Protecting Against National Security Threats to the Communications Supply Chain Through FCC Programs; Huawei Designation; ZTE Designation, 230-250 [2019-27610]

Download as PDF 230 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations 27. On page 61478, column 3, first partial paragraph, in line 8, the figure ‘‘4.5’’ is corrected to read ‘‘4.6’’. Dated: December 19, 2019. Ann C. Agnew, Executive Secretary to the Department, Department of Health and Human Services. [FR Doc. 2019–28364 Filed 12–30–19; 4:15 pm] BILLING CODE 4120–01–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 54 [WC Docket No. 18–89, PS Docket Nos. 19– 351, 19–352; FCC 19–121; FRS 16315] Protecting Against National Security Threats to the Communications Supply Chain Through FCC Programs; Huawei Designation; ZTE Designation Federal Communications Commission. ACTION: Final rule. AGENCY: In this document, the Federal Communications Commission (Commission) adopts a rule that prospectively prohibits the use of Universal Service Fund (USF or the Fund) funds to purchase or obtain any equipment or services produced or provided by a covered company posing a national security threat to the integrity of communications networks or the communications supply chain. In doing so, the Report and Order initially designates Huawei Technologies Company (Huawei) and ZTE Corporation (ZTE) as covered companies for purposes of the rule and establish a process for designating additional covered companies in the future. To support the Commission’s future efforts to protect the communications supply chain, the Information Collection Order (Order) directs the Wireline Competition Bureau (WCB) and Office of Economics and Analytics (OEA), in coordination with USAC, to conduct an information collection to determine the extent to which potentially prohibited equipment exists in current networks and the costs associated with removing such equipment and replacing it with equivalent equipment. DATES: Effective January 3, 2020. FOR FURTHER INFORMATION CONTACT: For further information, please contact John Visclosky, Competition Policy Division, Wireline Competition Bureau, at John.Visclosky@fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s Report and Order and Order in WC Docket No. jbell on DSKJLSW7X2PROD with RULES SUMMARY: VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 18–89 and PS Docket Nos. 19–351 and 19–352, adopted November 22, 2019 and released November 26, 2019. The full text of this document is available for public inspection during regular business hours in the FCC Reference Information Center, Portals II, 445 12th Street SW, Room CY–A257, Washington, DC 20554 or at the following internet address: https:// docs.fcc.gov/public/attachments/FCC19-121A1.pdf . The Further Notice of Proposed Rulemaking that was adopted concurrently with this Report and Order and Order is published elsewhere in the Federal Register. Comments on the initial designations of Huawei and ZTE as covered companies are due on or before February 3, 2020. Pursuant to sections 1.415 and 1.419 of the Commission’s rules, 47 CFR 1.415, 1.419, interested parties may file comments on or before the dates indicated on the first page of this document. Comments may be filed using the Commission’s Electronic Comment Filing System (ECFS). See Electronic Filing of Documents in Rulemaking Proceedings, 63 FR 24121 (1998). Interested parties may file comments, identified by PS Docket No. 19–351 for the Huawei final designation proceeding or PS Docket No. 19–352 for the ZTE final designation proceeding, by any of the following methods: D Electronic Filers: Comments may be filed electronically using the internet by accessing the ECFS: https:// www.fcc.gov/ecfs/. D Paper Filers: Parties who choose to file by paper must file an original and one copy of each filing. If more than one docket or rulemaking number appears in the caption of this proceeding, filers must submit two additional copies for each additional docket or rulemaking number. Filings can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. • All hand-delivered or messengerdelivered paper filings for the Commission’s Secretary must be delivered to FCC Headquarters at 445 12th St. SW, Room TW–A325, Washington, DC 20554. The filing hours are 8:00 a.m. to 7:00 p.m. All hand deliveries must be held together with rubber bands or fasteners. Any envelopes and boxes must be disposed of before entering the building. • Commercial overnight mail (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 PO 00000 Frm 00024 Fmt 4700 Sfmt 4700 Junction Drive, Annapolis Junction, MD 20701. • U.S. Postal Service first-class, Express, and Priority mail must be addressed to 445 12th Street SW, Washington, DC 20554. People with Disabilities: To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (tty). Comments and reply comments must include a short and concise summary of the substantive arguments raised in the pleading. Comments and reply comments must also comply with section 1.49 and all other applicable sections of the Commission’s rules. The Commission directs all interested parties to include the name of the filing party and the date of the filing on each page of their comments and reply comments. All parties are encouraged to use a table of contents, regardless of the length of their submission. I. Introduction 1. In today’s increasingly connected world, safeguarding the security and integrity of America’s communications infrastructure has never been more important. Broadband networks have transformed virtually every aspect of the U.S. economy, enabling the voice, data, and internet connectivity that fuels all other critical industry sectors— including our transportation systems, electrical grid, financial markets, and emergency services. And with the advent of 5G—the next generation of wireless technologies, which is expected to deliver exponential increases in speed, responsiveness, and capacity—the crucial and transformative role of communications networks in our economy and society will only increase. It is therefore vital that the Commission protects these networks from national security threats. 2. The Commission has taken a number of targeted steps to protect the nation’s communications networks from potential security threats. In this document, the Commission builds on these efforts, consistent with concurrent Congressional and Executive Branch actions, and ensure that the public funds used in the Commission’s USF funds are not used in a way that undermines or poses a threat to our national security. Specifically, in the Report and Order, the Commission adopts a rule that prospectively prohibits the use of USF funds to purchase or obtain any equipment or services produced or provided by a E:\FR\FM\03JAR1.SGM 03JAR1 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations jbell on DSKJLSW7X2PROD with RULES covered company posing a national security threat to the integrity of communications networks or the communications supply chain. In doing so, the Commission initially designates Huawei and ZTE as covered companies for purposes of this rule and establish a process for designating additional covered companies in the future. 3. Given the Commission’s oversight of the USF programs that fund voice and broadband networks and services and the Commission’s obligation to be responsible stewards of the public funds that subsidize those programs, the Commission has a specific, but important, role to play in securing the communications supply chain. The Commission believes that the steps the Commission takes in the document are consistent with this role, that the Commission must do all it can within the confines of its legal authority to address national security threats, and that its actions, along with those taken by other Executive Branch agencies, will go far in securing our nation’s critical telecommunications infrastructure. II. Report and Order 4. Based on the Commission’s review of the extensive record in the proceeding, it adopts a rule that no universal service support may be used to purchase or obtain any equipment or services produced or provided by a covered company posing a national security threat to the integrity of communications networks or the communications supply chain. Accordingly, USF recipients may not use USF funds to maintain, improve, modify, operate, manage, or otherwise support such equipment or services in any way, including upgrades to existing equipment and services. This prohibition applies to any subsidiaries and affiliates of USF recipients to the extent that such subsidiaries and affiliates use USF funds. 5. In addition to adopting the rule, the Commission initially designates Huawei and ZTE as covered companies for the purposes of this prohibition. Both companies’ ties to the Chinese government and military apparatus— together with Chinese laws obligating them to cooperate with any request by the Chinese government to use or access their systems—pose a threat to the security of communications networks and the communications supply chain and necessitate taking this step. The Commission’s actions in this document are informed by the evidence cited herein, including the actions of other agencies and branches of the government and similar assessments from other countries. VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 6. As the Commission stated in the Protecting Against National Security Threats Notice, the promotion of national security is consistent with the public interest, and USF funds should be used to deploy infrastructure and provide services that do not undermine our national security. The Commission has long accorded significant weight to the views of Executive Branch agencies on matters of national security, foreign policy, law enforcement, and trade policy, and the Commission finds it very significant that the U.S. Department of Justice (DoJ) has expressed its strong support for this conclusion. The Commission also agrees with the Telecommunications Industry Association (TIA) that the Commission ‘‘may reasonably conclude that limiting the use of technology from certain vendors deemed to pose a heightened national security risk is an appropriate element of providing a quality communications service.’’ The record persuades the Commission that the nature of today’s communications networks is such that untrusted participants in the supply chain pose a serious risk to the integrity and, thus, the quality of those networks. 7. It is well established that the Commission has authority to place reasonable public-interest conditions on the use of USF funds. In the 2011 USF/ ICC Transformation Order, 76 FR 73830, November 29, 2011, the Commission determined that supported services must be provided using broadbandcapable networks and that ETCs must offer broadband services that meet certain basic performance requirements. As the Tenth Circuit held in upholding the Commission’s imposition of these obligations, section 254(c)(1) does not limit the Commission’s authority to place conditions on the use of USF funds, and section 254(e) is reasonably interpreted as allowing the Commission ‘‘to specify what a USF recipient may or must do with the funds,’’ consistent with the policy principles outlined in section 254(b). The Commission adopts the rule as just such a restriction, based on its conclusion that it is critical to the provision of ‘‘quality service’’ that USF funds be spent on secure networks and not be spent on equipment and services from companies that threaten national security. Or, to put it another way, providing a secure service is part of providing a quality service. 8. The Commission disagrees with commenters who suggest that adopting the rule violates the principle that ‘‘[q]uality services should be available at just, reasonable, and affordable rates.’’ As TIA points out, many companies have been able to provide quality PO 00000 Frm 00025 Fmt 4700 Sfmt 4700 231 services at reasonable and affordable rates using suppliers whose quality, and risk to our national security, is not being questioned here. Furthermore, the Commission is not persuaded by arguments that the proposed rule would violate this principle by eliminating low-cost suppliers. Again, the record clearly demonstrates that service can be provided at just, reasonable, and affordable rates without these suppliers. Additionally, there is evidence that those low costs are likely due to favorable subsidies and other benefits bestowed by governments that are in an adversarial position to the United States. To the extent that certain vendors are able to offer lower prices for their equipment or services due to subsidization from foreign governments that pose a national security threat, restricting federal funding to those vendors should unleash competition from more-trusted, higher-quality suppliers in the long run, resulting in significant public interest benefits. Furthermore, the Commission would be shirking its responsibility to the American public if it were to ignore threats to our security posed by certain equipment manufacturers simply because that equipment was cheaper. 9. Moreover, the Commission must ensure that universal service funds are being spent in a manner consistent with section 254 of the Act. Section 254(e) requires that USF recipients ‘‘shall use that support only for the provision, maintenance, and upgrading of facilities and services for which the support is intended.’’ This language authorizes the Commission to designate the services for which USF support will be provided and to ‘‘encourage the deployment of the types of facilities that will best achieve the principles set forth in section 254(b).’’ The Commission also must define the services supported by USF, which the statute explains is to be ‘‘an evolving level of telecommunications services that the Commission shall establish periodically under this section.’’ In so doing, the Commission ‘‘shall consider . . . the extent to which such telecommunications services . . . are consistent with the public interest, convenience, and necessity.’’ Again, the Commission concludes that the public interest requires that the USF support only services that are not dependent on equipment and services provided or produced by any company that poses a national security threat. The Commission’s decision here to limit the services that will be supported by USF is especially consistent with public safety, under section 254(c)(1)(A), and E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 232 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations with the public interest, convenience, and necessity, under section 254(c)(1)(D). 10. To the extent parties contend that the Commission may not change what it establishes as the ‘‘evolving level of telecommunications services’’ to be supported by USF without first seeking the recommendation of the Joint Board, the Commission disagrees. Section 254(c)(1) requires the Commission to establish the definition of universal service; it allows the Joint Board to issue a recommendation but does not require Commission action to be preceded by such a recommendation. The Commission has acted under this provision several times without following a recommendation of the Joint Board—for example in the 2014 First ERate Order, 80 FR 167, January 5, 2015, and the 2016 Lifeline Order, 81 FR 33026, May 24, 2016. 11. The Commission also rejects arguments that it may not consider national security in assessing the public interest generally or under section 254. Indeed, the security of our nation is an important part of the public interest. That’s why the Commission has consistently held, including in the Protecting Against National Security Threats Notice in the proceeding, that national security concerns are part of the public interest and that the Commission’s exercise of specific statutory authorities should, when warranted, take those concerns into account. As discussed in the Protecting Against National Security Threats Notice, the Commission adopted rules implementing the 2012 Spectrum Act to prohibit participation in spectrum auctions by entities that have been barred by any federal agency from bidding on a contract, participating in an auction, or receiving a grant. The Commission also has a long history of considering national security equities where other agencies have specific expertise and are positioned to make recommendations, and adopting a similar process here cannot be characterized as ‘‘promot[ing] other, unrelated objectives’’ unrelated to the specific regulatory program at hand. 12. More generally, section 201(b) of the Act authorizes the Commission to promulgate ‘‘such rules and regulations as may be necessary in the public interest to carry out the provisions of this Act.’’ It is well-established that the promotion of national security is consistent with the public interest and part of the purpose for which the Commission was created. As section 1 of the Act states, the Commission was created ‘‘for the purpose of the national defense [and] for the purpose of VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 promoting safety of life and property through the use of wire and radio communication . . . .’’ The Commission concludes based on the record of the proceeding that it is necessary in the public interest to prohibit USF recipients from spending universal service funds on covered equipment or services. 13. The action the Commission takes in this document also implements section 105 of the Communications Assistance for Law Enforcement Act (CALEA). That section requires every telecommunications carrier to ensure that any interception of communications or access to callidentifying information effected within its switching premises can be activated only pursuant to a lawful authorization and with the affirmative intervention of an officer or employee of the carrier. The Commission has concluded that all facilities-based providers of broadband internet access services and all providers of interconnected VoIP services are telecommunications carriers under CALEA. The Commission has interpreted ‘‘switching premises’’ consistent with the purpose of CALEA as including ‘‘routers, soft switches, and other equipment that may provide addressing and intelligence functions for packet-based communications to manage and direct the communications along to their intended destinations.’’ One of the dangers of allowing equipment from untrusted suppliers to be part of a network is the possibility that those suppliers will maintain the ability to illegally activate interceptions or other forms of surveillance within the carrier’s switching premises without its knowledge, whether through the insertion of malicious hardware or software implants, remote network access maintained by providers of managed services, or otherwise. Telecommunications carriers, including all ETCs, therefore appear to have a duty to avoid such risks. 14. The Commission disagrees with Huawei that its recognition of this duty is barred by section 103(b)(1) of CALEA, 47 U.S.C. 1002(b)(1). The rule the Commission adopts in this document addresses only the use of USF funds and does not prohibit the ‘‘adoption of any equipment.’’ Furthermore, the Commission is not a ‘‘law enforcement agency’’ within the meaning of section 103(b)(1); in the context of CALEA, that term refers to agencies that conduct interceptions and access to callidentifying information. 15. The Commission is authorized to ‘‘prescribe such rules as are necessary to implement the requirements of’’ CALEA and specifically to require carriers to PO 00000 Frm 00026 Fmt 4700 Sfmt 4700 establish policies and procedures to prevent unauthorized surveillance. Though the rule the Commission adopts in this document applies only to ETCs’ use of USF funds, it disagrees with Huawei’s argument that the link between this obligation and the prohibition the Commission adopts here is ‘‘remote.’’ The rule the Commission adopts in this document directly implements section 105 of CALEA by reducing the likelihood that ETCs use USF funds to facilitate unauthorized surveillance. Nor does the rule require, as Huawei suggests, that the Commission interprets section 105 ‘‘as prohibiting carriers from using any equipment that has any possibility, no matter how remote, of being subject to unauthorized access for purposes of intercepting communications.’’ But use of equipment or services from companies that pose national security threats is far more likely to be subject to such unauthorized access, and the Commission chooses here not to allow USF funds to support such use. 16. The Commission further disagrees with Huawei’s contention that CALEA’s security provision does not apply to attempts by actors other than U.S. law enforcement to intercept or access communications. The plain language of section 105 specifies not only the activation of the assistance capabilities required by section 103 but any interception or access effected within a carrier’s switching premises. This understanding of the plain language is consistent with its legislative history. The bills reported by the House and Senate Judiciary Committees used different language limiting the security obligation only to ‘‘any court ordered or lawfully authorized interception of communications or access to callidentifying information within its switching premises,’’ but that language was revised in consultation with the House Energy and Commerce Committee in the version of the bill ultimately considered and adopted on the floor of both Houses. The Commission considers the change to be purposeful and to reflect Congress’s understanding of CALEA as enacting protections against unauthorized surveillance, not only as ensuring the ability of law enforcement to conduct authorized surveillance. 17. Congress has also determined, in section 889 of the National Defense Authorization Act for Fiscal Year 2019 (2019 NDAA), that the expenditure of loan or grant funds by federal agencies to procure or obtain covered telecommunications equipment or services is contrary to the security interests of the United States. Although E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations the USF is neither a loan program nor a grant program, it is a significant source of funds administered by the Commission and intended for the purchase of equipment, services, or systems with which section 889 is concerned. The Commission finds that the goals underlying section 889 of the 2019 NDAA also support its decision to take action here. Following enactment of the 2019 NDAA, the WCB sought comment on the relevance of section 889(b)(1) to the proceeding. The record now persuades the Commission that adoption of a rule that prohibits universal service funds from being used to obtain equipment or services produced or provided by companies that pose a threat to national security, and the Commission’s initial designation of Huawei and ZTE as such companies, is consistent with section 889 of the 2019 NDAA. The Commission agrees with TIA that section 889 ‘‘codifies a determination by Congress regarding five specific suppliers of concern,’’ including Huawei and ZTE, and expresses a view that ‘‘the role of the Commission and other executive agencies is to prevent the use of federal funds under their control on equipment and services from [those] suppliers of concern.’’ 18. The Commission establishes a process for designating entities as national security threats for purposes of its rule. The Commission first defines ‘‘covered company’’ to include subsidiaries, parents and affiliates of covered companies for purposes of the rule it adopts in this document. In the Protecting Against National Security Threats Notice, the Commission sought comment on whether a covered company’s subsidiaries, parents, and/or affiliates should be treated as a covered company as well and sought comment on how to define such entities. Because equipment from subsidiaries, parents, and affiliates pose the same risks to network integrity as equipment directly from the covered company, the Commission includes any subsidiary, parent, or affiliate of a covered company as a covered company subject to its prohibition. 19. When the Commission initially determines, either sua sponte or in response to a petition from an outside party, that a company poses a national security threat to the integrity of communications networks or the communications supply chain, the Commission will issue a public notice advising that such initial designation has been made, as well as the basis for such designation. This public notice shall serve as an ‘‘initial designation’’ of a covered company. Upon the issuance VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 of such notice, interested parties may file comments responding to the initial designation, including proffering an opposition to the initial designation. If the initial designation is unopposed, the entity shall be deemed to pose a national security threat 31 days after the issuance of the notice. If any party opposes the initial designation, the designation shall take effect only if the Commission determines that the affected entity should nevertheless be designated as a covered company under the Commission’s rule. In either case, the Commission shall issue a second public notice announcing its final designation and the effective date of that final designation. This public notice shall serve as the ‘‘final designation’’ of a covered company. In order to provide regulatory certainty to entities affected by initial designations, the Commission shall make a final designation effective no later than 120 days after release of its initial designation notice. The Commission may, however, extend such 120-day deadline for good cause. 20. In formulating its initial and final designations, the Commission will use all available evidence to determine whether an entity poses a national security threat. Examples of such evidence may include, but are not limited to: determinations by the Commission, Congress or the President that an entity poses a national security threat; determinations by other executive agencies that an entity poses a national security threat; and, any other available evidence, whether open source or classified, that an entity poses a national security threat. Where appropriate, the Commission will seek to harmonize its determinations with the determinations of other federal agencies in the Executive branch and determinations of the Legislative branch. The Commission will base its determination on the totality of evidence surrounding the affected entity and should consider any evidence provided by the affected entity, or any other interested party, in making its final determination. However, classified information will not be made public, nor will it be made available to the designated company. 21. Reversal of Designation. The Commission will act to reverse its designation upon a finding that a covered company no longer poses a national security threat to the integrity of communications networks or the communications supply chain. A covered company, or any other interested party, may submit a petition asking the Commission to remove a designation based on a showing of changed circumstances. The PO 00000 Frm 00027 Fmt 4700 Sfmt 4700 233 Commission shall seek the input of Executive Branch agencies and the public upon receipt of such a petition. If the record shows that a covered company is no longer a national security threat, the Commission shall promptly issue an order reversing its designation of that company. The Commission may dismiss repetitive or frivolous petitions for reversal of a designation without notice and comment—and may dismiss petitions that make no showing of changed circumstances or attempt to evade the limits the Commission’s rules place on petitions for reconsideration or applications for review. If the Commission reverses its designation, it shall issue an order announcing its decision along with the basis for its decision. 22. In the Protecting Against National Security Threats Notice, the Commission highlighted the longstanding concerns about the threats posed by Huawei and ZTE, including by other Executive Branch agencies and Congress. Both companies, as well as their subsidiaries and affiliates, are restricted from selling certain equipment and services to federal agencies due to Congressional and Executive Branch concern about the threat their equipment and services pose to the communications supply chain. Huawei vigorously responded to these allegations in the record of the proceeding, and ZTE did not make any filings in the proceeding. The Commission’s examination of the record re-affirms the concerns raised by them in the Protecting Against National Security Threats Notice, and the Commission therefore takes the step of initially designating Huawei and ZTE as covered companies for purposes of the prohibition the Commission adopts in this document. 23. The Commission concludes that publicly available information in the record is sufficient to support these designations. In addition, the Commission has compiled and reviewed additional classified national security information that provides further support for its determinations. 24. The Commission agrees with commenters who argue that ‘‘state actors, most notably China and Russia, have supported extensive and damaging cyberespionage efforts in the United States,’’ and there exists a ‘‘substantial body of evidence’’ about the risks of certain equipment providers like Huawei and ZTE. International experts have found that China has a ‘‘notorious reputation for persistent industrial espionage, and in particular for the close collaboration between government and Chinese industry.’’ Allies of the E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 234 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations United States have discovered numerous instances where the Chinese government has engaged in malicious acts, including ‘‘actors likely associated with the . . . Ministry of State Security . . . responsible for the compromise of several Managed Service Providers.’’ And as noted in the 2012 HPSCI Report, Huawei and ZTE are the ‘‘two largest Chinese-founded, Chinese-owned telecommunications companies seeking to market critical network equipment to the United States.’’ 25. These two companies pose a great security risk because Chinese intelligence agencies have opportunities to tamper with their products in both the design and manufacturing processes. The 2012 HPSCI Report observed that the risks posed by companies such as Huawei are further exacerbated because the company offers services managing telecommunications equipment and its ‘‘authorized access’’ could be exploited ‘‘for malicious activity under the guise of legitimate assistance.’’ This legislative concern has continued, with Congress passing, and the President signing into law, significant restrictions on the purchase of equipment and services from Huawei and ZTE. And, in the proceeding, the Attorney General has agreed that ‘‘a company’s ties to a foreign government and willingness to take direction from it bear on its reliability’’ for building or servicing telecommunications networks with the support of federal funds. As explained in the following, the Commission believes that Huawei and ZTE pose a unique threat to the security of communications networks and the communications supply chain because of their size, their close ties to the Chinese government both as a function of Chinese law and as a matter of fact, the security flaws in their equipment, and the unique end-to-end nature of Huawei’s service agreements that allow it key access to exploit for malicious purposes. As a consequence, the Commission’s primary focus is on Huawei and ZTE. 26. The Commission notes, at the outset, that the Chinese government is highly centralized and exercises strong control over commercial entities, permitting the government, including state intelligence agencies, to demand that private communications sector entities cooperate with any governmental requests, which could involve revealing customer information, including network traffic information. The Department of Justice says that the Chinese government ‘‘has subsidized [its] firms to lock up as much of the market as possible,’’ which ‘‘threatens to thwart the emergence of fair VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 competition and lead to irreversible market dominance that will force all of us onto Chinese systems, causing unmitigable harm to our national security.’’ According to Article 7 of the Chinese National Intelligence Law (NIL), all ‘‘organizations and citizens shall, according to the law, provide support and assistance to and cooperate with the State intelligence work, and keep secret the State intelligence work that they know.’’ Article 14 permits Chinese intelligence institutions to request that Chinese citizens and organizations provide necessary support, assistance, and cooperation. Article 17 allows Chinese intelligence agencies to take control of an organization’s facilities, including communications equipment. The Chinese NIL is extremely broad, applying to Chinese citizens residing outside of China. Article 11 specifies that the law’s powers are not limited to Chinese soil, which would permit Chinese government elements to compel Huawei and ZTE to carry out their directives within the United States’ national boundaries. Further, Article 28 of the NIL allows personnel to be punished for violating the Chinese NIL. This broad authority to compel support and assistance to Chinese intelligence agencies is particularly troublesome, given the Chinese government’s involvement in computer intrusions and attacks as well as economic espionage. As a consequence, the Commission’s primary focus in the Report and Order is on Huawei and ZTE. 27. The Commission initially designates Huawei, along with its parents, affiliates, and subsidiaries, as a covered company for purposes of the Commission’s rule. 28. The Commission finds that Huawei’s ties to the Chinese government and military apparatus, along with Chinese laws obligating them to cooperate with any request by the Chinese government to use or access their system, pose a threat to the security of communications networks and the communications supply chain. Congress and the Executive Branch have repeatedly expressed concerns regarding Huawei, its ties to the Chinese government, and its equipment. In addition to reports recommending that government agencies, federal contractors, and private-sector entities consider excluding Huawei and ZTE equipment from their networks due to long-term security risks and the companies’ close ties to the Chinese government, Congress has also taken action to limit the purchase of certain Huawei and ZTE equipment and services for federally funded networks. PO 00000 Frm 00028 Fmt 4700 Sfmt 4700 Additionally, the Department of Commerce has added Huawei to its Entity List, which ‘‘identifies entities for which there is reasonable cause to believe, based on specific and articulable facts, have been involved, are involved, or pose a significant risk of being or becoming involved in activities contrary to the national security or foreign policy interests of the United States.’’ These concerns center around Huawei’s established relationship with the Chinese government as well as Huawei’s obligation under Chinese law to cooperate with requests by the Chinese government for access to their system. 29. Although Huawei argues that its affiliates in the United States are not subject to state security laws, the Commission is not persuaded to excuse these affiliates from the scope of the Commission’s prohibition. One expert has noted that the nature of the Chinese system ‘‘recognizes no limits to government power.’’ Irrespective of their physical location, these affiliates still remain subject to Chinese law. 30. As the House Permanent Select Committee on Intelligence found, ‘‘the Chinese government and the Chinese Communist Party . . . can exert influence over the corporate boards and management of private sector companies, either formally through personnel choices, or in more subtle ways.’’ For example, Huawei’s founder, Ren Zhengfei, is himself believed to be a former director of the People’s Liberation Army Information Engineering Academy, an organization associated with China’s signals intelligence. Ren Zhengfei exercises ‘‘ultimate veto authority over the company’s material decisions.’’ Additionally, the Chinese government maintains an internal Communist Party Committee within Huawei that can exert additional influence on the company’s operations and decisions. The House Permanent Select Committee on Intelligence also received internal Huawei documentation from former Huawei employees ‘‘showing that Huawei provides special network services to an entity the employee believes to be an elite cyber-warfare unit within the PLA.’’ 31. Moreover, analysts have found that while ‘‘Huawei claims the Chinese state has no influence over its activities, . . . the company is treated as a stateowned enterprise and has benefited from state procurement funds, subsidized financing from state-owned policy banks and state funding for research.’’ Huawei is reported to benefit from vast subsidies from the Chinese government, to include state-controlled E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations financial organizations. One study ‘‘identified 32 cases since 2012 where Huawei projects were funded by Exim Bank of China ($2.8 billion) or China Development Bank ($7 billion).’’ In 1998, it was reported that China Construction Bank provided over $470 million in lines of credit to foreign companies as incentive to purchase Huawei products. This initiative accounted for over 45% of the bank’s annual extension of credit. While Huawei has refused to answer questions about its ownership and governance, it can be inferred that the Chinese government clearly has a vested interest in the company’s success. 32. The Commission’s actions in this document are also informed by the actions of other agencies and branches of the government, along with the increasing caution urged by our nation’s intelligence officials. For example, in February 2018, the leaders of all six top U.S. intelligence agencies warned against purchasing products or services from Huawei or ZTE with FBI Director Chris Wray saying, ‘‘the Commission is deeply concerned about the risks of allowing any company or entity that is beholden to foreign governments that don’t share the Commission’s values to gain positions of power inside our telecommunications networks that provides the capacity to exert pressure or control over the Commission’s telecommunications infrastructure.’’ The Department of Justice (DoJ) has also stated its ‘‘strong[] support’’ for the Commission’s action in this document, noting that it is pursuing numerous criminal charges against Huawei for violations of federal law and ‘‘a willingness to break U.S. law combined with a determination to avoid the consequences by obstructing justice argues against the reliability of the provider.’’ 33. In initially designating Huawei as a covered company, the Commission also relies on similar assessments by other countries. For example, on October 9, 2019, the European Union, with the support of the European Commission and the European Union Agency for Cybersecurity, released its risk assessment on 5G Security, specifically finding a high security risk where hostile countries exercise pressure on suppliers to facilitate cyberattacks serving their national interests. Many of our allies, including Australia, New Zealand, and Japan, have taken steps to exclude Huawei equipment from their networks. While Huawei argues that its equipment is used in other countries without undermining any nation’s security, several of the United States’ closest VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 allies have concluded that the risk posed by Huawei equipment and systems is too great to bear. In November 2018, New Zealand’s intelligence agency barred its largest telecommunications carrier, Sparc, from using Huawei equipment. Likewise, in December 2018, Japan excluded Huawei from its domestic communications infrastructure. Additionally, in August 2019, the Australian government announced a ban on Huawei equipment. The Commission also notes that communications service providers in other countries, including BT, Orange, and Deutsche Telekom, are acting to keep Huawei equipment out of their 5G networks. 34. Moreover, the Commission is confident that the national security risk to our communications network from permitting Huawei equipment and services is significant. For example, in 2019, Finite State, a cybersecurity firm, issued a report describing the unique threat posed by Huawei’s ‘‘high number’’ of security vulnerabilities. The report found that over half of the Huawei firmware images analyzed had at least one potential backdoor that could allow an attacker with knowledge of the firmware to log into the device, and that Huawei continues to make firmware updates without addressing these vulnerabilities. Finite State articulates the concern that suppliers of technology, such as Huawei, with ‘‘secret or overt access to the infrastructure they are providing,’’ could use that access ‘‘in times of peace, or perhaps [for] something far more ominous in times of conflict.’’ 35. Also in 2019, the United Kingdom’s Huawei Cyber Security Evaluation Centre Oversight Board released a report that sounded the alarm about the risks associated with Huawei’s engineering processes. The report further revealed that Huawei had made no substantive gains in the remediation of issues reported in the previous year, noting that, ‘‘[a]t present, the Oversight Board has not yet seen anything to give it confidence in Huawei’s capacity to successfully complete the elements of its transformation program that it has proposed as a means of addressing these underlying defects.’’ Further, in a 2013 report, the Intelligence and Security Committee of the UK Parliament said, ‘‘theoretically, the Chinese State may be able to exploit any vulnerability in Huawei’s equipment in order to gain some access to the BT network, which would provide them with an attractive espionage opportunity.’’ 36. Furthermore, a recent report from Recorded Future, a cyber threat intelligence firm, found that ‘‘[t]he PO 00000 Frm 00029 Fmt 4700 Sfmt 4700 235 enormous range of products and services offered by Huawei generates a nearly unimaginable amount of data for one company to possess.’’ This problem is compounded by Huawei’s ‘‘desire to be an end-to-end provider for whole network solutions.’’ As the 2012 HPSCI Report found, when companies ‘‘seek to control the market for sensitive equipment and infrastructure that could be used for spying and other malicious purposes, the lack of market diversity becomes a national concern for the United States and other countries.’’ Huawei’s desire to limit diversity in equipment poses a threat to the security of U.S. communications networks. Its access to this vast amount of data combined with its close ties to the Chinese government and its obligation under Chinese law to assist with Chinese intelligence-gathering mean that ‘‘Huawei is potentially subjected to a government-driven obligation to capitalize on its global network and consumer devices ecosystem to fulfill core [Chinese government] national security and economic dominance objectives.’’ Given the multitude of evidence about the threat that Huawei equipment presents, along with the company’s unique and close relationship to the Chinese government, the Commission disagrees with Huawei’s claim that there is no support for the conclusion that its equipment poses a threat. The fact that Huawei’s subsidiaries act outside of China does not mean that their parent company lacks influence over their operations and decisions given the strong influence that Huawei’s parent companies and the Chinese government can exert over their affiliates. The Commission additionally disagrees with Huawei’s assertion that the Chinese NIL is irrelevant because it is merely a ‘‘defensive measure’’ that does not ‘‘provide authority for Chinese intelligence agencies to engage in offensive intelligence activities.’’ The broad nature of the Chinese NIL, along with the Chinese government’s control over Huawei and history of espionage activities, presents far too great a risk to the security of U.S. communications networks to rely on the assurance that the Chinese government will act only in a vaguely-defined ‘‘defensive’’ manner. While the Commission recognizes that the Chinese NIL may be interpreted in different ways, the fact remains that entities such as Huawei that are subject to the NIL, and subject to the Chinese legal regime generally, pose too great a risk to the security of communications networks and the communications supply chain. E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 236 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations 37. The Commission also disagrees with Huawei’s criticisms of the Finite State report. Huawei argues that the Finite State report focused on old versions of Huawei’s equipment and did not follow ‘‘general practices’’ of security testing, which it argues, ‘‘typically involves dialogue between the security company and vendor’’ about vulnerabilities. However, unlike a report that assesses a zero-day threat and would typically include dialogue with the vendor to provide time to mitigate the threat, Finite State’s report was a general risk analysis report and was focused primarily on the culture of risk management at Huawei. In response to Huawei’s public criticisms of its report, Finite State determined that, ‘‘Based on 8 years of analysis of [UK Huawei Cyber Security Evaluation Centre] reports, along with the recent Finite States analysis, the Commission can clearly see that Huawei’s security posture has not materially improved over time.’’ Indeed, the Commission agrees with Finite State that ‘‘Huawei cannot deny that, now, multiple organizations have independently found similar, substantial security vulnerabilities in their products.’’ 38. In the light of the record in the proceeding and other publicly available information detailing the scope of the risk of allowing Huawei’s equipment and services into our communications networks, and given that the Chinese government has the ‘‘means, opportunity, and motive to use telecommunications companies for malicious purposes,’’ the Commission concludes that Huawei, its parents, affiliates, and subsidiaries should be initially designated as a national security threat to the integrity of communications networks or the communications supply chain for purposes of the rule the Commission adopts in this document. 39. The Commission also initially designates ZTE, its parents, affiliates, and subsidiaries as a covered company for purposes of the Commission’s rule. 40. As with Huawei, ZTE has close ties to the Chinese military apparatus, having originated from the Ministry of Aerospace, a government agency. In fact, ZTE is still alleged to be partially owned by the Chinese government. As the House Permanent Select Committee on Intelligence found, ZTE is in essence, ‘‘a hybrid serving both commercial and military needs.’’ In particular, much of ZTE’s ownership constitutes state owned enterprises, and, like Huawei, ZTE contains an internal Communist Party Committee, as required by the laws of China. The House Permanent Select Committee on Intelligence also VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 found that ZTE has not allayed the Committee’s concerns that it ‘‘is aligned with Chinese military and intelligence activities or research institutes.’’ As described in this document, legislative concern with ZTE equipment and services has been ongoing, with Congress passing, and the President signing into law, significant restrictions on the purchase and use of ZTE equipment. 41. Open source information highlights the risks posed by ZTE equipment. In April 2018, the Department of Defense announced that ZTE and Huawei devices would no longer be offered for sale at U.S. military bases and ordered them removed from its stores worldwide. In August 2018, a report funded by the Department of Homeland Security’s Science and Technology Directorate found a wide range of vulnerabilities in a number of mobile devices manufactured and marketed by ZTE. The report indicated that the vulnerabilities are built into the phones during the manufacturing process and could allow malicious access to user data. While the USF generally does not fund end-user devices such as phones, the security concerns raised regarding ZTE mobile phones give the Commission concerns about other ZTE equipment and services, including those funded by the USF. The National Security Institute published a report in January 2019 that describes the underlying risks posed by both Huawei and ZTE systems and recommends ‘‘additional restrictions on Huawei and ZTE products and services in the U.S.’’ As with Huawei, ZTE’s equipment has been barred in Australia and New Zealand. 42. Finally, the DoJ, in supporting the Commission’s initial designations of Huawei and ZTE, has noted that ZTE pleaded guilty to violating our embargo on Iran by sending approximately $32 million dollars’ worth of U.S. goods to Iran and obstructing justice in an effort to thwart DoJ’s investigation. Such disregard for American law in furtherance of the interests of foreign governments is additional evidence of the danger posed by Huawei and ZTE equipment in our communications networks. 43. Given that the Chinese government has the ‘‘means, opportunity, and motive to use telecommunications companies for malicious purposes,’’ the Commission concludes that ZTE Corporation, its parents, affiliates, and subsidiaries should be initially designated as a national security threat to the integrity of communications networks or the communications supply chain for PO 00000 Frm 00030 Fmt 4700 Sfmt 4700 purposes of the rule the Commission adopts in this document. 44. The Commission directs the Public Safety and Homeland Security Bureau (PSHSB) to implement the next steps in the designation processes for Huawei and ZTE. The Commission also directs PSHSB going forward to make both initial and final designations, to reverse prior designations, and to issue the public notices required in the designation process. PSHSB shall have discretion to revise this process if appropriate to the circumstances, consistent with providing affected parties an opportunity to respond and with any need to act expeditiously in individual cases. To the extent that a designated entity seeks review of a designation decision—from either PSHSB or the full Commission—PSHSB or the Commission shall act on such petition for reconsideration or application for review, respectively, within 120 days of the filing by a designated entity. The Commission finds that this time limitation is important to provide regulatory certainty to entities affected by designations made at the Commission or bureau level, and consistent with the national security interests at stake. The Commission or PSHSB may, however, extend such 120-day deadline for good cause. 45. Huawei and ZTE. The designations adopted herein for Huawei and ZTE shall serve as initial designations. Interested parties may file comments responding to these initial designations. Such comments are due 30 days after publication of the Report and Order in the Federal Register. After the conclusion of the comment period, PSHSB shall issue a public notice announcing its final determination and the effective date of any final designation. 46. The Commission next establishes the scope of the new prohibition. The rule the Commission adopts in the Report and Order shall apply to any and all equipment or services, including software, produced or provided by a covered company. USF recipients must be able to affirmatively demonstrate that they have not used any funds obtained via the USF to purchase, obtain, maintain, improve, modify, or otherwise support any equipment or services provided or manufactured by a covered company. 47. The Commission finds it necessary to establish this broad prohibition on the use of USF funds to procure or otherwise support any and all equipment and services produced or provided by a covered company. Although some commenters argue that a E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations prohibition precluding the expenditure of USF funds on every product from a covered company would not advance any material security purpose, and that such a restriction would be overbroad with potentially negative repercussions for U.S. industry, both domestically and overseas, the Commission believes that a blanket prohibition best promotes national security, provides the most administrable rule, and eases compliance for USF recipients. Given the dynamic and wide-ranging nature of the potential threats to our networks, and the Commission’s specific responsibility to protect against threats posed by USF-funded equipment and services, the Commission finds a complete prohibition on the expenditure of USF funds on any and all equipment and services from a covered company to be the only reliable protection against potential incursions. The Commission recognizes that a complete prohibition may impose attendant costs on providers, who must ensure that equipment or services obtained using USF funds do not use equipment or services produced or provided by a covered company, and the rural consumers served by these providers. However, the Commission finds that these costs are outweighed by the need to ensure that the services funded by USF are secure and by the benefits to our national security and the nation’s communications networks. 48. Malware and vulnerabilities can be designed and built directly into communications equipment, even when that equipment is not the covered company’s flagship equipment. Thus, these vulnerabilities can often be difficult to discover. Moreover, the transition to emerging next-generation networks and the accelerated adoption of virtualized distributed network infrastructure increases the number of attack points in the network and makes networks more susceptible to attacks and unauthorized intrusions. Given the increased risk that allowing any equipment from a covered company on the network can cause significant harm, the Commission cannot allow for bad actors to circumvent the Commission’s prohibitions through clever engineering. 49. The Commission further finds that a complete prohibition on the expenditure of USF funds for all equipment and services produced or provided by a covered company will provide regulatory certainty and will be easier for providers to implement and for the Commission to enforce. The Commission agrees with Vermont Telephone, which argues that the Commission’s rule ‘‘would eliminate uncertainty and reduce regulatory VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 burdens that fall most heavily on small operators,’’ and that adopting the Commission’s rule would ‘‘level the competitive playing field by creating incentives for operators to secure their networks rather than opting to deploy lower-cost Chinese manufactured equipment.’’ The Commission’s decision to adopt a complete prohibition rather than a narrow one will greatly reduce administrative costs for both providers and consumers as it would be time consuming and costly to require determinations on a product-byproduct basis as to whether any given equipment is subject to the prohibition. Relatedly, it will be simpler for participants, and thus more cost effective, to comply with a blanket ban on the use of USF funds on any and all equipment and services produced or provided by covered entities. Compliance costs will also be reduced because providers will more easily be able to certify that their subsidiaries and affiliates have not used USF funds to purchase, obtain, maintain, improve, modify, or otherwise support any equipment of a covered company. It would be far more difficult, costly, and invasive for the Commission to obligate providers to verify this same commitment on a product-by-product or even component-by-component basis. By the same token, it will be far simpler and more cost-effective for Universal Service Administrative Company (USAC) to audit and verify any such certification based on a blanket ban rather than a more selective product-byproduct prohibition. 50. The Commission is not persuaded that uncertainty in the purchasing process dictates a narrower prohibition. Some commenters argue that it is difficult to know from which companies they are purchasing equipment and that a blanket prohibition within the USF is therefore unreasonable. They claim this difficulty is especially apparent in instances of ‘‘white labeling,’’ where a covered company provides equipment or services to a third-party entity for sale under that third party’s brand and the purchaser may not know the covered company’s equipment is part of the purchased product. Although the Commission understands the complications inherent in the purchasing process, it believes it is the responsibility of all USF recipients to work with their suppliers to understand what equipment and services they are purchasing and to ensure that such equipment and services are not produced or provided by a covered company. Indeed, were the Commission to find white labeling as outside the PO 00000 Frm 00031 Fmt 4700 Sfmt 4700 237 scope of its prohibition, it would create an obvious and transparent loophole for companies that pose a national to national security to sneak their equipment into our communications networks. 51. The Commission also makes clear that USF recipients may continue to use these federal funds to maintain, improve, modify, or otherwise support their communications networks generally so long as no such funding goes toward any equipment or services provided or manufactured by a covered company. For example, a USF recipient could use funding to maintain gaspowered generators or battery cells that provide back-up power to radio access network equipment, purchase backhaul facilities and interconnection services from third parties, upgrade and maintain switches and routers, and otherwise expend USF funds on equipment and services that support a provider’s network in whole or in part and are not solely used in the maintenance or support of covered equipment. In contrast, a USF recipient could not use federal funds to upgrade covered equipment, install software updates on such equipment, or pay for a maintenance contract to the extent that contract covers covered equipment—even when such upgrades, installations, and contracts are not directly offered by a covered company. Similarly, a USF recipient would not be permitted to use USF support to pay its internal staff to perform maintenance on any equipment or services produced or provided by a covered company. Such expenditures would be directly and solely targeted at supporting equipment that poses a national security threat to our communications networks and allowing such expenditures to be paid for with federal funds would counter the Commission’s goal of securing American communications networks and incentivizing the replacement of such equipment with equipment from trusted vendors. 52. The Commission notes that its rule does not prohibit USF recipients from using their own funds to purchase or obtain equipment or services from covered companies, but USF recipients must be able to clearly demonstrate that no USF funds were used to purchase, obtain, maintain, improve, modify, or otherwise support any equipment or services produced or provided by a covered entity. But the Commission cautions USF recipients that choose to install new equipment or purchase new services from covered companies. Where a project involves the purchase of such equipment, the Commission believes it unlikely that many USF E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 238 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations recipients will be able to show the detailed records necessary to demonstrate that no USF funds were used on equipment or services from a covered company on any part of that project. For example, if a USF recipient tried to install a new cellular radio base station from a company that has been designated as a national security threat, all labor and other expenditures for that installation are part and parcel of installing an insecure network. The Commission is thus skeptical that any USF recipient seeking to use USF funds on an ‘‘eligible’’ portion of such a project would will be able to establish with the necessary certainty, even with a detailed recordkeeping process in place, that no part of the installation process, including the base station and any and all related expenditures, are paid for using USF funds. However, the Commission does not entirely foreclose the possibility that a USF recipient might be able to segregate the use of federal funds from other funds for the completion of a particular project, and the Commission reminds recipients that such expenditures will be subject to the audit and enforcement mechanisms described herein. 53. The Commission agrees with commenters who suggest a whole-ofgovernment approach to supply chain security. The Commission’s oversight of the USF requires them to act so that USF funds are not used in a manner that undermines the security of communications networks. In addition, the Commission has a responsibility to act in order to support the ongoing efforts of the federal government to protect communications networks and the communications supply chain from security threats. The prohibition the Commission adopts in this document applies only to equipment and services in the context of the USF, so the Commission believes this limited application of the prohibition will advance the interests of network security and will provide necessary certainty to affected USF participants. In short, the Commission’s actions in the Report and Order are a vital part of that approach and will complement the activities of other federal agencies and Congress. 54. The Commission disagrees with RWA, which contends that the prohibition it adopts in this document should extend only to ‘‘additional equipment’’ and ‘‘new services’’ not yet procured and deployed; such a distinction would do nothing to address the threat posed by existing equipment. If anything, it would magnify this risk by enabling providers to continue to use USF support to maintain, improve, VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 modify, operate, manage, renew, or otherwise support such equipment. Restricting the prohibition the Commission adopts in this document to apply only to equipment that has not yet been purchased would not only undercut the purpose behind this proscription, but could actively increase the risks posed by existing equipment. 55. The Commission acknowledges the concerns of some commenters who contend that ‘‘rural co-ops and closely held companies are massively restricted in their financial operations’’ and argue that USF support is ‘‘often critical’’ in order to maintain the operational viability of their networks. While this may be true in the case of some rural carriers, the Commission is unwilling to allow USF dollars to be used in support of equipment and services that pose a direct and immediate threat to our national security and the security of our networks. To do so would place our communications networks and supply chains as a whole at risk. No provider has yet offered the detailed financial records that would be necessary for the Commission to determine whether an individual provider actually could not maintain its existing network without violating its rule—and the Commission reminds providers that they remain free to seek a waiver of this prohibition in the exceptional case where they would be unable to operate their networks absent the use of USF funds to maintain or otherwise support equipment or services produced or provided by covered companies. 56. While the rule the Commission adopts in this document will not, in and of itself, completely address the risks posed by equipment or services produced or provided by covered companies, that is no reason not to adopt the rule, as RWA appears to argue. As the Commission has already stated, the targeted rule it adopts in this document is part of the Commission’s continuing efforts to protect the nation’s communications networks and supply chain from potential security threats. These efforts are, by their very nature, ongoing and incremental. The Commission’s is a specific but nevertheless important role in securing the communications supply chain and our nation’s communications infrastructure. 57. Upgrades to Existing Equipment. The Commission next clarifies that the prohibition will apply to upgrades and maintenance of existing equipment and services. As explained in this document, this restriction includes a prohibition on using USF funds to pay third parties or a carrier’s own employees to maintain or repair equipment from covered PO 00000 Frm 00032 Fmt 4700 Sfmt 4700 services. Costs for such services must be paid with non-USF funds. The rule the Commission adopts in this document prohibits USF recipients from using USF funds to purchase, obtain, maintain, improve, modify, or otherwise support equipment or services provided or produced by covered companies in addition to purchasing such equipment or services. The Commission specifically extends this prohibition to include upgrades to existing equipment and services. Several commenters have argued that upgrades to existing equipment should be exempt from the Commission’s rule, claiming any prohibition on the use of USF funds to support upgrades to existing equipment would ‘‘effectively mandate replacement of those products before the end of their life-cycle or force companies receiving USF monies to run outdated or inadequately maintained equipment.’’ Others argue that such upgrades should be exempted because they are necessary to preserve equipment functionality, performance, and security. 58. The Commission recognizes that this rule may encourage some providers to choose not to upgrade equipment and instead to replace these products prior to the end of their life-cycle, or risk running outdated and inadequately maintained equipment. The Commission notes that such upgrades are in fact in the public interest because they would increase the security of our communications networks. Indeed, the Commission finds the risk posed by covered companies’ products is too great to continue to allow federal funds to be used to purchase, obtain, maintain, improve, modify, or otherwise support them. To do so would allow these funds to be used to perpetuate existing security risks to the communications supply chain and the communications networks of this country. Further, the Commission is not restricting USF recipients from performing needed upgrades or maintenance to equipment procured from a covered company so long as they do not use USF funds to do so. Although the Commission may have concerns, it acknowledges that providers may continue to use and improve such equipment consistent with all other legal requirements, but they may not perform such maintenance or upgrades using USF funds. Affected carriers may of course file a request for waiver if they are manifestly unable to maintain their networks absent the use of USF funds to support equipment or services produced or provided by covered companies, and such failure poses a risk to public safety. The E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations Commission evaluates waivers on a factspecific basis. 59. Compliance Certifications. The Commission agrees with commenters who argue that the Commission should require recipients of universal service support to provide a certification that they have complied with the rule it adopts in this document. The Commission does not, at this time, require manufacturers to submit separate certifications, although USF recipients may require such certifications from manufacturers as part of their own contracts. The Commission directs WCB, in coordination with USAC, to revise the relevant information collections for each of the four USF programs to require a certification attesting to compliance with the rule adopted in this document. Given the variety of ways that USF participants file and certify to rule compliance, the Commission finds that directing WCB to develop such a certification for each respective program is the best means by which to implement this new certification requirement. 60. Audits and Recovery of Funds. The Commission believes that USAC audits are the most effective way to determine compliance with the requirements of the Report and Order, and the Commission directs USAC to implement audit procedures for each program consistent with the rules it adopts in this document. USF recipients must be able to affirmatively demonstrate that no universal service funds were used to purchase, obtain, maintain, improve, modify, or otherwise support any equipment or services provided or manufactured by covered companies. The Commission notes that applicants in the E-rate and Rural Health Care programs already retain and provide information either during the application process or during audit and program integrity assurance processes that could demonstrate (if verified) that no USF funds were improperly used. And the Commission notes that many ETCs receiving High Cost funding now report the projects they complete using federal funds to the High Cost Universal Broadband portal, allowing relatively swift verification by USAC of compliance. If USAC knows the specific locations where federal funds were used to build communications networks, it can verify what equipment and services are used at those locations and audit that usage if necessary. To the extent that other ETCs do not yet report information to USAC that would verify compliance, the Commission directs WCB and USAC to revise its information collection and audit VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 procedures to ensure the reporting of USF expenditures in a manner that will allow efficient oversight and thorough compliance. 61. Some commenters have argued that, for purposes of the E-Rate and Rural Health Care programs, service providers are in the best position to prevent violations of the rule and, as a result, should be the party responsible for recovery in cases where funds have been disbursed in violation of the rule. The Commission sees no reason to depart from the requirement that directs USAC to pursue recovery actions against the party or parties that committed the rule or statutory violation in question, recognizing that, in some instances, this could be the applicant school, library, health care provider, or consortium, rather than the service provider. The determination of which entity to seek recovery from is a factual determination based on the specific facts of the violation, and the Commission sees no need to establish a rule requiring recovery only from service providers. 62. Waivers. The Commission agrees with commenters who support a meaningful waiver process. As with any Commission rule, USF recipients may seek waivers of the rule the Commission establishes in this document. The Commission disagrees with commenters who suggest that it imposes a 90-day shot clock for resolution of such waivers. Commenters have provided no persuasive argument supporting the establishment of an arbitrary deadline for resolution of waiver requests and the Commission similarly refrains from establishing any specialized waiver requirements for the rule adopted in this document. 63. Because of the compelling interest in protecting our national security, the Commission concludes that the rule it adopts in this document should take effect immediately upon publication in the Federal Register. For purposes of the Lifeline and High-Cost Support Programs, any prohibition on the use of USF funds will take effect immediately upon publication of the effective date contained in the Final Designation Notice designating an entity as a covered company posing a national security threat. A requirement that USF recipients certify that they are in compliance with the Commission’s rule will take effect following revision of each information collection as described in this document, including approval by the Office of Management and Budget under the Paperwork Reduction Act. 64. In the April 2018 Protecting Against National Security Threats Notice, the Commission made clear that PO 00000 Frm 00033 Fmt 4700 Sfmt 4700 239 its proposed rule would apply only prospectively. The Commission sought comment on how long USF recipients would need to comply with the rule and whether it should consider phasing in the rule for certain programs or USF recipients. The Commission agrees with commenters who argue that the Commission should not delay the effective date of the rule. These commenters contend that service providers have long been aware of the security risks associated with certain vendors that may affect their ability to continue to receive federal funding, and thus many service providers have already made the business decision to purchase equipment from alternative vendors, precisely to avoid the security risks and the possible greater costs those risks might present in the long run. Given the important national security concerns at stake in the proceeding, the Commission believes it is critical that it moves forward expeditiously. Moreover, because many service providers have already made the business decision to purchase equipment from alternative vendors in order to avoid security risks, the Commission believes that the impact of an immediate effective date will be minimal. Given the industry’s longstanding knowledge of the risks posed by the installation and purchase of such equipment, the Commission does not believe that a phase-in period is necessary. Indeed, the important national security concerns at issue necessitate swift action. 65. Moreover, because the rule is prospective in effect, it does not prohibit the use of existing services or equipment already deployed or in use. USF recipients may continue to use equipment or services provided or produced by covered companies obtained prior to the issuance of the rule, but may not use USF funds to purchase, obtain, maintain, improve, modify, or otherwise support such equipment or services in any way. 66. The Commission next clarifies how its rule shall apply for E-Rate and Rural Health Care recipients. Specifically, unlike other USF recipients, E-Rate and Rural Health Care recipients apply for funding to cover specific services and equipment on coordinated basis, with funding tied to a particular funding year. To ensure prospective only effect, the rule the Commission adopts will apply to all funding years that start after the designation of a covered company (so the Commission would expect the rule prohibiting purchases from Huawei and ZTE that it initially designates in this document to apply for Funding Year 2020, starting July 1, 2020). This E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 240 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations provides a common administrative deadline for applicants and USAC and should allow sufficient time for E-Rate and Rural Health Care applicants to be trained to include service provider security compliance as a necessary factor in the selection of providers for the forthcoming funding year. The Commission notes that Funding Year 2020 for both programs begins July 1, 2020. The Commission believes that the decision strikes the best balance for promoting national security in a way that is practicable for E-Rate and Rural Health Care participants. For earlier funding years, the Commission directs USAC to process Operational Service Provider Identification Number (SPIN) changes and service substitutions to swap out non-compliant equipment for compliant equipment upon a showing that the equipment not yet installed would be prohibited under the Commission’s rule. 67. Existing Multiyear Contracts. The Commission finds that its rule extends to existing contracts to acquire equipment or services from any covered company that were negotiated and entered into prior to the final designation of that entity as a covered company. In other words, existing multiyear contracts to acquire equipment or services from a covered company will not be exempt from the rule. The Commission disagrees with commenters who favor such an exemption. Exempting existing multiyear contracts would negate the purpose behind the Commission’s rule and allow federal funds to be used to perpetuate existing security risks to communications networks and the communications supply chain. 68. Some commenters raise a number of constitutional challenges to the rule the Commission adopts in this document. They argue that the action adopted in this document, violates principles of due process, that it amounts to an unconstitutional bill of attainder, and that it amounts to a regulatory taking by denying carriers any economically productive use of their existing networks. The Commission finds these arguments unpersuasive. 69. Both carriers and suppliers argue that a national security condition on USF funding would violate their due process rights guaranteed by the Fifth Amendment. The Due Process Clause of the Fifth Amendment provides that ‘‘[n]o person shall be . . . deprived of life, liberty, or property, without due process of law.’’ These due process challenges, therefore, involve two questions: First, whether carriers or suppliers are deprived of a protected VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 interest in ‘‘property’’ or ‘‘liberty.’’ And second, if they are, whether the procedures employed by the Commission comport with principles of due process. The Commission concludes that the rule and its application, as adopted in this document and applied initially to Huawei and ZTE, do not violate the due process rights of USF recipients, of suppliers generally, or of Huawei and ZTE specifically. The Commission discusses these conclusions in the following. 70. Carriers’ Due Process Claims. CCA, on behalf of its carrier members, argues that the rule will violate the due process rights of carriers that rely on USF support in two ways. First, CCA asserts, the rule will interfere with carriers’ ‘‘long-standing investmentbacked reliance interests’’ in their telecommunications networks. Second, CCA claims that the rule ‘‘violates the due process rights of equipment, device and service providers, as well as the carriers who rely on them’’ by failing to provide ‘‘an opportunity to review the unclassified evidence on which the official actor relied.’’ Because this second argument primarily concerns the due process rights of suppliers and is also raised by them in more detail, the Commission addresses it—along with suppliers’ other concerns—in the following. 71. Regarding its first argument, CCA explains that many carriers have upgraded or are upgrading their networks to the newest available technologies, including by contracting with foreign suppliers who offer competitive pricing, in service of ‘‘the USF’s mandate to provide affordable telecommunications access to underserved communities.’’ Invoking FCC v. Fox Television Stations, CCA argues that these carriers ‘‘did not have fair notice of what would be forbidden,’’ and invoking General Motors Corp. v. Romein, CCA asserts that the proposed rule ‘‘unfairly interferes with carriers’ legitimate expectations without sufficient justification.’’ 72. In Romein, General Motors challenged the effect of a Michigan workers’ compensation statute that required it to retroactively pay workers’ compensation benefits. General Motors argued that the statute’s retroactive provisions ‘‘unreasonably interfered with closed transactions,’’ and thereby violated due process. Applying rational basis review, the Court rejected this challenge and found that the statute was a rational means of achieving a legitimate objective. Huawei similarly argues that the rule the Commission adopts in this document would violate PO 00000 Frm 00034 Fmt 4700 Sfmt 4700 the Administrative Procedure Act as a rule that has ‘‘unreasonable secondary retroactivity.’’ While the Commission acknowledges that the rule may have some retroactive effect, the Commission finds that any retroactive effect is reasonable in light of the goals of the Report and Order. Secondary retroactivity is reviewed under a reasonableness standard to determine whether or not it is arbitrary or capricious. The Commission notes that the rule and the initial designation of Huawei and ZTE as covered companies will not explicitly prevent Huawei from selling its products to any company. And as noted, the Commission concludes that multiyear contracts cannot be exempt from the rule, given that such an exemption would largely undermine the national security goals of the Report and Order. 73. At the outset, at least with respect to Huawei and ZTE, the Commission rejects the premise that carriers had a ‘‘legitimate expectation’’ of being able to continue to purchase products and services from them using USF funds and ‘‘did not have fair notice’’ that a rule like the one adopted in this document may be imposed. Mounting public concern about these entities was apparent at least as early as 2010, when a bipartisan group of lawmakers wrote a letter to the Chairman of the FCC, requesting information about the security of U.S. telecommunications networks in light of potential deals between U.S. carriers and Huawei and ZTE. 74. Moreover, CCA’s reliance on Fox Television is misplaced. That case addressed whether the FCC had violated the due process rights of two television networks by failing to give them fair notice that, in contrast to a prior FCC policy, a fleeting expletive or a fleeting shot of nudity could be actionably indecent. Here, by contrast, the Commission has issued a Notice and allowed interested parties to comment on the proposed rule, which will only be applied prospectively and does not require carriers to remove or stop using any already-purchased equipment or services. This situation is materially different than that presented in Fox Television, and at least one court has rejected an attempt to invoke Fox Television under similar circumstances, where parties were given notice and an opportunity to comment on the proposed rule. Finally, the Commission disagrees with CCA’s apparent assertion that it has not provided ‘‘sufficient justification’’ to satisfy the test for rational basis review articulated in General Motors. The government has a legitimate interest in safeguarding E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations national security, and the Commission’s rule is a rational means of furthering that interest. 75. Suppliers’ Due Process Claims. Some commenters—including Huawei—argue that due process requires that the rule offer suppliers designated as national security threats notice and a meaningful opportunity to respond to the evidence against them. Assuming that a designation could result in a deprivation of a cognizable liberty or property interest, an argument which the Commission considers and rejects in the following, the Commission has provided and will continue to provide due process as required under the Constitution and process in conformance with the Administrative Procedure Act. Under Mathews v. Eldridge and other applicable precedent, due process requires that the deprived party be afforded notice of the action, including enough information about the factual basis for the action to allow for a meaningful challenge, and a meaningful opportunity to be heard. An evaluation of the sufficiency of the process will consider the private interest that would be affected, the risk of an erroneous deprivation of such interest through the procedures used (and the probable value, if any, of additional procedural safeguards), and the government’s interest, including the burdens of additional procedural requirements. 76. The rulemaking proceeding has provided and will continue to provide Huawei and ZTE with notice and an opportunity to be heard on the issue of whether they should be designated under the rule adopted in the Report and Order. The Protecting Against National Security Threats Notice in the proceeding set forth Congress’s concern with both companies and explained that this concern stems from the fact that both companies are subject to such a degree of undue influence by the Chinese government as to raise counterintelligence and security concerns. It was clear from the Protecting Against National Security Threats Notice that the Commission was considering designating them under the proposed rule. In fact, the Protecting Against National Security Threats Notice specifically sought comment on ‘‘defin[ing] covered companies as those specifically barred by the National Defense Authorization Act from providing a substantial or essential component, or critical technology, of any system, to any federal agency or component thereof,’’ and the WCB specifically sought comment on how the 2019 NDAA should affect the Commission’s approach in the VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 proceeding. Huawei responded to the Protecting Against National Security Threats Notice at great length, and the Commission has fully considered those arguments. As with any Commission decision, the Report and Order is subject to procedures for reconsideration by the Commission and for judicial review. 77. Further, both Huawei and ZTE will have an additional opportunity to respond to the factual allegations supporting their initial designation under the process established in the Report and Order. The initial determination adopted in the Report and Order expands on the concerns raised in the Protecting Against National Security Threats Notice and responds to Huawei’s submissions that attempted to address these concerns. Huawei and ZTE will have a further chance to respond before PSHSB issues a final designation that either affirms or rejects the initial designation. The Commission therefore concludes that Huawei and ZTE will be afforded all the process that is due in the proceeding. 78. For all other designations, the Commission will adhere to the process discussed in this document, which includes notice and an opportunity to comment on any initial designation, a description of the basis for such initial designation and, if opposed, a written final determination subject to review by the Commission and, ultimately, the courts. Any such designation will also be subject to review, and potentially reversal, in the future if such an entity, or another interested entity, can demonstrate that it should no longer bear such a designation. 79. Huawei is incorrect when it argues that it violates the Due Process Clause to issue this adjudicatory decision in the context of a rulemaking proceeding. There is no requirement that designations be made pursuant to the formal adjudicatory procedures of the Administrative Procedure Act. Rather, the relevant question is whether the affected parties have had the ‘‘opportunity to present, at least in written form, such evidence as those entities may be able to produce to rebut the administrative record.’’ Huawei has already done so here, and ZTE had the same opportunity. There is nothing improper about issuing a designation pursuant to a rulemaking proceeding. Additionally, Huawei and ZTE will have a further opportunity to specifically respond to their initial designation during the comment period adopted in the Report and Order. 80. Moreover, the Fifth Amendment guarantees due process only where government action threatens or deprives PO 00000 Frm 00035 Fmt 4700 Sfmt 4700 241 an individual of life, liberty, or property. The Commission finds that designated suppliers and/or carriers do not suffer a deprivation of life, liberty, or property sufficient to trigger due process protections. Huawei claims that designating it under the rule the Commission adopts in this document would deprive it of liberty in three related ways: (1) By interfering with its freedom to practice a chosen profession; (2) by debarring it or effectively debarring it by preventing it from selling equipment and services to USF recipients; and (3) by imposing a ‘‘stigma’’ sufficiently serious to alter Huawei’s legal status. The Commission finds none of these arguments persuasive. 81. First, covered companies are not barred from a field of employment. Unlike the aggrieved parties in the cases cited by Huawei and CCA, the suppliers found to be a threat to national security will not be broadly excluded from a profession or field—such as aeronautics or law. To the contrary, any such designated suppliers will be free to pursue their business by serving as suppliers to a variety of carriers; in fact, as one commenter pointed out, a designation would not formally restrict them from conducting business with any customer, including those who participate in USF programs. 82. Second, the adopted rule does not debar covered companies, either through ‘‘formal debarment’’ or through ‘‘broad preclusion, equivalent in every practical sense to formal debarment.’’ Huawei itself recognizes an uneasy fit with the debarment cases it cites, conceding that those cases ‘‘merely involve actions that preclude private entities from transacting with the Government, while the proposed rule would preclude private entities from transacting with other private entities who spend federal funds.’’ Huawei argues, inter alia, that the proposed rule meets the definition of debarment in section 54.8 of the Commission’s rules. Even assuming Huawei is ‘‘debarred’’ from the USF under this definition, it is not ‘‘debarred’’ as the term is used in the cases cited by Huawei, which, as Huawei itself notes, involve government actions precluding private entities from serving the government. The Commission is similarly unconvinced by Huawei’s attempt to analogize itself to a subcontractor. While there is some authority for the proposition that due process protections extend to the debarment of subcontractors, Huawei and other affected suppliers are not subcontractors, and, even if they were, designation here does amount to de facto debarment—it does not prevent E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 242 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations designated suppliers from doing business with the government or carriers (the prime contractors, in Huawei’s analogy). 83. The rule here does not prevent any private entity from transacting with the government—either formally or through broad preclusion equivalent to formal debarment—nor does it completely prevent entities from transacting with carriers who receive USF funding. 84. Third, designation as a covered company does not create a deprivation by imposing a stigma sufficiently serious to alter a supplier’s legal status. To establish a deprivation under this ‘‘stigma-plus’’ theory, a party must show (1) the public disclosure of a stigmatizing claim by the government; and (2) an accompanying denial of ‘‘some more tangible interest such as employment, or the alteration of a right or status recognized by state law.’’ With respect to the first prong, assuming arguendo that designation by the Commission as a threat to national security is likely to impose some amount of stigma, the stigmatized party must also satisfy the ‘‘plus’’ factor of the ‘‘stigma plus’’ test. Courts have found this factor satisfied where the government has deprived a party of some benefit to which it has a legal right, like the ability to purchase alcohol or fly. The D.C. Circuit has found this prong satisfied where the governmentimposed stigma is so severe that it ‘‘broadly precludes’’ the stigmatized party from ‘‘pursuing a chosen trade or business.’’ The Commission finds that the rule adopted in this document does not satisfy this prong. 85. Huawei argues that the alleged stigma of a designation under the proposed rule would alter its status in two ways. First, by ‘‘barring the use of universal service funds to buy the company’s equipment.’’ Second, by having the practical effect of discouraging other U.S. entities from buying Huawei’s equipment. But while designation may create a disincentive for carriers to purchase equipment from designated entities, designation imposes no explicit restriction on designated entities at all; designated entities remain free to sell to anyone, including recipients of USF. Likewise, USF recipients remain free to purchase equipment from designated entities— and some may continue to do so, though they would not be able to use USF support for any covered equipment and services. This fact alone would prevent Huawei or other covered companies from establishing the deprivation of a legal right or the ‘‘broad preclusion’’ required in Trifax, the case on which VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 Huawei principally relies in establishing this factor. Thus, the Commission concludes that there is no cognizable deprivation of liberty or property either in adopting the rule or designating Huawei and ZTE herein the Report and Order. 86. Unconstitutional Taking. Some commenters assert that the Commission’s proposed rule would constitute a regulatory taking because it would deny some carriers of ‘‘all economically beneficial or productive use’’ of their property.’’ These commenters argue that the proposed rule would prevent carriers from upgrading, repairing, or servicing preexisting equipment purchased from prohibited suppliers, rendering this equipment useless. Without funding to compensate carriers for these losses, they argue, the proposed rule will run afoul of the Takings Clause of the Fifth Amendment, which prohibits the government from taking ‘‘private property . . . for public use, without just compensation.’’ 87. The Commission disagrees with these arguments. At the outset, the Takings Clause applies only when ‘‘property’’ is taken, but Commission and judicial precedent make clear that carriers have no vested property interest in ongoing USF support. Therefore, there is no merit to any suggestion that deprivation of future USF support amounts to a Takings under the Fifth Amendment. While carriers do have a cognizable property interest in their equipment, to the extent the action diminishes the value of equipment carriers have already purchased, this interference does not amount to a regulatory taking. The concurrently adopted Further Notice addresses making additional support available pursuant to NDAA section 889(b)(2)—a fact that arguably mitigates any takings concerns and makes any potential takings claim unripe. Further, there is no per se regulatory taking under Lucas v. South Carolina Coastal Council, because the rule will not deprive affected carriers of all economic value in their networks or equipment—the proposed rule is prospective in nature, and will allow them to continue using pre-existing equipment. Nor does the rule effect a partial regulatory taking under the three-factor test established in Penn Central Transportation Company v. New York City. First, the economic impact on affected carriers should not be severe, as they should still be able to use pre-existing equipment. Second, the rule should not upend reasonable investment-backed expectations. As explained in this document, the long history of concern about Huawei and PO 00000 Frm 00036 Fmt 4700 Sfmt 4700 ZTE should have served as a warning that the federal government may take action regarding these companies, and in any event the Protecting Against National Security Threats Notice provided affected carriers actual notice of this action. More broadly, the Commission frequently enacts rules adjusting the levels of USF support received by carriers, and has long held that carriers have no entitlement to ongoing USF support at current levels. Third and finally, with respect to the ‘‘character’’ of the Commission’s action, any interference could not be characterized as physically invading or permanently appropriating the property of carriers—and commenters seem to offer no argument to the contrary. 88. Bill of Attainder. Lastly, Huawei argues that the rule violates the Bill of Attainder Clause. A law constitutes a bill of attainder ‘‘if it (1) applies with specificity, and (2) imposes punishment.’’ According to the Supreme Court, ‘‘the Bill of Attainder Clause was intended . . . as an implementation of the separation of powers, a general safeguard against legislative exercise of the judicial function, or, more simply, trial by legislature.’’ Thus, ‘‘[a] bill of attainder is a legislative act which inflicts punishment without a judicial trial.’’ Huawei argues that the rule ‘‘contravene[s] the Bill of Attainder Clause by targeting a small group of people for punitive measures.’’ 89. The Commission finds this argument unpersuasive. First, the Supreme Court has never applied the Bill of Attainder Clause to a corporation like Huawei. Second, the rule cannot amount to a bill of attainder because it is not a ‘‘legislative act.’’ The Commission is unaware of any court opinion applying the Bill of Attainder clause to agency regulations. In a case challenging the Commission’s 2011 order overhauling the high-cost universal service program, the Tenth Circuit considered and rejected a similar argument on the grounds that the Commission’s order was not a legislative act. Second, even if the rule were a ‘‘legislative act,’’ it does not impose a ‘‘punishment.’’ As the Report and Order makes clear, the Commission has a legitimate, non-punitive reason to take the actions contemplated by the rule—the protection of national security. While some of the burdens of the rule will fall on those entities identified as threats to national security, the burdens imposed will not be ‘‘so disproportionately severe and so inappropriate to nonpunitive ends that they unquestionably have been held to E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations fall within the proscription of [the Bill of Attainder Clause].’’ 90. The Commission’s cost benefit analysis focuses on the economic costs of its action. An economic cost is the extent to which resources are spent inefficiently, in this case, on more expensive suppliers. The Commission notes that record evidence indicates the vast majority of such costs are attributable to ETCs receiving high-cost universal service support. The Commission accordingly focuses its analysis on such costs because any costs attributable to other programs are unlikely to have any measurable impact on whether the benefits of the rule outweigh its costs. Furthermore, the records suggest that the dominant economic cost equals the necessary additional cost to carriers who choose to purchase more expensive equipment as a result of the Commission’s action. The Commission estimates this cost and qualitatively consider other economic costs of its action. The Commission finds these other costs to be relatively small. Given the evidence available, the Commission estimates that the costs of the actions in this document will not exceed $960 million and are likely to be much lower. 91. Quantifying the expected benefits of the Commission’s rule is difficult. Nonetheless, the Commission takes into account several comparable situations to estimate an order of magnitude lower bound of benefits. Notably, a foreign adversary’s access to American communications networks could result in hostile actions to disrupt and surveil our communications networks, impacting our nation’s economy generally and online commerce specifically, and result in the breach of confidential data. To start, our national gross domestic product was $20.5 trillion last year, growing 2.9% or $595 billion last year, adjusting for inflation. Accordingly, preventing even a 0.005% disruption to our economy, or a 0.162% disruption to annual growth, would outweigh the costs of the prohibition. Likewise, the digital economy accounted for $1.35 trillion of our economy in 2017, and so preventing a disruption of even 0.072% would mean the benefits of the rule outweigh the costs. Given how dependent the general economy—let alone the digital economy—is on our national communications network and how interconnected that network is and is becoming, the Commission finds it likely that any potential disruption would exceed these measures by a large margin. As a check on the Commission’s analysis, consider the impact of existing malicious cyber activity on the U.S. VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 economy: $57 billion to $109 billion in 2016. Given the incentives and documented actions of hostile nationstate actors, reducing this activity (or preventing an expansion of such damage) by even 1.68% would justify the costs of the Commission’s rule. Or set aside broader commercial implications (such as theft of trade secrets and business plans) and focus on the impact of data breaches on consumers: An estimated 7% of consumers over the age of 16 were identity theft victims in 2014, and the estimated average loss to an identity theft victim is over $2,800. Accordingly, if the Commission’s rule reduced the incidence of data breach and identity theft by just 0.137% among American consumers over the age of 16, the benefits of the rule would outweigh the costs. In the Commission’s judgment and given this analysis, the Commission finds the benefits of its rule to the American economy, commerce, and consumers are likely to significantly and substantially outweigh the costs by a large margin (the upper end of those costs being $960 million). Finally, the Commission notes that the benefits of the rule also extend to even harder to quantify values, such as preventing untrustworthy elements in the communications network from impacting our nation’s defense, public safety, and homeland security operations, our military readiness, and our critical infrastructure, let alone the collateral damage such as loss of life that may occur with any mass disruption to our nation’s communications networks. The Commission finds that the benefits of safeguarding our nation against these threats alone would also significantly and substantially outweigh the costs of the Commission’s rule by a large margin. 92. Calculating the Additional Cost to Carriers. The Commission assumes based on the initial designations that its actions will prevent a carrier from using universal service funds to make purchases from Huawei or ZTE. As carriers maintain their existing networks and upgrade them to new technologies such as 5G, carriers relying on universal service funds may choose more expensive equipment—and for the sake of this cost-benefit analysis, the Commission assumes that the prices of Huawei and ZTE tend to be lower than those of other suppliers without a corresponding loss in quality, reliability, or durability. Buying more expensive equipment or services also increases the value of the firm’s capital base, which in turn, increases service PO 00000 Frm 00037 Fmt 4700 Sfmt 4700 243 and maintenance costs, and the required return on capital to bondholders and shareholders, resulting in a second source of cost. The Commission also estimates a useful lifetime of network equipment (like mobile switches) and exterior equipment (radio network access equipment (RAN) placed on or near a pole or tower) of approximately 10 years. 93. To estimate the additional cost to carriers of the prohibition and given the estimated useful lifetime of network equipment, the Commission expects that in 10 years all Huawei and ZTE equipment that will be replaced (or upgraded) with universal service support will have been replaced. At that point, the additional annual capital outlays will peak, and the Commission generously estimates the total annual cost of its actions, including service and maintenance cost, and the required return on capital, will be between approximately $17 million and $107 million. Although the Commission initially assumes Huawei and ZTE maintain their (non-quality-adjusted) price advantage for 10 years, the Commission then allows competition to linearly eliminate that advantage over the next ten years. On that basis, the Commission estimates the present value of the cost this will impose on carriers to range from $160 million and $960 million. 94. The analysis assumes constant real equipment prices. While real equipment prices will likely decline, it is the difference between the prices of alternatives to Huawei and ZTE equipment and the prices of Huawei and ZTE equipment that determines the reimbursement cost. While lower real prices would increase demand, they would also reduce the extent to which reimbursements from the Fund are necessary, the net effect of which is likely to be small relative to the error inherent in the Commission’s estimates. 95. In developing these estimates, the Commission first estimates the cost of replacing Huawei and ZTE equipment, and then estimate ongoing expenses. Since the Commission’s Report and Order does not mandate replacement, the Commission does not assume that all Huawei and ZTE equipment is replaced by alternative equipment. Instead, the Commission expects that a fraction of the Huawei and ZTE equipment will be replaced. The Commission then estimates the ongoing expenses implied by the assumed replacements. However, the sum of the estimated replacement and ongoing costs is not entirely attributable to the Commission’s action. Instead, it is the difference between these costs and the E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 244 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations costs that would have been incurred if Huawei and ZTE equipment were used. The Commission estimates this difference using reported differences between the prices of Huawei and ZTE equipment and the prices of alternative equipment (again, setting aside for these purposes concerns about the lower quality, reliability, or durability of such lower-priced equipment). 96. The Commission estimates the average cost for a firm to replace its Huawei and ZTE equipment, excluding ongoing expenses, to range from $40 million to $45 million. The Commission then multiplies this by an estimate of the number of firms that have Huawei or ZTE equipment and relies on universal service support, and then reduces it to account for the extent to which carriers will use other sources of capital to purchase and maintain Huawei and ZTE equipment. The result is an estimate of the cost of replacing Huawei and ZTE equipment, excluding ongoing expenses. 97. Seven carriers reported their estimated cost of replacing installed Huawei or ZTE equipment. The estimates come from Pine Belt Cellular, Sagebrush, Union Telephone Company, NE Colorado Cellular, SI Wireless, United TelCom, and James Valley Telecommunications. The median of the firms’ replacement cost estimates is $50 million. 98. To guard against distortion due to extreme estimates, particularly given carriers’ incentives to report higher estimates, the Commission prefers the median to the mean. The mean of the 7 reports, $94 million, is significantly raised by NE Colorado Cellular’s cost estimate, which is 3 times larger than the next highest estimate, and 60 times larger than the lowest estimate. NE Colorado Cellular’s absolute costs also seem high. It reports 80% of its network to be Huawei equipment, which it estimates would cost $360 million to replace. That implies a network with a replacement cost of approximately $450 million (= $360 million/0.8 million). Assuming an annual cost factor of 25%, this implies annual expenses of $112.5 million. As a comparison, the annual cost of switching in the Connect America Model is 0.2671, the sum of the annual charge factors for capital expenditures, 0.1476, and operating expenditures, 0.1195. (For the Commission’s estimates of the Report and Order costs, the Commission uses a 30% annual charge factor, as it wishes to avoid understating the costs of its actions. Here, the Commission seeks to show that NE Colorado Cellular’s costs are high, so it uses a 25% annual charge factor to demonstrate that their reported VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 costs are high even under conservative assumptions.) NE Colorado Cellular reports serving 110,000 customers, so capital costs alone amount to approximately $85 per month per customer ($112.5 million/12/110,000 = $85). Of course, NE Colorado Cellular must recover costs beyond its capital costs. NE Colorado Cellular collects and pays roaming fees, the net of which could reduce the required monthly recovery from its customers, but presumably not radically. Thus, NE Colorado Cellular would need to be charging monthly subscriber fees of around or probably in excess of $85 per month, which seems high, especially compared with T-Mobile’s ‘‘Premium Unlimited Plan,’’ which costs $50 per month per subscription when four subscriptions are purchased. 99. The Commission expects that firms motivated to report their costs in the record of the proceeding have above average costs. Indeed, the reporting carriers are unlikely to be representative of carriers affected by the Commission’s actions, but rather reflect carriers with greater incentives to put their concerns in the record, i.e., carriers for which the impact of a rip-and-replace requirement is large compared with similarly situated non-reporting carriers. In 2018, the 7 carriers who provided rip and replace cost estimates represented only 0.15% of mobile carrier end-user revenues as reported in their FCC Form 499s. Consequently, the Commission conservatively discounts the median of reported costs by between 10% and 20%, which yields an estimated replacement cost for each network of $40 million to $45 million. 100. The Commission generously estimates 106 firms currently buy Huawei and ZTE equipment. Huawei reports serving 85 U.S. customers in 2019. Alternatively, the Commission could rely on the Dell’Oro Group’s North American market share estimate for ZTE of zero. This would imply only 85, rather than 106 purchasers, lowering the Commission’s cost estimates by approximately 20%. Market share estimates for Huawei and ZTE, respectively of 31.1% and 7.5%, imply 105.5 (= 85 * (1 + 7.5/31.1)) purchasers of equipment from Huawei and ZTE. See Dell’Oro Group, Market Research Reports on Mobile Radio Access Network, which also finds Huawei’s North American share to be only 1.5% and ZTE’s to be zero. This is likely an overestimate as both suppliers, but especially ZTE, have experienced a decline in their U.S. customer bases. For sake of this analysis, however, the Commission rounds up to 106 firms. Given all of these customers are not PO 00000 Frm 00038 Fmt 4700 Sfmt 4700 likely to be ETCs, e.g., they may be firms purchasing Wi-Fi routers for internal use, the Commission estimates between 32 (30%) and 53 (50%) of these firms accept universal service funds. This range is consistent with CoBANK’s estimate that 30 rural carriers are impacted. 101. Lastly, the Commission recognizes capital is fungible, and carriers have some leeway to buy Huawei or ZTE equipment from other funding sources. For these carriers, the Commission estimates they may only use universal service funds to replace between 50% and 75% of their existing Huawei or ZTE equipment. The Commission’s actions prevents carriers from purchasing Huawei and ZTE equipment using universal service funds but does not prohibit them from purchasing such equipment using funds from other sources so long as they can meet the accounting requirements described in this document. This gives the following lower and upper bounds for the costs of replacing installed Huawei or ZTE equipment: Lower bound: $640 million = $40 million * 32 * 50%. Upper bound: $1.79 billion = $45 million * 53 * 75%. 102. Converting the Replacement Cost into a Cost Stream. Assuming the average useful life of the equipment in question is ten years, then on average in each year, 10% of the total value of the equipment must be replaced. The Commission adds to this an additional 20% of the value of the equipment for expenses for service and maintenance costs and a return to bondholders and shareholders. The sum equals a generous annual charge factor of 30%. This may be broken down into a 10% factor for capital purchases to maintain the capital base, and a 20% factor for service, maintenance, and a return to bondholders and shareholders. By comparison, the annual cost factor for switching in the Connect America Model is 0.2671 the sum of the annual cost factors for capital expenditures, 0.1476, and operating expenditures, 0.1195. This, with assumptions about prices discussed in this document, allows the Commission to develop a cost stream associated with each year for 20 years. 103. Comparing Expenses under the Report and Order with the Case of No Report and Order. Of course, this equipment would be replaced with or without the Commission’s requirement. The relevant cost of the Commission’s action is the price differential or markup between purchasing alternative equipment and Huawei or ZTE equipment. Sources suggest this markup E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations ranges from 5% to 40% (not taking into account any change in quality, reliability, or durability). These markups do not account for quality differences between Huawei and ZTE, and their rivals, or the likelihood that these rivals’ prices will become more competitive over time. The 40% estimate, which is well above the other two estimates, comes from a carrier that appears particularly concerned about the Commission’s actions, and hence may have overestimated the markup. Consequently, the Commission uses the mid-points of each of the other two markup estimates, 10% and 25%, as lower and upper bounds. Using these price markup assumptions and subtracting the annual cost streams in the absence of the Report and Order from the cost streams under the Report and Order results in a stream of cost differences. The Commission thus estimates the present value of the cost differences for the next twenty years that would arise due to the Report and Order ranges from $160 million to $960 million. 104. The Economic Efficiency Costs of the Commission’s Actions. So far, the Commission has only discussed the replacement cost of its actions. To understand the potential breadth of the economic cost of the Commission’s actions, first consider the simple case in which prices of both the cheaper and the more expensive providers recover no more than the economic costs of supply, including a return of capital (capital replacement), and a return on capital, accounting for the risks the firm’s owners bear. Call this a normal profit. In that case, the cost just calculated is a key economic cost, representing an increase in resources used because the Commission’s actions cause carriers to shift their purchases from more to less efficient providers. But there is a further efficiency consequence of the Commission’s actions. Purchase from less efficient suppliers occurs at higher (qualityadjusted) prices. If the quality-adjusted prices of Huawei and ZTE are equal to their rivals’ prices, then the Commission’s actions would have no costs. However, some carriers prefer Huawei or ZTE to alternative suppliers, implying that these carriers view the prices of Huawei or ZTE to be the lowest quality-adjusted price available to them. This lowers output because end users face higher prices, and consequently purchase less than is efficient. Estimating the efficiency cost of this is difficult, but relative to the replacement cost, the distortion cost is small and likely swamped by the error VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 inherent in the replacement cost estimate. This is true from a global as well as a domestic perspective. 105. This can be seen by focusing on the intermediary market for network equipment, i.e., demand in this market is derived from demand for services provided to end users. This implies the distortions in the intermediary market reflect those in the final market. The reimbursement cost to the Universal Service Fund is the product of the amount of network equipment bought and sold at the new higher prices, call this Q, and the markup over Huawei and ZTE prices, call this DP. The cost of the distortion caused by the reduction in demand for network equipment due to inefficiently higher prices is the lost value consumers would have obtained from the additional quantity they would have consumed at the Huawei or ZTE prices. This lost value equals the area under the demand curve in the region where demand is curtailed due to the higher prices of the alternative suppliers. At a first approximation, this cost is, because demand is downward sloping, strictly less than the product of the change in what is bought and sold, call this DQ, and the change in price, DP. The reimbursement cost, DP * Q, swamps the distortion cost, DP * DQ, since Q is generally considerably larger than DQ. Thus, if higher prices reduce demand by 5% (= DQ/Q), then the distortion cost could not add more than 5% to the cost to the Universal Service Fund (DP * DQ/DP * Q = 5%). 106. From a global perspective, the Commission’s estimates of the economic cost of its actions would be higher to the extent that Huawei or ZTE earn more than a normal profit despite having substantially lower prices than their rivals. Purchases diverted to alternative suppliers would cause Huawei and ZTE to forgo that extra-normal profit. However, it seems unlikely that Huawei or ZTE earn extra-normal profit. Similarly, from a global perspective, the Commission’s economic cost estimate would be lower to the extent that the prices of the rivals of Huawei and ZTE, today essentially being Ericsson and Nokia, incorporate extra-normal profits. While U.S. purchasers, and hence the Universal Service Fund, would be spending more when purchasing from Ericsson and Nokia at higher prices, to the extent these prices incorporate extra-normal profit, this would be a transfer from the U.S. to the foreign owners of Ericsson and Nokia. Finally, from a global perspective, if Huawei or ZTE’s prices are less than what is required to recover their costs of operations, e.g., due to a government PO 00000 Frm 00039 Fmt 4700 Sfmt 4700 245 subsidy, then the economic cost of the Commission’s actions would be lower. 107. The Commission rejects Huawei’s claims that its actions would reduce 5G deployment and would materially increase mobile radio access network equipment prices in the U.S., which in turn would materially harm growth and employment in the U.S. economy. It is unlikely the Commission’s actions will impact U.S. 5G deployment. The four largest U.S. mobile carriers do not use and have no plans to use Huawei (or ZTE) radio access network equipment. Given this, and Aron’s claim that there are high costs associated with switching from one equipment manufacturer to another, it is implausible that the Commission’s actions will affect these carriers’ 5G deployment plans. More broadly, the Commission finds it unlikely that its actions will materially increase U.S. radio access network equipment prices. While carriers that buy equipment from covered companies could face higher prices in the near term (and only to the extent they use universal services funds to purchase that equipment), Huawei’s own chief executive has admitted that Huawei has ‘‘virtually no business dealings in the U.S.’’—making it far more likely that the Commission’s rule will have ‘‘virtually no’’ impact on 5G deployment. What is more, the Commission finds that ensuring a robust ecosystem of trusted vendors for 5G equipment (one collateral consequence of the Commission’s rule) is more likely to keep 5G equipment prices checked by a competitive market over the long term, facilitating deployment and continued U.S. leadership in 5G. III. Information Collection Order 108. In the concurrently adopted Further Notice, the Commission seeks comment on proposals to address the national security threats arising from the existing use of equipment or services produced or provided by covered companies. To support the Commission’s future efforts to protect the communications supply chain, the Commission directs WCB and OEA, in coordination with USAC, to conduct an information collection to determine the extent to which potentially prohibited equipment exists in current networks and the costs associated with removing such equipment and replacing it with equivalent equipment. The information collection will aid the Commission’s review of the record and guide its next steps in the proceeding. Because section 889(f) of the 2019 NDAA identifies specific companies that are prohibited from federal procurements, and the concurrently adopted Further Notice E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 246 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations seeks comment on how to implement those and other prohibitions, the Commission specifically seeks comment on the extent to which equipment or services from companies identified in Section 889 of the NDAA exist in current networks. 109. The Commission seeks information from ETCs on the potential costs associated with the complete removal and replacement of any equipment and services produced or provided by Huawei and ZTE. The information collection applies to all subsidiaries and affiliates of ETCs. 110. Specifically, the Commission seeks information on all equipment and services from Huawei and ZTE that are used or owned by ETCs. ETCs are the subject of the Commission’s proposed rule (and among USF recipients the most likely to currently own and use equipment and services from Huawei and ZTE). The Commission therefore limits its information collection only to ETCs and will not require cost information from other USF recipients at this time. The Commission nonetheless will allow service providers that are not ETCs to participate on a voluntary basis should they have ETC designation petitions pending (or may intend to file such in the future). And the Commission will allow other USF recipients who are not ETCs to participate on a voluntary basis as well. 111. In implementing the information collection, WCB and OEA should gather information from ETCs as to whether they own equipment or services from Huawei or ZTE, what that equipment is and what those services are, the cost to purchase and/or install such equipment or services, and the cost to remove and replace such equipment or services. ETCs must demonstrate how they arrived at any cost estimates they provide in response to the information collection. All submissions must be certified to ensure the accuracy of the responses. 112. The information collection shall be mandatory for all ETCs and voluntary for others. The Commission directs WCB to consider the potential confidentiality of any information submitted, particularly where public release of such information could raise security concerns (e.g., granular location information). The Commission expects, however, that the public interest in knowing whether a carrier uses equipment or services from Huawei or ZTE would significantly outweigh any interest the carrier would have in keeping such information confidential. As part of the information collection, the Commission directs WCB and OEA to seek any information necessary to VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 verify responses provided by ETCs to the information collection, including by requiring further information from respondents. The Commission directs WCB and OEA to proceed expeditiously with the information collection, including by seeking emergency PRA approval from OMB, if necessary and appropriate. The Commission believes there is good cause for requesting emergency PRA approval from OMB for the reasons described in the following. Given the nature of the national security concerns, the Commission finds that the serious and immediate risks to communications networks likely justify the expedited approval of the information collection. IV. Procedural Matters A. Paperwork Reduction Act 113. This document contains new or modified information collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104–13. It will be submitted to the Office of Management and Budget (OMB) for review under Section 3507(d) of the PRA. OMB, the general public, and other Federal agencies will be invited to comment on the new or modified information collection requirements contained in the proceeding. In addition, the Commission notes that pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4), the Commission previously sought specific comment on how the Commission might further reduce the information collection burden for small business concerns with fewer than 25 employees. B. Congressional Review Act 114. The Commission has determined, and the Administrator of the Office of Information and Regulatory Affairs, Office of Management and Budget, concurs, that this rule is non-major under the Congressional Review Act, 5 U.S.C. 804(2), because it is promulgated under the Telecommunications Act of 1996 and the amendments made by that Act. The Commission will send a copy of this Report and Order, Further Notice of Proposed Rulemaking, and Order to Congress and the Government Accountability Office pursuant to 5 U.S.C. 801(a)(1)(A). 115. As required by the Regulatory Flexibility Act of 1980, as amended (RFA), an Initial Regulatory Flexibility Analysis (IRFA) was incorporated into the Protecting Against National Security Threats Notice for the proceeding. The Commission sought written public comment on the proposed rule in the PO 00000 Frm 00040 Fmt 4700 Sfmt 4700 Protecting Against National Security Threats Notice, including comment on the IRFA. The Commission received only a single comment on the IRFA. Because the Commission amends its rules in the Report and Order, the Commission has included the Final Regulatory Flexibility Analysis (FRFA). The present FRFA conforms to the RFA. 116. Consistent with the Commission’s obligation to be responsible stewards of the public funds used in USF programs and increasing concern about ensuring communications supply chain integrity, the Order adopts a rule that restricts universal service support from being used to purchase, obtain, maintain, improve, modify, or otherwise support any equipment or services produced or provided by any company posing a national security threat to the integrity of communications networks or the communications supply chain. 117. The RFA directs agencies to provide a description and, where feasible, an estimate of the number of small entities that may be affected by the final rules adopted pursuant to the Order. The RFA generally defines the term ‘‘small entity’’ as having the same meaning as the terms ‘‘small business,’’ ‘‘small organization,’’ and ‘‘small governmental jurisdiction.’’ In addition, the term ‘‘small business’’ has the same meaning as the term ‘‘small-business concern’’ under the Small Business Act. See 5 U.S.C. 601(3) (incorporating by reference the definition of ‘‘smallbusiness concern’’ in the Small Business Act, 15 U.S.C. 632). Pursuant to 5 U.S.C. 601(3), the statutory definition of a small business applies ‘‘unless an agency, after consultation with the Office of Advocacy of the Small Business Administration and after opportunity for public comment, establishes one or more definitions of such term which are appropriate to the activities of the agency and publishes such definition(s) in the Federal Register.’’ A ‘‘small-business concern’’ is one which: (1) Is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the SBA. 118. Small Businesses, Small Organizations, Small Governmental Jurisdictions. The Commission’s actions, over time, may affect small entities that are not easily categorized at present. The Commission therefore describes in this document, at the outset, three broad groups of small entities that could be directly affected herein. First, while there are industry specific size standards for small businesses that are used in the regulatory flexibility E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations analysis, according to data from the SBA’s Office of Advocacy, in general a small business is an independent business having fewer than 500 employees. These types of small businesses represent 99.9% of all businesses in the United States which translates to 28.8 million businesses. 119. Next, the type of small entity described as a ‘‘small organization’’ is generally ‘‘any not-for-profit enterprise which is independently owned and operated and is not dominant in its field.’’ Nationwide, as of Aug 2016, there were approximately 356,494 small organizations based on registration and tax data filed by nonprofits with the Internal Revenue Service (IRS). 120. Finally, the small entity described as a ‘‘small governmental jurisdiction’’ is defined generally as ‘‘governments of cities, counties, towns, townships, villages, school districts, or special districts, with a population of less than fifty thousand.’’ U.S. Census Bureau data from the 2012 Census of Governments indicates that there were 90,056 local governmental jurisdictions consisting of general purpose governments and special purpose governments in the United States. Of this number there were 37,132 general purpose governments (county, municipal and town or township) with populations of less than 50,000 and 12,184 special purpose governments (independent school districts and special districts) with populations of less than 50,000. The 2012 U.S. Census Bureau data for most types of governments in the local government category show that the majority of these governments have populations of less than 50,000. Based on this data the Commission estimates that at least 49,316 local government jurisdictions fall in the category of ‘‘small governmental jurisdictions.’’ 121. Small entities potentially affected by the rules herein include Schools and Libraries, Healthcare Providers, Providers of Telecommunications and other Services, Internet Service Providers and Vendors and Equipment Manufacturers. 122. Restriction on Use of USF Funds. The Order adopts a rule that no universal service support may be used to purchase or obtain any equipment or services produced or provided by a covered company posing a national security threat to the integrity of communications networks or the communications supply chain. Applicants may continue to use their own funds to upgrade and maintain such equipment. They must, however, be able to affirmatively demonstrate that they have not used any funds obtained VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 via the USF to purchase, obtain, maintain, improve, modify, or otherwise support equipment or services provided or manufactured by a covered company. This restriction applies to any and all equipment and services, including software, produced or provided by a covered company. Because the rule is prospective in effect, it does not prohibit the use of existing services or equipment already deployed or in use. USF recipients may seek waivers of the requirements. 123. Covered Companies. The Report and Order initially designates Huawei and ZTE as covered companies for purposes of the prohibition the Commission adopts in this document. Independently, the Order establishes a process for designating entities as national security threats for purposes of the Commission’s rule, and delegates to the PSHSB the authority to implement this process, as well as the next steps in the designation processes for Huawei and ZTE. Because equipment from subsidiaries, parents, and affiliates pose the same risks to network integrity as equipment directly from the covered company, the Commission includes any subsidiary, parent, or affiliate of a covered company as a covered company subject to the Commission’s prohibition. 124. Effective Date of Rule. Because of the compelling interest in protecting our national security, the Commission concludes that the rule it adopts in this document should take effect immediately upon publication in the Federal Register. For purposes of the Lifeline and High-Cost Support Programs, any prohibition on the use of USF funds will take effect immediately upon publication of the effective date contained in the Final Designation Notice designating an entity as a covered company posing a national security threat. A requirement that USF recipients certify that they are in compliance with the Commission’s rule will take effect following revision of each information collection as described in the Order, including approval by the Office of Management and Budget (OMB) under the Paperwork Reduction Act. For E-Rate and Rural Health Care Recipients, the rule the Commission adopts will apply to all funding years that start after the designation of a covered company. The Commission’s rule extends to existing contracts to acquire equipment or services from any covered company that were negotiated and entered into prior to the final designation of that entity as a covered company. In other words, existing multiyear contracts to acquire equipment or services from a covered PO 00000 Frm 00041 Fmt 4700 Sfmt 4700 247 company will not be exempt from the rule. 125. Compliance Certifications. The Order establishes that the Commission should require recipients of universal service support to provide a certification that they have complied with the adopted rule, and directs WCB, in coordination with USAC, to revise the relevant information collections for each of the four USF programs to implement a certification attesting to compliance with the adopted rule. 126. Audits and Recovery of Funds. The Order directs USAC to implement audit procedures for each USF program consistent with the adopted rule. USF recipients must be able to affirmatively demonstrate that no universal service funds were used to purchase, obtain, maintain, improve, modify, or otherwise support any equipment or services provided or manufactured by covered companies. The Order notes that applicants in the E-rate and Rural Health Care programs already retain and provide information either during the application process or during audit and program integrity assurance processes that could demonstrate (if verified) that no USF funds were improperly used. And many ETCs receiving High Cost funding now report the projects they complete using federal funds to the High Cost Universal Broadband portal, allowing relatively swift verification by USAC of compliance. To the extent that other ETCs do not yet report information to USAC that would verify compliance, the Commission directs WCB and USAC to revise its information collection and audit procedures to ensure the reporting of USF expenditures in a manner that will allow efficient oversight and thorough compliance. The Order does not depart from the requirement that directs USAC to pursue recovery actions against the party or parties that committed the rule or statutory violation in question, recognizing that, in some instances, this could be the applicant school, library, health care provider, or consortium, rather than the service provider. 127. Information Collection. The Information Collection Order directs WCB and OEA, in coordination with USAC, to conduct an information collection to determine the extent to which potentially prohibited equipment exists in current networks and the costs associated with removing such equipment and replacing it with equivalent equipment. Specifically, the information collection will seek information from ETCs on the potential costs associated with the complete removal and replacement of any equipment and services produced or E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES 248 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations provided by Huawei and ZTE. Specifically, the Commission seeks information on all equipment and services from Huawei and ZTE that are used or owned by ETCs. ETCs are the subject of the Commission’s proposed rule (and among USF recipients the most likely to currently own and use equipment and services from Huawei and ZTE). The Commission therefore limits its information collection only to ETCs and will not require cost information from other USF recipients at this time. The Commission nonetheless will allow service providers that are not ETCs to participate on a voluntary basis should they have ETC designation petitions pending (or may intend to file such in the future). And the Commission will allow other USF recipients who are not ETCs to participate on a voluntary basis as well. 128. In implementing the information collection, WCB and OEA should gather information from ETCs as to whether they own equipment or services from Huawei or ZTE, what that equipment is and what those services are, the cost to purchase and/or install such equipment or services, and the cost to remove and replace such equipment or services. ETCs must demonstrate how they arrived at any cost estimates they provide in response to the information collection. All submissions must be certified to ensure the accuracy of the responses. The information collection shall be mandatory for all ETCs and voluntary for others. The information collection applies to all subsidiaries and affiliates of ETCs. The Information Collection Order directs WCB to consider the potential confidentiality of any information submitted, particularly where public release of such information could raise security concerns (e.g., granular location information). The Commission expects, however, that the public interest in knowing whether a carrier uses equipment or services from Huawei or ZTE would significantly outweigh any interest the carrier would have in keeping such information confidential. As part of the information collection, the Commission directs WCB and OEA to seek any information necessary to verify responses provided by ETCs to the information collection, including by requiring further information from respondents. The Commission directs WCB and OEA to proceed expeditiously with the information collection, including by seeking emergency PRA approval from OMB, if necessary and appropriate. 129. The RFA requires an agency to describe the steps the agency has taken to minimize the significant economic VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 impact on small entities of the final rule, consistent with the stated objectives of the applicable statutes, including a statement of the factual, policy, and legal reasons in support of the final rule, and why any significant alternatives to the rule considered by the agency and which affect the impact on small entities were rejected. 130. The scope of the rule adopted in the Order is carefully limited so as to lessen its impact on small entities. Because the rule is prospective in effect, it does not prohibit the use of existing services or equipment already deployed or in use. USF recipients may continue to use equipment or services provided or produced by covered companies obtained prior to the issuance of the rule, although they may not use USF funds to purchase, obtain, maintain, improve, modify, or otherwise support such equipment or services in any way. Recipients may also continue to use their own funds to upgrade and maintain such equipment, so long as they do not use USF funds to do so. The Order also permits USF recipients to seek a waiver of the requirements. In these ways, the Order seeks to minimize the economic burden of these rules on small entities. 131. Effective Date. The rules adopted herein and the initial designations of Huawei and ZTE as covered companies shall be effective immediately upon publication in the Federal Register. 132. While a rule ordinarily will take effect 30 days after publication in the Federal Register, the Commission finds here that good cause exists to expedite the implementation of these rules and to make them effective upon publication in the Federal Register. In finding that good cause exists, the Commission applies the test articulated by the D.C. Circuit in Omnipoint Corporation v. FCC, which requires an agency to ‘‘balance the necessity for immediate implementation against principles of fundamental fairness which require that all affected persons be afforded a reasonable amount of time to prepare for the effective date of its ruling.’’ 133. The Commission first examines the necessity for immediate implementation. The record before the Commission establishes that the nature of today’s communications networks is such that untrusted participants in the supply chain pose a serious and immediate risk to the integrity and proper functioning of these networks. In addition, expediting the Commission’s process for analyzing such risks serves to minimize the scope of exposure of USF recipients to the significant flaws in their networks from future installation of equipment that may PO 00000 Frm 00042 Fmt 4700 Sfmt 4700 compromise the security of these networks, and any resulting need to replace such equipment. Against this critical national security concern the Commission balances the concerns of fairness to affected parties—including whether dispensing with the 30-day waiting period will deprive affected parties of ‘‘a reasonable time to adjust their behavior before the final rule takes effect.’’ Here, the Commission notes that the principal effect of the rules adopted in the Report and Order—restriction on the spending of USF to certain suppliers designated as a threat to national security—will not take effect until an entity is actually designated as a threat to national security under the proposed rules. Thus, no entity will be designated until—at the earliest—31 days after the effective date of the Report and Order. In other words, making these rules effective immediately upon publication in the Federal Register will not inhibit any party’s ability to ‘‘prepare for [their] effective date’’ because the rules the Commission adopts in this document does not include any requirements with which USF recipients must immediately comply. 134. While the Commission has adopted initial designations of Huawei and ZTE as covered companies, use of USF support to procure or otherwise support equipment or services produced or provided by these two companies has not and will not be disallowed until such time as PSHSB issues a public notice announcing its final determination and the effective date of any potential final designation of one or both of these companies. To the extent that accelerating the effective date requires these companies to respond more quickly to their initial designation, the Commission will provide copies of the Report and Order to both parties or their U.S. agents or affiliates immediately after release. The Commission has recognized that a finding of good cause under section 553(d)(3) can be further supported where ‘‘the Commission is serving those entities by overnight mail.’’ 135. Even were the rules the Commission adopts in this document to have an immediate impact on USF recipients, it does not believe it would affect the Commission’s findings here. Many service providers have already made the business decision to purchase equipment from alternative vendors in order to avoid security risks. Given this, and the industry’s long-standing knowledge of the risks posed by the installation and purchase of such equipment, the Commission believes that the impact of an immediate effective date would be minimal. E:\FR\FM\03JAR1.SGM 03JAR1 jbell on DSKJLSW7X2PROD with RULES Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations 136. In this case, given the critical security concerns at issue, and the fact that an expedited schedule will not impede the ability of interested parties to prepare for the implementation of the rules the Commission adopts in this document, it finds that good cause exists, in accordance with the balancing test articulated by the Court in Omnipoint, to expedite the implementation of these rules and to make them effective immediately upon publication in the Federal Register. 137. Ex Parte Presentations. This proceeding shall be treated as a ‘‘permitbut-disclose’’ proceeding in accordance with the Commission’s ex parte rules. Persons making ex parte presentations must file a copy of any written presentation or a memorandum summarizing any oral presentation within two business days after the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all persons attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) summarize all data presented and arguments made during the presentation. If the presentation consisted in whole or in part of the presentation of data or arguments already reflected in the presenter’s written comments, memoranda, or other filings in the proceeding, the presenter may provide citations to such data or arguments in his or her prior comments, memoranda, or other filings (specifying the relevant page and/or paragraph numbers where such data or arguments can be found) in lieu of summarizing them in the memorandum. Documents shown or given to Commission staff during ex parte meetings are deemed to be written ex parte presentations and must be filed consistent with rule 1.1206(b). In proceedings governed by rule 1.49(f) or for which the Commission has made available a method of electronic filing, written ex parte presentations and memoranda summarizing oral ex parte presentations, and all attachments thereto, must be filed through the electronic comment filing system available for that proceeding, and must be filed in their native format (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should familiarize themselves with the Commission’s ex parte rules. V. Ordering Clauses 138. Accordingly, it is ordered, pursuant to in sections 1–4, 201(b), 229 VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 and 254 of the Communications Act of 1934, as amended, and section 105 of the Communications Assistance for Law Enforcement Act, 47 U.S.C. 151–154, 201(b), 229, 254, 1004, that the Report and Order is adopted. 139. It is further ordered that Part 54 of the Commission’s rules is amended as set forth in the following. 140. It is further ordered that, pursuant to §§ 1.4(b)(1) and 1.103(a) of the Commission’s rules, 47 CFR 1.4(b)(1), 1.103(a), the Report and Order shall be effective immediately upon publication of the Report and Order in the Federal Register. 141. It is further ordered that, pursuant to §§ 1.4(b)(1) and 1.103(a) of the Commission’s rules, 47 CFR 1.4(b)(1), 1.103(a), the initial designations adopted in this order shall be effective immediately upon publication of the Report and Order in the Federal Register. 142. It is further ordered, pursuant to sections 1–4, 201(b) and 254 of the Communications Act of 1934, as amended, 47 U.S.C. 151–154, 201(b), 254, that the Information Collection Order is adopted. Information collection pursuant to the Order shall be effective immediately upon OMB approval. List of Subjects in 47 CFR Part 54 Communications common carriers, Health facilities, Infants and children, internet, Libraries, Reporting and recordkeeping requirements, Schools, Telecommunications, Telephone. Federal Communications Commission. Katura Jackson, Federal Register Liaison Officer, Office of the Secretary. Final Rules For the reasons discussed in the preamble, the Federal Communications Commission amends 47 part 54 as follows: PART 54—UNIVERSAL SERVICE 1. The authority citation for part 54 is revised to read as follows: ■ Authority: 47 U.S.C. 151, 154(i), 155, 201, 205, 214, 219, 220, 229, 254, 303(r), 403, 1004, and 1302 unless otherwise noted. 2. Add § 54.9 to subpart A to read as follows: ■ § 54.9 Prohibition on use of funds. (a) USF support restriction No universal service support may be used to purchase, obtain, maintain, improve, modify, or otherwise support any equipment or services produced or provided by any company posing a national security threat to the integrity PO 00000 Frm 00043 Fmt 4700 Sfmt 4700 249 of communications networks or the communications supply chain. (b) Designation of Entities Subject to Prohibition. (1) When the Public Safety and Homeland Security Bureau (PSHSB) determines, either sua sponte or in response to a petition from an outside party, that a company poses a national security threat to the integrity of communications networks or the communications supply chain, PSHSB shall issue a public notice advising that such designation has been proposed as well as the basis for such designation. (2) Upon issuance of such notice, interested parties may file comments responding to the initial designation, including proffering an opposition to the initial designation. If the initial designation is unopposed, the entity shall be deemed to pose a national security threat 31 days after the issuance of the notice. If any party opposes the initial designation, the designation shall take effect only if PSHSB determines that the affected entity should nevertheless be designated as a national security threat to the integrity of communications networks or the communications supply chain. In either case, PSHSB shall issue a second public notice announcing its final designation and the effective date of its final designation. PSHSB shall make a final designation no later than 120 days after release of its initial determination notice. PSHSB may, however, extend such 120-day deadline for good cause. (3) PSHSB will act to reverse its designation upon a finding that an entity is no longer a threat to the integrity of communications networks or the communications supply chain. A designated company, or any other interested party, may submit a petition asking PSHSB to remove a designation. PSHSB shall seek the input of Executive Branch agencies and the public upon receipt of such a petition. If the record shows that a designated company is no longer a national security threat, PSHSB shall promptly issue an order reversing its designation of that company. PSHSB may dismiss repetitive or frivolous petitions for reversal of a designation without notice and comment. If PSHSB reverses its designation, PSHSB shall issue an order announcing its decision along with the basis for its decision. (4) PSHSB shall have discretion to revise this process or follow a different process if appropriate to the circumstances, consistent with providing affected parties an opportunity to respond and with any E:\FR\FM\03JAR1.SGM 03JAR1 250 Federal Register / Vol. 85, No. 2 / Friday, January 3, 2020 / Rules and Regulations need to act expeditiously in individual cases. [FR Doc. 2019–27610 Filed 1–2–20; 8:45 am] BILLING CODE 6712–01–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration 50 CFR Part 660 [Docket No. 180625576–8999–02] RIN 0648–BJ43 Magnuson-Stevens Act Provisions; Fisheries Off West Coast States; Pacific Coast Groundfish Fishery; 2019–2020 Biennial Specifications and Management Measures; Inseason Adjustments National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Final rule; inseason adjustments to biennial groundfish management measures. AGENCY: This final rule announces routine inseason adjustments to management measures in commercial groundfish fisheries. This action is intended to allow commercial fishing vessels to access more abundant groundfish stocks while protecting overfished and depleted stocks. DATES: This final rule is effective January 2, 2020. FOR FURTHER INFORMATION CONTACT: Karen Palmigiano, phone: 206–526– 4491 or email: karen.palmigiano@noaa. gov. SUMMARY: Electronic Access This rule is accessible via the internet at the Office of the Federal Register website at https:// www.federalregister.gov. Background information and documents are available at the Pacific Fishery Management Council’s website at https:// www.pcouncil.org/. SUPPLEMENTARY INFORMATION: jbell on DSKJLSW7X2PROD with RULES Background The Pacific Coast Groundfish Fishery Management Plan (PCGFMP) and its implementing regulations at 50 CFR part 660, subparts C through G, regulate fishing for over 90 species of groundfish off the coasts of Washington, Oregon, and California. The Pacific Fishery Management Council (Council) develops groundfish harvest specifications and management VerDate Sep<11>2014 16:16 Jan 02, 2020 Jkt 250001 measures for two-year periods (i.e., a biennium). NMFS published the final rule to implement harvest specifications and management measures for the 2019–2020 biennium for most species managed under the PCGFMP on December 12, 2018 (83 FR 63970). In general, the management measures set at the start of the biennial harvest specifications cycle help the various sectors of the fishery attain, but not exceed, the catch limits for each stock. The Council, in coordination with Pacific Coast Treaty Indian Tribes and the States of Washington, Oregon, and California, recommends adjustments to the management measures during the fishing year to achieve this goal. Pacific Coast groundfish fisheries are managed using harvest specifications or limits (e.g., overfishing limits [OFL], acceptable biological catch [ABC], annual catch limits [ACL] and harvest guidelines [HG]) which are recommended biennially by the Council and based on the best scientific information available at that time (50 CFR 660.60(b)). During development of the harvest specifications, the Council also recommends management measures (e.g., trip limits, area closures, and bag limits) that are meant to mitigate catch so as not to exceed the harvest specifications. The harvest specifications and mitigation measures developed for the 2019–2020 biennium used data through the 2017 fishing year. Throughout the 2019 fishing year, the Council’s Groundfish Management Team (GMT) monitored inseason catch and updated catch projections based on new information as it became available. Based on those updated projections, and requests from Council and industry members to investigate potential for inseason trip limit adjustments, the Council recommended adjustments to management measures at its March, April, June, and September meetings. NMFS subsequently implemented each of the Council’s recommendations through final rule and made a total of 13 adjustments during the 2019 fishing year (84 FR 25708, June 4, 2019; 84 FR 37780, August 2, 2019; 84 FR 56142, October 21, 2019). Each of the adjustments to management measures were based on updated fisheries information that was unavailable when the analysis for the current harvest specifications was completed. At its November 14–20, 2019 meeting, the Council recommended adjustments to the trip limits for vessels in the limited entry fixed gear (LEFG) and open access (OA) fisheries that are targeting sablefish, lingcod, the Minor Slope rockfish complex and darkblotched rockfish, the Minor PO 00000 Frm 00044 Fmt 4700 Sfmt 4700 Nearshore Rockfish complex, deeper nearshore rockfish complex, and bocaccio for 2020. The Council also recommended adjustments to the Shorebased Individual Fishing Quota (IFQ) Program fishery trip limits for big skate for 2020. The following adjustments rely on analysis of commercial fisheries data through mid-November 2019 to inform catch projections for 2020 under the current trip limits. As new fisheries data becomes available, adjustments to management measures are implemented so as to help harvesters achieve but not exceed the harvest limits. Sablefish Trip Limits Sablefish is an important commercial species on the West Coast with vessels targeting sablefish with both trawl and fixed gear (longlines and pots/traps). Sablefish is managed with area specific ACLs that are apportioned north and south of 36° N lat. with 73.8 percent going to the north and 26.2 percent going to the south. Sablefish North In 2019, the ACL for sablefish north of 36° N lat. is 5,606 mt with a fishery harvest guideline of 5,007 mt. For 2020, the ACL for sablefish north is 5,723 mt, with a fishery harvest guideline of 5,113 mt. The fishery harvest guideline for the area north of 36 N lat. is further divided between the LEFG and OA sectors with 90.6 percent going to the LEFG sector and 9.4 percent going to the OA sector. In 2019, the Council recommended, and NMFS implemented, two inseason adjustments to increase trip limits for LEFG and OA vessels targeting sablefish north and south of 36° N lat. (84 FR 37780, August 2, 2019; 84 FR 56142, October 21, 2019). These trip limit increases were possible because of unanticipated low sablefish prices that contributed to less than projected fishery participation throughout 2019. This low participation resulted in total attainment, as of November 2019, of around 50 percent of the LEFG and OA portion of the fishery harvest guideline for the area north of 36° N lat. and total attainment around 10 percent of fixed gear portion of the fishery harvest guideline south of 36° N lat. At the November 2019 Council meeting, the Council’s GMT made model-based landings projections under current trip limits for 2020 based on the most recent catch information available through mid-November 2019. According to the projections, under the current trip limits, the LEFG and OA sectors targeting sablefish north of 36° N lat. would likely exceed their portion of the fishery harvest guidelines in 2020 by 10 E:\FR\FM\03JAR1.SGM 03JAR1

Agencies

[Federal Register Volume 85, Number 2 (Friday, January 3, 2020)]
[Rules and Regulations]
[Pages 230-250]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-27610]


=======================================================================
-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Part 54

[WC Docket No. 18-89, PS Docket Nos. 19-351, 19-352; FCC 19-121; FRS 
16315]


Protecting Against National Security Threats to the 
Communications Supply Chain Through FCC Programs; Huawei Designation; 
ZTE Designation

AGENCY: Federal Communications Commission.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: In this document, the Federal Communications Commission 
(Commission) adopts a rule that prospectively prohibits the use of 
Universal Service Fund (USF or the Fund) funds to purchase or obtain 
any equipment or services produced or provided by a covered company 
posing a national security threat to the integrity of communications 
networks or the communications supply chain. In doing so, the Report 
and Order initially designates Huawei Technologies Company (Huawei) and 
ZTE Corporation (ZTE) as covered companies for purposes of the rule and 
establish a process for designating additional covered companies in the 
future. To support the Commission's future efforts to protect the 
communications supply chain, the Information Collection Order (Order) 
directs the Wireline Competition Bureau (WCB) and Office of Economics 
and Analytics (OEA), in coordination with USAC, to conduct an 
information collection to determine the extent to which potentially 
prohibited equipment exists in current networks and the costs 
associated with removing such equipment and replacing it with 
equivalent equipment.

DATES: Effective January 3, 2020.

FOR FURTHER INFORMATION CONTACT: For further information, please 
contact John Visclosky, Competition Policy Division, Wireline 
Competition Bureau, at [email protected].

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report 
and Order and Order in WC Docket No. 18-89 and PS Docket Nos. 19-351 
and 19-352, adopted November 22, 2019 and released November 26, 2019. 
The full text of this document is available for public inspection 
during regular business hours in the FCC Reference Information Center, 
Portals II, 445 12th Street SW, Room CY-A257, Washington, DC 20554 or 
at the following internet address: https://docs.fcc.gov/public/attachments/FCC-19-121A1.pdf . The Further Notice of Proposed 
Rulemaking that was adopted concurrently with this Report and Order and 
Order is published elsewhere in the Federal Register.
    Comments on the initial designations of Huawei and ZTE as covered 
companies are due on or before February 3, 2020.
    Pursuant to sections 1.415 and 1.419 of the Commission's rules, 47 
CFR 1.415, 1.419, interested parties may file comments on or before the 
dates indicated on the first page of this document. Comments may be 
filed using the Commission's Electronic Comment Filing System (ECFS). 
See Electronic Filing of Documents in Rulemaking Proceedings, 63 FR 
24121 (1998). Interested parties may file comments, identified by PS 
Docket No. 19-351 for the Huawei final designation proceeding or PS 
Docket No. 19-352 for the ZTE final designation proceeding, by any of 
the following methods:
    [ssquf] Electronic Filers: Comments may be filed electronically 
using the internet by accessing the ECFS: https://www.fcc.gov/ecfs/.
    [ssquf] Paper Filers: Parties who choose to file by paper must file 
an original and one copy of each filing. If more than one docket or 
rulemaking number appears in the caption of this proceeding, filers 
must submit two additional copies for each additional docket or 
rulemaking number. Filings can be sent by hand or messenger delivery, 
by commercial overnight courier, or by first-class or overnight U.S. 
Postal Service mail. All filings must be addressed to the Commission's 
Secretary, Office of the Secretary, Federal Communications Commission.
     All hand-delivered or messenger-delivered paper filings 
for the Commission's Secretary must be delivered to FCC Headquarters at 
445 12th St. SW, Room TW-A325, Washington, DC 20554. The filing hours 
are 8:00 a.m. to 7:00 p.m. All hand deliveries must be held together 
with rubber bands or fasteners. Any envelopes and boxes must be 
disposed of before entering the building.
     Commercial overnight mail (other than U.S. Postal Service 
Express Mail and Priority Mail) must be sent to 9050 Junction Drive, 
Annapolis Junction, MD 20701.
     U.S. Postal Service first-class, Express, and Priority 
mail must be addressed to 445 12th Street SW, Washington, DC 20554.
    People with Disabilities: To request materials in accessible 
formats for people with disabilities (braille, large print, electronic 
files, audio format), send an email to [email protected] or call the 
Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-
418-0432 (tty).
    Comments and reply comments must include a short and concise 
summary of the substantive arguments raised in the pleading. Comments 
and reply comments must also comply with section 1.49 and all other 
applicable sections of the Commission's rules. The Commission directs 
all interested parties to include the name of the filing party and the 
date of the filing on each page of their comments and reply comments. 
All parties are encouraged to use a table of contents, regardless of 
the length of their submission.

I. Introduction

    1. In today's increasingly connected world, safeguarding the 
security and integrity of America's communications infrastructure has 
never been more important. Broadband networks have transformed 
virtually every aspect of the U.S. economy, enabling the voice, data, 
and internet connectivity that fuels all other critical industry 
sectors--including our transportation systems, electrical grid, 
financial markets, and emergency services. And with the advent of 5G--
the next generation of wireless technologies, which is expected to 
deliver exponential increases in speed, responsiveness, and capacity--
the crucial and transformative role of communications networks in our 
economy and society will only increase. It is therefore vital that the 
Commission protects these networks from national security threats.
    2. The Commission has taken a number of targeted steps to protect 
the nation's communications networks from potential security threats. 
In this document, the Commission builds on these efforts, consistent 
with concurrent Congressional and Executive Branch actions, and ensure 
that the public funds used in the Commission's USF funds are not used 
in a way that undermines or poses a threat to our national security. 
Specifically, in the Report and Order, the Commission adopts a rule 
that prospectively prohibits the use of USF funds to purchase or obtain 
any equipment or services produced or provided by a

[[Page 231]]

covered company posing a national security threat to the integrity of 
communications networks or the communications supply chain. In doing 
so, the Commission initially designates Huawei and ZTE as covered 
companies for purposes of this rule and establish a process for 
designating additional covered companies in the future.
    3. Given the Commission's oversight of the USF programs that fund 
voice and broadband networks and services and the Commission's 
obligation to be responsible stewards of the public funds that 
subsidize those programs, the Commission has a specific, but important, 
role to play in securing the communications supply chain. The 
Commission believes that the steps the Commission takes in the document 
are consistent with this role, that the Commission must do all it can 
within the confines of its legal authority to address national security 
threats, and that its actions, along with those taken by other 
Executive Branch agencies, will go far in securing our nation's 
critical telecommunications infrastructure.

II. Report and Order

    4. Based on the Commission's review of the extensive record in the 
proceeding, it adopts a rule that no universal service support may be 
used to purchase or obtain any equipment or services produced or 
provided by a covered company posing a national security threat to the 
integrity of communications networks or the communications supply 
chain. Accordingly, USF recipients may not use USF funds to maintain, 
improve, modify, operate, manage, or otherwise support such equipment 
or services in any way, including upgrades to existing equipment and 
services. This prohibition applies to any subsidiaries and affiliates 
of USF recipients to the extent that such subsidiaries and affiliates 
use USF funds.
    5. In addition to adopting the rule, the Commission initially 
designates Huawei and ZTE as covered companies for the purposes of this 
prohibition. Both companies' ties to the Chinese government and 
military apparatus--together with Chinese laws obligating them to 
cooperate with any request by the Chinese government to use or access 
their systems--pose a threat to the security of communications networks 
and the communications supply chain and necessitate taking this step. 
The Commission's actions in this document are informed by the evidence 
cited herein, including the actions of other agencies and branches of 
the government and similar assessments from other countries.
    6. As the Commission stated in the Protecting Against National 
Security Threats Notice, the promotion of national security is 
consistent with the public interest, and USF funds should be used to 
deploy infrastructure and provide services that do not undermine our 
national security. The Commission has long accorded significant weight 
to the views of Executive Branch agencies on matters of national 
security, foreign policy, law enforcement, and trade policy, and the 
Commission finds it very significant that the U.S. Department of 
Justice (DoJ) has expressed its strong support for this conclusion. The 
Commission also agrees with the Telecommunications Industry Association 
(TIA) that the Commission ``may reasonably conclude that limiting the 
use of technology from certain vendors deemed to pose a heightened 
national security risk is an appropriate element of providing a quality 
communications service.'' The record persuades the Commission that the 
nature of today's communications networks is such that untrusted 
participants in the supply chain pose a serious risk to the integrity 
and, thus, the quality of those networks.
    7. It is well established that the Commission has authority to 
place reasonable public-interest conditions on the use of USF funds. In 
the 2011 USF/ICC Transformation Order, 76 FR 73830, November 29, 2011, 
the Commission determined that supported services must be provided 
using broadband-capable networks and that ETCs must offer broadband 
services that meet certain basic performance requirements. As the Tenth 
Circuit held in upholding the Commission's imposition of these 
obligations, section 254(c)(1) does not limit the Commission's 
authority to place conditions on the use of USF funds, and section 
254(e) is reasonably interpreted as allowing the Commission ``to 
specify what a USF recipient may or must do with the funds,'' 
consistent with the policy principles outlined in section 254(b). The 
Commission adopts the rule as just such a restriction, based on its 
conclusion that it is critical to the provision of ``quality service'' 
that USF funds be spent on secure networks and not be spent on 
equipment and services from companies that threaten national security. 
Or, to put it another way, providing a secure service is part of 
providing a quality service.
    8. The Commission disagrees with commenters who suggest that 
adopting the rule violates the principle that ``[q]uality services 
should be available at just, reasonable, and affordable rates.'' As TIA 
points out, many companies have been able to provide quality services 
at reasonable and affordable rates using suppliers whose quality, and 
risk to our national security, is not being questioned here. 
Furthermore, the Commission is not persuaded by arguments that the 
proposed rule would violate this principle by eliminating low-cost 
suppliers. Again, the record clearly demonstrates that service can be 
provided at just, reasonable, and affordable rates without these 
suppliers. Additionally, there is evidence that those low costs are 
likely due to favorable subsidies and other benefits bestowed by 
governments that are in an adversarial position to the United States. 
To the extent that certain vendors are able to offer lower prices for 
their equipment or services due to subsidization from foreign 
governments that pose a national security threat, restricting federal 
funding to those vendors should unleash competition from more-trusted, 
higher-quality suppliers in the long run, resulting in significant 
public interest benefits. Furthermore, the Commission would be shirking 
its responsibility to the American public if it were to ignore threats 
to our security posed by certain equipment manufacturers simply because 
that equipment was cheaper.
    9. Moreover, the Commission must ensure that universal service 
funds are being spent in a manner consistent with section 254 of the 
Act. Section 254(e) requires that USF recipients ``shall use that 
support only for the provision, maintenance, and upgrading of 
facilities and services for which the support is intended.'' This 
language authorizes the Commission to designate the services for which 
USF support will be provided and to ``encourage the deployment of the 
types of facilities that will best achieve the principles set forth in 
section 254(b).'' The Commission also must define the services 
supported by USF, which the statute explains is to be ``an evolving 
level of telecommunications services that the Commission shall 
establish periodically under this section.'' In so doing, the 
Commission ``shall consider . . . the extent to which such 
telecommunications services . . . are consistent with the public 
interest, convenience, and necessity.'' Again, the Commission concludes 
that the public interest requires that the USF support only services 
that are not dependent on equipment and services provided or produced 
by any company that poses a national security threat. The Commission's 
decision here to limit the services that will be supported by USF is 
especially consistent with public safety, under section 254(c)(1)(A), 
and

[[Page 232]]

with the public interest, convenience, and necessity, under section 
254(c)(1)(D).
    10. To the extent parties contend that the Commission may not 
change what it establishes as the ``evolving level of 
telecommunications services'' to be supported by USF without first 
seeking the recommendation of the Joint Board, the Commission 
disagrees. Section 254(c)(1) requires the Commission to establish the 
definition of universal service; it allows the Joint Board to issue a 
recommendation but does not require Commission action to be preceded by 
such a recommendation. The Commission has acted under this provision 
several times without following a recommendation of the Joint Board--
for example in the 2014 First E-Rate Order, 80 FR 167, January 5, 2015, 
and the 2016 Lifeline Order, 81 FR 33026, May 24, 2016.
    11. The Commission also rejects arguments that it may not consider 
national security in assessing the public interest generally or under 
section 254. Indeed, the security of our nation is an important part of 
the public interest. That's why the Commission has consistently held, 
including in the Protecting Against National Security Threats Notice in 
the proceeding, that national security concerns are part of the public 
interest and that the Commission's exercise of specific statutory 
authorities should, when warranted, take those concerns into account. 
As discussed in the Protecting Against National Security Threats 
Notice, the Commission adopted rules implementing the 2012 Spectrum Act 
to prohibit participation in spectrum auctions by entities that have 
been barred by any federal agency from bidding on a contract, 
participating in an auction, or receiving a grant. The Commission also 
has a long history of considering national security equities where 
other agencies have specific expertise and are positioned to make 
recommendations, and adopting a similar process here cannot be 
characterized as ``promot[ing] other, unrelated objectives'' unrelated 
to the specific regulatory program at hand.
    12. More generally, section 201(b) of the Act authorizes the 
Commission to promulgate ``such rules and regulations as may be 
necessary in the public interest to carry out the provisions of this 
Act.'' It is well-established that the promotion of national security 
is consistent with the public interest and part of the purpose for 
which the Commission was created. As section 1 of the Act states, the 
Commission was created ``for the purpose of the national defense [and] 
for the purpose of promoting safety of life and property through the 
use of wire and radio communication . . . .'' The Commission concludes 
based on the record of the proceeding that it is necessary in the 
public interest to prohibit USF recipients from spending universal 
service funds on covered equipment or services.
    13. The action the Commission takes in this document also 
implements section 105 of the Communications Assistance for Law 
Enforcement Act (CALEA). That section requires every telecommunications 
carrier to ensure that any interception of communications or access to 
call-identifying information effected within its switching premises can 
be activated only pursuant to a lawful authorization and with the 
affirmative intervention of an officer or employee of the carrier. The 
Commission has concluded that all facilities-based providers of 
broadband internet access services and all providers of interconnected 
VoIP services are telecommunications carriers under CALEA. The 
Commission has interpreted ``switching premises'' consistent with the 
purpose of CALEA as including ``routers, soft switches, and other 
equipment that may provide addressing and intelligence functions for 
packet-based communications to manage and direct the communications 
along to their intended destinations.'' One of the dangers of allowing 
equipment from untrusted suppliers to be part of a network is the 
possibility that those suppliers will maintain the ability to illegally 
activate interceptions or other forms of surveillance within the 
carrier's switching premises without its knowledge, whether through the 
insertion of malicious hardware or software implants, remote network 
access maintained by providers of managed services, or otherwise. 
Telecommunications carriers, including all ETCs, therefore appear to 
have a duty to avoid such risks.
    14. The Commission disagrees with Huawei that its recognition of 
this duty is barred by section 103(b)(1) of CALEA, 47 U.S.C. 
1002(b)(1). The rule the Commission adopts in this document addresses 
only the use of USF funds and does not prohibit the ``adoption of any 
equipment.'' Furthermore, the Commission is not a ``law enforcement 
agency'' within the meaning of section 103(b)(1); in the context of 
CALEA, that term refers to agencies that conduct interceptions and 
access to call-identifying information.
    15. The Commission is authorized to ``prescribe such rules as are 
necessary to implement the requirements of'' CALEA and specifically to 
require carriers to establish policies and procedures to prevent 
unauthorized surveillance. Though the rule the Commission adopts in 
this document applies only to ETCs' use of USF funds, it disagrees with 
Huawei's argument that the link between this obligation and the 
prohibition the Commission adopts here is ``remote.'' The rule the 
Commission adopts in this document directly implements section 105 of 
CALEA by reducing the likelihood that ETCs use USF funds to facilitate 
unauthorized surveillance. Nor does the rule require, as Huawei 
suggests, that the Commission interprets section 105 ``as prohibiting 
carriers from using any equipment that has any possibility, no matter 
how remote, of being subject to unauthorized access for purposes of 
intercepting communications.'' But use of equipment or services from 
companies that pose national security threats is far more likely to be 
subject to such unauthorized access, and the Commission chooses here 
not to allow USF funds to support such use.
    16. The Commission further disagrees with Huawei's contention that 
CALEA's security provision does not apply to attempts by actors other 
than U.S. law enforcement to intercept or access communications. The 
plain language of section 105 specifies not only the activation of the 
assistance capabilities required by section 103 but any interception or 
access effected within a carrier's switching premises. This 
understanding of the plain language is consistent with its legislative 
history. The bills reported by the House and Senate Judiciary 
Committees used different language limiting the security obligation 
only to ``any court ordered or lawfully authorized interception of 
communications or access to call-identifying information within its 
switching premises,'' but that language was revised in consultation 
with the House Energy and Commerce Committee in the version of the bill 
ultimately considered and adopted on the floor of both Houses. The 
Commission considers the change to be purposeful and to reflect 
Congress's understanding of CALEA as enacting protections against 
unauthorized surveillance, not only as ensuring the ability of law 
enforcement to conduct authorized surveillance.
    17. Congress has also determined, in section 889 of the National 
Defense Authorization Act for Fiscal Year 2019 (2019 NDAA), that the 
expenditure of loan or grant funds by federal agencies to procure or 
obtain covered telecommunications equipment or services is contrary to 
the security interests of the United States. Although

[[Page 233]]

the USF is neither a loan program nor a grant program, it is a 
significant source of funds administered by the Commission and intended 
for the purchase of equipment, services, or systems with which section 
889 is concerned. The Commission finds that the goals underlying 
section 889 of the 2019 NDAA also support its decision to take action 
here. Following enactment of the 2019 NDAA, the WCB sought comment on 
the relevance of section 889(b)(1) to the proceeding. The record now 
persuades the Commission that adoption of a rule that prohibits 
universal service funds from being used to obtain equipment or services 
produced or provided by companies that pose a threat to national 
security, and the Commission's initial designation of Huawei and ZTE as 
such companies, is consistent with section 889 of the 2019 NDAA. The 
Commission agrees with TIA that section 889 ``codifies a determination 
by Congress regarding five specific suppliers of concern,'' including 
Huawei and ZTE, and expresses a view that ``the role of the Commission 
and other executive agencies is to prevent the use of federal funds 
under their control on equipment and services from [those] suppliers of 
concern.''
    18. The Commission establishes a process for designating entities 
as national security threats for purposes of its rule. The Commission 
first defines ``covered company'' to include subsidiaries, parents and 
affiliates of covered companies for purposes of the rule it adopts in 
this document. In the Protecting Against National Security Threats 
Notice, the Commission sought comment on whether a covered company's 
subsidiaries, parents, and/or affiliates should be treated as a covered 
company as well and sought comment on how to define such entities. 
Because equipment from subsidiaries, parents, and affiliates pose the 
same risks to network integrity as equipment directly from the covered 
company, the Commission includes any subsidiary, parent, or affiliate 
of a covered company as a covered company subject to its prohibition.
    19. When the Commission initially determines, either sua sponte or 
in response to a petition from an outside party, that a company poses a 
national security threat to the integrity of communications networks or 
the communications supply chain, the Commission will issue a public 
notice advising that such initial designation has been made, as well as 
the basis for such designation. This public notice shall serve as an 
``initial designation'' of a covered company. Upon the issuance of such 
notice, interested parties may file comments responding to the initial 
designation, including proffering an opposition to the initial 
designation. If the initial designation is unopposed, the entity shall 
be deemed to pose a national security threat 31 days after the issuance 
of the notice. If any party opposes the initial designation, the 
designation shall take effect only if the Commission determines that 
the affected entity should nevertheless be designated as a covered 
company under the Commission's rule. In either case, the Commission 
shall issue a second public notice announcing its final designation and 
the effective date of that final designation. This public notice shall 
serve as the ``final designation'' of a covered company. In order to 
provide regulatory certainty to entities affected by initial 
designations, the Commission shall make a final designation effective 
no later than 120 days after release of its initial designation notice. 
The Commission may, however, extend such 120-day deadline for good 
cause.
    20. In formulating its initial and final designations, the 
Commission will use all available evidence to determine whether an 
entity poses a national security threat. Examples of such evidence may 
include, but are not limited to: determinations by the Commission, 
Congress or the President that an entity poses a national security 
threat; determinations by other executive agencies that an entity poses 
a national security threat; and, any other available evidence, whether 
open source or classified, that an entity poses a national security 
threat. Where appropriate, the Commission will seek to harmonize its 
determinations with the determinations of other federal agencies in the 
Executive branch and determinations of the Legislative branch. The 
Commission will base its determination on the totality of evidence 
surrounding the affected entity and should consider any evidence 
provided by the affected entity, or any other interested party, in 
making its final determination. However, classified information will 
not be made public, nor will it be made available to the designated 
company.
    21. Reversal of Designation. The Commission will act to reverse its 
designation upon a finding that a covered company no longer poses a 
national security threat to the integrity of communications networks or 
the communications supply chain. A covered company, or any other 
interested party, may submit a petition asking the Commission to remove 
a designation based on a showing of changed circumstances. The 
Commission shall seek the input of Executive Branch agencies and the 
public upon receipt of such a petition. If the record shows that a 
covered company is no longer a national security threat, the Commission 
shall promptly issue an order reversing its designation of that 
company. The Commission may dismiss repetitive or frivolous petitions 
for reversal of a designation without notice and comment--and may 
dismiss petitions that make no showing of changed circumstances or 
attempt to evade the limits the Commission's rules place on petitions 
for reconsideration or applications for review. If the Commission 
reverses its designation, it shall issue an order announcing its 
decision along with the basis for its decision.
    22. In the Protecting Against National Security Threats Notice, the 
Commission highlighted the longstanding concerns about the threats 
posed by Huawei and ZTE, including by other Executive Branch agencies 
and Congress. Both companies, as well as their subsidiaries and 
affiliates, are restricted from selling certain equipment and services 
to federal agencies due to Congressional and Executive Branch concern 
about the threat their equipment and services pose to the 
communications supply chain. Huawei vigorously responded to these 
allegations in the record of the proceeding, and ZTE did not make any 
filings in the proceeding. The Commission's examination of the record 
re-affirms the concerns raised by them in the Protecting Against 
National Security Threats Notice, and the Commission therefore takes 
the step of initially designating Huawei and ZTE as covered companies 
for purposes of the prohibition the Commission adopts in this document.
    23. The Commission concludes that publicly available information in 
the record is sufficient to support these designations. In addition, 
the Commission has compiled and reviewed additional classified national 
security information that provides further support for its 
determinations.
    24. The Commission agrees with commenters who argue that ``state 
actors, most notably China and Russia, have supported extensive and 
damaging cyberespionage efforts in the United States,'' and there 
exists a ``substantial body of evidence'' about the risks of certain 
equipment providers like Huawei and ZTE. International experts have 
found that China has a ``notorious reputation for persistent industrial 
espionage, and in particular for the close collaboration between 
government and Chinese industry.'' Allies of the

[[Page 234]]

United States have discovered numerous instances where the Chinese 
government has engaged in malicious acts, including ``actors likely 
associated with the . . . Ministry of State Security . . . responsible 
for the compromise of several Managed Service Providers.'' And as noted 
in the 2012 HPSCI Report, Huawei and ZTE are the ``two largest Chinese-
founded, Chinese-owned telecommunications companies seeking to market 
critical network equipment to the United States.''
    25. These two companies pose a great security risk because Chinese 
intelligence agencies have opportunities to tamper with their products 
in both the design and manufacturing processes. The 2012 HPSCI Report 
observed that the risks posed by companies such as Huawei are further 
exacerbated because the company offers services managing 
telecommunications equipment and its ``authorized access'' could be 
exploited ``for malicious activity under the guise of legitimate 
assistance.'' This legislative concern has continued, with Congress 
passing, and the President signing into law, significant restrictions 
on the purchase of equipment and services from Huawei and ZTE. And, in 
the proceeding, the Attorney General has agreed that ``a company's ties 
to a foreign government and willingness to take direction from it bear 
on its reliability'' for building or servicing telecommunications 
networks with the support of federal funds. As explained in the 
following, the Commission believes that Huawei and ZTE pose a unique 
threat to the security of communications networks and the 
communications supply chain because of their size, their close ties to 
the Chinese government both as a function of Chinese law and as a 
matter of fact, the security flaws in their equipment, and the unique 
end-to-end nature of Huawei's service agreements that allow it key 
access to exploit for malicious purposes. As a consequence, the 
Commission's primary focus is on Huawei and ZTE.
    26. The Commission notes, at the outset, that the Chinese 
government is highly centralized and exercises strong control over 
commercial entities, permitting the government, including state 
intelligence agencies, to demand that private communications sector 
entities cooperate with any governmental requests, which could involve 
revealing customer information, including network traffic information. 
The Department of Justice says that the Chinese government ``has 
subsidized [its] firms to lock up as much of the market as possible,'' 
which ``threatens to thwart the emergence of fair competition and lead 
to irreversible market dominance that will force all of us onto Chinese 
systems, causing unmitigable harm to our national security.'' According 
to Article 7 of the Chinese National Intelligence Law (NIL), all 
``organizations and citizens shall, according to the law, provide 
support and assistance to and cooperate with the State intelligence 
work, and keep secret the State intelligence work that they know.'' 
Article 14 permits Chinese intelligence institutions to request that 
Chinese citizens and organizations provide necessary support, 
assistance, and cooperation. Article 17 allows Chinese intelligence 
agencies to take control of an organization's facilities, including 
communications equipment. The Chinese NIL is extremely broad, applying 
to Chinese citizens residing outside of China. Article 11 specifies 
that the law's powers are not limited to Chinese soil, which would 
permit Chinese government elements to compel Huawei and ZTE to carry 
out their directives within the United States' national boundaries. 
Further, Article 28 of the NIL allows personnel to be punished for 
violating the Chinese NIL. This broad authority to compel support and 
assistance to Chinese intelligence agencies is particularly 
troublesome, given the Chinese government's involvement in computer 
intrusions and attacks as well as economic espionage. As a consequence, 
the Commission's primary focus in the Report and Order is on Huawei and 
ZTE.
    27. The Commission initially designates Huawei, along with its 
parents, affiliates, and subsidiaries, as a covered company for 
purposes of the Commission's rule.
    28. The Commission finds that Huawei's ties to the Chinese 
government and military apparatus, along with Chinese laws obligating 
them to cooperate with any request by the Chinese government to use or 
access their system, pose a threat to the security of communications 
networks and the communications supply chain. Congress and the 
Executive Branch have repeatedly expressed concerns regarding Huawei, 
its ties to the Chinese government, and its equipment. In addition to 
reports recommending that government agencies, federal contractors, and 
private-sector entities consider excluding Huawei and ZTE equipment 
from their networks due to long-term security risks and the companies' 
close ties to the Chinese government, Congress has also taken action to 
limit the purchase of certain Huawei and ZTE equipment and services for 
federally funded networks. Additionally, the Department of Commerce has 
added Huawei to its Entity List, which ``identifies entities for which 
there is reasonable cause to believe, based on specific and articulable 
facts, have been involved, are involved, or pose a significant risk of 
being or becoming involved in activities contrary to the national 
security or foreign policy interests of the United States.'' These 
concerns center around Huawei's established relationship with the 
Chinese government as well as Huawei's obligation under Chinese law to 
cooperate with requests by the Chinese government for access to their 
system.
    29. Although Huawei argues that its affiliates in the United States 
are not subject to state security laws, the Commission is not persuaded 
to excuse these affiliates from the scope of the Commission's 
prohibition. One expert has noted that the nature of the Chinese system 
``recognizes no limits to government power.'' Irrespective of their 
physical location, these affiliates still remain subject to Chinese 
law.
    30. As the House Permanent Select Committee on Intelligence found, 
``the Chinese government and the Chinese Communist Party . . . can 
exert influence over the corporate boards and management of private 
sector companies, either formally through personnel choices, or in more 
subtle ways.'' For example, Huawei's founder, Ren Zhengfei, is himself 
believed to be a former director of the People's Liberation Army 
Information Engineering Academy, an organization associated with 
China's signals intelligence. Ren Zhengfei exercises ``ultimate veto 
authority over the company's material decisions.'' Additionally, the 
Chinese government maintains an internal Communist Party Committee 
within Huawei that can exert additional influence on the company's 
operations and decisions. The House Permanent Select Committee on 
Intelligence also received internal Huawei documentation from former 
Huawei employees ``showing that Huawei provides special network 
services to an entity the employee believes to be an elite cyber-
warfare unit within the PLA.''
    31. Moreover, analysts have found that while ``Huawei claims the 
Chinese state has no influence over its activities, . . . the company 
is treated as a state-owned enterprise and has benefited from state 
procurement funds, subsidized financing from state-owned policy banks 
and state funding for research.'' Huawei is reported to benefit from 
vast subsidies from the Chinese government, to include state-controlled

[[Page 235]]

financial organizations. One study ``identified 32 cases since 2012 
where Huawei projects were funded by Exim Bank of China ($2.8 billion) 
or China Development Bank ($7 billion).'' In 1998, it was reported that 
China Construction Bank provided over $470 million in lines of credit 
to foreign companies as incentive to purchase Huawei products. This 
initiative accounted for over 45% of the bank's annual extension of 
credit. While Huawei has refused to answer questions about its 
ownership and governance, it can be inferred that the Chinese 
government clearly has a vested interest in the company's success.
    32. The Commission's actions in this document are also informed by 
the actions of other agencies and branches of the government, along 
with the increasing caution urged by our nation's intelligence 
officials. For example, in February 2018, the leaders of all six top 
U.S. intelligence agencies warned against purchasing products or 
services from Huawei or ZTE with FBI Director Chris Wray saying, ``the 
Commission is deeply concerned about the risks of allowing any company 
or entity that is beholden to foreign governments that don't share the 
Commission's values to gain positions of power inside our 
telecommunications networks that provides the capacity to exert 
pressure or control over the Commission's telecommunications 
infrastructure.'' The Department of Justice (DoJ) has also stated its 
``strong[] support'' for the Commission's action in this document, 
noting that it is pursuing numerous criminal charges against Huawei for 
violations of federal law and ``a willingness to break U.S. law 
combined with a determination to avoid the consequences by obstructing 
justice argues against the reliability of the provider.''
    33. In initially designating Huawei as a covered company, the 
Commission also relies on similar assessments by other countries. For 
example, on October 9, 2019, the European Union, with the support of 
the European Commission and the European Union Agency for 
Cybersecurity, released its risk assessment on 5G Security, 
specifically finding a high security risk where hostile countries 
exercise pressure on suppliers to facilitate cyberattacks serving their 
national interests. Many of our allies, including Australia, New 
Zealand, and Japan, have taken steps to exclude Huawei equipment from 
their networks. While Huawei argues that its equipment is used in other 
countries without undermining any nation's security, several of the 
United States' closest allies have concluded that the risk posed by 
Huawei equipment and systems is too great to bear. In November 2018, 
New Zealand's intelligence agency barred its largest telecommunications 
carrier, Sparc, from using Huawei equipment. Likewise, in December 
2018, Japan excluded Huawei from its domestic communications 
infrastructure. Additionally, in August 2019, the Australian government 
announced a ban on Huawei equipment. The Commission also notes that 
communications service providers in other countries, including BT, 
Orange, and Deutsche Telekom, are acting to keep Huawei equipment out 
of their 5G networks.
    34. Moreover, the Commission is confident that the national 
security risk to our communications network from permitting Huawei 
equipment and services is significant. For example, in 2019, Finite 
State, a cybersecurity firm, issued a report describing the unique 
threat posed by Huawei's ``high number'' of security vulnerabilities. 
The report found that over half of the Huawei firmware images analyzed 
had at least one potential backdoor that could allow an attacker with 
knowledge of the firmware to log into the device, and that Huawei 
continues to make firmware updates without addressing these 
vulnerabilities. Finite State articulates the concern that suppliers of 
technology, such as Huawei, with ``secret or overt access to the 
infrastructure they are providing,'' could use that access ``in times 
of peace, or perhaps [for] something far more ominous in times of 
conflict.''
    35. Also in 2019, the United Kingdom's Huawei Cyber Security 
Evaluation Centre Oversight Board released a report that sounded the 
alarm about the risks associated with Huawei's engineering processes. 
The report further revealed that Huawei had made no substantive gains 
in the remediation of issues reported in the previous year, noting 
that, ``[a]t present, the Oversight Board has not yet seen anything to 
give it confidence in Huawei's capacity to successfully complete the 
elements of its transformation program that it has proposed as a means 
of addressing these underlying defects.'' Further, in a 2013 report, 
the Intelligence and Security Committee of the UK Parliament said, 
``theoretically, the Chinese State may be able to exploit any 
vulnerability in Huawei's equipment in order to gain some access to the 
BT network, which would provide them with an attractive espionage 
opportunity.''
    36. Furthermore, a recent report from Recorded Future, a cyber 
threat intelligence firm, found that ``[t]he enormous range of products 
and services offered by Huawei generates a nearly unimaginable amount 
of data for one company to possess.'' This problem is compounded by 
Huawei's ``desire to be an end-to-end provider for whole network 
solutions.'' As the 2012 HPSCI Report found, when companies ``seek to 
control the market for sensitive equipment and infrastructure that 
could be used for spying and other malicious purposes, the lack of 
market diversity becomes a national concern for the United States and 
other countries.'' Huawei's desire to limit diversity in equipment 
poses a threat to the security of U.S. communications networks. Its 
access to this vast amount of data combined with its close ties to the 
Chinese government and its obligation under Chinese law to assist with 
Chinese intelligence-gathering mean that ``Huawei is potentially 
subjected to a government-driven obligation to capitalize on its global 
network and consumer devices ecosystem to fulfill core [Chinese 
government] national security and economic dominance objectives.'' 
Given the multitude of evidence about the threat that Huawei equipment 
presents, along with the company's unique and close relationship to the 
Chinese government, the Commission disagrees with Huawei's claim that 
there is no support for the conclusion that its equipment poses a 
threat. The fact that Huawei's subsidiaries act outside of China does 
not mean that their parent company lacks influence over their 
operations and decisions given the strong influence that Huawei's 
parent companies and the Chinese government can exert over their 
affiliates. The Commission additionally disagrees with Huawei's 
assertion that the Chinese NIL is irrelevant because it is merely a 
``defensive measure'' that does not ``provide authority for Chinese 
intelligence agencies to engage in offensive intelligence activities.'' 
The broad nature of the Chinese NIL, along with the Chinese 
government's control over Huawei and history of espionage activities, 
presents far too great a risk to the security of U.S. communications 
networks to rely on the assurance that the Chinese government will act 
only in a vaguely-defined ``defensive'' manner. While the Commission 
recognizes that the Chinese NIL may be interpreted in different ways, 
the fact remains that entities such as Huawei that are subject to the 
NIL, and subject to the Chinese legal regime generally, pose too great 
a risk to the security of communications networks and the 
communications supply chain.

[[Page 236]]

    37. The Commission also disagrees with Huawei's criticisms of the 
Finite State report. Huawei argues that the Finite State report focused 
on old versions of Huawei's equipment and did not follow ``general 
practices'' of security testing, which it argues, ``typically involves 
dialogue between the security company and vendor'' about 
vulnerabilities. However, unlike a report that assesses a zero-day 
threat and would typically include dialogue with the vendor to provide 
time to mitigate the threat, Finite State's report was a general risk 
analysis report and was focused primarily on the culture of risk 
management at Huawei. In response to Huawei's public criticisms of its 
report, Finite State determined that, ``Based on 8 years of analysis of 
[UK Huawei Cyber Security Evaluation Centre] reports, along with the 
recent Finite States analysis, the Commission can clearly see that 
Huawei's security posture has not materially improved over time.'' 
Indeed, the Commission agrees with Finite State that ``Huawei cannot 
deny that, now, multiple organizations have independently found 
similar, substantial security vulnerabilities in their products.''
    38. In the light of the record in the proceeding and other publicly 
available information detailing the scope of the risk of allowing 
Huawei's equipment and services into our communications networks, and 
given that the Chinese government has the ``means, opportunity, and 
motive to use telecommunications companies for malicious purposes,'' 
the Commission concludes that Huawei, its parents, affiliates, and 
subsidiaries should be initially designated as a national security 
threat to the integrity of communications networks or the 
communications supply chain for purposes of the rule the Commission 
adopts in this document.
    39. The Commission also initially designates ZTE, its parents, 
affiliates, and subsidiaries as a covered company for purposes of the 
Commission's rule.
    40. As with Huawei, ZTE has close ties to the Chinese military 
apparatus, having originated from the Ministry of Aerospace, a 
government agency. In fact, ZTE is still alleged to be partially owned 
by the Chinese government. As the House Permanent Select Committee on 
Intelligence found, ZTE is in essence, ``a hybrid serving both 
commercial and military needs.'' In particular, much of ZTE's ownership 
constitutes state owned enterprises, and, like Huawei, ZTE contains an 
internal Communist Party Committee, as required by the laws of China. 
The House Permanent Select Committee on Intelligence also found that 
ZTE has not allayed the Committee's concerns that it ``is aligned with 
Chinese military and intelligence activities or research institutes.'' 
As described in this document, legislative concern with ZTE equipment 
and services has been ongoing, with Congress passing, and the President 
signing into law, significant restrictions on the purchase and use of 
ZTE equipment.
    41. Open source information highlights the risks posed by ZTE 
equipment. In April 2018, the Department of Defense announced that ZTE 
and Huawei devices would no longer be offered for sale at U.S. military 
bases and ordered them removed from its stores worldwide. In August 
2018, a report funded by the Department of Homeland Security's Science 
and Technology Directorate found a wide range of vulnerabilities in a 
number of mobile devices manufactured and marketed by ZTE. The report 
indicated that the vulnerabilities are built into the phones during the 
manufacturing process and could allow malicious access to user data. 
While the USF generally does not fund end-user devices such as phones, 
the security concerns raised regarding ZTE mobile phones give the 
Commission concerns about other ZTE equipment and services, including 
those funded by the USF. The National Security Institute published a 
report in January 2019 that describes the underlying risks posed by 
both Huawei and ZTE systems and recommends ``additional restrictions on 
Huawei and ZTE products and services in the U.S.'' As with Huawei, 
ZTE's equipment has been barred in Australia and New Zealand.
    42. Finally, the DoJ, in supporting the Commission's initial 
designations of Huawei and ZTE, has noted that ZTE pleaded guilty to 
violating our embargo on Iran by sending approximately $32 million 
dollars' worth of U.S. goods to Iran and obstructing justice in an 
effort to thwart DoJ's investigation. Such disregard for American law 
in furtherance of the interests of foreign governments is additional 
evidence of the danger posed by Huawei and ZTE equipment in our 
communications networks.
    43. Given that the Chinese government has the ``means, opportunity, 
and motive to use telecommunications companies for malicious 
purposes,'' the Commission concludes that ZTE Corporation, its parents, 
affiliates, and subsidiaries should be initially designated as a 
national security threat to the integrity of communications networks or 
the communications supply chain for purposes of the rule the Commission 
adopts in this document.
    44. The Commission directs the Public Safety and Homeland Security 
Bureau (PSHSB) to implement the next steps in the designation processes 
for Huawei and ZTE. The Commission also directs PSHSB going forward to 
make both initial and final designations, to reverse prior 
designations, and to issue the public notices required in the 
designation process. PSHSB shall have discretion to revise this process 
if appropriate to the circumstances, consistent with providing affected 
parties an opportunity to respond and with any need to act 
expeditiously in individual cases. To the extent that a designated 
entity seeks review of a designation decision--from either PSHSB or the 
full Commission--PSHSB or the Commission shall act on such petition for 
reconsideration or application for review, respectively, within 120 
days of the filing by a designated entity. The Commission finds that 
this time limitation is important to provide regulatory certainty to 
entities affected by designations made at the Commission or bureau 
level, and consistent with the national security interests at stake. 
The Commission or PSHSB may, however, extend such 120-day deadline for 
good cause.
    45. Huawei and ZTE. The designations adopted herein for Huawei and 
ZTE shall serve as initial designations. Interested parties may file 
comments responding to these initial designations. Such comments are 
due 30 days after publication of the Report and Order in the Federal 
Register. After the conclusion of the comment period, PSHSB shall issue 
a public notice announcing its final determination and the effective 
date of any final designation.
    46. The Commission next establishes the scope of the new 
prohibition. The rule the Commission adopts in the Report and Order 
shall apply to any and all equipment or services, including software, 
produced or provided by a covered company. USF recipients must be able 
to affirmatively demonstrate that they have not used any funds obtained 
via the USF to purchase, obtain, maintain, improve, modify, or 
otherwise support any equipment or services provided or manufactured by 
a covered company.
    47. The Commission finds it necessary to establish this broad 
prohibition on the use of USF funds to procure or otherwise support any 
and all equipment and services produced or provided by a covered 
company. Although some commenters argue that a

[[Page 237]]

prohibition precluding the expenditure of USF funds on every product 
from a covered company would not advance any material security purpose, 
and that such a restriction would be overbroad with potentially 
negative repercussions for U.S. industry, both domestically and 
overseas, the Commission believes that a blanket prohibition best 
promotes national security, provides the most administrable rule, and 
eases compliance for USF recipients. Given the dynamic and wide-ranging 
nature of the potential threats to our networks, and the Commission's 
specific responsibility to protect against threats posed by USF-funded 
equipment and services, the Commission finds a complete prohibition on 
the expenditure of USF funds on any and all equipment and services from 
a covered company to be the only reliable protection against potential 
incursions. The Commission recognizes that a complete prohibition may 
impose attendant costs on providers, who must ensure that equipment or 
services obtained using USF funds do not use equipment or services 
produced or provided by a covered company, and the rural consumers 
served by these providers. However, the Commission finds that these 
costs are outweighed by the need to ensure that the services funded by 
USF are secure and by the benefits to our national security and the 
nation's communications networks.
    48. Malware and vulnerabilities can be designed and built directly 
into communications equipment, even when that equipment is not the 
covered company's flagship equipment. Thus, these vulnerabilities can 
often be difficult to discover. Moreover, the transition to emerging 
next-generation networks and the accelerated adoption of virtualized 
distributed network infrastructure increases the number of attack 
points in the network and makes networks more susceptible to attacks 
and unauthorized intrusions. Given the increased risk that allowing any 
equipment from a covered company on the network can cause significant 
harm, the Commission cannot allow for bad actors to circumvent the 
Commission's prohibitions through clever engineering.
    49. The Commission further finds that a complete prohibition on the 
expenditure of USF funds for all equipment and services produced or 
provided by a covered company will provide regulatory certainty and 
will be easier for providers to implement and for the Commission to 
enforce. The Commission agrees with Vermont Telephone, which argues 
that the Commission's rule ``would eliminate uncertainty and reduce 
regulatory burdens that fall most heavily on small operators,'' and 
that adopting the Commission's rule would ``level the competitive 
playing field by creating incentives for operators to secure their 
networks rather than opting to deploy lower-cost Chinese manufactured 
equipment.'' The Commission's decision to adopt a complete prohibition 
rather than a narrow one will greatly reduce administrative costs for 
both providers and consumers as it would be time consuming and costly 
to require determinations on a product-by-product basis as to whether 
any given equipment is subject to the prohibition. Relatedly, it will 
be simpler for participants, and thus more cost effective, to comply 
with a blanket ban on the use of USF funds on any and all equipment and 
services produced or provided by covered entities. Compliance costs 
will also be reduced because providers will more easily be able to 
certify that their subsidiaries and affiliates have not used USF funds 
to purchase, obtain, maintain, improve, modify, or otherwise support 
any equipment of a covered company. It would be far more difficult, 
costly, and invasive for the Commission to obligate providers to verify 
this same commitment on a product-by-product or even component-by-
component basis. By the same token, it will be far simpler and more 
cost-effective for Universal Service Administrative Company (USAC) to 
audit and verify any such certification based on a blanket ban rather 
than a more selective product-by-product prohibition.
    50. The Commission is not persuaded that uncertainty in the 
purchasing process dictates a narrower prohibition. Some commenters 
argue that it is difficult to know from which companies they are 
purchasing equipment and that a blanket prohibition within the USF is 
therefore unreasonable. They claim this difficulty is especially 
apparent in instances of ``white labeling,'' where a covered company 
provides equipment or services to a third-party entity for sale under 
that third party's brand and the purchaser may not know the covered 
company's equipment is part of the purchased product. Although the 
Commission understands the complications inherent in the purchasing 
process, it believes it is the responsibility of all USF recipients to 
work with their suppliers to understand what equipment and services 
they are purchasing and to ensure that such equipment and services are 
not produced or provided by a covered company. Indeed, were the 
Commission to find white labeling as outside the scope of its 
prohibition, it would create an obvious and transparent loophole for 
companies that pose a national to national security to sneak their 
equipment into our communications networks.
    51. The Commission also makes clear that USF recipients may 
continue to use these federal funds to maintain, improve, modify, or 
otherwise support their communications networks generally so long as no 
such funding goes toward any equipment or services provided or 
manufactured by a covered company. For example, a USF recipient could 
use funding to maintain gas-powered generators or battery cells that 
provide back-up power to radio access network equipment, purchase 
backhaul facilities and interconnection services from third parties, 
upgrade and maintain switches and routers, and otherwise expend USF 
funds on equipment and services that support a provider's network in 
whole or in part and are not solely used in the maintenance or support 
of covered equipment. In contrast, a USF recipient could not use 
federal funds to upgrade covered equipment, install software updates on 
such equipment, or pay for a maintenance contract to the extent that 
contract covers covered equipment--even when such upgrades, 
installations, and contracts are not directly offered by a covered 
company. Similarly, a USF recipient would not be permitted to use USF 
support to pay its internal staff to perform maintenance on any 
equipment or services produced or provided by a covered company. Such 
expenditures would be directly and solely targeted at supporting 
equipment that poses a national security threat to our communications 
networks and allowing such expenditures to be paid for with federal 
funds would counter the Commission's goal of securing American 
communications networks and incentivizing the replacement of such 
equipment with equipment from trusted vendors.
    52. The Commission notes that its rule does not prohibit USF 
recipients from using their own funds to purchase or obtain equipment 
or services from covered companies, but USF recipients must be able to 
clearly demonstrate that no USF funds were used to purchase, obtain, 
maintain, improve, modify, or otherwise support any equipment or 
services produced or provided by a covered entity. But the Commission 
cautions USF recipients that choose to install new equipment or 
purchase new services from covered companies. Where a project involves 
the purchase of such equipment, the Commission believes it unlikely 
that many USF

[[Page 238]]

recipients will be able to show the detailed records necessary to 
demonstrate that no USF funds were used on equipment or services from a 
covered company on any part of that project. For example, if a USF 
recipient tried to install a new cellular radio base station from a 
company that has been designated as a national security threat, all 
labor and other expenditures for that installation are part and parcel 
of installing an insecure network. The Commission is thus skeptical 
that any USF recipient seeking to use USF funds on an ``eligible'' 
portion of such a project would will be able to establish with the 
necessary certainty, even with a detailed recordkeeping process in 
place, that no part of the installation process, including the base 
station and any and all related expenditures, are paid for using USF 
funds. However, the Commission does not entirely foreclose the 
possibility that a USF recipient might be able to segregate the use of 
federal funds from other funds for the completion of a particular 
project, and the Commission reminds recipients that such expenditures 
will be subject to the audit and enforcement mechanisms described 
herein.
    53. The Commission agrees with commenters who suggest a whole-of-
government approach to supply chain security. The Commission's 
oversight of the USF requires them to act so that USF funds are not 
used in a manner that undermines the security of communications 
networks. In addition, the Commission has a responsibility to act in 
order to support the ongoing efforts of the federal government to 
protect communications networks and the communications supply chain 
from security threats. The prohibition the Commission adopts in this 
document applies only to equipment and services in the context of the 
USF, so the Commission believes this limited application of the 
prohibition will advance the interests of network security and will 
provide necessary certainty to affected USF participants. In short, the 
Commission's actions in the Report and Order are a vital part of that 
approach and will complement the activities of other federal agencies 
and Congress.
    54. The Commission disagrees with RWA, which contends that the 
prohibition it adopts in this document should extend only to 
``additional equipment'' and ``new services'' not yet procured and 
deployed; such a distinction would do nothing to address the threat 
posed by existing equipment. If anything, it would magnify this risk by 
enabling providers to continue to use USF support to maintain, improve, 
modify, operate, manage, renew, or otherwise support such equipment. 
Restricting the prohibition the Commission adopts in this document to 
apply only to equipment that has not yet been purchased would not only 
undercut the purpose behind this proscription, but could actively 
increase the risks posed by existing equipment.
    55. The Commission acknowledges the concerns of some commenters who 
contend that ``rural co-ops and closely held companies are massively 
restricted in their financial operations'' and argue that USF support 
is ``often critical'' in order to maintain the operational viability of 
their networks. While this may be true in the case of some rural 
carriers, the Commission is unwilling to allow USF dollars to be used 
in support of equipment and services that pose a direct and immediate 
threat to our national security and the security of our networks. To do 
so would place our communications networks and supply chains as a whole 
at risk. No provider has yet offered the detailed financial records 
that would be necessary for the Commission to determine whether an 
individual provider actually could not maintain its existing network 
without violating its rule--and the Commission reminds providers that 
they remain free to seek a waiver of this prohibition in the 
exceptional case where they would be unable to operate their networks 
absent the use of USF funds to maintain or otherwise support equipment 
or services produced or provided by covered companies.
    56. While the rule the Commission adopts in this document will not, 
in and of itself, completely address the risks posed by equipment or 
services produced or provided by covered companies, that is no reason 
not to adopt the rule, as RWA appears to argue. As the Commission has 
already stated, the targeted rule it adopts in this document is part of 
the Commission's continuing efforts to protect the nation's 
communications networks and supply chain from potential security 
threats. These efforts are, by their very nature, ongoing and 
incremental. The Commission's is a specific but nevertheless important 
role in securing the communications supply chain and our nation's 
communications infrastructure.
    57. Upgrades to Existing Equipment. The Commission next clarifies 
that the prohibition will apply to upgrades and maintenance of existing 
equipment and services. As explained in this document, this restriction 
includes a prohibition on using USF funds to pay third parties or a 
carrier's own employees to maintain or repair equipment from covered 
services. Costs for such services must be paid with non-USF funds. The 
rule the Commission adopts in this document prohibits USF recipients 
from using USF funds to purchase, obtain, maintain, improve, modify, or 
otherwise support equipment or services provided or produced by covered 
companies in addition to purchasing such equipment or services. The 
Commission specifically extends this prohibition to include upgrades to 
existing equipment and services. Several commenters have argued that 
upgrades to existing equipment should be exempt from the Commission's 
rule, claiming any prohibition on the use of USF funds to support 
upgrades to existing equipment would ``effectively mandate replacement 
of those products before the end of their life-cycle or force companies 
receiving USF monies to run outdated or inadequately maintained 
equipment.'' Others argue that such upgrades should be exempted because 
they are necessary to preserve equipment functionality, performance, 
and security.
    58. The Commission recognizes that this rule may encourage some 
providers to choose not to upgrade equipment and instead to replace 
these products prior to the end of their life-cycle, or risk running 
outdated and inadequately maintained equipment. The Commission notes 
that such upgrades are in fact in the public interest because they 
would increase the security of our communications networks. Indeed, the 
Commission finds the risk posed by covered companies' products is too 
great to continue to allow federal funds to be used to purchase, 
obtain, maintain, improve, modify, or otherwise support them. To do so 
would allow these funds to be used to perpetuate existing security 
risks to the communications supply chain and the communications 
networks of this country. Further, the Commission is not restricting 
USF recipients from performing needed upgrades or maintenance to 
equipment procured from a covered company so long as they do not use 
USF funds to do so. Although the Commission may have concerns, it 
acknowledges that providers may continue to use and improve such 
equipment consistent with all other legal requirements, but they may 
not perform such maintenance or upgrades using USF funds. Affected 
carriers may of course file a request for waiver if they are manifestly 
unable to maintain their networks absent the use of USF funds to 
support equipment or services produced or provided by covered 
companies, and such failure poses a risk to public safety. The

[[Page 239]]

Commission evaluates waivers on a fact-specific basis.
    59. Compliance Certifications. The Commission agrees with 
commenters who argue that the Commission should require recipients of 
universal service support to provide a certification that they have 
complied with the rule it adopts in this document. The Commission does 
not, at this time, require manufacturers to submit separate 
certifications, although USF recipients may require such certifications 
from manufacturers as part of their own contracts. The Commission 
directs WCB, in coordination with USAC, to revise the relevant 
information collections for each of the four USF programs to require a 
certification attesting to compliance with the rule adopted in this 
document. Given the variety of ways that USF participants file and 
certify to rule compliance, the Commission finds that directing WCB to 
develop such a certification for each respective program is the best 
means by which to implement this new certification requirement.
    60. Audits and Recovery of Funds. The Commission believes that USAC 
audits are the most effective way to determine compliance with the 
requirements of the Report and Order, and the Commission directs USAC 
to implement audit procedures for each program consistent with the 
rules it adopts in this document. USF recipients must be able to 
affirmatively demonstrate that no universal service funds were used to 
purchase, obtain, maintain, improve, modify, or otherwise support any 
equipment or services provided or manufactured by covered companies. 
The Commission notes that applicants in the E-rate and Rural Health 
Care programs already retain and provide information either during the 
application process or during audit and program integrity assurance 
processes that could demonstrate (if verified) that no USF funds were 
improperly used. And the Commission notes that many ETCs receiving High 
Cost funding now report the projects they complete using federal funds 
to the High Cost Universal Broadband portal, allowing relatively swift 
verification by USAC of compliance. If USAC knows the specific 
locations where federal funds were used to build communications 
networks, it can verify what equipment and services are used at those 
locations and audit that usage if necessary. To the extent that other 
ETCs do not yet report information to USAC that would verify 
compliance, the Commission directs WCB and USAC to revise its 
information collection and audit procedures to ensure the reporting of 
USF expenditures in a manner that will allow efficient oversight and 
thorough compliance.
    61. Some commenters have argued that, for purposes of the E-Rate 
and Rural Health Care programs, service providers are in the best 
position to prevent violations of the rule and, as a result, should be 
the party responsible for recovery in cases where funds have been 
disbursed in violation of the rule. The Commission sees no reason to 
depart from the requirement that directs USAC to pursue recovery 
actions against the party or parties that committed the rule or 
statutory violation in question, recognizing that, in some instances, 
this could be the applicant school, library, health care provider, or 
consortium, rather than the service provider. The determination of 
which entity to seek recovery from is a factual determination based on 
the specific facts of the violation, and the Commission sees no need to 
establish a rule requiring recovery only from service providers.
    62. Waivers. The Commission agrees with commenters who support a 
meaningful waiver process. As with any Commission rule, USF recipients 
may seek waivers of the rule the Commission establishes in this 
document. The Commission disagrees with commenters who suggest that it 
imposes a 90-day shot clock for resolution of such waivers. Commenters 
have provided no persuasive argument supporting the establishment of an 
arbitrary deadline for resolution of waiver requests and the Commission 
similarly refrains from establishing any specialized waiver 
requirements for the rule adopted in this document.
    63. Because of the compelling interest in protecting our national 
security, the Commission concludes that the rule it adopts in this 
document should take effect immediately upon publication in the Federal 
Register. For purposes of the Lifeline and High-Cost Support Programs, 
any prohibition on the use of USF funds will take effect immediately 
upon publication of the effective date contained in the Final 
Designation Notice designating an entity as a covered company posing a 
national security threat. A requirement that USF recipients certify 
that they are in compliance with the Commission's rule will take effect 
following revision of each information collection as described in this 
document, including approval by the Office of Management and Budget 
under the Paperwork Reduction Act.
    64. In the April 2018 Protecting Against National Security Threats 
Notice, the Commission made clear that its proposed rule would apply 
only prospectively. The Commission sought comment on how long USF 
recipients would need to comply with the rule and whether it should 
consider phasing in the rule for certain programs or USF recipients. 
The Commission agrees with commenters who argue that the Commission 
should not delay the effective date of the rule. These commenters 
contend that service providers have long been aware of the security 
risks associated with certain vendors that may affect their ability to 
continue to receive federal funding, and thus many service providers 
have already made the business decision to purchase equipment from 
alternative vendors, precisely to avoid the security risks and the 
possible greater costs those risks might present in the long run. Given 
the important national security concerns at stake in the proceeding, 
the Commission believes it is critical that it moves forward 
expeditiously. Moreover, because many service providers have already 
made the business decision to purchase equipment from alternative 
vendors in order to avoid security risks, the Commission believes that 
the impact of an immediate effective date will be minimal. Given the 
industry's long-standing knowledge of the risks posed by the 
installation and purchase of such equipment, the Commission does not 
believe that a phase-in period is necessary. Indeed, the important 
national security concerns at issue necessitate swift action.
    65. Moreover, because the rule is prospective in effect, it does 
not prohibit the use of existing services or equipment already deployed 
or in use. USF recipients may continue to use equipment or services 
provided or produced by covered companies obtained prior to the 
issuance of the rule, but may not use USF funds to purchase, obtain, 
maintain, improve, modify, or otherwise support such equipment or 
services in any way.
    66. The Commission next clarifies how its rule shall apply for E-
Rate and Rural Health Care recipients. Specifically, unlike other USF 
recipients, E-Rate and Rural Health Care recipients apply for funding 
to cover specific services and equipment on coordinated basis, with 
funding tied to a particular funding year. To ensure prospective only 
effect, the rule the Commission adopts will apply to all funding years 
that start after the designation of a covered company (so the 
Commission would expect the rule prohibiting purchases from Huawei and 
ZTE that it initially designates in this document to apply for Funding 
Year 2020, starting July 1, 2020). This

[[Page 240]]

provides a common administrative deadline for applicants and USAC and 
should allow sufficient time for E-Rate and Rural Health Care 
applicants to be trained to include service provider security 
compliance as a necessary factor in the selection of providers for the 
forthcoming funding year. The Commission notes that Funding Year 2020 
for both programs begins July 1, 2020. The Commission believes that the 
decision strikes the best balance for promoting national security in a 
way that is practicable for E-Rate and Rural Health Care participants. 
For earlier funding years, the Commission directs USAC to process 
Operational Service Provider Identification Number (SPIN) changes and 
service substitutions to swap out non-compliant equipment for compliant 
equipment upon a showing that the equipment not yet installed would be 
prohibited under the Commission's rule.
    67. Existing Multiyear Contracts. The Commission finds that its 
rule extends to existing contracts to acquire equipment or services 
from any covered company that were negotiated and entered into prior to 
the final designation of that entity as a covered company. In other 
words, existing multiyear contracts to acquire equipment or services 
from a covered company will not be exempt from the rule. The Commission 
disagrees with commenters who favor such an exemption. Exempting 
existing multiyear contracts would negate the purpose behind the 
Commission's rule and allow federal funds to be used to perpetuate 
existing security risks to communications networks and the 
communications supply chain.
    68. Some commenters raise a number of constitutional challenges to 
the rule the Commission adopts in this document. They argue that the 
action adopted in this document, violates principles of due process, 
that it amounts to an unconstitutional bill of attainder, and that it 
amounts to a regulatory taking by denying carriers any economically 
productive use of their existing networks. The Commission finds these 
arguments unpersuasive.
    69. Both carriers and suppliers argue that a national security 
condition on USF funding would violate their due process rights 
guaranteed by the Fifth Amendment. The Due Process Clause of the Fifth 
Amendment provides that ``[n]o person shall be . . . deprived of life, 
liberty, or property, without due process of law.'' These due process 
challenges, therefore, involve two questions: First, whether carriers 
or suppliers are deprived of a protected interest in ``property'' or 
``liberty.'' And second, if they are, whether the procedures employed 
by the Commission comport with principles of due process. The 
Commission concludes that the rule and its application, as adopted in 
this document and applied initially to Huawei and ZTE, do not violate 
the due process rights of USF recipients, of suppliers generally, or of 
Huawei and ZTE specifically. The Commission discusses these conclusions 
in the following.
    70. Carriers' Due Process Claims. CCA, on behalf of its carrier 
members, argues that the rule will violate the due process rights of 
carriers that rely on USF support in two ways. First, CCA asserts, the 
rule will interfere with carriers' ``long-standing investment-backed 
reliance interests'' in their telecommunications networks. Second, CCA 
claims that the rule ``violates the due process rights of equipment, 
device and service providers, as well as the carriers who rely on 
them'' by failing to provide ``an opportunity to review the 
unclassified evidence on which the official actor relied.'' Because 
this second argument primarily concerns the due process rights of 
suppliers and is also raised by them in more detail, the Commission 
addresses it--along with suppliers' other concerns--in the following.
    71. Regarding its first argument, CCA explains that many carriers 
have upgraded or are upgrading their networks to the newest available 
technologies, including by contracting with foreign suppliers who offer 
competitive pricing, in service of ``the USF's mandate to provide 
affordable telecommunications access to underserved communities.'' 
Invoking FCC v. Fox Television Stations, CCA argues that these carriers 
``did not have fair notice of what would be forbidden,'' and invoking 
General Motors Corp. v. Romein, CCA asserts that the proposed rule 
``unfairly interferes with carriers' legitimate expectations without 
sufficient justification.''
    72. In Romein, General Motors challenged the effect of a Michigan 
workers' compensation statute that required it to retroactively pay 
workers' compensation benefits. General Motors argued that the 
statute's retroactive provisions ``unreasonably interfered with closed 
transactions,'' and thereby violated due process. Applying rational 
basis review, the Court rejected this challenge and found that the 
statute was a rational means of achieving a legitimate objective. 
Huawei similarly argues that the rule the Commission adopts in this 
document would violate the Administrative Procedure Act as a rule that 
has ``unreasonable secondary retroactivity.'' While the Commission 
acknowledges that the rule may have some retroactive effect, the 
Commission finds that any retroactive effect is reasonable in light of 
the goals of the Report and Order. Secondary retroactivity is reviewed 
under a reasonableness standard to determine whether or not it is 
arbitrary or capricious. The Commission notes that the rule and the 
initial designation of Huawei and ZTE as covered companies will not 
explicitly prevent Huawei from selling its products to any company. And 
as noted, the Commission concludes that multiyear contracts cannot be 
exempt from the rule, given that such an exemption would largely 
undermine the national security goals of the Report and Order.
    73. At the outset, at least with respect to Huawei and ZTE, the 
Commission rejects the premise that carriers had a ``legitimate 
expectation'' of being able to continue to purchase products and 
services from them using USF funds and ``did not have fair notice'' 
that a rule like the one adopted in this document may be imposed. 
Mounting public concern about these entities was apparent at least as 
early as 2010, when a bipartisan group of lawmakers wrote a letter to 
the Chairman of the FCC, requesting information about the security of 
U.S. telecommunications networks in light of potential deals between 
U.S. carriers and Huawei and ZTE.
    74. Moreover, CCA's reliance on Fox Television is misplaced. That 
case addressed whether the FCC had violated the due process rights of 
two television networks by failing to give them fair notice that, in 
contrast to a prior FCC policy, a fleeting expletive or a fleeting shot 
of nudity could be actionably indecent. Here, by contrast, the 
Commission has issued a Notice and allowed interested parties to 
comment on the proposed rule, which will only be applied prospectively 
and does not require carriers to remove or stop using any already-
purchased equipment or services. This situation is materially different 
than that presented in Fox Television, and at least one court has 
rejected an attempt to invoke Fox Television under similar 
circumstances, where parties were given notice and an opportunity to 
comment on the proposed rule. Finally, the Commission disagrees with 
CCA's apparent assertion that it has not provided ``sufficient 
justification'' to satisfy the test for rational basis review 
articulated in General Motors. The government has a legitimate interest 
in safeguarding

[[Page 241]]

national security, and the Commission's rule is a rational means of 
furthering that interest.
    75. Suppliers' Due Process Claims. Some commenters--including 
Huawei--argue that due process requires that the rule offer suppliers 
designated as national security threats notice and a meaningful 
opportunity to respond to the evidence against them. Assuming that a 
designation could result in a deprivation of a cognizable liberty or 
property interest, an argument which the Commission considers and 
rejects in the following, the Commission has provided and will continue 
to provide due process as required under the Constitution and process 
in conformance with the Administrative Procedure Act. Under Mathews v. 
Eldridge and other applicable precedent, due process requires that the 
deprived party be afforded notice of the action, including enough 
information about the factual basis for the action to allow for a 
meaningful challenge, and a meaningful opportunity to be heard. An 
evaluation of the sufficiency of the process will consider the private 
interest that would be affected, the risk of an erroneous deprivation 
of such interest through the procedures used (and the probable value, 
if any, of additional procedural safeguards), and the government's 
interest, including the burdens of additional procedural requirements.
    76. The rulemaking proceeding has provided and will continue to 
provide Huawei and ZTE with notice and an opportunity to be heard on 
the issue of whether they should be designated under the rule adopted 
in the Report and Order. The Protecting Against National Security 
Threats Notice in the proceeding set forth Congress's concern with both 
companies and explained that this concern stems from the fact that both 
companies are subject to such a degree of undue influence by the 
Chinese government as to raise counterintelligence and security 
concerns. It was clear from the Protecting Against National Security 
Threats Notice that the Commission was considering designating them 
under the proposed rule. In fact, the Protecting Against National 
Security Threats Notice specifically sought comment on ``defin[ing] 
covered companies as those specifically barred by the National Defense 
Authorization Act from providing a substantial or essential component, 
or critical technology, of any system, to any federal agency or 
component thereof,'' and the WCB specifically sought comment on how the 
2019 NDAA should affect the Commission's approach in the proceeding. 
Huawei responded to the Protecting Against National Security Threats 
Notice at great length, and the Commission has fully considered those 
arguments. As with any Commission decision, the Report and Order is 
subject to procedures for reconsideration by the Commission and for 
judicial review.
    77. Further, both Huawei and ZTE will have an additional 
opportunity to respond to the factual allegations supporting their 
initial designation under the process established in the Report and 
Order. The initial determination adopted in the Report and Order 
expands on the concerns raised in the Protecting Against National 
Security Threats Notice and responds to Huawei's submissions that 
attempted to address these concerns. Huawei and ZTE will have a further 
chance to respond before PSHSB issues a final designation that either 
affirms or rejects the initial designation. The Commission therefore 
concludes that Huawei and ZTE will be afforded all the process that is 
due in the proceeding.
    78. For all other designations, the Commission will adhere to the 
process discussed in this document, which includes notice and an 
opportunity to comment on any initial designation, a description of the 
basis for such initial designation and, if opposed, a written final 
determination subject to review by the Commission and, ultimately, the 
courts. Any such designation will also be subject to review, and 
potentially reversal, in the future if such an entity, or another 
interested entity, can demonstrate that it should no longer bear such a 
designation.
    79. Huawei is incorrect when it argues that it violates the Due 
Process Clause to issue this adjudicatory decision in the context of a 
rulemaking proceeding. There is no requirement that designations be 
made pursuant to the formal adjudicatory procedures of the 
Administrative Procedure Act. Rather, the relevant question is whether 
the affected parties have had the ``opportunity to present, at least in 
written form, such evidence as those entities may be able to produce to 
rebut the administrative record.'' Huawei has already done so here, and 
ZTE had the same opportunity. There is nothing improper about issuing a 
designation pursuant to a rulemaking proceeding. Additionally, Huawei 
and ZTE will have a further opportunity to specifically respond to 
their initial designation during the comment period adopted in the 
Report and Order.
    80. Moreover, the Fifth Amendment guarantees due process only where 
government action threatens or deprives an individual of life, liberty, 
or property. The Commission finds that designated suppliers and/or 
carriers do not suffer a deprivation of life, liberty, or property 
sufficient to trigger due process protections. Huawei claims that 
designating it under the rule the Commission adopts in this document 
would deprive it of liberty in three related ways: (1) By interfering 
with its freedom to practice a chosen profession; (2) by debarring it 
or effectively debarring it by preventing it from selling equipment and 
services to USF recipients; and (3) by imposing a ``stigma'' 
sufficiently serious to alter Huawei's legal status. The Commission 
finds none of these arguments persuasive.
    81. First, covered companies are not barred from a field of 
employment. Unlike the aggrieved parties in the cases cited by Huawei 
and CCA, the suppliers found to be a threat to national security will 
not be broadly excluded from a profession or field--such as aeronautics 
or law. To the contrary, any such designated suppliers will be free to 
pursue their business by serving as suppliers to a variety of carriers; 
in fact, as one commenter pointed out, a designation would not formally 
restrict them from conducting business with any customer, including 
those who participate in USF programs.
    82. Second, the adopted rule does not debar covered companies, 
either through ``formal debarment'' or through ``broad preclusion, 
equivalent in every practical sense to formal debarment.'' Huawei 
itself recognizes an uneasy fit with the debarment cases it cites, 
conceding that those cases ``merely involve actions that preclude 
private entities from transacting with the Government, while the 
proposed rule would preclude private entities from transacting with 
other private entities who spend federal funds.'' Huawei argues, inter 
alia, that the proposed rule meets the definition of debarment in 
section 54.8 of the Commission's rules. Even assuming Huawei is 
``debarred'' from the USF under this definition, it is not ``debarred'' 
as the term is used in the cases cited by Huawei, which, as Huawei 
itself notes, involve government actions precluding private entities 
from serving the government. The Commission is similarly unconvinced by 
Huawei's attempt to analogize itself to a subcontractor. While there is 
some authority for the proposition that due process protections extend 
to the debarment of subcontractors, Huawei and other affected suppliers 
are not subcontractors, and, even if they were, designation here does 
amount to de facto debarment--it does not prevent

[[Page 242]]

designated suppliers from doing business with the government or 
carriers (the prime contractors, in Huawei's analogy).
    83. The rule here does not prevent any private entity from 
transacting with the government--either formally or through broad 
preclusion equivalent to formal debarment--nor does it completely 
prevent entities from transacting with carriers who receive USF 
funding.
    84. Third, designation as a covered company does not create a 
deprivation by imposing a stigma sufficiently serious to alter a 
supplier's legal status. To establish a deprivation under this 
``stigma-plus'' theory, a party must show (1) the public disclosure of 
a stigmatizing claim by the government; and (2) an accompanying denial 
of ``some more tangible interest such as employment, or the alteration 
of a right or status recognized by state law.'' With respect to the 
first prong, assuming arguendo that designation by the Commission as a 
threat to national security is likely to impose some amount of stigma, 
the stigmatized party must also satisfy the ``plus'' factor of the 
``stigma plus'' test. Courts have found this factor satisfied where the 
government has deprived a party of some benefit to which it has a legal 
right, like the ability to purchase alcohol or fly. The D.C. Circuit 
has found this prong satisfied where the government-imposed stigma is 
so severe that it ``broadly precludes'' the stigmatized party from 
``pursuing a chosen trade or business.'' The Commission finds that the 
rule adopted in this document does not satisfy this prong.
    85. Huawei argues that the alleged stigma of a designation under 
the proposed rule would alter its status in two ways. First, by 
``barring the use of universal service funds to buy the company's 
equipment.'' Second, by having the practical effect of discouraging 
other U.S. entities from buying Huawei's equipment. But while 
designation may create a disincentive for carriers to purchase 
equipment from designated entities, designation imposes no explicit 
restriction on designated entities at all; designated entities remain 
free to sell to anyone, including recipients of USF. Likewise, USF 
recipients remain free to purchase equipment from designated entities--
and some may continue to do so, though they would not be able to use 
USF support for any covered equipment and services. This fact alone 
would prevent Huawei or other covered companies from establishing the 
deprivation of a legal right or the ``broad preclusion'' required in 
Trifax, the case on which Huawei principally relies in establishing 
this factor. Thus, the Commission concludes that there is no cognizable 
deprivation of liberty or property either in adopting the rule or 
designating Huawei and ZTE herein the Report and Order.
    86. Unconstitutional Taking. Some commenters assert that the 
Commission's proposed rule would constitute a regulatory taking because 
it would deny some carriers of ``all economically beneficial or 
productive use'' of their property.'' These commenters argue that the 
proposed rule would prevent carriers from upgrading, repairing, or 
servicing pre-existing equipment purchased from prohibited suppliers, 
rendering this equipment useless. Without funding to compensate 
carriers for these losses, they argue, the proposed rule will run afoul 
of the Takings Clause of the Fifth Amendment, which prohibits the 
government from taking ``private property . . . for public use, without 
just compensation.''
    87. The Commission disagrees with these arguments. At the outset, 
the Takings Clause applies only when ``property'' is taken, but 
Commission and judicial precedent make clear that carriers have no 
vested property interest in ongoing USF support. Therefore, there is no 
merit to any suggestion that deprivation of future USF support amounts 
to a Takings under the Fifth Amendment. While carriers do have a 
cognizable property interest in their equipment, to the extent the 
action diminishes the value of equipment carriers have already 
purchased, this interference does not amount to a regulatory taking. 
The concurrently adopted Further Notice addresses making additional 
support available pursuant to NDAA section 889(b)(2)--a fact that 
arguably mitigates any takings concerns and makes any potential takings 
claim unripe. Further, there is no per se regulatory taking under Lucas 
v. South Carolina Coastal Council, because the rule will not deprive 
affected carriers of all economic value in their networks or 
equipment--the proposed rule is prospective in nature, and will allow 
them to continue using pre-existing equipment. Nor does the rule effect 
a partial regulatory taking under the three-factor test established in 
Penn Central Transportation Company v. New York City. First, the 
economic impact on affected carriers should not be severe, as they 
should still be able to use pre-existing equipment. Second, the rule 
should not upend reasonable investment-backed expectations. As 
explained in this document, the long history of concern about Huawei 
and ZTE should have served as a warning that the federal government may 
take action regarding these companies, and in any event the Protecting 
Against National Security Threats Notice provided affected carriers 
actual notice of this action. More broadly, the Commission frequently 
enacts rules adjusting the levels of USF support received by carriers, 
and has long held that carriers have no entitlement to ongoing USF 
support at current levels. Third and finally, with respect to the 
``character'' of the Commission's action, any interference could not be 
characterized as physically invading or permanently appropriating the 
property of carriers--and commenters seem to offer no argument to the 
contrary.
    88. Bill of Attainder. Lastly, Huawei argues that the rule violates 
the Bill of Attainder Clause. A law constitutes a bill of attainder 
``if it (1) applies with specificity, and (2) imposes punishment.'' 
According to the Supreme Court, ``the Bill of Attainder Clause was 
intended . . . as an implementation of the separation of powers, a 
general safeguard against legislative exercise of the judicial 
function, or, more simply, trial by legislature.'' Thus, ``[a] bill of 
attainder is a legislative act which inflicts punishment without a 
judicial trial.'' Huawei argues that the rule ``contravene[s] the Bill 
of Attainder Clause by targeting a small group of people for punitive 
measures.''
    89. The Commission finds this argument unpersuasive. First, the 
Supreme Court has never applied the Bill of Attainder Clause to a 
corporation like Huawei. Second, the rule cannot amount to a bill of 
attainder because it is not a ``legislative act.'' The Commission is 
unaware of any court opinion applying the Bill of Attainder clause to 
agency regulations. In a case challenging the Commission's 2011 order 
overhauling the high-cost universal service program, the Tenth Circuit 
considered and rejected a similar argument on the grounds that the 
Commission's order was not a legislative act. Second, even if the rule 
were a ``legislative act,'' it does not impose a ``punishment.'' As the 
Report and Order makes clear, the Commission has a legitimate, non-
punitive reason to take the actions contemplated by the rule--the 
protection of national security. While some of the burdens of the rule 
will fall on those entities identified as threats to national security, 
the burdens imposed will not be ``so disproportionately severe and so 
inappropriate to nonpunitive ends that they unquestionably have been 
held to

[[Page 243]]

fall within the proscription of [the Bill of Attainder Clause].''
    90. The Commission's cost benefit analysis focuses on the economic 
costs of its action. An economic cost is the extent to which resources 
are spent inefficiently, in this case, on more expensive suppliers. The 
Commission notes that record evidence indicates the vast majority of 
such costs are attributable to ETCs receiving high-cost universal 
service support. The Commission accordingly focuses its analysis on 
such costs because any costs attributable to other programs are 
unlikely to have any measurable impact on whether the benefits of the 
rule outweigh its costs. Furthermore, the records suggest that the 
dominant economic cost equals the necessary additional cost to carriers 
who choose to purchase more expensive equipment as a result of the 
Commission's action. The Commission estimates this cost and 
qualitatively consider other economic costs of its action. The 
Commission finds these other costs to be relatively small. Given the 
evidence available, the Commission estimates that the costs of the 
actions in this document will not exceed $960 million and are likely to 
be much lower.
    91. Quantifying the expected benefits of the Commission's rule is 
difficult. Nonetheless, the Commission takes into account several 
comparable situations to estimate an order of magnitude lower bound of 
benefits. Notably, a foreign adversary's access to American 
communications networks could result in hostile actions to disrupt and 
surveil our communications networks, impacting our nation's economy 
generally and online commerce specifically, and result in the breach of 
confidential data. To start, our national gross domestic product was 
$20.5 trillion last year, growing 2.9% or $595 billion last year, 
adjusting for inflation. Accordingly, preventing even a 0.005% 
disruption to our economy, or a 0.162% disruption to annual growth, 
would outweigh the costs of the prohibition. Likewise, the digital 
economy accounted for $1.35 trillion of our economy in 2017, and so 
preventing a disruption of even 0.072% would mean the benefits of the 
rule outweigh the costs. Given how dependent the general economy--let 
alone the digital economy--is on our national communications network 
and how interconnected that network is and is becoming, the Commission 
finds it likely that any potential disruption would exceed these 
measures by a large margin. As a check on the Commission's analysis, 
consider the impact of existing malicious cyber activity on the U.S. 
economy: $57 billion to $109 billion in 2016. Given the incentives and 
documented actions of hostile nation-state actors, reducing this 
activity (or preventing an expansion of such damage) by even 1.68% 
would justify the costs of the Commission's rule. Or set aside broader 
commercial implications (such as theft of trade secrets and business 
plans) and focus on the impact of data breaches on consumers: An 
estimated 7% of consumers over the age of 16 were identity theft 
victims in 2014, and the estimated average loss to an identity theft 
victim is over $2,800. Accordingly, if the Commission's rule reduced 
the incidence of data breach and identity theft by just 0.137% among 
American consumers over the age of 16, the benefits of the rule would 
outweigh the costs. In the Commission's judgment and given this 
analysis, the Commission finds the benefits of its rule to the American 
economy, commerce, and consumers are likely to significantly and 
substantially outweigh the costs by a large margin (the upper end of 
those costs being $960 million). Finally, the Commission notes that the 
benefits of the rule also extend to even harder to quantify values, 
such as preventing untrustworthy elements in the communications network 
from impacting our nation's defense, public safety, and homeland 
security operations, our military readiness, and our critical 
infrastructure, let alone the collateral damage such as loss of life 
that may occur with any mass disruption to our nation's communications 
networks. The Commission finds that the benefits of safeguarding our 
nation against these threats alone would also significantly and 
substantially outweigh the costs of the Commission's rule by a large 
margin.
    92. Calculating the Additional Cost to Carriers. The Commission 
assumes based on the initial designations that its actions will prevent 
a carrier from using universal service funds to make purchases from 
Huawei or ZTE. As carriers maintain their existing networks and upgrade 
them to new technologies such as 5G, carriers relying on universal 
service funds may choose more expensive equipment--and for the sake of 
this cost-benefit analysis, the Commission assumes that the prices of 
Huawei and ZTE tend to be lower than those of other suppliers without a 
corresponding loss in quality, reliability, or durability. Buying more 
expensive equipment or services also increases the value of the firm's 
capital base, which in turn, increases service and maintenance costs, 
and the required return on capital to bondholders and shareholders, 
resulting in a second source of cost. The Commission also estimates a 
useful lifetime of network equipment (like mobile switches) and 
exterior equipment (radio network access equipment (RAN) placed on or 
near a pole or tower) of approximately 10 years.
    93. To estimate the additional cost to carriers of the prohibition 
and given the estimated useful lifetime of network equipment, the 
Commission expects that in 10 years all Huawei and ZTE equipment that 
will be replaced (or upgraded) with universal service support will have 
been replaced. At that point, the additional annual capital outlays 
will peak, and the Commission generously estimates the total annual 
cost of its actions, including service and maintenance cost, and the 
required return on capital, will be between approximately $17 million 
and $107 million. Although the Commission initially assumes Huawei and 
ZTE maintain their (non-quality-adjusted) price advantage for 10 years, 
the Commission then allows competition to linearly eliminate that 
advantage over the next ten years. On that basis, the Commission 
estimates the present value of the cost this will impose on carriers to 
range from $160 million and $960 million.
    94. The analysis assumes constant real equipment prices. While real 
equipment prices will likely decline, it is the difference between the 
prices of alternatives to Huawei and ZTE equipment and the prices of 
Huawei and ZTE equipment that determines the reimbursement cost. While 
lower real prices would increase demand, they would also reduce the 
extent to which reimbursements from the Fund are necessary, the net 
effect of which is likely to be small relative to the error inherent in 
the Commission's estimates.
    95. In developing these estimates, the Commission first estimates 
the cost of replacing Huawei and ZTE equipment, and then estimate 
ongoing expenses. Since the Commission's Report and Order does not 
mandate replacement, the Commission does not assume that all Huawei and 
ZTE equipment is replaced by alternative equipment. Instead, the 
Commission expects that a fraction of the Huawei and ZTE equipment will 
be replaced. The Commission then estimates the ongoing expenses implied 
by the assumed replacements. However, the sum of the estimated 
replacement and ongoing costs is not entirely attributable to the 
Commission's action. Instead, it is the difference between these costs 
and the

[[Page 244]]

costs that would have been incurred if Huawei and ZTE equipment were 
used. The Commission estimates this difference using reported 
differences between the prices of Huawei and ZTE equipment and the 
prices of alternative equipment (again, setting aside for these 
purposes concerns about the lower quality, reliability, or durability 
of such lower-priced equipment).
    96. The Commission estimates the average cost for a firm to replace 
its Huawei and ZTE equipment, excluding ongoing expenses, to range from 
$40 million to $45 million. The Commission then multiplies this by an 
estimate of the number of firms that have Huawei or ZTE equipment and 
relies on universal service support, and then reduces it to account for 
the extent to which carriers will use other sources of capital to 
purchase and maintain Huawei and ZTE equipment. The result is an 
estimate of the cost of replacing Huawei and ZTE equipment, excluding 
ongoing expenses.
    97. Seven carriers reported their estimated cost of replacing 
installed Huawei or ZTE equipment. The estimates come from Pine Belt 
Cellular, Sagebrush, Union Telephone Company, NE Colorado Cellular, SI 
Wireless, United TelCom, and James Valley Telecommunications. The 
median of the firms' replacement cost estimates is $50 million.
    98. To guard against distortion due to extreme estimates, 
particularly given carriers' incentives to report higher estimates, the 
Commission prefers the median to the mean. The mean of the 7 reports, 
$94 million, is significantly raised by NE Colorado Cellular's cost 
estimate, which is 3 times larger than the next highest estimate, and 
60 times larger than the lowest estimate. NE Colorado Cellular's 
absolute costs also seem high. It reports 80% of its network to be 
Huawei equipment, which it estimates would cost $360 million to 
replace. That implies a network with a replacement cost of 
approximately $450 million (= $360 million/0.8 million). Assuming an 
annual cost factor of 25%, this implies annual expenses of $112.5 
million. As a comparison, the annual cost of switching in the Connect 
America Model is 0.2671, the sum of the annual charge factors for 
capital expenditures, 0.1476, and operating expenditures, 0.1195. (For 
the Commission's estimates of the Report and Order costs, the 
Commission uses a 30% annual charge factor, as it wishes to avoid 
understating the costs of its actions. Here, the Commission seeks to 
show that NE Colorado Cellular's costs are high, so it uses a 25% 
annual charge factor to demonstrate that their reported costs are high 
even under conservative assumptions.) NE Colorado Cellular reports 
serving 110,000 customers, so capital costs alone amount to 
approximately $85 per month per customer ($112.5 million/12/110,000 = 
$85). Of course, NE Colorado Cellular must recover costs beyond its 
capital costs. NE Colorado Cellular collects and pays roaming fees, the 
net of which could reduce the required monthly recovery from its 
customers, but presumably not radically. Thus, NE Colorado Cellular 
would need to be charging monthly subscriber fees of around or probably 
in excess of $85 per month, which seems high, especially compared with 
T-Mobile's ``Premium Unlimited Plan,'' which costs $50 per month per 
subscription when four subscriptions are purchased.
    99. The Commission expects that firms motivated to report their 
costs in the record of the proceeding have above average costs. Indeed, 
the reporting carriers are unlikely to be representative of carriers 
affected by the Commission's actions, but rather reflect carriers with 
greater incentives to put their concerns in the record, i.e., carriers 
for which the impact of a rip-and-replace requirement is large compared 
with similarly situated non-reporting carriers. In 2018, the 7 carriers 
who provided rip and replace cost estimates represented only 0.15% of 
mobile carrier end-user revenues as reported in their FCC Form 499s. 
Consequently, the Commission conservatively discounts the median of 
reported costs by between 10% and 20%, which yields an estimated 
replacement cost for each network of $40 million to $45 million.
    100. The Commission generously estimates 106 firms currently buy 
Huawei and ZTE equipment. Huawei reports serving 85 U.S. customers in 
2019. Alternatively, the Commission could rely on the Dell'Oro Group's 
North American market share estimate for ZTE of zero. This would imply 
only 85, rather than 106 purchasers, lowering the Commission's cost 
estimates by approximately 20%. Market share estimates for Huawei and 
ZTE, respectively of 31.1% and 7.5%, imply 105.5 (= 85 * (1 + 7.5/
31.1)) purchasers of equipment from Huawei and ZTE. See Dell'Oro Group, 
Market Research Reports on Mobile Radio Access Network, which also 
finds Huawei's North American share to be only 1.5% and ZTE's to be 
zero. This is likely an overestimate as both suppliers, but especially 
ZTE, have experienced a decline in their U.S. customer bases. For sake 
of this analysis, however, the Commission rounds up to 106 firms. Given 
all of these customers are not likely to be ETCs, e.g., they may be 
firms purchasing Wi-Fi routers for internal use, the Commission 
estimates between 32 (30%) and 53 (50%) of these firms accept universal 
service funds. This range is consistent with CoBANK's estimate that 30 
rural carriers are impacted.
    101. Lastly, the Commission recognizes capital is fungible, and 
carriers have some leeway to buy Huawei or ZTE equipment from other 
funding sources. For these carriers, the Commission estimates they may 
only use universal service funds to replace between 50% and 75% of 
their existing Huawei or ZTE equipment. The Commission's actions 
prevents carriers from purchasing Huawei and ZTE equipment using 
universal service funds but does not prohibit them from purchasing such 
equipment using funds from other sources so long as they can meet the 
accounting requirements described in this document. This gives the 
following lower and upper bounds for the costs of replacing installed 
Huawei or ZTE equipment:
    Lower bound: $640 million = $40 million * 32 * 50%.
    Upper bound: $1.79 billion = $45 million * 53 * 75%.
    102. Converting the Replacement Cost into a Cost Stream. Assuming 
the average useful life of the equipment in question is ten years, then 
on average in each year, 10% of the total value of the equipment must 
be replaced. The Commission adds to this an additional 20% of the value 
of the equipment for expenses for service and maintenance costs and a 
return to bondholders and shareholders. The sum equals a generous 
annual charge factor of 30%. This may be broken down into a 10% factor 
for capital purchases to maintain the capital base, and a 20% factor 
for service, maintenance, and a return to bondholders and shareholders. 
By comparison, the annual cost factor for switching in the Connect 
America Model is 0.2671 the sum of the annual cost factors for capital 
expenditures, 0.1476, and operating expenditures, 0.1195. This, with 
assumptions about prices discussed in this document, allows the 
Commission to develop a cost stream associated with each year for 20 
years.
    103. Comparing Expenses under the Report and Order with the Case of 
No Report and Order. Of course, this equipment would be replaced with 
or without the Commission's requirement. The relevant cost of the 
Commission's action is the price differential or markup between 
purchasing alternative equipment and Huawei or ZTE equipment. Sources 
suggest this markup

[[Page 245]]

ranges from 5% to 40% (not taking into account any change in quality, 
reliability, or durability). These markups do not account for quality 
differences between Huawei and ZTE, and their rivals, or the likelihood 
that these rivals' prices will become more competitive over time. The 
40% estimate, which is well above the other two estimates, comes from a 
carrier that appears particularly concerned about the Commission's 
actions, and hence may have overestimated the markup. Consequently, the 
Commission uses the mid-points of each of the other two markup 
estimates, 10% and 25%, as lower and upper bounds. Using these price 
markup assumptions and subtracting the annual cost streams in the 
absence of the Report and Order from the cost streams under the Report 
and Order results in a stream of cost differences. The Commission thus 
estimates the present value of the cost differences for the next twenty 
years that would arise due to the Report and Order ranges from $160 
million to $960 million.
    104. The Economic Efficiency Costs of the Commission's Actions. So 
far, the Commission has only discussed the replacement cost of its 
actions. To understand the potential breadth of the economic cost of 
the Commission's actions, first consider the simple case in which 
prices of both the cheaper and the more expensive providers recover no 
more than the economic costs of supply, including a return of capital 
(capital replacement), and a return on capital, accounting for the 
risks the firm's owners bear. Call this a normal profit. In that case, 
the cost just calculated is a key economic cost, representing an 
increase in resources used because the Commission's actions cause 
carriers to shift their purchases from more to less efficient 
providers. But there is a further efficiency consequence of the 
Commission's actions. Purchase from less efficient suppliers occurs at 
higher (quality-adjusted) prices. If the quality-adjusted prices of 
Huawei and ZTE are equal to their rivals' prices, then the Commission's 
actions would have no costs. However, some carriers prefer Huawei or 
ZTE to alternative suppliers, implying that these carriers view the 
prices of Huawei or ZTE to be the lowest quality-adjusted price 
available to them. This lowers output because end users face higher 
prices, and consequently purchase less than is efficient. Estimating 
the efficiency cost of this is difficult, but relative to the 
replacement cost, the distortion cost is small and likely swamped by 
the error inherent in the replacement cost estimate. This is true from 
a global as well as a domestic perspective.
    105. This can be seen by focusing on the intermediary market for 
network equipment, i.e., demand in this market is derived from demand 
for services provided to end users. This implies the distortions in the 
intermediary market reflect those in the final market. The 
reimbursement cost to the Universal Service Fund is the product of the 
amount of network equipment bought and sold at the new higher prices, 
call this Q, and the markup over Huawei and ZTE prices, call this 
[Delta]P. The cost of the distortion caused by the reduction in demand 
for network equipment due to inefficiently higher prices is the lost 
value consumers would have obtained from the additional quantity they 
would have consumed at the Huawei or ZTE prices. This lost value equals 
the area under the demand curve in the region where demand is curtailed 
due to the higher prices of the alternative suppliers. At a first 
approximation, this cost is, because demand is downward sloping, 
strictly less than the product of the change in what is bought and 
sold, call this [Delta]Q, and the change in price, [Delta]P. The 
reimbursement cost, [Delta]P * Q, swamps the distortion cost, [Delta]P 
* [Delta]Q, since Q is generally considerably larger than [Delta]Q. 
Thus, if higher prices reduce demand by 5% (= [Delta]Q/Q), then the 
distortion cost could not add more than 5% to the cost to the Universal 
Service Fund ([Delta]P * [Delta]Q/[Delta]P * Q = 5%).
    106. From a global perspective, the Commission's estimates of the 
economic cost of its actions would be higher to the extent that Huawei 
or ZTE earn more than a normal profit despite having substantially 
lower prices than their rivals. Purchases diverted to alternative 
suppliers would cause Huawei and ZTE to forgo that extra-normal profit. 
However, it seems unlikely that Huawei or ZTE earn extra-normal profit. 
Similarly, from a global perspective, the Commission's economic cost 
estimate would be lower to the extent that the prices of the rivals of 
Huawei and ZTE, today essentially being Ericsson and Nokia, incorporate 
extra-normal profits. While U.S. purchasers, and hence the Universal 
Service Fund, would be spending more when purchasing from Ericsson and 
Nokia at higher prices, to the extent these prices incorporate extra-
normal profit, this would be a transfer from the U.S. to the foreign 
owners of Ericsson and Nokia. Finally, from a global perspective, if 
Huawei or ZTE's prices are less than what is required to recover their 
costs of operations, e.g., due to a government subsidy, then the 
economic cost of the Commission's actions would be lower.
    107. The Commission rejects Huawei's claims that its actions would 
reduce 5G deployment and would materially increase mobile radio access 
network equipment prices in the U.S., which in turn would materially 
harm growth and employment in the U.S. economy. It is unlikely the 
Commission's actions will impact U.S. 5G deployment. The four largest 
U.S. mobile carriers do not use and have no plans to use Huawei (or 
ZTE) radio access network equipment. Given this, and Aron's claim that 
there are high costs associated with switching from one equipment 
manufacturer to another, it is implausible that the Commission's 
actions will affect these carriers' 5G deployment plans. More broadly, 
the Commission finds it unlikely that its actions will materially 
increase U.S. radio access network equipment prices. While carriers 
that buy equipment from covered companies could face higher prices in 
the near term (and only to the extent they use universal services funds 
to purchase that equipment), Huawei's own chief executive has admitted 
that Huawei has ``virtually no business dealings in the U.S.''--making 
it far more likely that the Commission's rule will have ``virtually 
no'' impact on 5G deployment. What is more, the Commission finds that 
ensuring a robust ecosystem of trusted vendors for 5G equipment (one 
collateral consequence of the Commission's rule) is more likely to keep 
5G equipment prices checked by a competitive market over the long term, 
facilitating deployment and continued U.S. leadership in 5G.

III. Information Collection Order

    108. In the concurrently adopted Further Notice, the Commission 
seeks comment on proposals to address the national security threats 
arising from the existing use of equipment or services produced or 
provided by covered companies. To support the Commission's future 
efforts to protect the communications supply chain, the Commission 
directs WCB and OEA, in coordination with USAC, to conduct an 
information collection to determine the extent to which potentially 
prohibited equipment exists in current networks and the costs 
associated with removing such equipment and replacing it with 
equivalent equipment. The information collection will aid the 
Commission's review of the record and guide its next steps in the 
proceeding. Because section 889(f) of the 2019 NDAA identifies specific 
companies that are prohibited from federal procurements, and the 
concurrently adopted Further Notice

[[Page 246]]

seeks comment on how to implement those and other prohibitions, the 
Commission specifically seeks comment on the extent to which equipment 
or services from companies identified in Section 889 of the NDAA exist 
in current networks.
    109. The Commission seeks information from ETCs on the potential 
costs associated with the complete removal and replacement of any 
equipment and services produced or provided by Huawei and ZTE. The 
information collection applies to all subsidiaries and affiliates of 
ETCs.
    110. Specifically, the Commission seeks information on all 
equipment and services from Huawei and ZTE that are used or owned by 
ETCs. ETCs are the subject of the Commission's proposed rule (and among 
USF recipients the most likely to currently own and use equipment and 
services from Huawei and ZTE). The Commission therefore limits its 
information collection only to ETCs and will not require cost 
information from other USF recipients at this time. The Commission 
nonetheless will allow service providers that are not ETCs to 
participate on a voluntary basis should they have ETC designation 
petitions pending (or may intend to file such in the future). And the 
Commission will allow other USF recipients who are not ETCs to 
participate on a voluntary basis as well.
    111. In implementing the information collection, WCB and OEA should 
gather information from ETCs as to whether they own equipment or 
services from Huawei or ZTE, what that equipment is and what those 
services are, the cost to purchase and/or install such equipment or 
services, and the cost to remove and replace such equipment or 
services. ETCs must demonstrate how they arrived at any cost estimates 
they provide in response to the information collection. All submissions 
must be certified to ensure the accuracy of the responses.
    112. The information collection shall be mandatory for all ETCs and 
voluntary for others. The Commission directs WCB to consider the 
potential confidentiality of any information submitted, particularly 
where public release of such information could raise security concerns 
(e.g., granular location information). The Commission expects, however, 
that the public interest in knowing whether a carrier uses equipment or 
services from Huawei or ZTE would significantly outweigh any interest 
the carrier would have in keeping such information confidential. As 
part of the information collection, the Commission directs WCB and OEA 
to seek any information necessary to verify responses provided by ETCs 
to the information collection, including by requiring further 
information from respondents. The Commission directs WCB and OEA to 
proceed expeditiously with the information collection, including by 
seeking emergency PRA approval from OMB, if necessary and appropriate. 
The Commission believes there is good cause for requesting emergency 
PRA approval from OMB for the reasons described in the following. Given 
the nature of the national security concerns, the Commission finds that 
the serious and immediate risks to communications networks likely 
justify the expedited approval of the information collection.

IV. Procedural Matters

A. Paperwork Reduction Act

    113. This document contains new or modified information collection 
requirements subject to the Paperwork Reduction Act of 1995 (PRA), 
Public Law 104-13. It will be submitted to the Office of Management and 
Budget (OMB) for review under Section 3507(d) of the PRA. OMB, the 
general public, and other Federal agencies will be invited to comment 
on the new or modified information collection requirements contained in 
the proceeding. In addition, the Commission notes that pursuant to the 
Small Business Paperwork Relief Act of 2002, Public Law 107-198, see 44 
U.S.C. 3506(c)(4), the Commission previously sought specific comment on 
how the Commission might further reduce the information collection 
burden for small business concerns with fewer than 25 employees.

B. Congressional Review Act

    114. The Commission has determined, and the Administrator of the 
Office of Information and Regulatory Affairs, Office of Management and 
Budget, concurs, that this rule is non-major under the Congressional 
Review Act, 5 U.S.C. 804(2), because it is promulgated under the 
Telecommunications Act of 1996 and the amendments made by that Act. The 
Commission will send a copy of this Report and Order, Further Notice of 
Proposed Rulemaking, and Order to Congress and the Government 
Accountability Office pursuant to 5 U.S.C. 801(a)(1)(A).
    115. As required by the Regulatory Flexibility Act of 1980, as 
amended (RFA), an Initial Regulatory Flexibility Analysis (IRFA) was 
incorporated into the Protecting Against National Security Threats 
Notice for the proceeding. The Commission sought written public comment 
on the proposed rule in the Protecting Against National Security 
Threats Notice, including comment on the IRFA. The Commission received 
only a single comment on the IRFA. Because the Commission amends its 
rules in the Report and Order, the Commission has included the Final 
Regulatory Flexibility Analysis (FRFA). The present FRFA conforms to 
the RFA.
    116. Consistent with the Commission's obligation to be responsible 
stewards of the public funds used in USF programs and increasing 
concern about ensuring communications supply chain integrity, the Order 
adopts a rule that restricts universal service support from being used 
to purchase, obtain, maintain, improve, modify, or otherwise support 
any equipment or services produced or provided by any company posing a 
national security threat to the integrity of communications networks or 
the communications supply chain.
    117. The RFA directs agencies to provide a description and, where 
feasible, an estimate of the number of small entities that may be 
affected by the final rules adopted pursuant to the Order. The RFA 
generally defines the term ``small entity'' as having the same meaning 
as the terms ``small business,'' ``small organization,'' and ``small 
governmental jurisdiction.'' In addition, the term ``small business'' 
has the same meaning as the term ``small-business concern'' under the 
Small Business Act. See 5 U.S.C. 601(3) (incorporating by reference the 
definition of ``small-business concern'' in the Small Business Act, 15 
U.S.C. 632). Pursuant to 5 U.S.C. 601(3), the statutory definition of a 
small business applies ``unless an agency, after consultation with the 
Office of Advocacy of the Small Business Administration and after 
opportunity for public comment, establishes one or more definitions of 
such term which are appropriate to the activities of the agency and 
publishes such definition(s) in the Federal Register.'' A ``small-
business concern'' is one which: (1) Is independently owned and 
operated; (2) is not dominant in its field of operation; and (3) 
satisfies any additional criteria established by the SBA.
    118. Small Businesses, Small Organizations, Small Governmental 
Jurisdictions. The Commission's actions, over time, may affect small 
entities that are not easily categorized at present. The Commission 
therefore describes in this document, at the outset, three broad groups 
of small entities that could be directly affected herein. First, while 
there are industry specific size standards for small businesses that 
are used in the regulatory flexibility

[[Page 247]]

analysis, according to data from the SBA's Office of Advocacy, in 
general a small business is an independent business having fewer than 
500 employees. These types of small businesses represent 99.9% of all 
businesses in the United States which translates to 28.8 million 
businesses.
    119. Next, the type of small entity described as a ``small 
organization'' is generally ``any not-for-profit enterprise which is 
independently owned and operated and is not dominant in its field.'' 
Nationwide, as of Aug 2016, there were approximately 356,494 small 
organizations based on registration and tax data filed by nonprofits 
with the Internal Revenue Service (IRS).
    120. Finally, the small entity described as a ``small governmental 
jurisdiction'' is defined generally as ``governments of cities, 
counties, towns, townships, villages, school districts, or special 
districts, with a population of less than fifty thousand.'' U.S. Census 
Bureau data from the 2012 Census of Governments indicates that there 
were 90,056 local governmental jurisdictions consisting of general 
purpose governments and special purpose governments in the United 
States. Of this number there were 37,132 general purpose governments 
(county, municipal and town or township) with populations of less than 
50,000 and 12,184 special purpose governments (independent school 
districts and special districts) with populations of less than 50,000. 
The 2012 U.S. Census Bureau data for most types of governments in the 
local government category show that the majority of these governments 
have populations of less than 50,000. Based on this data the Commission 
estimates that at least 49,316 local government jurisdictions fall in 
the category of ``small governmental jurisdictions.''
    121. Small entities potentially affected by the rules herein 
include Schools and Libraries, Healthcare Providers, Providers of 
Telecommunications and other Services, Internet Service Providers and 
Vendors and Equipment Manufacturers.
    122. Restriction on Use of USF Funds. The Order adopts a rule that 
no universal service support may be used to purchase or obtain any 
equipment or services produced or provided by a covered company posing 
a national security threat to the integrity of communications networks 
or the communications supply chain. Applicants may continue to use 
their own funds to upgrade and maintain such equipment. They must, 
however, be able to affirmatively demonstrate that they have not used 
any funds obtained via the USF to purchase, obtain, maintain, improve, 
modify, or otherwise support equipment or services provided or 
manufactured by a covered company. This restriction applies to any and 
all equipment and services, including software, produced or provided by 
a covered company. Because the rule is prospective in effect, it does 
not prohibit the use of existing services or equipment already deployed 
or in use. USF recipients may seek waivers of the requirements.
    123. Covered Companies. The Report and Order initially designates 
Huawei and ZTE as covered companies for purposes of the prohibition the 
Commission adopts in this document. Independently, the Order 
establishes a process for designating entities as national security 
threats for purposes of the Commission's rule, and delegates to the 
PSHSB the authority to implement this process, as well as the next 
steps in the designation processes for Huawei and ZTE. Because 
equipment from subsidiaries, parents, and affiliates pose the same 
risks to network integrity as equipment directly from the covered 
company, the Commission includes any subsidiary, parent, or affiliate 
of a covered company as a covered company subject to the Commission's 
prohibition.
    124. Effective Date of Rule. Because of the compelling interest in 
protecting our national security, the Commission concludes that the 
rule it adopts in this document should take effect immediately upon 
publication in the Federal Register. For purposes of the Lifeline and 
High-Cost Support Programs, any prohibition on the use of USF funds 
will take effect immediately upon publication of the effective date 
contained in the Final Designation Notice designating an entity as a 
covered company posing a national security threat. A requirement that 
USF recipients certify that they are in compliance with the 
Commission's rule will take effect following revision of each 
information collection as described in the Order, including approval by 
the Office of Management and Budget (OMB) under the Paperwork Reduction 
Act. For E-Rate and Rural Health Care Recipients, the rule the 
Commission adopts will apply to all funding years that start after the 
designation of a covered company. The Commission's rule extends to 
existing contracts to acquire equipment or services from any covered 
company that were negotiated and entered into prior to the final 
designation of that entity as a covered company. In other words, 
existing multiyear contracts to acquire equipment or services from a 
covered company will not be exempt from the rule.
    125. Compliance Certifications. The Order establishes that the 
Commission should require recipients of universal service support to 
provide a certification that they have complied with the adopted rule, 
and directs WCB, in coordination with USAC, to revise the relevant 
information collections for each of the four USF programs to implement 
a certification attesting to compliance with the adopted rule.
    126. Audits and Recovery of Funds. The Order directs USAC to 
implement audit procedures for each USF program consistent with the 
adopted rule. USF recipients must be able to affirmatively demonstrate 
that no universal service funds were used to purchase, obtain, 
maintain, improve, modify, or otherwise support any equipment or 
services provided or manufactured by covered companies. The Order notes 
that applicants in the E-rate and Rural Health Care programs already 
retain and provide information either during the application process or 
during audit and program integrity assurance processes that could 
demonstrate (if verified) that no USF funds were improperly used. And 
many ETCs receiving High Cost funding now report the projects they 
complete using federal funds to the High Cost Universal Broadband 
portal, allowing relatively swift verification by USAC of compliance. 
To the extent that other ETCs do not yet report information to USAC 
that would verify compliance, the Commission directs WCB and USAC to 
revise its information collection and audit procedures to ensure the 
reporting of USF expenditures in a manner that will allow efficient 
oversight and thorough compliance. The Order does not depart from the 
requirement that directs USAC to pursue recovery actions against the 
party or parties that committed the rule or statutory violation in 
question, recognizing that, in some instances, this could be the 
applicant school, library, health care provider, or consortium, rather 
than the service provider.
    127. Information Collection. The Information Collection Order 
directs WCB and OEA, in coordination with USAC, to conduct an 
information collection to determine the extent to which potentially 
prohibited equipment exists in current networks and the costs 
associated with removing such equipment and replacing it with 
equivalent equipment. Specifically, the information collection will 
seek information from ETCs on the potential costs associated with the 
complete removal and replacement of any equipment and services produced 
or

[[Page 248]]

provided by Huawei and ZTE. Specifically, the Commission seeks 
information on all equipment and services from Huawei and ZTE that are 
used or owned by ETCs. ETCs are the subject of the Commission's 
proposed rule (and among USF recipients the most likely to currently 
own and use equipment and services from Huawei and ZTE). The Commission 
therefore limits its information collection only to ETCs and will not 
require cost information from other USF recipients at this time. The 
Commission nonetheless will allow service providers that are not ETCs 
to participate on a voluntary basis should they have ETC designation 
petitions pending (or may intend to file such in the future). And the 
Commission will allow other USF recipients who are not ETCs to 
participate on a voluntary basis as well.
    128. In implementing the information collection, WCB and OEA should 
gather information from ETCs as to whether they own equipment or 
services from Huawei or ZTE, what that equipment is and what those 
services are, the cost to purchase and/or install such equipment or 
services, and the cost to remove and replace such equipment or 
services. ETCs must demonstrate how they arrived at any cost estimates 
they provide in response to the information collection. All submissions 
must be certified to ensure the accuracy of the responses. The 
information collection shall be mandatory for all ETCs and voluntary 
for others. The information collection applies to all subsidiaries and 
affiliates of ETCs. The Information Collection Order directs WCB to 
consider the potential confidentiality of any information submitted, 
particularly where public release of such information could raise 
security concerns (e.g., granular location information). The Commission 
expects, however, that the public interest in knowing whether a carrier 
uses equipment or services from Huawei or ZTE would significantly 
outweigh any interest the carrier would have in keeping such 
information confidential. As part of the information collection, the 
Commission directs WCB and OEA to seek any information necessary to 
verify responses provided by ETCs to the information collection, 
including by requiring further information from respondents. The 
Commission directs WCB and OEA to proceed expeditiously with the 
information collection, including by seeking emergency PRA approval 
from OMB, if necessary and appropriate.
    129. The RFA requires an agency to describe the steps the agency 
has taken to minimize the significant economic impact on small entities 
of the final rule, consistent with the stated objectives of the 
applicable statutes, including a statement of the factual, policy, and 
legal reasons in support of the final rule, and why any significant 
alternatives to the rule considered by the agency and which affect the 
impact on small entities were rejected.
    130. The scope of the rule adopted in the Order is carefully 
limited so as to lessen its impact on small entities. Because the rule 
is prospective in effect, it does not prohibit the use of existing 
services or equipment already deployed or in use. USF recipients may 
continue to use equipment or services provided or produced by covered 
companies obtained prior to the issuance of the rule, although they may 
not use USF funds to purchase, obtain, maintain, improve, modify, or 
otherwise support such equipment or services in any way. Recipients may 
also continue to use their own funds to upgrade and maintain such 
equipment, so long as they do not use USF funds to do so. The Order 
also permits USF recipients to seek a waiver of the requirements. In 
these ways, the Order seeks to minimize the economic burden of these 
rules on small entities.
    131. Effective Date. The rules adopted herein and the initial 
designations of Huawei and ZTE as covered companies shall be effective 
immediately upon publication in the Federal Register.
    132. While a rule ordinarily will take effect 30 days after 
publication in the Federal Register, the Commission finds here that 
good cause exists to expedite the implementation of these rules and to 
make them effective upon publication in the Federal Register. In 
finding that good cause exists, the Commission applies the test 
articulated by the D.C. Circuit in Omnipoint Corporation v. FCC, which 
requires an agency to ``balance the necessity for immediate 
implementation against principles of fundamental fairness which require 
that all affected persons be afforded a reasonable amount of time to 
prepare for the effective date of its ruling.''
    133. The Commission first examines the necessity for immediate 
implementation. The record before the Commission establishes that the 
nature of today's communications networks is such that untrusted 
participants in the supply chain pose a serious and immediate risk to 
the integrity and proper functioning of these networks. In addition, 
expediting the Commission's process for analyzing such risks serves to 
minimize the scope of exposure of USF recipients to the significant 
flaws in their networks from future installation of equipment that may 
compromise the security of these networks, and any resulting need to 
replace such equipment. Against this critical national security concern 
the Commission balances the concerns of fairness to affected parties--
including whether dispensing with the 30-day waiting period will 
deprive affected parties of ``a reasonable time to adjust their 
behavior before the final rule takes effect.'' Here, the Commission 
notes that the principal effect of the rules adopted in the Report and 
Order--restriction on the spending of USF to certain suppliers 
designated as a threat to national security--will not take effect until 
an entity is actually designated as a threat to national security under 
the proposed rules. Thus, no entity will be designated until--at the 
earliest--31 days after the effective date of the Report and Order. In 
other words, making these rules effective immediately upon publication 
in the Federal Register will not inhibit any party's ability to 
``prepare for [their] effective date'' because the rules the Commission 
adopts in this document does not include any requirements with which 
USF recipients must immediately comply.
    134. While the Commission has adopted initial designations of 
Huawei and ZTE as covered companies, use of USF support to procure or 
otherwise support equipment or services produced or provided by these 
two companies has not and will not be disallowed until such time as 
PSHSB issues a public notice announcing its final determination and the 
effective date of any potential final designation of one or both of 
these companies. To the extent that accelerating the effective date 
requires these companies to respond more quickly to their initial 
designation, the Commission will provide copies of the Report and Order 
to both parties or their U.S. agents or affiliates immediately after 
release. The Commission has recognized that a finding of good cause 
under section 553(d)(3) can be further supported where ``the Commission 
is serving those entities by overnight mail.''
    135. Even were the rules the Commission adopts in this document to 
have an immediate impact on USF recipients, it does not believe it 
would affect the Commission's findings here. Many service providers 
have already made the business decision to purchase equipment from 
alternative vendors in order to avoid security risks. Given this, and 
the industry's long-standing knowledge of the risks posed by the 
installation and purchase of such equipment, the Commission believes 
that the impact of an immediate effective date would be minimal.

[[Page 249]]

    136. In this case, given the critical security concerns at issue, 
and the fact that an expedited schedule will not impede the ability of 
interested parties to prepare for the implementation of the rules the 
Commission adopts in this document, it finds that good cause exists, in 
accordance with the balancing test articulated by the Court in 
Omnipoint, to expedite the implementation of these rules and to make 
them effective immediately upon publication in the Federal Register.
    137. Ex Parte Presentations. This proceeding shall be treated as a 
``permit-but-disclose'' proceeding in accordance with the Commission's 
ex parte rules. Persons making ex parte presentations must file a copy 
of any written presentation or a memorandum summarizing any oral 
presentation within two business days after the presentation (unless a 
different deadline applicable to the Sunshine period applies). Persons 
making oral ex parte presentations are reminded that memoranda 
summarizing the presentation must (1) list all persons attending or 
otherwise participating in the meeting at which the ex parte 
presentation was made, and (2) summarize all data presented and 
arguments made during the presentation. If the presentation consisted 
in whole or in part of the presentation of data or arguments already 
reflected in the presenter's written comments, memoranda, or other 
filings in the proceeding, the presenter may provide citations to such 
data or arguments in his or her prior comments, memoranda, or other 
filings (specifying the relevant page and/or paragraph numbers where 
such data or arguments can be found) in lieu of summarizing them in the 
memorandum. Documents shown or given to Commission staff during ex 
parte meetings are deemed to be written ex parte presentations and must 
be filed consistent with rule 1.1206(b). In proceedings governed by 
rule 1.49(f) or for which the Commission has made available a method of 
electronic filing, written ex parte presentations and memoranda 
summarizing oral ex parte presentations, and all attachments thereto, 
must be filed through the electronic comment filing system available 
for that proceeding, and must be filed in their native format (e.g., 
.doc, .xml, .ppt, searchable .pdf). Participants in this proceeding 
should familiarize themselves with the Commission's ex parte rules.

V. Ordering Clauses

    138. Accordingly, it is ordered, pursuant to in sections 1-4, 
201(b), 229 and 254 of the Communications Act of 1934, as amended, and 
section 105 of the Communications Assistance for Law Enforcement Act, 
47 U.S.C. 151-154, 201(b), 229, 254, 1004, that the Report and Order is 
adopted.
    139. It is further ordered that Part 54 of the Commission's rules 
is amended as set forth in the following.
    140. It is further ordered that, pursuant to Sec. Sec.  1.4(b)(1) 
and 1.103(a) of the Commission's rules, 47 CFR 1.4(b)(1), 1.103(a), the 
Report and Order shall be effective immediately upon publication of the 
Report and Order in the Federal Register.
    141. It is further ordered that, pursuant to Sec. Sec.  1.4(b)(1) 
and 1.103(a) of the Commission's rules, 47 CFR 1.4(b)(1), 1.103(a), the 
initial designations adopted in this order shall be effective 
immediately upon publication of the Report and Order in the Federal 
Register.
    142. It is further ordered, pursuant to sections 1-4, 201(b) and 
254 of the Communications Act of 1934, as amended, 47 U.S.C. 151-154, 
201(b), 254, that the Information Collection Order is adopted. 
Information collection pursuant to the Order shall be effective 
immediately upon OMB approval.

List of Subjects in 47 CFR Part 54

    Communications common carriers, Health facilities, Infants and 
children, internet, Libraries, Reporting and recordkeeping 
requirements, Schools, Telecommunications, Telephone.

Federal Communications Commission.
Katura Jackson,
Federal Register Liaison Officer, Office of the Secretary.

Final Rules

    For the reasons discussed in the preamble, the Federal 
Communications Commission amends 47 part 54 as follows:

PART 54--UNIVERSAL SERVICE

0
1. The authority citation for part 54 is revised to read as follows:

    Authority:  47 U.S.C. 151, 154(i), 155, 201, 205, 214, 219, 220, 
229, 254, 303(r), 403, 1004, and 1302 unless otherwise noted.

0
2. Add Sec.  54.9 to subpart A to read as follows:


Sec.  54.9  Prohibition on use of funds.

    (a) USF support restriction No universal service support may be 
used to purchase, obtain, maintain, improve, modify, or otherwise 
support any equipment or services produced or provided by any company 
posing a national security threat to the integrity of communications 
networks or the communications supply chain.
    (b) Designation of Entities Subject to Prohibition. (1) When the 
Public Safety and Homeland Security Bureau (PSHSB) determines, either 
sua sponte or in response to a petition from an outside party, that a 
company poses a national security threat to the integrity of 
communications networks or the communications supply chain, PSHSB shall 
issue a public notice advising that such designation has been proposed 
as well as the basis for such designation.
    (2) Upon issuance of such notice, interested parties may file 
comments responding to the initial designation, including proffering an 
opposition to the initial designation. If the initial designation is 
unopposed, the entity shall be deemed to pose a national security 
threat 31 days after the issuance of the notice. If any party opposes 
the initial designation, the designation shall take effect only if 
PSHSB determines that the affected entity should nevertheless be 
designated as a national security threat to the integrity of 
communications networks or the communications supply chain. In either 
case, PSHSB shall issue a second public notice announcing its final 
designation and the effective date of its final designation. PSHSB 
shall make a final designation no later than 120 days after release of 
its initial determination notice. PSHSB may, however, extend such 120-
day deadline for good cause.
    (3) PSHSB will act to reverse its designation upon a finding that 
an entity is no longer a threat to the integrity of communications 
networks or the communications supply chain. A designated company, or 
any other interested party, may submit a petition asking PSHSB to 
remove a designation. PSHSB shall seek the input of Executive Branch 
agencies and the public upon receipt of such a petition. If the record 
shows that a designated company is no longer a national security 
threat, PSHSB shall promptly issue an order reversing its designation 
of that company. PSHSB may dismiss repetitive or frivolous petitions 
for reversal of a designation without notice and comment. If PSHSB 
reverses its designation, PSHSB shall issue an order announcing its 
decision along with the basis for its decision.
    (4) PSHSB shall have discretion to revise this process or follow a 
different process if appropriate to the circumstances, consistent with 
providing affected parties an opportunity to respond and with any

[[Page 250]]

need to act expeditiously in individual cases.

[FR Doc. 2019-27610 Filed 1-2-20; 8:45 am]
 BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.