Equipment and Services Produced or Provided by Certain Entities Identified as Risks to National Security, 59785-59788 [2020-20987]
Download as PDF
Federal Register / Vol. 85, No. 185 / Wednesday, September 23, 2020 / Notices
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
[Docket No. AD20–14–000]
khammond on DSKJM1Z7X2PROD with NOTICES
Carbon Pricing in Organized
Wholesale Electricity Markets;
Supplemental Notice of Technical
Conference
As announced in the Notice 1 of
Technical Conference issued in this
proceeding on June 17, 2020, the
Federal Energy Regulatory Commission
(Commission) will convene a
Commissioner-led technical conference
in the above-referenced proceeding on
Wednesday, September 30, 2020, from
approximately 9:00 a.m. to 6:00 p.m.
Eastern time. The conference will be
held electronically.
The purpose of this conference is to
discuss considerations related to stateadoption of mechanisms to price carbon
dioxide emissions, commonly referred
to as carbon pricing, in regions with
Commission-jurisdictional organized
wholesale electricity markets (i.e.,
regions with regional transmission
organizations/independent system
operators, or RTOs/ISOs). This
conference will focus on carbon pricing
approaches where a state (or group of
states) sets an explicit carbon price,
whether through a price-based or
quantity-based approach, and how that
carbon price intersects with RTO/ISOadministered markets, addressing both
legal and technical issues.
A revised agenda and list of panelists
for this conference are attached. All
changes to the agenda since the
Commission’s August 28, 2020
Supplemental Notice of Technical
Conference appear in italics.
There is no fee for attendance, and the
conference will be webcast for the
public to attend electronically.
Information on this technical
conference, including a link to the
webcast, will also be posted on this
conference’s event page on the
Commission’s website, www.ferc.gov/
news-events/events/technicalconference-regarding-carbon-pricingorganized-wholesale-electricity, prior to
the event. The conference will be
transcribed. Transcripts will be
available for a fee from Ace Reporting,
(202) 347–3700.
Commission conferences are
accessible under section 508 of the
Rehabilitation Act of 1973. For
accessibility accommodations, please
send an email to accessibility@ferc.gov,
call toll-free (866) 208–3372 (voice) or
1 18
CFR 2.1 (2020).
VerDate Sep<11>2014
18:02 Sep 22, 2020
Jkt 250001
(202) 208–8659 (TTY), or send a fax to
(202) 208–2106 with the required
accommodations.
For more information about this
technical conference, please contact:
John Miller (Technical Information),
Office of Energy Market Regulation,
(202) 502–6016, john.miller@ferc.gov
Anne Marie Hirschberger (Legal
Information), Office of the General
Counsel, (202) 502–8387,
annemarie.hirschberger@ferc.gov
Sarah McKinley (Logistical
Information), Office of External
Affairs, (202) 502–8004,
sarah.mckinley@ferc.gov
Dated: September 16, 2020.
Kimberly D. Bose,
Secretary.
[FR Doc. 2020–20985 Filed 9–22–20; 8:45 am]
BILLING CODE 6717–01–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
[Docket No. RM20–19–000]
Equipment and Services Produced or
Provided by Certain Entities Identified
as Risks to National Security
Federal Energy Regulatory
Commission, Department of Energy.
ACTION: Notice of inquiry.
AGENCY:
The Federal Energy
Regulatory Commission (Commission)
seeks comments on the potential risks to
the bulk electric system posed by the
use of equipment and services produced
or provided by certain entities identified
as risks to national security. In addition,
the Commission seeks comments on
strategies to mitigate any potential risks
posed by such telecommunications
equipment and services, including but
not limited to potential modifications to
the Critical Infrastructure Protection
Reliability Standards.
DATES: Initial Comments are due
November 23, 2020, and Reply
Comments are due December 22, 2020.
ADDRESSES: Comments, identified by
docket number, may be filed in the
following ways:
• Electronic Filing through https://
www.ferc.gov. Documents created
electronically using word processing
software should be filed in native
applications or print-to-PDF format and
not in a scanned format.
• Mail/Hand Delivery: Those unable
to file electronically may mail or handdeliver comments to: Federal Energy
Regulatory Commission, Secretary of the
SUMMARY:
PO 00000
Frm 00051
Fmt 4703
Sfmt 4703
59785
Commission, 888 First Street NE,
Washington, DC 20426.
• Instructions: For detailed
instructions on submitting comments,
see the Comment Procedures Section of
this document.
FOR FURTHER INFORMATION CONTACT:
Simon Slobodnik (Technical
Information), Office of Electric
Reliability, Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502–
6707, Simon.Slobodnik@ferc.gov
Kevin Ryan (Legal Information), Office
of the General Counsel, Federal
Energy Regulatory Commission, 888
First Street NE, Washington, DC
20426, (202) 502–6840, Kevin.Ryan@
ferc.gov
1. In this Notice of Inquiry, the
Commission seeks comments on the
potential risks to the bulk electric
system posed by using equipment and
services produced or provided by
entities identified as risks to national
security. In addition, the Commission
seeks comments on whether the current
Critical Infrastructure Protection (CIP)
Reliability Standards adequately
mitigate the identified risks. Further, the
Commission seeks comment on possible
actions the Commission could consider
taking to address the identified risks.
2. On October 18, 2018, the
Commission approved the first set of
supply chain risk management
Reliability Standards in Order No. 850.1
The Commission described the supply
chain risk management Reliability
Standards as ‘‘forward-looking and
objective-based and require each
affected entity to develop and
implement a plan that includes security
controls for supply chain management
for industrial control system hardware,
software, and services associated with
bulk electric system operations.’’ 2 In
approving the supply chain risk
management Reliability Standards, the
Commission recognized that ‘‘the global
supply chain creates opportunities for
adversaries to directly or indirectly
affect the management or operations of
companies with potential risks to end
users.’’ 3
3. Since the issuance of Order No.
850, there have been significant
developments in the form of Executive
1 The Commission approved Reliability Standards
CIP–013–1 (Cyber Security—Supply chain Risk
Management), CIP–005–6 (Cyber Security—
Electronic Security Perimeter(s)), and CIP–010–3
(Cyber Security—Configuration Change
Management and Vulnerability Assessments).
Supply Chain Risk Management Reliability
Standards, Order No. 850, 165 FERC ¶ 61,020
(2018).
2 Id. P 2.
3 Id.
E:\FR\FM\23SEN1.SGM
23SEN1
59786
Federal Register / Vol. 85, No. 185 / Wednesday, September 23, 2020 / Notices
Orders, legislation, as well as federal
agency actions that raise concerns over
the potential risks posed by the use of
equipment and services provided by
certain entities identified as risks to
national security. In particular, Huawei
Technologies Company (Huawei) and
ZTE Corporation (ZTE) have been
identified as examples of such certain
entities because they provide
communication systems and other
equipment and services that are critical
to bulk electric system reliability.4
4. Therefore, as discussed in this
Notice of Inquiry, the Commission seeks
comments on: (1) The extent of the use
of equipment and services provided by
certain entities identified as risks to
national security related to bulk electric
system operations; (2) the risks to bulk
electric system reliability and security
posed by the use of equipment and
services provided by certain entities; (3)
whether the CIP Reliability Standards
adequately mitigate the identified risks;
(4) what mandatory actions the
Commission could consider taking to
mitigate the risk of equipment and
services provided by certain entities
related to bulk electric system
operations; (5) strategies that entities
have implemented or plan to
implement—in addition to compliance
with the mandatory CIP Reliability
Standards—to mitigate the risks
associated with use of equipment and
services provided by certain entities;
and (6) other methods the Commission
may employ to address this matter
including working collaboratively with
industry to raise awareness about the
identified risks and assisting with
mitigating actions (i.e., such as
facilitating information sharing). The
responses to these questions will
provide the Commission with a better
understanding of the risks to bulk
electric system reliability posed by
equipment and services provided by
entities identified as risks to national
security, as well as how the Commission
may best address any identified risks.
I. Background
khammond on DSKJM1Z7X2PROD with NOTICES
A. Executive Orders on Bulk-Power
System Security
5. On May 15, 2019, President Trump
issued Executive Order 13,873 on
‘‘Securing the Information and
Communications Technology and
Services Supply Chain.’’ 5 Executive
4 See e.g. John S. McCain National Defense
Authorization Act for Fiscal Year 2019, Public Law
115–232, 889(f)(3) (2018) (2019 NDAA).
5 Executive Order No. 13,873, 84 FR 22689 (May
17, 2019).
VerDate Sep<11>2014
20:59 Sep 22, 2020
Jkt 250001
Order 13,873 declared a national
emergency based on a finding that:
foreign adversaries are increasingly creating
and exploiting vulnerabilities in information
and communications technology and services
. . . in order to commit malicious cyberenabled actions, including economic and
industrial espionage against the United States
and its people.
To address that risk, Executive Order
13,873 directs the Secretary of
Commerce, in consultation with other
agency heads, to identify ‘‘any
acquisition, importation, transfer,
installation, dealing in, or use of any
information and communications
technology or service . . . where the
transaction involves any property in
which any foreign country or a national
thereof has any interest.’’
6. Executive Order 13,873 directs the
Secretary of Commerce, in consultation
with other agency heads, to identify
such prohibited transactions by
determining whether: (1) The
transaction involves information and
communications technology or services
designed, manufactured, or supplied, by
persons owned by, controlled by, or
subject to the jurisdiction or direction of
a foreign adversary; and (2) the
transaction poses an undue risk of
sabotage to or subversion of the design
or operation of information and
communications technology or services
in the United States or poses an undue
risk of catastrophic effects on the
security of United States critical
infrastructure.
7. On May 1, 2020, President Trump
issued Executive Order 13,920 on
‘‘Securing the U.S. Bulk-Power System,’’
declaring a national emergency based on
the findings that ‘‘foreign adversaries
are increasingly creating and exploiting
vulnerabilities’’ in the Bulk-Power
System and that the ‘‘unrestricted
foreign supply of bulk-power system
electric equipment constitutes an
unusual and extraordinary threat to the
national security.’’ 6
8. To address these risks, Executive
Order 13,920 prohibits the acquisition,
importation, transfer, or installation of
any Bulk-Power System electric
equipment where the transaction: (1)
Involves Bulk-Power System electric
equipment designed, developed,
manufactured, or supplied, by a foreign
adversary; and (2) the transaction poses
an undue risk of sabotage to the BulkPower System or poses an undue risk to
U.S. critical infrastructure, economy or
national security. In addition, Executive
Order 13,920 establishes a Task Force
on Federal Energy Infrastructure
6 Executive Order No. 13,920, 85 FR 26595 (May
4, 2020).
PO 00000
Frm 00052
Fmt 4703
Sfmt 4703
Procurement Policies Related to
National Security (Task Force), chaired
by the Secretary of Energy.7 The Task
Force is directed to: (1) Develop energy
infrastructure procurement policies for
agencies; (2) evaluate methods to
incorporate national security
considerations into energy security and
cybersecurity policymaking; (3) consult
with the Electric Subsector Coordinating
Council (and the oil and natural gas
sector equivalent) in developing
recommendations; and (4) conduct other
studies and develop other
recommendations as appropriate.
B. National Defense Authorization Acts
9. Recently, Congress has addressed
the risks posed by the procurement of
equipment and services from entities
identified as risks to national security in
the annual National Defense
Authorization Acts.
10. The National Defense
Authorization Act for Fiscal Year 2018
bars the Department of Defense from
using ‘‘[t]elecommunications equipment
[or] services produced [or] provided by
Huawei Technologies Company or ZTE
Corporation’’ for certain critical
programs, including ballistic missile
defense and nuclear command, control,
and communications.8
11. In addition, the National Defense
Authorization Act for Fiscal Year 2019
prohibits the Secretary of Defense from
procuring or obtaining, or extending or
renewing a contract to procure or
obtain, equipment, systems, or services
that use ‘‘covered telecommunications
equipment or services’’ as a substantial
or essential component of any system,
or as critical technology as part of any
system. Specifically, section 889(f)(3) of
the 2019 NDAA defines ‘‘covered
telecommunications equipment or
services’’ as:
(1) telecommunications equipment produced
by Huawei or ZTE or any subsidiary or
affiliate of such entities; (2) video
surveillance and telecommunications
equipment produced by Hytera
Communications Corporation, Hangzhou
Hikvision Digital Technology Company, or
Dahua Technology Company or any
subsidiary or affiliate of such entities; (3)
telecommunications or video surveillance
services provided by such entities or using
such equipment; or (4) telecommunications
or video surveillance equipment or services
produced or provided by an entity that the
Secretary of Defense . . . reasonably believes
7 The Secretary of Energy has until September 28,
2020, to promulgate the necessary regulations. See
Dept. of Energy, Request for Information, 85 FR
41023 (July 8, 2020) (the public comment period is
open until Aug. 24, 2020).
8 National Defense Authorization Act for Fiscal
Year 2018, Public Law 115–91, 1656 (2017) (2018
NDAA).
E:\FR\FM\23SEN1.SGM
23SEN1
Federal Register / Vol. 85, No. 185 / Wednesday, September 23, 2020 / Notices
to be an entity owned or controlled by, or
otherwise connected to, the . . . People’s
Republic of China.9
D. The 5G Ecosystem: Risks and
Opportunities for the Department of
Defense
C. Federal Communication Commission
Orders on Communications Supply
Chain
14. A report by the Defense
Innovation Board, titled ‘‘The 5G
Ecosystem: Risks and Opportunities for
DoD,’’ highlights the threats posed by
China and other nation-state
adversaries.11 The report notes that
‘‘evidence of backdoors or security
vulnerabilities have been discovered in
a variety of devices globally’’ and that
many of those vulnerabilities ‘‘seem to
be related to requirements from the
Chinese intelligence community
pressuring companies to exfiltrate
information.’’ 12 The report also
highlights the need for the Department
of Defense to ‘‘consider options for
defending against a compromised
supply chain, where Chinese
semiconductor components and
chipsets are embedded across multiple
systems.’’ 13
khammond on DSKJM1Z7X2PROD with NOTICES
12. On June 30, 2020, the Federal
Communications Commission (FCC)
issued two orders designating both
Huawei and ZTE as covered entities that
are prohibited from receiving Universal
Service Fund moneys to support the
purchase of any equipment or services
provided by a company posing a
national security threat to the integrity
of communications networks or the
communications supply chain.10 The
FCC Orders determined that Huawei
and ZTE pose a national security threat
to the integrity of communications
networks and the communications
supply chain due to their close ties to
the Chinese government. The FCC found
that Huawei is susceptible to coercion,
both legal and political, presenting
profound risks to the security of affected
communications networks. The FCC
also found that Huawei’s close ties to
the Chinese government, both at the
level of ownership and at the employee
level, as well as its obligations under
Chinese law, present too great a risk to
U.S. national security to continue to
subsidize the use of Huawei equipment
and services.
13. Likewise, with respect to ZTE, the
FCC noted the company’s obligations
under Chinese law to permit Chinese
government entities, including state
intelligence agencies, to demand that
private communications sector entities
cooperate with governmental requests,
including revealing customer
information and network traffic
information. The FCC also found that
security risks and vulnerabilities in
ZTE’s equipment pose a threat to the
integrity of communications networks
and the communications supply chain.
The FCC, furthermore, identified
various reports that identify a wide
range of vulnerabilities and
cybersecurity risks found in ZTE
equipment, which have led to an
increase in restrictions placed upon its
availability in the U.S. market.
9 John S. McCain National Defense Authorization
Act for Fiscal Year 2019, Public Law 115–232,
889(f)(3) (2018) (2019 NDAA).
10 Protecting Against National Security Threats to
the Communications Supply Chain Through FCC
Programs—Huawei Designation, PS Docket No. 19–
351, Order (Jun. 30, 2020); Protecting Against
National Security Threats to the Communications
Supply Chain Through FCC Programs—ZTE
Designation, PS Docket No. 19–352, Order (Jun. 30,
2020).
VerDate Sep<11>2014
18:02 Sep 22, 2020
Jkt 250001
II. Discussion
A. Analysis
15. Recent Executive Orders,
legislation and federal agency decisions
have identified Huawei and ZTE, as
well as other entities identified as risks
to national security, as potential risks to
national security. The FCC has gone so
far as to designate both Huawei and ZTE
as national security threats to the
integrity of communications networks
and the communications supply chain.
These actions raise concerns over the
potential risks to bulk electric system
reliability posed by the use of
equipment and services provided by
Huawei, ZTE, and other entities
identified as risks to national security.
16. The Commission has previously
noted that responsible entities such as
reliability coordinators, balancing
authorities, and transmission operators
must be capable of receiving and storing
a variety of sensitive bulk electric
system data from interconnected entities
in order to adequately perform their
reliability functions.14 The critical role
played by communications networks in
maintaining bulk electric system
reliability by, among other things,
helping to maintain situational
awareness and reliable bulk electric
system operations through timely and
11 The 5G Ecosystem: Risks and Opportunities for
DoD, Defense Innovation Board (Apr. 3, 2019),
https://media.defense.gov/2019/Apr/03/
2002109302/-1/-1/0/DIB_5G_STUDY_04.03.19.PDF.
12 Id. at 25.
13 Id. at 29.
14 See Revised Critical Infrastructure Protection
Reliability Standards, Order No. 822, 154 FERC
¶ 61,037, at P 54, order denying reh’g, Order No.
822–A, 156 FERC ¶ 61,052 (2016).
PO 00000
Frm 00053
Fmt 4703
Sfmt 4703
59787
accurate measurement, collection,
processing of bulk electric system status
and information exchange among
control centers makes it necessary for
the Commission to understand the risk
to bulk electric system reliability posed
by the use of equipment and services
provided by Huawei, ZTE, and other
entities identified as risks to national
security.
17. There are many manufacturers of
networking and telecommunications
equipment, but Huawei, ZTE, and their
subsidiaries are gaining substantial
shares of the market globally.15 A
portion of this exposure to Huawei and
ZTE stems from embedded Huawei or
ZTE components in equipment
produced by unaffiliated vendors. The
probability that electric utilities now
use a significant amount of
telecommunications equipment with
embedded components from Huawei or
ZTE is greater in consideration of these
facts, especially when factoring in
components that are branded under a
different vendor’s label. If these
obscured, or potentially unlabeled,
components are present in an electric
utility’s infrastructure, the same risks
may exist as if the hardware had been
purchased directly from Huawei, ZTE,
or one of their subsidiaries.
18. In addition, the Commission notes
that Executive Order No. 13,920 on
Securing the U.S. Bulk-Power System
includes a definition for ‘‘bulk-power
system electric equipment’’ that covers
a range of electrical equipment
commonly used in substations,
generating stations, and control
rooms.16 Huawei or ZTE equipment or
components that fall within these
categories may also raise concerns over
the potential risks to bulk electric
system reliability posed by their use.
B. Request for Comments
19. The Commission seeks comment
on the potential risk to bulk electric
system reliability posed by the use of
equipment and services provided by
entities identified in section 889(f)(3) of
the 2019 NDAA (Covered Companies).17
20. Below, we pose questions that
commenters should address in their
submissions. However, commenters
need not address every topic or answer
every question identified below. Please
15 See, e.g., Investigative Report on the U.S.
National Security Issues Posed by Chinese
Telecommunications Companies Huawei and ZTE,
112th Cong., at 2 (Oct. 8, 2012) (finding ‘‘Chinese
telecommunications firms, such as Huawei and
ZTE, are rapidly becoming dominant global players
in the telecommunications market’’).
16 Executive Order No. 13,920 at section 4(b), 85
FR 26595 (May 4, 2020).
17 See supra P 11.
E:\FR\FM\23SEN1.SGM
23SEN1
59788
Federal Register / Vol. 85, No. 185 / Wednesday, September 23, 2020 / Notices
khammond on DSKJM1Z7X2PROD with NOTICES
do not include confidential or
proprietary information, CEII, or other
sensitive or classified information in
your responses.
Q1. To what extent is the equipment
(including components) and services
provided by Covered Companies used in the
operation of the bulk electric system?
a. What methods could be used to ascertain
the extent to which equipment and services
provided by Covered Companies is used in
the operation of the bulk electric system?
b. Describe any potential complications to
system operations that may result from
implementing such methods (e.g., need to
shut down certain activities to perform
testing).
Q2. Describe the risks to bulk electric
system reliability and security posed by the
use of equipment and services provided by
Covered Companies?
a. Describe the range of potential security
impacts to bulk electric system reliability
that could occur if a responsible entity uses
the equipment and services provided by the
Covered Companies within its real-time
operations infrastructure and the equipment
was compromised.
b. If equipment and services provided by
Covered Companies is installed in a
responsible entity’s real-time operations
infrastructure, what controls are in place to
prevent or detect compromise? What controls
are in place to mitigate the potential effects
of compromise?
c. Describe the range of potential security
impacts to bulk electric system reliability
from a compromise of a responsible entity’s
systems related to non-real time bulk electric
system operations (e.g., operations planning)
resulting from the use of equipment and
services provided by Covered Companies.
d. If equipment and services provided by
Covered Companies is installed in a non-real
time environment (e.g. operations planning),
what controls are in place to prevent or
detect compromise? What controls are in
place to mitigate the potential effects of
compromise?
e. Describe the potential range of security
impacts to bulk electric system reliability
from a compromise of responsible entity’s
systems related to non-bulk electric system
communications and operations (e.g.,
business networks and systems not directly
related to bulk electric system operations)
resulting from the use of equipment and
services provided by Covered Companies.
f. If equipment and services provided by
Covered Companies is installed in a non-bulk
electric system communications and
operations environment (e.g., business
networks and systems not directly related to
bulk electric system operations), what
controls are in place to prevent or detect
compromise? What controls are in place to
mitigate the potential effects of compromise?
What controls are in place to prevent
compromise of business network or systems
from migrating and impacting bulk electric
system operations?
Q3. Discuss the effectiveness of the current
CIP Reliability Standards in mitigating the
risks posed by equipment and services
provided by Covered Companies used in the
operation of the bulk electric system.
VerDate Sep<11>2014
18:02 Sep 22, 2020
Jkt 250001
a. Which requirements of the CIP
Reliability Standards, including
complementary requirements across the CIP
Reliability Standards, require entities to take
actions that detect and mitigate the risks
associated with the use of equipment and
services provided by Covered Companies?
b. What modifications to the CIP Standards
would minimize risks associated with
equipment and services provided by the
Covered Companies?
Q4. Describe any strategies, in addition to
compliance with the CIP Reliability
Standards, entities have implemented or plan
to implement to mitigate the risks associated
with use of equipment and services provided
by Covered Companies.
Q5. What other methods could the
Commission employ outside the CIP
Reliability Standards, whether through
regulatory action or through voluntary
collaboration with industry and government,
to further address the risks to bulk electric
system reliability and security posed by the
use of equipment and services provided by
Covered Companies? For example, raising
awareness about the risks identified in
response to the previous questions,
identifying potential solutions, and assisting
with mitigating actions (including the
facilitating information sharing)?
a. Describe how your organization is
informed of the risks to bulk electric system
reliability and security posed by the use of
equipment and services provided by Covered
Companies and what could be done to
improve this process.
b. What actions has your organization
taken to address these risks and what
impediments exist to do so (i.e., such as
procurement process requirements)?
c. What challenges does your organization
face when identifying, containing or
removing equipment that presents supply
chain threats from Covered Companies?
III. Comment Procedures
21. The Commission invites interested
persons to submit comments on the
matters and issues proposed in this
notice, including any related matters or
alternative proposals that commenters
may wish to discuss. Comments are due
November 23, 2020, and Reply
Comments are due December 22, 2020.
Comments must refer to Docket No.
RM20–19–000, and must include the
commenter’s name, the organization
they represent, if applicable, and their
address.
22. The Commission encourages
comments to be filed electronically via
the eFiling link on the Commission’s
web site at https://www.ferc.gov. The
Commission accepts most standard
word-processing formats. Documents
created electronically using wordprocessing software should be filed in
native applications or print-to-PDF
format and not in a scanned format.
Commenters filing electronically do not
need to make a paper filing.
23. Commenters that are not able to
file comments electronically must send
PO 00000
Frm 00054
Fmt 4703
Sfmt 4703
an original of their comments to:
Federal Energy Regulatory Commission,
Secretary of the Commission, 888 First
Street NE, Washington, DC 20426.
24. All comments will be placed in
the Commission’s public files and may
be viewed, printed, or downloaded
remotely as described in the Document
Availability section below. Commenters
on this proposal are not required to
serve copies of their comments on other
commenters.
IV. Document Availability
25. In addition to publishing the full
text of this document in the Federal
Register, the Commission provides all
interested persons an opportunity to
view and/or print the contents of this
document via the internet through the
Commission’s Home Page (https://
www.ferc.gov) and in the Commission’s
Public Reference Room during normal
business hours (8:30 a.m. to 5:00 p.m.
eastern time) at 888 First Street NE,
Room 2A, Washington, DC 20426.
26. From the Commission’s Home
Page on the internet, this information is
available on eLibrary. The full text of
this document is available on eLibrary
in PDF and Microsoft Word format for
viewing, printing, and/or downloading.
To access this document in eLibrary,
type the docket number excluding the
last three digits of this document in the
docket number field.
27. User assistance is available for
eLibrary and the Commission’s web site
during normal business hours from the
Commission’s Online Support at (202)
502–6652 (toll free at 1–866–208–3676)
or email at ferconlinesupport@ferc.gov,
or the Public Reference Room at (202)
502–8371, TTY (202) 502–8659. Email
the Public Reference Room at
public.referenceroom@ferc.gov.
By direction of the Commission.
Issued: September 17, 2020.
Kimberly D. Bose,
Secretary.
[FR Doc. 2020–20987 Filed 9–22–20; 8:45 am]
BILLING CODE 6717–01–P
ENVIRONMENTAL PROTECTION
AGENCY
[FRL–10013–52–Region 3]
Clean Water Act: Maryland–City of
Annapolis and Anne Arundel County
Vessel Sewage No-Discharge Zone for
Thirteen Waters—Tentative Affirmative
Determination
Environmental Protection
Agency (EPA).
AGENCY:
E:\FR\FM\23SEN1.SGM
23SEN1
Agencies
[Federal Register Volume 85, Number 185 (Wednesday, September 23, 2020)]
[Notices]
[Pages 59785-59788]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-20987]
-----------------------------------------------------------------------
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
[Docket No. RM20-19-000]
Equipment and Services Produced or Provided by Certain Entities
Identified as Risks to National Security
AGENCY: Federal Energy Regulatory Commission, Department of Energy.
ACTION: Notice of inquiry.
-----------------------------------------------------------------------
SUMMARY: The Federal Energy Regulatory Commission (Commission) seeks
comments on the potential risks to the bulk electric system posed by
the use of equipment and services produced or provided by certain
entities identified as risks to national security. In addition, the
Commission seeks comments on strategies to mitigate any potential risks
posed by such telecommunications equipment and services, including but
not limited to potential modifications to the Critical Infrastructure
Protection Reliability Standards.
DATES: Initial Comments are due November 23, 2020, and Reply Comments
are due December 22, 2020.
ADDRESSES: Comments, identified by docket number, may be filed in the
following ways:
Electronic Filing through https://www.ferc.gov. Documents
created electronically using word processing software should be filed
in native applications or print-to-PDF format and not in a scanned
format.
Mail/Hand Delivery: Those unable to file electronically
may mail or hand-deliver comments to: Federal Energy Regulatory
Commission, Secretary of the Commission, 888 First Street NE,
Washington, DC 20426.
Instructions: For detailed instructions on submitting
comments, see the Comment Procedures Section of this document.
FOR FURTHER INFORMATION CONTACT:
Simon Slobodnik (Technical Information), Office of Electric
Reliability, Federal Energy Regulatory Commission, 888 First Street NE,
Washington, DC 20426, (202) 502-6707, [email protected]
Kevin Ryan (Legal Information), Office of the General Counsel, Federal
Energy Regulatory Commission, 888 First Street NE, Washington, DC
20426, (202) 502-6840, [email protected]
1. In this Notice of Inquiry, the Commission seeks comments on the
potential risks to the bulk electric system posed by using equipment
and services produced or provided by entities identified as risks to
national security. In addition, the Commission seeks comments on
whether the current Critical Infrastructure Protection (CIP)
Reliability Standards adequately mitigate the identified risks.
Further, the Commission seeks comment on possible actions the
Commission could consider taking to address the identified risks.
2. On October 18, 2018, the Commission approved the first set of
supply chain risk management Reliability Standards in Order No. 850.\1\
The Commission described the supply chain risk management Reliability
Standards as ``forward-looking and objective-based and require each
affected entity to develop and implement a plan that includes security
controls for supply chain management for industrial control system
hardware, software, and services associated with bulk electric system
operations.'' \2\ In approving the supply chain risk management
Reliability Standards, the Commission recognized that ``the global
supply chain creates opportunities for adversaries to directly or
indirectly affect the management or operations of companies with
potential risks to end users.'' \3\
---------------------------------------------------------------------------
\1\ The Commission approved Reliability Standards CIP-013-1
(Cyber Security--Supply chain Risk Management), CIP-005-6 (Cyber
Security--Electronic Security Perimeter(s)), and CIP-010-3 (Cyber
Security--Configuration Change Management and Vulnerability
Assessments). Supply Chain Risk Management Reliability Standards,
Order No. 850, 165 FERC ] 61,020 (2018).
\2\ Id. P 2.
\3\ Id.
---------------------------------------------------------------------------
3. Since the issuance of Order No. 850, there have been significant
developments in the form of Executive
[[Page 59786]]
Orders, legislation, as well as federal agency actions that raise
concerns over the potential risks posed by the use of equipment and
services provided by certain entities identified as risks to national
security. In particular, Huawei Technologies Company (Huawei) and ZTE
Corporation (ZTE) have been identified as examples of such certain
entities because they provide communication systems and other equipment
and services that are critical to bulk electric system reliability.\4\
---------------------------------------------------------------------------
\4\ See e.g. John S. McCain National Defense Authorization Act
for Fiscal Year 2019, Public Law 115-232, 889(f)(3) (2018) (2019
NDAA).
---------------------------------------------------------------------------
4. Therefore, as discussed in this Notice of Inquiry, the
Commission seeks comments on: (1) The extent of the use of equipment
and services provided by certain entities identified as risks to
national security related to bulk electric system operations; (2) the
risks to bulk electric system reliability and security posed by the use
of equipment and services provided by certain entities; (3) whether the
CIP Reliability Standards adequately mitigate the identified risks; (4)
what mandatory actions the Commission could consider taking to mitigate
the risk of equipment and services provided by certain entities related
to bulk electric system operations; (5) strategies that entities have
implemented or plan to implement--in addition to compliance with the
mandatory CIP Reliability Standards--to mitigate the risks associated
with use of equipment and services provided by certain entities; and
(6) other methods the Commission may employ to address this matter
including working collaboratively with industry to raise awareness
about the identified risks and assisting with mitigating actions (i.e.,
such as facilitating information sharing). The responses to these
questions will provide the Commission with a better understanding of
the risks to bulk electric system reliability posed by equipment and
services provided by entities identified as risks to national security,
as well as how the Commission may best address any identified risks.
I. Background
A. Executive Orders on Bulk-Power System Security
5. On May 15, 2019, President Trump issued Executive Order 13,873
on ``Securing the Information and Communications Technology and
Services Supply Chain.'' \5\ Executive Order 13,873 declared a national
emergency based on a finding that:
---------------------------------------------------------------------------
\5\ Executive Order No. 13,873, 84 FR 22689 (May 17, 2019).
foreign adversaries are increasingly creating and exploiting
vulnerabilities in information and communications technology and
services . . . in order to commit malicious cyber-enabled actions,
including economic and industrial espionage against the United
---------------------------------------------------------------------------
States and its people.
To address that risk, Executive Order 13,873 directs the Secretary
of Commerce, in consultation with other agency heads, to identify ``any
acquisition, importation, transfer, installation, dealing in, or use of
any information and communications technology or service . . . where
the transaction involves any property in which any foreign country or a
national thereof has any interest.''
6. Executive Order 13,873 directs the Secretary of Commerce, in
consultation with other agency heads, to identify such prohibited
transactions by determining whether: (1) The transaction involves
information and communications technology or services designed,
manufactured, or supplied, by persons owned by, controlled by, or
subject to the jurisdiction or direction of a foreign adversary; and
(2) the transaction poses an undue risk of sabotage to or subversion of
the design or operation of information and communications technology or
services in the United States or poses an undue risk of catastrophic
effects on the security of United States critical infrastructure.
7. On May 1, 2020, President Trump issued Executive Order 13,920 on
``Securing the U.S. Bulk-Power System,'' declaring a national emergency
based on the findings that ``foreign adversaries are increasingly
creating and exploiting vulnerabilities'' in the Bulk-Power System and
that the ``unrestricted foreign supply of bulk-power system electric
equipment constitutes an unusual and extraordinary threat to the
national security.'' \6\
---------------------------------------------------------------------------
\6\ Executive Order No. 13,920, 85 FR 26595 (May 4, 2020).
---------------------------------------------------------------------------
8. To address these risks, Executive Order 13,920 prohibits the
acquisition, importation, transfer, or installation of any Bulk-Power
System electric equipment where the transaction: (1) Involves Bulk-
Power System electric equipment designed, developed, manufactured, or
supplied, by a foreign adversary; and (2) the transaction poses an
undue risk of sabotage to the Bulk-Power System or poses an undue risk
to U.S. critical infrastructure, economy or national security. In
addition, Executive Order 13,920 establishes a Task Force on Federal
Energy Infrastructure Procurement Policies Related to National Security
(Task Force), chaired by the Secretary of Energy.\7\ The Task Force is
directed to: (1) Develop energy infrastructure procurement policies for
agencies; (2) evaluate methods to incorporate national security
considerations into energy security and cybersecurity policymaking; (3)
consult with the Electric Subsector Coordinating Council (and the oil
and natural gas sector equivalent) in developing recommendations; and
(4) conduct other studies and develop other recommendations as
appropriate.
---------------------------------------------------------------------------
\7\ The Secretary of Energy has until September 28, 2020, to
promulgate the necessary regulations. See Dept. of Energy, Request
for Information, 85 FR 41023 (July 8, 2020) (the public comment
period is open until Aug. 24, 2020).
---------------------------------------------------------------------------
B. National Defense Authorization Acts
9. Recently, Congress has addressed the risks posed by the
procurement of equipment and services from entities identified as risks
to national security in the annual National Defense Authorization Acts.
10. The National Defense Authorization Act for Fiscal Year 2018
bars the Department of Defense from using ``[t]elecommunications
equipment [or] services produced [or] provided by Huawei Technologies
Company or ZTE Corporation'' for certain critical programs, including
ballistic missile defense and nuclear command, control, and
communications.\8\
---------------------------------------------------------------------------
\8\ National Defense Authorization Act for Fiscal Year 2018,
Public Law 115-91, 1656 (2017) (2018 NDAA).
---------------------------------------------------------------------------
11. In addition, the National Defense Authorization Act for Fiscal
Year 2019 prohibits the Secretary of Defense from procuring or
obtaining, or extending or renewing a contract to procure or obtain,
equipment, systems, or services that use ``covered telecommunications
equipment or services'' as a substantial or essential component of any
system, or as critical technology as part of any system. Specifically,
section 889(f)(3) of the 2019 NDAA defines ``covered telecommunications
equipment or services'' as:
(1) telecommunications equipment produced by Huawei or ZTE or any
subsidiary or affiliate of such entities; (2) video surveillance and
telecommunications equipment produced by Hytera Communications
Corporation, Hangzhou Hikvision Digital Technology Company, or Dahua
Technology Company or any subsidiary or affiliate of such entities;
(3) telecommunications or video surveillance services provided by
such entities or using such equipment; or (4) telecommunications or
video surveillance equipment or services produced or provided by an
entity that the Secretary of Defense . . . reasonably believes
[[Page 59787]]
to be an entity owned or controlled by, or otherwise connected to,
the . . . People's Republic of China.\9\
---------------------------------------------------------------------------
\9\ John S. McCain National Defense Authorization Act for Fiscal
Year 2019, Public Law 115-232, 889(f)(3) (2018) (2019 NDAA).
---------------------------------------------------------------------------
C. Federal Communication Commission Orders on Communications Supply
Chain
12. On June 30, 2020, the Federal Communications Commission (FCC)
issued two orders designating both Huawei and ZTE as covered entities
that are prohibited from receiving Universal Service Fund moneys to
support the purchase of any equipment or services provided by a company
posing a national security threat to the integrity of communications
networks or the communications supply chain.\10\ The FCC Orders
determined that Huawei and ZTE pose a national security threat to the
integrity of communications networks and the communications supply
chain due to their close ties to the Chinese government. The FCC found
that Huawei is susceptible to coercion, both legal and political,
presenting profound risks to the security of affected communications
networks. The FCC also found that Huawei's close ties to the Chinese
government, both at the level of ownership and at the employee level,
as well as its obligations under Chinese law, present too great a risk
to U.S. national security to continue to subsidize the use of Huawei
equipment and services.
---------------------------------------------------------------------------
\10\ Protecting Against National Security Threats to the
Communications Supply Chain Through FCC Programs--Huawei
Designation, PS Docket No. 19-351, Order (Jun. 30, 2020); Protecting
Against National Security Threats to the Communications Supply Chain
Through FCC Programs--ZTE Designation, PS Docket No. 19-352, Order
(Jun. 30, 2020).
---------------------------------------------------------------------------
13. Likewise, with respect to ZTE, the FCC noted the company's
obligations under Chinese law to permit Chinese government entities,
including state intelligence agencies, to demand that private
communications sector entities cooperate with governmental requests,
including revealing customer information and network traffic
information. The FCC also found that security risks and vulnerabilities
in ZTE's equipment pose a threat to the integrity of communications
networks and the communications supply chain. The FCC, furthermore,
identified various reports that identify a wide range of
vulnerabilities and cybersecurity risks found in ZTE equipment, which
have led to an increase in restrictions placed upon its availability in
the U.S. market.
D. The 5G Ecosystem: Risks and Opportunities for the Department of
Defense
14. A report by the Defense Innovation Board, titled ``The 5G
Ecosystem: Risks and Opportunities for DoD,'' highlights the threats
posed by China and other nation-state adversaries.\11\ The report notes
that ``evidence of backdoors or security vulnerabilities have been
discovered in a variety of devices globally'' and that many of those
vulnerabilities ``seem to be related to requirements from the Chinese
intelligence community pressuring companies to exfiltrate
information.'' \12\ The report also highlights the need for the
Department of Defense to ``consider options for defending against a
compromised supply chain, where Chinese semiconductor components and
chipsets are embedded across multiple systems.'' \13\
---------------------------------------------------------------------------
\11\ The 5G Ecosystem: Risks and Opportunities for DoD, Defense
Innovation Board (Apr. 3, 2019), https://media.defense.gov/2019/Apr/03/2002109302/-1/-1/0/DIB_5G_STUDY_04.03.19.PDF.
\12\ Id. at 25.
\13\ Id. at 29.
---------------------------------------------------------------------------
II. Discussion
A. Analysis
15. Recent Executive Orders, legislation and federal agency
decisions have identified Huawei and ZTE, as well as other entities
identified as risks to national security, as potential risks to
national security. The FCC has gone so far as to designate both Huawei
and ZTE as national security threats to the integrity of communications
networks and the communications supply chain. These actions raise
concerns over the potential risks to bulk electric system reliability
posed by the use of equipment and services provided by Huawei, ZTE, and
other entities identified as risks to national security.
16. The Commission has previously noted that responsible entities
such as reliability coordinators, balancing authorities, and
transmission operators must be capable of receiving and storing a
variety of sensitive bulk electric system data from interconnected
entities in order to adequately perform their reliability
functions.\14\ The critical role played by communications networks in
maintaining bulk electric system reliability by, among other things,
helping to maintain situational awareness and reliable bulk electric
system operations through timely and accurate measurement, collection,
processing of bulk electric system status and information exchange
among control centers makes it necessary for the Commission to
understand the risk to bulk electric system reliability posed by the
use of equipment and services provided by Huawei, ZTE, and other
entities identified as risks to national security.
---------------------------------------------------------------------------
\14\ See Revised Critical Infrastructure Protection Reliability
Standards, Order No. 822, 154 FERC ] 61,037, at P 54, order denying
reh'g, Order No. 822-A, 156 FERC ] 61,052 (2016).
---------------------------------------------------------------------------
17. There are many manufacturers of networking and
telecommunications equipment, but Huawei, ZTE, and their subsidiaries
are gaining substantial shares of the market globally.\15\ A portion of
this exposure to Huawei and ZTE stems from embedded Huawei or ZTE
components in equipment produced by unaffiliated vendors. The
probability that electric utilities now use a significant amount of
telecommunications equipment with embedded components from Huawei or
ZTE is greater in consideration of these facts, especially when
factoring in components that are branded under a different vendor's
label. If these obscured, or potentially unlabeled, components are
present in an electric utility's infrastructure, the same risks may
exist as if the hardware had been purchased directly from Huawei, ZTE,
or one of their subsidiaries.
---------------------------------------------------------------------------
\15\ See, e.g., Investigative Report on the U.S. National
Security Issues Posed by Chinese Telecommunications Companies Huawei
and ZTE, 112th Cong., at 2 (Oct. 8, 2012) (finding ``Chinese
telecommunications firms, such as Huawei and ZTE, are rapidly
becoming dominant global players in the telecommunications
market'').
---------------------------------------------------------------------------
18. In addition, the Commission notes that Executive Order No.
13,920 on Securing the U.S. Bulk-Power System includes a definition for
``bulk-power system electric equipment'' that covers a range of
electrical equipment commonly used in substations, generating stations,
and control rooms.\16\ Huawei or ZTE equipment or components that fall
within these categories may also raise concerns over the potential
risks to bulk electric system reliability posed by their use.
---------------------------------------------------------------------------
\16\ Executive Order No. 13,920 at section 4(b), 85 FR 26595
(May 4, 2020).
---------------------------------------------------------------------------
B. Request for Comments
19. The Commission seeks comment on the potential risk to bulk
electric system reliability posed by the use of equipment and services
provided by entities identified in section 889(f)(3) of the 2019 NDAA
(Covered Companies).\17\
---------------------------------------------------------------------------
\17\ See supra P 11.
---------------------------------------------------------------------------
20. Below, we pose questions that commenters should address in
their submissions. However, commenters need not address every topic or
answer every question identified below. Please
[[Page 59788]]
do not include confidential or proprietary information, CEII, or other
---------------------------------------------------------------------------
sensitive or classified information in your responses.
Q1. To what extent is the equipment (including components) and
services provided by Covered Companies used in the operation of the
bulk electric system?
a. What methods could be used to ascertain the extent to which
equipment and services provided by Covered Companies is used in the
operation of the bulk electric system?
b. Describe any potential complications to system operations
that may result from implementing such methods (e.g., need to shut
down certain activities to perform testing).
Q2. Describe the risks to bulk electric system reliability and
security posed by the use of equipment and services provided by
Covered Companies?
a. Describe the range of potential security impacts to bulk
electric system reliability that could occur if a responsible entity
uses the equipment and services provided by the Covered Companies
within its real-time operations infrastructure and the equipment was
compromised.
b. If equipment and services provided by Covered Companies is
installed in a responsible entity's real-time operations
infrastructure, what controls are in place to prevent or detect
compromise? What controls are in place to mitigate the potential
effects of compromise?
c. Describe the range of potential security impacts to bulk
electric system reliability from a compromise of a responsible
entity's systems related to non-real time bulk electric system
operations (e.g., operations planning) resulting from the use of
equipment and services provided by Covered Companies.
d. If equipment and services provided by Covered Companies is
installed in a non-real time environment (e.g. operations planning),
what controls are in place to prevent or detect compromise? What
controls are in place to mitigate the potential effects of
compromise?
e. Describe the potential range of security impacts to bulk
electric system reliability from a compromise of responsible
entity's systems related to non-bulk electric system communications
and operations (e.g., business networks and systems not directly
related to bulk electric system operations) resulting from the use
of equipment and services provided by Covered Companies.
f. If equipment and services provided by Covered Companies is
installed in a non-bulk electric system communications and
operations environment (e.g., business networks and systems not
directly related to bulk electric system operations), what controls
are in place to prevent or detect compromise? What controls are in
place to mitigate the potential effects of compromise? What controls
are in place to prevent compromise of business network or systems
from migrating and impacting bulk electric system operations?
Q3. Discuss the effectiveness of the current CIP Reliability
Standards in mitigating the risks posed by equipment and services
provided by Covered Companies used in the operation of the bulk
electric system.
a. Which requirements of the CIP Reliability Standards,
including complementary requirements across the CIP Reliability
Standards, require entities to take actions that detect and mitigate
the risks associated with the use of equipment and services provided
by Covered Companies?
b. What modifications to the CIP Standards would minimize risks
associated with equipment and services provided by the Covered
Companies?
Q4. Describe any strategies, in addition to compliance with the
CIP Reliability Standards, entities have implemented or plan to
implement to mitigate the risks associated with use of equipment and
services provided by Covered Companies.
Q5. What other methods could the Commission employ outside the
CIP Reliability Standards, whether through regulatory action or
through voluntary collaboration with industry and government, to
further address the risks to bulk electric system reliability and
security posed by the use of equipment and services provided by
Covered Companies? For example, raising awareness about the risks
identified in response to the previous questions, identifying
potential solutions, and assisting with mitigating actions
(including the facilitating information sharing)?
a. Describe how your organization is informed of the risks to
bulk electric system reliability and security posed by the use of
equipment and services provided by Covered Companies and what could
be done to improve this process.
b. What actions has your organization taken to address these
risks and what impediments exist to do so (i.e., such as procurement
process requirements)?
c. What challenges does your organization face when identifying,
containing or removing equipment that presents supply chain threats
from Covered Companies?
III. Comment Procedures
21. The Commission invites interested persons to submit comments on
the matters and issues proposed in this notice, including any related
matters or alternative proposals that commenters may wish to discuss.
Comments are due November 23, 2020, and Reply Comments are due December
22, 2020. Comments must refer to Docket No. RM20-19-000, and must
include the commenter's name, the organization they represent, if
applicable, and their address.
22. The Commission encourages comments to be filed electronically
via the eFiling link on the Commission's web site at https://www.ferc.gov. The Commission accepts most standard word-processing
formats. Documents created electronically using word-processing
software should be filed in native applications or print-to-PDF format
and not in a scanned format. Commenters filing electronically do not
need to make a paper filing.
23. Commenters that are not able to file comments electronically
must send an original of their comments to: Federal Energy Regulatory
Commission, Secretary of the Commission, 888 First Street NE,
Washington, DC 20426.
24. All comments will be placed in the Commission's public files
and may be viewed, printed, or downloaded remotely as described in the
Document Availability section below. Commenters on this proposal are
not required to serve copies of their comments on other commenters.
IV. Document Availability
25. In addition to publishing the full text of this document in the
Federal Register, the Commission provides all interested persons an
opportunity to view and/or print the contents of this document via the
internet through the Commission's Home Page (https://www.ferc.gov) and
in the Commission's Public Reference Room during normal business hours
(8:30 a.m. to 5:00 p.m. eastern time) at 888 First Street NE, Room 2A,
Washington, DC 20426.
26. From the Commission's Home Page on the internet, this
information is available on eLibrary. The full text of this document is
available on eLibrary in PDF and Microsoft Word format for viewing,
printing, and/or downloading. To access this document in eLibrary, type
the docket number excluding the last three digits of this document in
the docket number field.
27. User assistance is available for eLibrary and the Commission's
web site during normal business hours from the Commission's Online
Support at (202) 502-6652 (toll free at 1-866-208-3676) or email at
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at
[email protected].
By direction of the Commission.
Issued: September 17, 2020.
Kimberly D. Bose,
Secretary.
[FR Doc. 2020-20987 Filed 9-22-20; 8:45 am]
BILLING CODE 6717-01-P