, and seeks comment on which pieces of 
information are important to accurately identify contraband wireless 
devices. Commenters are asked whether small entities face any special 
or unique issues with respect to terminating service to devices, and 
whether they would require additional time to take such action. In 
doing so, the Commission seeks to ensure the accuracy, security, and 
efficiency of the identification and disabling process, while also 
minimizing compliance burdens to the greatest extent possible.
    104. Second, to limit the economic impact of a notice requirement, 
we seek comment on the types of network changes that should require 
advanced notification to CIS providers. While the Commission emphasizes 
the importance of cooperation between CIS operators and CMRS providers 
at every stage of CIS deployment, we also recognize the potential for 
overly burdensome notice requirements that would require notice upon 
making any network changes, even those that are unlikely to negatively 
impact the CIS.
    105. Third, in order to clarify and simplify compliance and 
reporting requirements for small entities, as well as all other 
impacted entities, the Commission intends to designate a single point 
of contact at the Commission to serve as the ombudsperson on contraband 
wireless device issues. The ombudsperson's duties may include, as 
necessary, providing assistance to CIS operators in connecting with 
CMRS licensees, playing a role in identifying required CIS filings for 
a given correctional facility, facilitating the required Commission 
filings, thereby reducing regulatory burdens, and resolving issues that 
may arise during the leasing process. The ombudsperson will also 
conduct outreach and maintain a dialogue with all stakeholders on the 
issues important to furthering a solution to the problem of contraband 
wireless device use in correctional facilities. Finally, the 
ombudsperson, in conjunction with WTB, will maintain Web page with a 
list of active CIS operators and locations where CIS has been deployed. 
The appointment of an ombudsperson provides an important resource for 
small entities to understand and comply with any CIS-related 
requirements.
    106. While the FNPRM considers a requirement that CISs be deemed 
eligible prior to making a qualifying request, the Commission does not 
seek comment on any specific design standard. Instead, the Commission 
seeks comment on the elements of detection systems and identification 
methods that contribute to the accuracy and reliability of a particular 
CIS. The FNPRM asks whether the standard should differ between rural 
and urban areas, or between large and small detection system providers 
or operators.
    107. Finally, the FNPRM does not propose any exemption for small 
entities. The Commission finds an overriding public interest in 
preventing the illicit use of contraband wireless devices by prisoners 
to perpetuate criminal enterprises. The CIS eligibility requirement 
discussed in the FNPRM would be vital to the accuracy and reliability 
of the information ultimately used to disable contraband wireless 
devices, regardless of the size of the entity obtaining that 
information. Further, to the extent that a small entity could be exempt 
from a disabling requirement, it would reduce the overall effectiveness 
of a CIS. If inmates discover that a wireless provider whose service 
area includes the correctional facility does not disable contraband 
wireless devices within the facility, inmates will accordingly use only 
that service. Therefore, while the Further Notice seeks comment on 
alternative considerations for the overall identification and disabling 
process to accommodate the needs and resources of small entities, an 
exemption would be contrary to the Commission's overarching goal of 
combatting contraband wireless devices in wireless facilities.
    108. Federal Rules That May Duplicate, Overlap, or Conflict With 
the Proposed Rules. The FNPRM seeks comment on the application and 
relevance of sections 705 and 222 of the Act and Title 18 of the U.S. 
Code.

Congressional Review Act

    109. The Commission will send a copy of the FNPRM to Congress and 
the Government Accountability Office pursuant to the Congressional 
Review Act, see 5 U.S.C. 801(a)(1)(A).

[[Page 22797]]

III. Ordering Clauses

    110. It is ordered that, pursuant to the authority contained in 
sections 1, 2, 4(i), 4(j), 301, 302, 303, 307, 308, 309, 310, and 332 
of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 
154(i), 154(j), 301, 302a, 303, 307, 308, 309, 310, and 332, the FNPRM 
in GN Docket No. 13-111 is adopted.
    111. It is further ordered that, pursuant to applicable procedures 
set forth in sections 1.415 and 1.419 of the Commission's rules, 47 CFR 
1.415, 1.419, interested parties may file comments on the FNPRM on or 
before 30 days after publication in the Federal Register and reply 
comments on or before 60 days after publication in the Federal 
Register.
    112. It is further ordered that, pursuant to section 801(a)(1)(A) 
of the Congressional Review Act, 5 U.S.C. 801(a)(1)(A), the Commission 
shall send a copy of the FNPRM to Congress and to the Government 
Accountability Office.
    113. It is further ordered that the Commission's Consumer & 
Governmental Affairs Bureau, Reference Information Center, shall send a 
copy of the FNPRM, including the Initial Regulatory Flexibility 
Analysis, to the Chief Counsel for Advocacy of the Small Business 
Administration.

List of Subjects in 47 CFR Part 20

    Communications common carriers, Radio.

Federal Communications Commission.
Marlene H. Dortch,
Secretary.

Proposed Rules

    For the reasons discussed in the preamble, the Federal 
Communications Commission proposes to further amend 47 CFR part 20, as 
amended in a final rule published elsewhere in this issue of the 
Federal Register, as set forth below:

PART 20--COMMERCIAL MOBILE RADIO SERVICES

0
1. The authority citation for part 20 continues to read as follows:

    Authority:  47 U.S.C. 151, 152(a), 154(i), 157, 160, 201, 214, 
222, 251(e), 301, 302, 303, 303(b), 303(r), 307, 307(a), 309, 
309(j)(3), 316, 316(a), 332, 610, 615, 615a, 615b, 615c, unless 
otherwise noted.

0
2. Amend Sec.  20.23 by adding paragraph (b) to read as follows:


Sec.  20.23   Contraband wireless devices in correctional facilities.

* * * * *
    (b) Disabling contraband wireless devices. A Designated 
Correctional Facility Official may request that a CMRS licensee disable 
a contraband wireless device in a correctional facility detected by a 
Contraband Interdiction System as described below.
    (1) Licensee obligation. A licensee providing CMRS service must:
    (i) Upon request of a Designated Correctional Facility Official, 
provide a point of contact suitable for receiving qualifying requests 
to disable devices; and
    (ii) Upon request of a Designated Correctional Facility Office to 
disable a contraband wireless devices, verify that the request is a 
qualifying request and, if so, permanently disable the device.
    (2) Qualifying request. A qualifying request must be made in 
writing via a verifiable transmission mechanism, contain the 
certifications in paragraph (3) of this section and the device and 
correctional facility identifying information in paragraph (4) of this 
section, and be signed by a Designated Correctional Facility Official. 
For purposes of this section, a Designated Correctional Facility 
Official means a state or local official responsible for the 
correctional facility where the contraband device is located.
    (3) Certifications. A qualifying request must include the following 
certifications by the Designated Correctional Facility Official:
    (i) The CIS used to identify the device is authorized for operation 
through a Commission license or approved lease agreement, referencing 
the applicable ULS identifying information;
    (ii) The Designated Correctional Facility Official has contacted 
all CMRS licensees providing service in the area of the correctional 
facility in order to establish a verifiable transmission mechanism for 
making qualifying requests and for receiving notifications from the 
CMRS licensee;
    (iii) The Designated Correctional Facility Official has substantial 
evidence that the contraband wireless device was used in the 
correctional facility, and that such use was observed within the 30 day 
period immediately prior to the date of submitting the request; and
    (iv) The CIS used to identify the device is an Eligible CIS as 
defined in paragraph (5) of this section. The Designated Correctional 
Facility Official must include a copy of a FCC Public Notice listing 
the eligible CIS.
    (4) Device and correctional facility identifying information. The 
request must identify the device to be disabled and correctional 
facility by providing the following information:
    (i) Identifiers sufficient to uniquely describe the device in 
question;
    (ii) Licensee providing CMRS service to the device;
    (iii) Name of correctional facility;
    (iv) Street address of correctional facility;
    (v) Latitude and longitude coordinates sufficient to describe the 
boundaries of the correctional facility; and
    (vi) Call signs of FCC Licenses and/or Leases authorizing the CIS.
    (5) Eligible CIS. (i) In order to be listed on a FCC Public Notice 
as an Eligible CIS, a CIS operator must demonstrate to the Commission 
that:
    (A) All radio transmitters used as part of the CIS have appropriate 
equipment authorization pursuant to Commission rules;
    (B) The CIS is designed and will be configured to locate devices 
solely within a correctional facility, secure and protect the collected 
information, and is capable of being programmed not to interfere with 
emergency 911 calls; and
    (C) The methodology to be used in analyzing data collected by the 
CIS is sufficiently robust to provide a high degree of certainty that 
the particular wireless device is in fact located within a correctional 
facility.
    (ii) Periodically, the Commission will issue Public Notices listing 
all Eligible CISs.

[FR Doc. 2017-09886 Filed 5-17-17; 8:45 am]
 BILLING CODE 6712-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.