Emergency Alert System; Wireless Emergency Alerts; Protecting the Nation's Communications Systems From Cybersecurity Threats, 71539-71557 [2022-25263]

Download as PDF Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules Facility Address 71539 Waste description (A) If, any time after disposal of the delisted waste, WRB Refining possesses or is otherwise made aware of any environmental data (including but not limited to leachate data or ground water monitoring data) or any other data relevant to the delisted waste indicating that any constituent identified for the delisting verification testing is at level higher than the delisting level allowed by the Division Director in granting the petition, then the facility must report the data, in writing, to the Division Director within 10 days of first possessing or being made aware of that data. (B) If the verification testing of the waste does not meet the delisting requirements in Paragraph 1, WRB Refining must report the data, in writing, to the Division Director within 10 days of first possessing or being made aware of that data. (C) If WRB Refining fails to submit the information described in paragraphs (4), (5)(A) or (5)(B) or if any other information is received from any source, the Division Director will make a preliminary determination as to whether the reported information requires Agency action to protect human health or the environment. Further action may include suspending, or revoking the exclusion, or other appropriate response necessary to protect human health and the environment. (D) If the Division Director determines that the reported information does require Agency action, the Division Director will notify the facility, in writing, of the actions the Division Director believes are necessary to protect human health and the environment. The notice shall include a statement of the proposed action and a statement providing the facility with an opportunity to present information as to why the proposed Agency action is not necessary. The facility shall have 10 days from the date of the Division Director’s notice to present such information. (E) Following the receipt of information from the facility described in paragraph (5)(D) or (if no information is presented under paragraph (5)(D)) the initial receipt of information described in paragraphs (4), (5)(A) or (5)(B), the Division Director will issue a final written determination describing the Agency actions that are necessary to protect human health or the environment. Any required action described in the Division Director’s determination shall become effective immediately, unless the Division Director provides otherwise. (6) Notification Requirements: WRB Refining must do the following before transporting the delisted waste: Failure to provide this notification will result in a violation of the delisting petition and a possible revocation of the decision. (A) Provide a written notification to any State Regulatory Agency to which, or through which they will transport the delisted waste described above for disposal, 60 days before beginning such activities. If WRB Refining transports the excluded waste to or manages the waste in any state with delisting authorization, WRB Refining must obtain delisting authorization from that state before it can manage the waste as nonhazardous in the state. (B) Update the one-time written notification if they ship the delisted waste to a different disposal facility. (C) Failure to provide the notification will result in a violation of the delisting variance and a possible revocation of the exclusion. [FR Doc. 2022–25213 Filed 11–22–22; 8:45 am] BILLING CODE 6560–50–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 10 and 11 [PS Docket Nos. 15–94, 15–91, 22–329; FCC 22–82; FR ID 113410] Emergency Alert System; Wireless Emergency Alerts; Protecting the Nation’s Communications Systems From Cybersecurity Threats Federal Communications Commission. ACTION: Proposed rule. lotter on DSK11XQN23PROD with PROPOSALS1 AGENCY: In this document, the Commission proposes requirements for Emergency Alert System (EAS) Participants to report compromises of their EAS equipment, communications systems, and services to the Commission. Additionally, this SUMMARY: VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 document proposes requirements for EAS Participants and Commercial Mobile Service (CMS) providers that participate in Wireless Emergency Alerts (WEA) to annually certify to having a cybersecurity risk management plan in place and to employ sufficient security measures to ensure the confidentiality, integrity, and availability of their respective alerting systems. This document also proposes requirements for participating CMS providers to take steps to ensure that only valid alerts are displayed on consumer devices. These requirements would further protect the nation’s communications systems from cybersecurity threats. With this Notice of Proposed Rulemaking, the Commission seeks comment on the proposed rules and any suitable alternatives. Comments are due on or before December 23, 2022 and reply comments are due on or before January 23, 2023. DATES: PO 00000 Frm 00009 Fmt 4702 Sfmt 4702 You may submit comments, identified by PS Docket Nos. 15–94, 15– 91, and 22–329, by any of the following methods: • Electronic Filers: Comments may be filed electronically using the internet by accessing the ECFS: https://apps.fcc.gov/ ecfs/. • Paper Filers: Parties who choose to file by paper must file an original and one copy of each filing. Filings can be sent by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. • Commercial overnight mail (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 Junction Drive, Annapolis Junction, MD 20701. • U.S. Postal Service first-class, Express, and Priority mail must be addressed to 45 L Street NE, Washington, DC 20554. ADDRESSES: E:\FR\FM\23NOP1.SGM 23NOP1 71540 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 • Effective March 19, 2020, and until further notice, the Commission no longer accepts any hand or messenger delivered filings. This is a temporary measure taken to help protect the health and safety of individuals, and to mitigate the transmission of COVID–19. See FCC Announces Closure of FCC Headquarters Open Window and Change in Hand-Delivery Policy, Public Notice, DA 20–304 (March 19, 2020). https://www.fcc.gov/document/fcccloses-headquarters-open-window-andchanges-hand-delivery-policy. People with Disabilities. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (tty). FOR FURTHER INFORMATION CONTACT: For further information regarding Notice of Proposed Rulemaking, please contact James Wiley, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418–1678, or by email to James.Wiley@fcc.gov, or Steven Carpenter, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418–2313, or by email to Steven.Carpenter@fcc.gov. For additional information concerning the Paperwork Reduction Act information collection requirements contained in this document, send an email to PRA@ fcc.gov or contact Nicole Ongele, Office of Managing Director, Performance Evaluation and Records Management, 202–418–2991, or by email to PRA@ fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s Notice of Proposed Rulemaking (NPRM), in PS Docket Nos. 15–94, 15–91, 22–329; FCC 22–82, adopted and released on October 27, 2022. The full text of this document is available by downloading the text from the Commission’s website at: https://docs.fcc.gov/public/ attachments/FCC-22-82A1.pdf. Paperwork Reduction Act This Notice of Proposed Rulemaking (NPRM) seeks comment on potential new or revised proposed information collection requirements. If the Commission adopts any new or revised final information collection requirements when the final rules are adopted, the Commission will publish a notice in the Federal Register inviting further comments from the public on the final information collection requirements, as required by the VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 Paperwork Reduction Act of 1995, Public Law 104–13 (44 U.S.C. 3501– 3520). The Commission, as part of its continuing effort to reduce paperwork burdens, invites the general public and OMB to comment on the information collection requirements contained in this document, as required by the PRA. Public and agency comments on the PRA proposed information collection requirements are due January 23, 2023. Comments should address: (a) whether the proposed collection of information is necessary for the proper performance of the functions of the Commission, including whether the information shall have practical utility; (b) the accuracy of the Commission’s burden estimates; (c) ways to enhance the quality, utility, and clarity of the information collected; (d) ways to minimize the burden of the collection of information on the respondents, including the use of automated collection techniques or other forms of information technology; and (e) way to further reduce the information collection burden on small business concerns with fewer than 25 employees. In addition, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4), we seek specific comment on how we might further reduce the information collection burden for small business concerns with fewer than 25 employees. I. Initial Regulatory Flexibility Analysis 1. As required by the Regulatory Flexibility Act of 1980, as amended (RFA), the Commission has prepared this Initial Regulatory Flexibility Analysis (IRFA) of the possible significant economic impact on a substantial number of small entities by the policies and rules proposed in the NPRM. Written public comments are requested on this IRFA. Comments must be identified as responses to the IRFA and must be filed by the deadlines for comments on the NPRM. The Commission will send a copy of the NPRM, including this IRFA, to the Chief Counsel for Advocacy of the Small Business Administration (SBA). In addition, the NPRM and IRFA (or summaries thereof) will be published in the Federal Register. A. Need for, and Objectives of, the Proposed Rules 2. The NPRM raises awareness concerning security of the nation’s alert and warning systems is essential to helping safeguard the lives and property of all Americans. To ensure that the EAS and WEA remain strong, the Commission must act proactively in its PO 00000 Frm 00010 Fmt 4702 Sfmt 4702 oversight of stakeholders associated with these systems. The Commission has previously encouraged stakeholders to ensure that their systems are secure and provided guidance on specific steps that communications providers could take to secure their equipment. According to data collected by the Public Safety and Homeland Security Bureau (Bureau) during the nationwide EAS test in August 2021 however, more than 5,000 EAS Participants were using outdated software or using equipment that no longer supported regular software updates. Moreover, in the area of equipment operational readiness, the test also revealed that an appreciable number of EAS Participants were unable to participate in testing due to equipment failure. This was despite receiving advanced notice that the test was going to be conducted. The Commission therefore believes the information revealed in the nationwide EAS test signals that we should take action to ensure and enhance the security of the EAS and WEA. In the NPRM, the Commission acts to improve the security and reliability of the EAS and WEA by proposing and seeking comment on rules promoting the operational readiness of EAS equipment, improving awareness of unauthorized access to EAS equipment, communications systems, or services, protecting the nation’s alerting systems through the development, implementation, and certification of a cybersecurity risk management plan and displaying only valid WEA messages on mobile devices. 3. The NPRM includes specific proposals upon which the Commission seeks comment include: requiring EAS Participants and Participating CMS Providers to annually certify to having a cybersecurity risk management plan in place and employing sufficient security controls to ensure the confidentiality, integrity, and availability of their respective alerting systems (including certain baseline security controls); requiring EAS Participants to report any incident of unauthorized access of their EAS equipment, communications systems, or services (i.e., regardless of whether that compromise has resulted in the transmission of a false alert) to the Commission via NORS within 72 hours of when it knew or should have known that an incident has occurred, and provide details concerning the incident and requiring that mobile devices only present WEA alerts from valid base stations. In addition, the Commission seeks comment on whether and how to promote the operational readiness of EAS. The Commission also E:\FR\FM\23NOP1.SGM 23NOP1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules seeks comment to refresh the record on previously proposed changes to the WEA infrastructure functionality rules, and on how our proposals in the NPRM may promote or inhibit advances in diversity, equity, inclusion, and accessibility, as well as on the scope of the Commission’s relevant legal authority. lotter on DSK11XQN23PROD with PROPOSALS1 B. Legal Basis 4. The proposed action is authorized pursuant to sections 1, 2, 4(i), 4(n), 301, 303(b), 303(g), 303(r), 303(v), 307, 309, 335, 403, 624(g), and 706 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 154(n), 301, 303(b), 303(g), 303(r), 303(v), 307, 309, 335, 403, 544(g), and 606; The Warning, Alert and Response Network (WARN) Act, WARN Act sections 602(a), (b), (c), (f), 603, 604, and 606, 47 U.S.C. 1202(a),(b),(c), (f), 1203, 1204 and 1206; the Wireless Communications and Public Safety Act of 1999, Pub. L. 106–81, 47 U.S.C. 615, 615a, 615b; Section 202 of the TwentyFirst Century Communications and Video Accessibility Act of 2010, as amended, 47 U.S.C. 613. C. Description and Estimate of the Number of Small Entities to Which the Proposed Rules Will Apply 5. The RFA directs agencies to provide a description of and, where feasible, an estimate of, the number of small entities that may be affected by the proposed rules, if adopted. The RFA generally defines the term ‘‘small entity’’ as having the same meaning as the terms ‘‘small business,’’ ‘‘small organization,’’ and ‘‘small governmental jurisdiction.’’ In addition, the term ‘‘small business’’ has the same meaning as the term ‘‘small business concern’’ under the Small Business Act. A ‘‘small business concern’’ is one which: (1) is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the Small Business Administration (SBA). 6. Small Businesses, Small Organizations, Small Governmental Jurisdictions. Our actions, over time, may affect small entities that are not easily categorized at present. We therefore describe here, at the outset, three broad groups of small entities that could be directly affected herein. First, while there are industry specific size standards for small businesses that are used in the regulatory flexibility analysis, according to data from the SBA’s Office of Advocacy, in general a small business is an independent business having fewer than 500 employees. These types of small VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 businesses represent 99.9% of all businesses in the United States, which translates to 32.5 million businesses. 7. Next, the type of small entity described as a ‘‘small organization’’ is generally ‘‘any not-for-profit enterprise which is independently owned and operated and is not dominant in its field.’’ The Internal Revenue Service (IRS) uses a revenue benchmark of $50,000 or less to delineate its annual electronic filing requirements for small exempt organizations. Nationwide, for tax year 2020, there were approximately 447,689 small exempt organizations in the U.S. reporting revenues of $50,000 or less according to the registration and tax data for exempt organizations available from the IRS. 8. Finally, the small entity described as a ‘‘small governmental jurisdiction’’ is defined generally as ‘‘governments of cities, counties, towns, townships, villages, school districts, or special districts, with a population of less than fifty thousand.’’ U.S. Census Bureau data from the 2017 Census of Governments indicate that there were 90,075 local governmental jurisdictions consisting of general purpose governments and special purpose governments in the United States. Of this number there were 36,931 general purpose governments (county, municipal and town or township) with populations of less than 50,000 and 12,040 special purpose governments— independent school districts with enrollment populations of less than 50,000. Accordingly, based on the 2017 U.S. Census of Governments data, we estimate that at least 48,971 entities fall into the category of ‘‘small governmental jurisdictions.’’ 9. Wireless Telecommunications Carriers (except Satellite). This industry comprises establishments engaged in operating and maintaining switching and transmission facilities to provide communications via the airwaves. Establishments in this industry have spectrum licenses and provide services using that spectrum, such as cellular services, paging services, wireless internet access, and wireless video services. The SBA size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms in this industry that operated for the entire year. Of that number, 2,837 firms employed fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 797 providers that reported they were engaged in the provision of wireless services. Of these providers, the PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 71541 Commission estimates that 715 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 10. Broadband Personal Communications Service. The broadband personal communications services (PCS) spectrum encompasses services in the 1850–1910 and 1930– 1990 MHz bands. The closest industry with a SBA small business size standard applicable to these services is Wireless Telecommunications Carriers (except Satellite). The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 11. Based on Commission data as of November 2021, there were approximately 5,060 active licenses in the Broadband PCS service. The Commission’s small business size standards with respect to Broadband PCS involve eligibility for bidding credits and installment payments in the auction of licenses for these services. In auctions for these licenses, the Commission defined ‘‘small business’’ as an entity that, together with its affiliates and controlling interests, has average gross revenues not exceeding $40 million for the preceding three years, and a ‘‘very small business’’ as an entity that, together with its affiliates and controlling interests, has had average annual gross revenues not exceeding $15 million for the preceding three years. Winning bidders claiming small business credits won Broadband PCS licenses in C, D, E, and F Blocks. 12. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these, at this time we are not able to estimate the number of licensees with active licenses that would qualify as small E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71542 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules under the SBA’s small business size standard. 13. Narrowband Personal Communications Services. Narrowband Personal Communications Services (Narrowband PCS) are PCS services operating in the 901–902 MHz, 930–931 MHz, and 940–941 MHz bands. PCS services are radio communications that encompass mobile and ancillary fixed communication that provide services to individuals and businesses and can be integrated with a variety of competing networks. Wireless Telecommunications Carriers (except Satellite) is the closest industry with a SBA small business size standard applicable to these services. The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 14. According to Commission data as of December 2021, there were approximately 4,211 active Narrowband PCS licenses. The Commission’s small business size standards with respect to Narrowband PCS involve eligibility for bidding credits and installment payments in the auction of licenses for these services. For the auction of these licenses, the Commission defined a ‘‘small business’’ as an entity that, together with affiliates and controlling interests, has average gross revenues for the three preceding years of not more than $40 million. A ‘‘very small business’’ is defined as an entity that, together with affiliates and controlling interests, has average gross revenues for the three preceding years of not more than $15 million. Pursuant to these definitions, 7 winning bidders claiming small and very small bidding credits won approximately 359 licenses. One of the winning bidders claiming a small business status classification in these Narrowband PCS license auctions had an active license as of December 2021. 15. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 employees for licensees providing these services, at this time we are not able to estimate the number of licensees with active licenses that would qualify as small under the SBA’s small business size standard. 16. Wireless Communications Services. Wireless Communications Services (WCS) can be used for a variety of fixed, mobile, radiolocation, and digital audio broadcasting satellite services. Wireless spectrum is made available and licensed for the provision of wireless communications services in several frequency bands subject to Part 27 of the Commission’s rules. Wireless Telecommunications Carriers (except Satellite) is the closest industry with a SBA small business size standard applicable to these services. The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 17. The Commission’s small business size standards with respect to WCS involve eligibility for bidding credits and installment payments in the auction of licenses for the various frequency bands included in WCS. When bidding credits are adopted for the auction of licenses in WCS frequency bands, such credits may be available to several types of small businesses based average gross revenues (small, very small and entrepreneur) pursuant to the competitive bidding rules adopted in conjunction with the requirements for the auction and/or as identified in the designated entities section in Part 27 of the Commission’s rules for the specific WCS frequency bands. 18. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these services, at this time we are not able to estimate the number of licensees with active licenses that would qualify as small under the SBA’s small business size standard. PO 00000 Frm 00012 Fmt 4702 Sfmt 4702 19. 700 MHz Guard Band Licensees. The 700 MHz Guard Band encompasses spectrum in 746–747/776–777 MHz and 762–764/792–794 MHz frequency bands. Wireless Telecommunications Carriers (except Satellite) is the closest industry with a SBA small business size standard applicable to licenses providing services in these bands. The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 20. According to Commission data as of December 2021, there were approximately 224 active 700 MHz Guard Band licenses. The Commission’s small business size standards with respect to 700 MHz Guard Band licensees involve eligibility for bidding credits and installment payments in the auction of licenses. For the auction of these licenses, the Commission defined a ‘‘small business’’ as an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years, and a ‘‘very small business’’ an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. Pursuant to these definitions, five winning bidders claiming one of the small business status classifications won 26 licenses, and one winning bidder claiming small business won two licenses. None of the winning bidders claiming a small business status classification in these 700 MHz Guard Band license auctions had an active license as of December 2021. 21. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these services, at this time we are not able to estimate the number of licensees with active licenses that would qualify as E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules small under the SBA’s small business size standard. 22. Lower 700 MHz Band Licenses. The lower 700 MHz band encompasses spectrum in the 698–746 MHz frequency bands. Permissible operations in these bands include flexible fixed, mobile, and broadcast uses, including mobile and other digital new broadcast operation; fixed and mobile wireless commercial services (including FDDand TDD-based services); as well as fixed and mobile wireless uses for private, internal radio needs, two-way interactive, cellular, and mobile television broadcasting services. Wireless Telecommunications Carriers (except Satellite) is the closest industry with a SBA small business size standard applicable to licenses providing services in these bands. The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 23. According to Commission data as of December 2021, there were approximately 2,824 active Lower 700 MHz Band licenses. The Commission’s small business size standards with respect to Lower 700 MHz Band licensees involve eligibility for bidding credits and installment payments in the auction of licenses. For auctions of Lower 700 MHz Band licenses the Commission adopted criteria for three groups of small businesses. A very small business was defined as an entity that, together with its affiliates and controlling interests, has average annual gross revenues not exceeding $15 million for the preceding three years, a small business was defined as an entity that, together with its affiliates and controlling interests, has average gross revenues not exceeding $40 million for the preceding three years, and an entrepreneur was defined as an entity that, together with its affiliates and controlling interests, has average gross revenues not exceeding $3 million for the preceding three years. In auctions for Lower 700 MHz Band licenses seventy-two winning bidders claiming a small business classification won 329 licenses, twenty-six winning bidders claiming a small business classification won 214 licenses, and three winning bidders claiming a small business classification won all five auctioned licenses. VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 24. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these services, at this time we are not able to estimate the number of licensees with active licenses that would qualify as small under the SBA’s small business size standard. 25. Upper 700 MHz Band Licenses. The upper 700 MHz band encompasses spectrum in the 746–806 MHz bands. Upper 700 MHz D Block licenses are nationwide licenses associated with the 758–763 MHz and 788–793 MHz bands. Permissible operations in these bands include flexible fixed, mobile, and broadcast uses, including mobile and other digital new broadcast operation; fixed and mobile wireless commercial services (including FDD- and TDDbased services); as well as fixed and mobile wireless uses for private, internal radio needs, two-way interactive, cellular, and mobile television broadcasting services. Wireless Telecommunications Carriers (except Satellite) is the closest industry with a SBA small business size standard applicable to licenses providing services in these bands. The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of that number, 2,837 firms employed fewer than 250 employees. Thus, under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 26. According to Commission data as of December 2021, there were approximately 152 active Upper 700 MHz Band licenses. The Commission’s small business size standards with respect to Upper 700 MHz Band licensees involve eligibility for bidding credits and installment payments in the auction of licenses. For the auction of these licenses, the Commission defined a ‘‘small business’’ as an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years, and a ‘‘very small business’’ an entity that, together PO 00000 Frm 00013 Fmt 4702 Sfmt 4702 71543 with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. Pursuant to these definitions, three winning bidders claiming very small business status won five of the twelve available licenses. 27. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these services, at this time we are not able to estimate the number of licensees with active licenses that would qualify as small under the SBA’s small business size standard. 28. Advanced Wireless Services (AWS)—(1710–1755 MHz and 2110– 2155 MHz bands (AWS–1); 1915–1920 MHz, 1995–2000 MHz, 2020–2025 MHz and 2175–2180 MHz bands (AWS–2); 2155–2175 MHz band (AWS–3); 2000– 2020 MHz and 2180–2200 MHz (AWS– 4). Spectrum is made available and licensed in these bands for the provision of various wireless communications services. Wireless Telecommunications Carriers (except Satellite) is the closest industry with a SBA small business size standard applicable to these services. The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus, under the SBA size standard, the Commission estimates that a majority of licensees in this industry can be considered small. 29. According to Commission data as December 2021, there were approximately 4,472 active AWS licenses. The Commission’s small business size standards with respect to AWS involve eligibility for bidding credits and installment payments in the auction of licenses for these services. For the auction of AWS licenses, the Commission defined a ‘‘small business’’ as an entity with average annual gross revenues for the preceding three years not exceeding $40 million, and a ‘‘very small business’’ as an entity with average annual gross revenues for the preceding three years not exceeding $15 million. Pursuant to these definitions, E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71544 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules 57 winning bidders claiming status as small or very small businesses won 215 of 1,087 licenses. In the most recent auction of AWS licenses 15 of 37 bidders qualifying for status as small or very small businesses won licenses. 30. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these services, at this time we are not able to estimate the number of licensees with active licenses that would qualify as small under the SBA’s small business size standard. 31. Broadband Radio Service and Educational Broadband Service. Broadband Radio Service systems, previously referred to as Multipoint Distribution Service (MDS) and Multichannel Multipoint Distribution Service (MMDS) systems, and ‘‘wireless cable,’’ transmit video programming to subscribers and provide two-way high speed data operations using the microwave frequencies of the Broadband Radio Service (BRS) and Educational Broadband Service (EBS) (previously referred to as the Instructional Television Fixed Service (ITFS)). Wireless cable operators that use spectrum in the BRS often supplemented with leased channels from the EBS, provide a competitive alternative to wired cable and other multichannel video programming distributors. Wireless cable programming to subscribers resembles cable television, but instead of coaxial cable, wireless cable uses microwave channels. 32. In light of the use of wireless frequencies by BRS and EBS services, the closest industry with a SBA small business size standard applicable to these services is Wireless Telecommunications Carriers (except Satellite). The SBA small business size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms that operated in this industry for the entire year. Of this number, 2,837 firms employed fewer than 250 employees. Thus under the SBA size standard, the Commission estimates that a majority of VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 licensees in this industry can be considered small. 33. According to Commission data as December 2021, there were approximately 5,869 active BRS and EBS licenses. The Commission’s small business size standards with respect to BRS involves eligibility for bidding credits and installment payments in the auction of licenses for these services. For the auction of BRS licenses, the Commission adopted criteria for three groups of small businesses. A very small business is an entity that, together with its affiliates and controlling interests, has average annual gross revenues exceed $3 million and did not exceed $15 million for the preceding three years, a small business is an entity that, together with its affiliates and controlling interests, has average gross revenues exceed $15 million and did not exceed $40 million for the preceding three years, and an entrepreneur is an entity that, together with its affiliates and controlling interests, has average gross revenues not exceeding $3 million for the preceding three years. Of the ten winning bidders for BRS licenses, two bidders claiming the small business status won 4 licenses, one bidder claiming the very small business status won three licenses and two bidders claiming entrepreneur status won six licenses. One of the winning bidders claiming a small business status classification in the BRS license auction has an active licenses as of December 2021. 34. The Commission’s small business size standards for EBS define a small business as an entity that, together with its affiliates, its controlling interests and the affiliates of its controlling interests, has average gross revenues that are not more than $55 million for the preceding five (5) years, and a very small business is an entity that, together with its affiliates, its controlling interests and the affiliates of its controlling interests, has average gross revenues that are not more than $20 million for the preceding five (5) years. In frequency bands where licenses were subject to auction, the Commission notes that as a general matter, the number of winning bidders that qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Further, the Commission does not generally track subsequent business size unless, in the context of assignments or transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect data on the number of employees for licensees providing these services, at this time we are not able to estimate the number of licensees with PO 00000 Frm 00014 Fmt 4702 Sfmt 4702 active licenses that would qualify as small under the SBA’s small business size standard. 35. The Educational Broadcasting Services. Cable-based educational broadcasting services fall under the broad category of the Wired Telecommunications Carriers industry. The Wired Telecommunications Carriers industry comprises establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired telecommunications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services; wired (cable) audio and video programming distribution; and wired broadband internet services. 36. The SBA small business size standard for this industry classifies businesses having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms in this industry that operated for the entire year. Of this total, 2,964 firms operated with fewer than 250 employees. Thus, under this size standard, the majority of firms in this industry can be considered small. Additionally, according to Commission data as of December 2021, there were 4,477 active EBS licenses. The Commission estimates that the majority of these licenses are held by non-profit educational institutions and school districts and are likely small entities. 37. Radio and Television Broadcasting and Wireless Communications Equipment Manufacturing. This industry comprises establishments primarily engaged in manufacturing radio and television broadcast and wireless communications equipment. Examples of products made by these establishments are: transmitting and receiving antennas, cable television equipment, GPS equipment, pagers, cellular phones, mobile communications equipment, and radio and television studio and broadcasting equipment. The SBA small business size standard for this industry classifies businesses having 1,250 employees or less as small. U.S. Census Bureau data for 2017 show that there were 656 firms in this industry that operated for the entire year. Of this number, 624 firms had fewer than 250 employees. Thus, under the SBA size E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules standard, the majority of firms in this industry can be considered small. 38. Software Publishers. This industry comprises establishments primarily engaged in computer software publishing or publishing and reproduction. Establishments in this industry carry out operations necessary for producing and distributing computer software, such as designing, providing documentation, assisting in installation, and providing support services to software purchasers. These establishments may design, develop, and publish, or publish only. The SBA small business size standard for this industry classifies businesses having annual receipts of $41.5 million or less as small. U.S. Census Bureau data for 2017 indicate that 7,842 firms in this industry operated for the entire year. Of this number 7,226 firms had revenue of less than $25 million. Based on this data, we conclude that a majority of firms in this industry are small. 39. Noncommercial Educational (NCE) and Public Broadcast Stations. Noncommercial educational broadcast stations and public broadcast stations are television or radio broadcast stations which under the Commission’s rules are eligible to be licensed by the Commission as a noncommercial educational radio or television broadcast station and are owned and operated by a public agency or nonprofit private foundation, corporation, or association; or are owned and operated by a municipality which transmits only noncommercial programs for education purposes. 40. The SBA small business size standards and U.S. Census Bureau data classify radio stations and television broadcasting separately and both categories may include both noncommercial and commercial stations. The SBA small business size standard for both radio stations and television broadcasting classify firms having $41.5 million or less in annual receipts as small. For Radio Stations, U.S. Census Bureau data for 2017 show that 1,879 of the 2,963 firms that operated during that year had revenue of less than $25 million per year. For Television Broadcasting, U.S. Census Bureau data for 2017 show that 657 of the 744 firms that operated for the entire year had revenue of less than $25,000,000. While the U.S. Census Bureau data does not indicate the number of non-commercial stations, we estimate that under the applicable SBA size standard the majority of noncommercial educational broadcast stations and public broadcast stations are small entities. VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 41. According to Commission data as of March 31, 2022, there were 4,503 licensed noncommercial educational radio and television stations. In addition, the Commission estimates as of March 31, 2022, there were 384 licensed noncommercial educational (NCE) television stations, 383 Class A TV stations, 1,840 LPTV stations and 3,231 TV translator stations. The Commission does not compile and otherwise does not have access to financial information for these stations that permit it to determine how many stations qualify as small entities under the SBA small business size standards. However, given the nature of these services, we will presume that all noncommercial educational and public broadcast stations qualify as small entities under the above SBA small business size standards. 42. Radio Stations. This industry is comprised of ‘‘establishments primarily engaged in broadcasting aural programs by radio to the public.’’ Programming may originate in their own studio, from an affiliated network, or from external sources. The SBA small business size standard for this industry classifies firms having $41.5 million or less in annual receipts as small. U.S. Census Bureau data for 2017 show that 2,963 firms operated in this industry during that year. Of this number, 1,879 firms operated with revenue of less than $25 million per year. Based on this data and the SBA’s small business size standard, we estimate a majority of such entities are small entities. 43. The Commission estimates that as of March 31, 2022, there were 4,508 licensed commercial AM radio stations and 6,763 licensed commercial FM radio stations, for a combined total of 11,271 commercial radio stations. Of this total, 11,269 stations (or 99.98%) had revenues of $41.5 million or less in 2021, according to Commission staff review of the BIA Kelsey Inc. Media Access Pro Database (BIA) on June 1, 2022, and therefore these licensees qualify as small entities under the SBA definition. In addition, the Commission estimates that as of March 31, 2022, there were 4,119 licensed noncommercial (NCE) FM radio stations, 2,049 low power FM (LPFM) stations, and 8,919 FM translators and boosters. The Commission however does not compile, and otherwise does not have access to financial information for these radio stations that would permit it to determine how many of these stations qualify as small entities under the SBA small business size standard. Nevertheless, given the SBA’s large annual receipts threshold for this industry and the nature of these radio PO 00000 Frm 00015 Fmt 4702 Sfmt 4702 71545 station licensees, we presume that all of these entities qualify as small entities under the above SBA small business size standard. 44. We note, however, that in assessing whether a business concern qualifies as ‘‘small’’ under the above definition, business (control) affiliations must be included. Our estimate, therefore, likely overstates the number of small entities that might be affected by our action, because the revenue figure on which it is based does not include or aggregate revenues from affiliated companies. In addition, another element of the definition of ‘‘small business’’ requires that an entity not be dominant in its field of operation. We are unable at this time to define or quantify the criteria that would establish whether a specific radio or television broadcast station is dominant in its field of operation. Accordingly, the estimate of small businesses to which the rules may apply does not exclude any radio or television station from the definition of a small business on this basis and is therefore possibly over-inclusive. An additional element of the definition of ‘‘small business’’ is that the entity must be independently owned and operated. Because it is difficult to assess these criteria in the context of media entities, the estimate of small businesses to which the rules may apply does not exclude any radio or television station from the definition of a small business on this basis and similarly may be over-inclusive. 45. FM Translator Stations and LowPower FM Stations. FM translators and Low Power FM Stations are classified in the industry for Radio Stations. The Radio Stations industry comprises establishments primarily engaged in broadcasting aural programs by radio to the public. Programming may originate in their own studio, from an affiliated network, or from external sources. The SBA small business size standard for this industry classifies firms having $41.5 million or less in annual receipts as small. U.S. Census Bureau data for 2017 show that 2,963 firms operated during that year. Of that number, 1,879 firms operated with revenue of less than $25 million per year. Therefore, based on the SBA’s size standard we conclude that the majority of FM Translator stations and Low Power FM Stations are small. Additionally, according to Commission data, as of March 31, 2022, there were 8,919 FM Translator Stations and 2,049 Low Power FM licensed broadcast stations. The Commission however does not compile and otherwise does not have access to information on the revenue of these stations that would permit it to E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71546 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules determine how many of the stations would qualify as small entities. For purposes of this regulatory flexibility analysis, we presume the majority of these stations are small entities. 46. Television Broadcasting. This industry is comprised of ‘‘establishments primarily engaged in broadcasting images together with sound.’’ These establishments operate television broadcast studios and facilities for the programming and transmission of programs to the public. These establishments also produce or transmit visual programming to affiliated broadcast television stations, which in turn broadcast the programs to the public on a predetermined schedule. Programming may originate in their own studio, from an affiliated network, or from external sources. The SBA small business size standard for this industry classifies businesses having $41.5 million or less in annual receipts as small. 2017 U.S. Census Bureau data indicate that 744 firms in this industry operated for the entire year. Of that number, 657 firms had revenue of less than $25,000,000. Based on this data we estimate that the majority of television broadcasters are small entities under the SBA small business size standard. 47. The Commission estimates that as of March 31, 2022, there were 1,373 licensed commercial television stations. Of this total, 1,280 stations (or 93.2%) had revenues of $41.5 million or less in 2021, according to Commission staff review of the BIA Kelsey Inc. Media Access Pro Television Database (BIA) on June 1, 2022, and therefore these licensees qualify as small entities under the SBA definition. In addition, the Commission estimates as of March 31, 2022, there were 384 licensed noncommercial educational (NCE) television stations, 383 Class A TV stations, 1,840 LPTV stations and 3,231 TV translator stations. The Commission however does not compile, and otherwise does not have access to financial information for these television broadcast stations that would permit it to determine how many of these stations qualify as small entities under the SBA small business size standard. Nevertheless, given the SBA’s large annual receipts threshold for this industry and the nature of these television station licensees, we presume that all of these entities qualify as small entities under the above SBA small business size standard. 48. Cable and Other Subscription Programming. The U.S. Census Bureau defines this industry as establishments primarily engaged in operating studios and facilities for the broadcasting of programs on a subscription or fee basis. VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 The broadcast programming is typically narrowcast in nature (e.g., limited format, such as news, sports, education, or youth-oriented). These establishments produce programming in their own facilities or acquire programming from external sources. The programming material is usually delivered to a third party, such as cable systems or direct-to-home satellite systems, for transmission to viewers. The SBA small business size standard for this industry classifies firms with annual receipts less than $41.5 million as small. Based on U.S. Census Bureau data for 2017, 378 firms operated in this industry during that year. Of that number, 149 firms operated with revenue of less than $25 million a year and 44 firms operated with revenue of $25 million or more. Based on this data, the Commission estimates that the majority of firms operating in this industry are small. 49. Cable System Operators (Rate Regulation Standard). The Commission has developed its own small business size standard for the purpose of cable rate regulation. Under the Commission’s rules, a ‘‘small cable company’’ is one serving 400,000 or fewer subscribers nationwide. Based on industry data, there are about 420 cable companies in the U.S. Of these, only seven have more than 400,000 subscribers. In addition, under the Commission’s rules, a ‘‘small system’’ is a cable system serving 15,000 or fewer subscribers. Based on industry data, there are about 4,139 cable systems (headends) in the U.S. Of these, about 639 have more than 15,000 subscribers. Accordingly, the Commission estimates that the majority of cable companies and cable systems are small. 50. Cable System Operators (Telecom Act Standard). The Communications Act of 1934, as amended, contains a size standard for a ‘‘small cable operator,’’ which is ‘‘a cable operator that, directly or through an affiliate, serves in the aggregate fewer than one percent of all subscribers in the United States and is not affiliated with any entity or entities whose gross annual revenues in the aggregate exceed $250,000,000.’’ For purposes of the Telecom Act Standard, the Commission determined that a cable system operator that serves fewer than 677,000 subscribers, either directly or through affiliates, will meet the definition of a small cable operator based on the cable subscriber count established in a 2001 Public Notice. Based on industry data, only six cable system operators have more than 677,000 subscribers. Accordingly, the Commission estimates that the majority of cable system operators are small under this size standard. We note PO 00000 Frm 00016 Fmt 4702 Sfmt 4702 however, that the Commission neither requests nor collects information on whether cable system operators are affiliated with entities whose gross annual revenues exceed $250 million. Therefore, we are unable at this time to estimate with greater precision the number of cable system operators that would qualify as small cable operators under the definition in the Communications Act. 51. Satellite Telecommunications. This industry comprises firms ‘‘primarily engaged in providing telecommunications services to other establishments in the telecommunications and broadcasting industries by forwarding and receiving communications signals via a system of satellites or reselling satellite telecommunications.’’ Satellite telecommunications service providers include satellite and earth station operators. The SBA small business size standard for this industry classifies a business with $35 million or less in annual receipts as small. U.S. Census Bureau data for 2017 show that 275 firms in this industry operated for the entire year. Of this number, 242 firms had revenue of less than $25 million. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 71 providers that reported they were engaged in the provision of satellite telecommunications services. Of these providers, the Commission estimates that approximately 48 providers have 1,500 or fewer employees. Consequently using the SBA’s small business size standard, a little more than of these providers can be considered small entities. 52. All Other Telecommunications. This industry is comprised of establishments primarily engaged in providing specialized telecommunications services, such as satellite tracking, communications telemetry, and radar station operation. This industry also includes establishments primarily engaged in providing satellite terminal stations and associated facilities connected with one or more terrestrial systems and capable of transmitting telecommunications to, and receiving telecommunications from, satellite systems. Providers of internet services (e.g. dial-up ISPs) or voice over internet protocol (VoIP) services, via client-supplied telecommunications connections are also included in this industry. The SBA small business size standard for this industry classifies firms with annual receipts of $35 million or less as small. U.S. Census Bureau data for 2017 show that there E:\FR\FM\23NOP1.SGM 23NOP1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 were 1,079 firms in this industry that operated for the entire year. Of those firms, 1,039 had revenue of less than $25 million. Based on this data, the Commission estimates that the majority of ‘‘All Other Telecommunications’’ firms can be considered small. 53. Direct Broadcast Satellite (‘‘DBS’’) Service. DBS service is a nationally distributed subscription service that delivers video and audio programming via satellite to a small parabolic ‘‘dish’’ antenna at the subscriber’s location. DBS is included in the Wired Telecommunications Carriers industry which comprises establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired telecommunications networks. Transmission facilities may be based on a single technology or combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution; and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry. 54. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that 3,054 firms operated in this industry for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Based on this data, the majority of firms in this industry can be considered small under the SBA small business size standard. According to Commission data however, only two entities provide DBS service—DIRECTV (owned by AT&T) and DISH Network, which require a great deal of capital for operation. DIRECTV and DISH Network both exceed the SBA size standard for classification as a small business. Therefore, we must conclude based on internally developed Commission data, in general DBS service is provided only by large firms. D. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small Entities 55. We expect the actions proposed in the NPRM, if adopted, will impose additional reporting, recordkeeping and/or other compliance obligations on small as well as other entities who are VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 EAS Participants and Participating CMS Providers. More specifically, if adopted, EAS Participants and Participating CMS Providers would be required to annually certify to creating, updating, and implementing a cybersecurity risk management plan to ensure the confidentiality, integrity, and availability of their respective alerting systems. The cybersecurity risk management plan must contain among other things, a description of how organizational resources are employed to ensure the confidentiality, integrity, and availability of the alerting system. Further, any incident involving the unauthorized access to EAS equipment, communications systems, or services, regardless of whether the event resulted in the transmission of a false alert would require EAS Participants to report the unauthorized access to the Commission within 72 hours of when the EAS Participant knew or should have known that an incident has occurred. The Commission also seeks comment on whether and how to strengthen the operational readiness of the EAS. 56. In assessing the cost of compliance with our proposed rule to create a cybersecurity risk management plan, we estimate the cost for each small EAS Participant and each Participating CMS Providers to be approximately $820. These costs are based on 10 hours of labor at $82 an hour and apply to all EAS Participants and Participating CMS Providers not just small entities. We anticipate however, that many small EAS Participants and Participating CMS Providers will not require 10 hours to develop or update a cybersecurity risk management plan tailored to the size of their organization. The cost for reporting an unauthorized access incident we believe would be similar to the cost of reporting a false alert, which the Commission has estimated to have a total cost of $11,600 per year across 290 EAS Participants. This total cost when apportioned to each EAS Participant comes out to approximately $40 per EAS Participant. 57. We estimate a $9.2 million onetime cost for all Participating CMS Providers, not just small providers, to update the WEA standards and software necessary to comply with our proposed rule that Participating CMS Providers transmit sufficient authentication information to allow mobile devices to present WEA alerts only if they come from valid base stations. This figure consists of approximately a $500,000 cost to update applicable WEA standards and approximately an $8.7 million cost to update applicable software. We quantify the cost of PO 00000 Frm 00017 Fmt 4702 Sfmt 4702 71547 modifying standards as the annual compensation for 30 network engineers compensated at the national average for their field ($85,816/year; $41.26/hour), plus annual benefits ($26,775/year; 12.87/hour) working for the amount of time that it takes to develop a standard (one hour every other week for one year, 26 hours) for 12 distinct standards. We quantify the cost of modifying software as the annual compensation for a software engineer compensated at the national average for their field ($86,998/ year), plus annual benefits ($27,143/ year) working for the amount of time that it takes to develop software (one year) at each of the 76 CMS Providers that participate in WEA. 58. At this time the Commission cannot quantify the cost of compliance for small entities to comply with the other proposals or approaches on which it seeks comment in the NPRM. We believe that the modifications to improve and enhance the security of the EAS that we discuss in the NPRM are the most efficient and least burdensome approach and do not believe small entities will have to hire professionals to meet the requirements discussed in the NPRM, if adopted. To help the Commission more fully evaluate the cost of compliance for small entities should our proposals be adopted, in the NPRM, we request comments on the cost implications of our proposals and ask whether there are more efficient and less burdensome alternatives (including cost estimates) for the Commission to consider. We expect the information we receive in comments including cost and benefit analyses, will help the Commission identify and evaluate relevant matters for small entities, including compliance costs and other burdens that may result from the proposals and inquiries we make in the NPRM. E. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives Considered 59. The RFA requires an agency to describe any significant, specifically small business alternatives that it has considered in reaching its proposed approach, which may include (among others) the following four alternatives: (1) the establishment of differing compliance or reporting requirements or timetables that take into account the resources available to small entities; (2) the clarification, consolidation, or simplification of compliance or reporting requirements under the rule for such small entities; (3) the use of performance, rather than design, standards; and (4) and exemption from E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71548 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules coverage of the rule, or any part thereof, for such small entities. 60. The Commission has taken steps to minimize the impact of the proposals in the NPRM as a general matter, and specifically targeting small entities, has sought comment on the extent to which we can limit the overall economic impact of these proposed requirements if we provide increased flexibility for businesses classified as small under the SBA small business size standard. Below we discuss actions taken and alternatives considered by the Commission for the rules proposed promoting the operational readiness of EAS equipment, improving awareness of unauthorized access to EAS equipment, communications systems, and services, and requiring the development, implementation, and certification of a cybersecurity risk management plan. 61. To further the Commission’s objectives to promote EAS equipment operational readiness, in the NPRM we seek comment on whether to require EAS Participants to repair EAS equipment with prompt and reasonable diligence, on whether the EAS Participants should notify the Commission of the status of their repairs, and, if so, on the timing, content, and means of that notification. 62. We seek comment on whether a compliance timeframe of 30 days from publication in the Federal Register of notice that the Office of Management and Budget (OMB) has completed its review of the modified information collection to improve the Commission’s visibility into the repair or replacement of non-operational EAS equipment would not impose a burden on small entities. Small and other EAS Participants currently make entries in their broadcast station logs and cable system records showing the date and time equipment was removed and restored to service, and therefore already have processes and procedures in place to record information about the operational status of their EAS equipment in station logs that could be utilized for the proposed notification requirement. In the event that the Commission were to alternatively require this notification to be provided through NORS, the requirement would become effective within 30 days from publication in the Federal Register of notice that the OMB has approved the modified information collection or upon publication in the Federal Register of a Public Notice announcing that NORS is technically capable of receiving such notifications, whichever is later. Similarly, this requirement should not impose a burden on small entities for VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 the reason stated above and since EAS Participants are already likely to be using NORS. 63. Our approach to improving awareness of unauthorized access to EAS equipment, communications systems, and services relies on our belief that significant public safety benefits will accrue if EAS Participants were required to provide the Commission with notification that their EAS equipment, communications systems, and services have been accessed without authorization, even in the absence of a subsequent transmission of a false alert. The reporting requirement we proposed in the NPRM requiring EAS Participants to provide notification to the Commission via NORS within 72 hours of when an EAS Participant knew or should have known that an incident has occurred should result in low marginal costs for small and other EAS participants since our requirement parallels the reporting obligations EAS Participants may have to other government agencies that require critical infrastructure sector entities to report cyber incidents. This would allow the requirement to be satisfied by reporting substantially similar information to another federal agency in a similar timeframe. We believe the cost to report unauthorized access is comparable to the cost of reporting false alerts which further supports our belief that these costs will be relatively low for small and other EAS Participants. In the NPRM we have requested comments and cost and benefit analyses on our proposal and beliefs. In addition, we have requested alternative proposals (accompanied by cost analyses) for unauthorized access reporting requirements that would be less costly for small and other EAS Participants while producing similar or greater benefits. 64. The requirement for EAS Participants to report any incident of unauthorized access of its EAS equipment, communications systems, or services would be effective 60 days from publication in the Federal Register of notice that the OMB has approved the modified information collection. Since we consider the requirement to report unauthorized access similar to the Commission’s false alert reporting requirement, there are likely to be compliance synergies for small and other EAS Participants, and less of a burden than there would be in the absence of the similarity. We therefore seek comment in the NPRM on whether an EAS Participant’s process for ascertaining whether an incident of unauthorized access of its EAS equipment, communications systems, or PO 00000 Frm 00018 Fmt 4702 Sfmt 4702 services has occurred and reporting it to the Commission entails a level of effort comparable to compliance with the Commission’s false alert reporting requirement. 65. To further explore the impact of the cybersecurity risk management plan requirement proposed in the NPRM which requires small and other EAS Participants and Participating CMS Providers to create, implement, and annually update a cybersecurity risk management plan and submit an annual certification attesting to compliance with requirement, Commission seeks comment on steps that it could take to limit various burdens. In particular, the Commission requests comment on whether the steps that it describes for EAS Participants and Participating CMS Providers to submit their risk management plans are the most efficient way to implement a certification requirement. In the NPRM, we propose to afford each EAS Participant and Participating CMS Provider the flexibility to include content in its plan that is tailored to its organization, provided that the plan demonstrates how the EAS Participant or Participating CMS Provider identifies the cyber risks that they face, the controls they use to mitigate those risks, and how they ensure that these controls are applied effectively to their operations. 66. The Commission also proposes to require that each plan include security controls sufficient to ensure the confidentiality, integrity, and availability (CIA) of the EAS. While we believe there are numerous methods to satisfy this aspect of the requirement, we have proposed to allow the requirement to be satisfied by providing evidence of the successful implementation of an established set of cybersecurity best practices, such as applicable Center for internet Security (CIS) Critical Security Controls or the Cybersecurity & Infrastructure Security Agency (CISA) Cybersecurity Baseline. We believe adopting this flexible approach will allow EAS Participants and Participating CMS Providers to develop a plan that is appropriate for their organization’s size and available resources, while still ensuring that the plan results in ongoing and material improvements in EAS and WEA security. The Commission anticipates that this flexibility will reduce the costs imposed on small business EAS Participants and Participating CMS Providers, which will have different cybersecurity needs than larger EAS Participants and Participating CMS Providers, respectively. We do note, however, that to ensure that every EAS E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules Participant implements a baseline of security controls, the Commission proposes to require that each plan include certain security measures: changing default passwords prior to operation, installing security updates in a timely manner, securing equipment behind properly configured firewalls or using other segmentation practices, requiring multifactor authentication where applicable, addressing the replacement of end-of-life equipment, and wiping, clearing, or encrypting user information before disposing of old devices. 67. The Commission proposes to require compliance with the requirement to implement a cybersecurity risk management plan and certification within twelve months of the publication in the Federal Register of notice that the OMB has approved the modified information collection. We recognize that larger EAS Participants are likely to already have cybersecurity risk management plans in place. We ask whether we should allow small entities a two-year timeframe to implement this requirement. The two-year timeframe should provide sufficient time for small EAS Participants and small Participating CMS Providers that do not already have a risk management plan in place to create one. The timeframe would also be sufficient to prepare their organizations to manage security and privacy risks, categorize their systems and the information being processed, stored, and transmitted, and select controls to protect their systems. Further, a two-year timeframe would provide time for these entities to implement the security controls that the plan describes, assess whether the controls are in place, operating as intended, and producing the desired results, appoint a senior official to authorize the system, and develop mechanisms to continuously monitor control implementation and risks to the system. 68. In the NPRM, the Commission identifies alternative approaches on several matters that might minimize the economic impact for small entities. For example, the Commission requests alternatives to providing a second notification to the Commission once repairs of EAS equipment have been completed, and the EAS Participant’s EAS systems have been tested and determined to once again be fully functional. The Commission seeks comment on potential alternatives to, and additional aspects of, the discussed approach, as well as their accompanying costs and benefits. The Commission recommends that EAS Participants file the required notifications regarding EAS VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 equipment failures and repairs in the NORS database, but requests comment on other means EAS Participants could use to submit the notifications such as via email to a designated email address. 69. The Commission expects to more fully consider the economic impact and alternatives for small entities following the review of comments filed in response to the NPRM, including costs and benefits analyses. Having data on the costs and economic impacts of proposals and approaches will allow the Commission to better evaluate options and alternatives for minimization of any significant economic impact on small entities as a result of the proposals and approaches raised in the NPRM. The Commission’s evaluation of this information will shape the final alternatives it considers to minimize any significant economic impact that may occur on small entities, the final conclusions it reaches, and any final rules it promulgates in this proceeding. F. Federal Rules That May Duplicate, Overlap, or Conflict With the Proposed Rules 70. None. II. Notice of Proposed Rulemaking A. Promoting the Operational Readiness of EAS Equipment 71. We observe that, according to the Bureau’s last nationwide EAS test report, an appreciable number of EAS Participants were unable to participate in testing due to equipment failure— despite advance notice that such test was to take place—suggesting that equipment failures are not addressed by EAS Participants as swiftly as reasonably possible and that more needs to be done to improve EAS operational readiness. Today, EAS Participants may continue operations for a period of 60 days despite having defective equipment that preclude their participation in EAS. We seek comment on whether this approach is effective at ensuring the operational readiness of EAS. How frequently does EAS equipment encounter defects that prevent it from receiving or retransmitting alerts? What are the most common types of defects that are experienced? What steps are necessary to repair these defects, and how often do they typically take to repair? Do EAS Participants take prompt steps to repair their EAS equipment, or do they typically take several days or weeks before seeking repairs? Do other EAS stakeholders, such as alert originators, have concerns about equipment failures preventing the transmission of emergency alerts to the public? We PO 00000 Frm 00019 Fmt 4702 Sfmt 4702 71549 encourage commenters to highlight any specific incidences in which an EAS equipment defect prevented members of the public from being alerted to an emergency. 72. We seek comment on how to better promote the operational readiness of EAS equipment. For example, instead of requiring repairs within 60 days, would it serve the public interest to require EAS Participants to conduct repairs promptly and with reasonable diligence? Are all EAS Participants already doing so? If so, what are the reasons why some EAS Participants are not able to conduct repairs promptly and diligently? What factors should we consider when determining whether repairs are made promptly and with reasonable diligence? What barriers prevent equipment from being repaired promptly and what steps can we take to remove those barriers? 73. Would it improve EAS operational readiness and public safety in general to increase the situational awareness of the Commission, alert originators, and others about the occurrence of equipment defects that might prevent alerts from reaching the public? For example, would such an approach allow us to better enforce our operational readiness rules and identify persistent technical problems, and make contingency plans for alert delivery? If so, should we adopt an EAS equipment defect notification requirement? For example, should we require EAS Participants to report EAS equipment defects and submit a follow-up notification when the equipment is repaired? Within what timeframe should they perform that notification to ensure that stakeholders are aware of possible impacts on EAS (e.g. 24 hours)? What content should the notification contain? For example, should notifications include the same information that is already included in requests for additional repair time that are required sent to the Regional Director of the FCC field office for the area that the EAS Participant serves? We seek comment on how, if at all, the Commission should share information to promote situational awareness among relevant stakeholders, such as alert originators State Emergency Communications Committees. We also seek comment on whether to treat this information as confidential and, if so, how to protect it. Are there other steps that we should take to better ensure that EAS is ready and available when it is needed? 74. We seek comment on any measures that the Commission could take to reduce burdens on EAS Participants if it were to take further E:\FR\FM\23NOP1.SGM 23NOP1 71550 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 steps to promote the operational readiness of EAS equipment. Should we remove the requirement under § 11.35(b) that EAS Participants make entries in their own broadcast station log and cable system records showing the date and time the equipment was removed and restored to service? Would the elimination of the ‘‘60 day’’ rule in favor of a prompt repair rule reduce certain burdens on EAS Participants? We seek comments on the costs of any approaches to improving EAS operational readiness that commenters propose that we consider. In doing so, commenters should offer specific cost estimates where possible. For example, we seek comment on whether it would be reasonable to estimate that EAS Participants would transmit a maximum of 2,000 EAS equipment defect notifications annually under the approach discussed above, as 565 EAS Participants reported their equipment was defective during the 2021 Nationwide EAS Test? Would it be reasonable to estimate that 2,000 annual notifications would require one hour of labor each from a General and Operations Manager who is compensated at $82 per hour, resulting in an overall cost of $164,000? We seek similarly detailed analysis on potential alternatives to improve EAS operational readiness. B. Improving Awareness of Unauthorized Access to EAS Equipment 75. Section 11.45(b) of the Commission’s rules requires that an EAS Participant notify the Commission by email within 24 hours of its discovery that it has transmitted or otherwise sent a false alert to the public, including details concerning the event. We believe that it would be in the public interest to strengthen this rule in view of the increasing threats that cyber attacks pose to EAS networks and equipment. Accordingly, we propose to revise this rule to further require that an EAS Participant report any incident of unauthorized access of its EAS equipment (i.e., regardless of whether that compromise has resulted in the transmission of a false alert), to the Commission via NORS within 72 hours of when it knew or should have known that an incident has occurred and provide details concerning the incident. We seek comment on this proposal. 76. We observe that protecting EAS equipment alone is unlikely to be sufficient to protect the EAS from a cyber attack. Even without directly accessing an EAS Participant’s EAS equipment, a bad actor could send a false alert or prevent a legitimate alert with lifesaving information from VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 reaching the public by gaining unauthorized access to EAS Participants’ communications systems and services. For this reason, we also propose to require that an EAS Participant report any incident of unauthorized access to any aspects of an EAS Participant’s communications systems and services that potentially could affect their provision of EAS. This would include infrastructure that serves to prevent unauthorized access to EAS equipment, including firewalls and Virtual Private Networks. We seek comment on this proposal and on any suitable alternatives. 77. We believe the proposed rule is justified in light of the instances of false EAS alerts in recent years, caused by compromised EAS equipment being used to transmit a false message. As recounted above, we are aware of several situations in the past decade in which bad actors were either capable of obtaining, or actually obtained unauthorized access to EAS equipment. We seek comment on these views. Are there any other past or present security incidents involving EAS about which the Commission should be aware? Does unauthorized access to EAS equipment provide bad actors with the ability to disrupt EAS Participants’ regularly scheduled programming, which has the potential to inflict financial harm in relation to their advertisers and reputational harm with their audiences? Are there any other kinds of harms resulting from unauthorized access to EAS equipment that the Commission should consider? 78. We believe significant public safety benefits would accrue if EAS Participants were required to provide the Commission with notification that their EAS equipment, communications systems, or services have been accessed without authorization, even in the absence of a subsequent transmission of a false alert. This view is based on our observation that, after a system is compromised, many attackers will position themselves to attack connected systems in several different ways. For example, we have observed that it is characteristic of some cyber attacks that an attacker will start by compromising one device and then, prior to launching a specific attack, spend time and effort to identify and compromise other devices in the network, potentially using the initially comprised device as an access point to other devices. The Commission could use the proposed notifications to work with providers and other government agencies to resolve an equipment compromise before the compromise is actually exploited to cause false EAS transmissions in at least PO 00000 Frm 00020 Fmt 4702 Sfmt 4702 some instances. We further believe that the Commission could leverage information on the frequency and nature of equipment compromise to better understand the prevalence and trends associated such attacks across the nation. The Commission and its government partners would thus be better apprised of the risks posed to EAS and in a position to use this information to inform further measures that might be necessary to secure EAS. 79. We seek comment on these views, including detailed information as to the associated costs and benefits of the proposed approach. For example, what would be a reasonable estimate of the financial harm that such a cyber attack would inflict upon an EAS Participant, and how should such estimates be calculated? We believe the cost of reporting an unauthorized access incident would tend to be similar to the cost of reporting a false alert, which the Commission has estimated to have a total cost of $11,600 per year across all EAS Participants. We seek comment on that estimate. Are EAS Participants already conducting investigations and gathering information about suspected incidents of unauthorized access to EAS equipment, communications systems, and services? Are there less costly alternatives to an unauthorized access reporting requirement that would achieve similar or greater benefits? We believe that the marginal costs of an unauthorized access reporting requirement are likely to be low, as the requirement parallels the requirements of an upcoming CISA rulemaking. Specifically, CISA is required by the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) to adopt rules requiring critical infrastructure sector entities to report cyber incidents, but allows the requirement to be satisfied by reporting substantially similar information to another federal agency in a similar timeframe. We seek comment on that belief. 80. We propose to define ‘‘unauthorized access’’ to EAS equipment, communications systems, and services for the purposes of today’s proposal to refer to any incident involving either remote or local access to EAS equipment, communications systems, or services by an individual or other entity that either does not have permission to access the equipment or exceeds their authorized access. We seek comment on this definition. For example, does this proposed definition mirror the methods that have been, and are likely to be, used by cyber-attackers to infiltrate EAS? We seek comment on whether it is appropriate to require that E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules EAS Participants provide notification to the Commission within 72 hours of when they knew or should have known that an incident has occurred. Is this time frame appropriate or would it, for example, put undue pressure on EAS Participants at a critical time when they may be attempting to fully diagnose and resolve the compromise to their systems? On the other hand, is this time frame too slow to provide the Commission and government partners with timely notice of an incident? For example, consistent with the NORS reporting deadlines for interconnected VoIP outages, should the Commission be notified within 24 hours of a reasonable belief that an incident has occurred? In the alternative, should we require EAS Participants to provide notification to the Commission within 72 hours of ‘‘its reasonable belief that an incident has occurred,’’ consistent with the approach to cyber incident reporting outlined by CIRCIA? Or, would this approach create disincentives for a provider to monitor the security of its own network? Would any alternative approach be more effective? Similar to what is contemplated by CIRCIA, should EAS Participants be required to submit updates to the Commission if substantial new or different information becomes available, until the date that the Commission is notified that the incident has concluded and been fully mitigated and resolved? Is the overall approach we propose today consistent with the incident reporting requirements of other federal and state government agencies, and if not, how should our proposal be harmonized to be more consistent with those requirements? 81. We seek comment on the kinds of information that should be included in reports of unauthorized access. We propose that reports include, to the extent it is applicable and available at the time of reporting, the date range of the incident, a description of the unauthorized access, the impact to the EAS Participant’s EAS operational readiness, a description of the vulnerabilities exploited and the techniques used to access the device, identifying information for each actor responsible for the incident, and contact information for the EAS Participant. We believe this information is necessary to understand the unauthorized access incident, resolve it before the compromise is actually exploited to send a false alert, and harmonize our requirements with those of other federal agencies. We seek comment on the proposed content of these reports and whether it should be modified. We VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 propose that the contents of these reports be treated as presumptively confidential and only shared on a confidential basis with other Federal agencies and state government agencies that agree to protect them to the same extent and in the same manner as the Commission would and, to the extent that the policies or regulations of those agencies are stricter, to the same extent and in the same manner as they would if they had collected the information themselves. We also propose to allow disclosure by the Commission, or by parties with whom the Commission has shared the notifications, of anonymized information about breaches that might be useful for industry, security researchers, policymakers, and the general public. We seek comment on this approach to cyber incident information sharing. 82. We seek comment on how these reports should be submitted to the Commission. Should they be submitted to the FCC Operation Center by email, in similar fashion to the false alert reports that EAS Participants are already required to file with the Commission? Should these reports be submitted in NORS to better capture the required contents in clearly defined fields and more easily facilitate sharing with federal partners? Or should we develop a new electronic database to collect the content of the reports? Are there other approaches we should consider? What are the costs and benefits associated with each approach? We seek comment on whether Participating CMS Providers should also be required to report incidents of unauthorized access to their WEA systems, or services. Similar to EAS, we believe that such a requirement would allow the Commission and its government partners to better identify and evaluate risks posed to EAS and inform further measures that might be necessary to secure WEA. Should reports be required in the same timeframe and with the same content as proposed for EAS? Are there any differences between EAS and WEA that would warrant differing unauthorized access reporting requirements for WEA? If so, what are those differences and how should the requirements be modified to reflect them? C. Protecting the Nation’s Alerting Systems Through the Development, Implementation, and Certification of a Cybersecurity Risk Management Plan 1. EAS Security 83. As discussed above, the EAS has faced cybersecurity risks for more than a decade, with PSHSB regularly advising EAS Participants to follow PO 00000 Frm 00021 Fmt 4702 Sfmt 4702 71551 cybersecurity best practices and take other steps to improve their cybersecurity posture. Despite these admonitions, however, we have not observed meaningful security improvements. For example, PSHSB has frequently advised EAS Participants to update their EAS software to ensure that they have installed the most recent security patches, including one such round of outreach in 2020 after the discovery that certain EAS equipment was potentially vulnerable to IP-based attacks. However, in filings related to the Nationwide EAS Test in August 2021, the Bureau observed that more than 5,000 EAS Participants were using outdated software or using equipment that no longer supported regular software updates. In light of these failures, we believe the Commission should take action to ensure the security of EAS. 84. We propose to require EAS Participants to submit an annual certification attesting that they have created, updated, and implemented a cybersecurity risk management plan. The cybersecurity risk management plan would describe how the EAS Participant employs their organizational resources and processes to ensure the confidentiality, integrity, and availability of the EAS. The plan must discuss how the EAS Participant identifies the cyber risks that they face, the controls they use to mitigate those risks, and how they ensure that these controls are applied effectively to their operations. We believe that this certification requirement would improve the overall security of EAS by ensuring that EAS Participants are regularly taking steps to address security threats as part of their organization’s day-to-day strategic and operational planning. We also believe the creation and implementation of cybersecurity risk management plans would help to ensure EAS operational readiness and eliminate false alerts, which divert public safety and other government resources from other important activities, impose costs on EAS Participants that have to deal with many of the consequences and, ultimately, desensitize the public to legitimate alerts. We seek comment on this proposal. Do stakeholders agree this proposal would improve the security of the EAS? Are there other benefits that may accrue from the creation and implementation of cybersecurity risk management plans by EAS Participants? Is an annual certification the right frequency with which to file certifications, or are there circumstances E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71552 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules where more (or less) frequent filings might be necessary? 85. We propose to afford each EAS Participant flexibility to structure its plan in a manner that is tailored to its organization, provided that the plan demonstrate that the EAS Participant is taking affirmative steps to analyze security risks and improve its security posture. While we believe there are many ways for EAS Participants to satisfy this requirement, we propose that EAS Participants can successfully demonstrate that they have satisfied this requirement by structuring their plans to follow an established risk management framework, such as the National Institute of Standards and Technology (NIST) Risk Management Framework or the NIST Cybersecurity Framework. We believe this flexible approach would allow EAS Participants to develop a plan that is appropriate for their organization’s size and available resources, while still ensuring that the plan results in ongoing and material improvements in EAS security. We also anticipate that this requirement would reduce the costs imposed on smaller EAS Participants, which may have different cybersecurity needs than larger EAS Participants. We seek comment on this proposal. Alternatively, should we require EAS Participants to structure their plans to follow the NIST Risk Management Framework or the NIST Cybersecurity Framework? If so, should we require EAS Participants to follow the current version of each framework (i.e., Risk Management Framework for Information Systems and Organizations, NIST Special Publication 800–37, Revision 2; NIST Cybersecurity Framework V1.1)? If we take this approach, we anticipate that NIST may one day release updated versions of these frameworks, and we would then expect to seek notice and comment on whether we should require EAS Participants to follow the updated versions. We seek comment on this approach. 86. We propose that each cybersecurity risk management framework include security controls sufficient to ensure the confidentiality, integrity, and availability (CIA) of the EAS. We expect that reasonable security measures will include measures that are commonly the subject of best practices. While we believe there are potentially many ways for EAS Participants to satisfy this aspect of the requirement, we propose that EAS Participants will have satisfied it if they demonstrate they have successfully implemented an established set of cybersecurity best practices, such as applicable CIS Critical Security Controls or the CISA VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 Cybersecurity Baseline. To ensure that every EAS Participant implements a baseline of security controls, however, we propose to require that each plan include security measures that address changing default passwords prior to operation, installing security updates in a timely manner, securing equipment behind properly configured firewalls or using other segmentation practices, requiring multifactor authentication where applicable, addressing the replacement of end-of-life equipment, and wiping, clearing, or encrypting user information before disposing of old devices. We expect that compliant cybersecurity risk management plans will not be limited to only these specific measures, as plans will vary based on individual providers’ needs and circumstances and will need regular updates to keep up with an evolving threat environment. We seek comment on these proposed rules. Are there other specific security measures that we should require EAS Participants to implement? For example, should we require EAS Participants to conduct network security audits or vulnerability assessments to identify potential security vulnerabilities? If so, how often should they be conducted? Should we require EAS Participants to report to the Commission when their network audits, network vulnerability assessments, or penetration testing reports reveal critical vulnerabilities? If so, how should we define a ‘‘critical vulnerability’’ for this purpose? Should we require EAS Participants to implement Incident Response Plans that describe how the procedures that EAS Participants would follow when respond to an ongoing cybersecurity incident? Should we require EAS Participants to conduct cybersecurity training for their employees or contractors and if so, what should the contents of that training be? What kinds of security measures have EAS Participants already implemented to protect the EAS, and how effective are they at mitigating cybersecurity risks? Should we require EAS Participants to keep records that demonstrate how they have implemented each of the baseline security controls? If so, what specific types of information should the records include and for how long should they be kept? Have EAS Participants identified unsuccessful attempts to access their systems, and if so, what specific security measures best thwarted those attempts? 87. Does this approach strike the appropriate balance between improving EAS security, complementing EAS Participants’ existing cybersecurity PO 00000 Frm 00022 Fmt 4702 Sfmt 4702 activities, and reducing burdens on small EAS Participants? If not, how should this requirement be modified to achieve that balance? We seek comment on whether this approach grants too much flexibility and will not result in improvements to EAS security. We also seek comment on alternative approaches that would be effective at improving EAS security. For example, should we require EAS Participants to address a specified list of cybersecurity subject matters in their risk management plans? Instead of requiring the use of a risk management plan, should we require EAS Participants to take specific steps to secure their EAS equipment? If so, could such a requirement be drafted in a way to encourage EAS Participants to continually examine and improve their cybersecurity posture, rather than merely check items off a list? Is our proposed certification requirement too burdensome on small EAS Participants? If so, what would be a more costeffective way to promote EAS security for small EAS Participants? 88. We observe that protecting EAS equipment alone is unlikely to be sufficient to protect the EAS from a cyber attack. In addition to the risk of a bad actor sending a false alert, a bad actor could attack other elements of an EAS Participant’s systems or service as a way to prevent a legitimate alert with lifesaving information from reaching the public. For this reason, we propose to require that the cybersecurity risk management plan address not only the security of EAS equipment, but also the security of all aspects of an EAS Participant’s communications systems and services that potentially could affect their provision of EAS. We seek comment on this requirement. Are there alternative requirements that we should consider to ensure that bad actors cannot prevent the transmission of legitimate alerts (or engage in the transmission of false ones)? 89. We seek comment on whether there are industry groups, cybersecurity organizations, or other organizations that may be positioned to help EAS Participants create, implement, and maintain their cybersecurity risk management plan. What kinds of resources do these organizations offer, and how can EAS Participants make use of them? For example, are there organizations that offer, or that would be able to begin offering, authoritative sources of cybersecurity information and expertise? Are there organizations that can support EAS Participants by offering cybersecurity training, risk management plan templates, or otherwise promote the cybersecurity? If so, to what extent can these E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules organizations help reduce the burdens related to the proposed certification requirement and make EAS more secure? 90. We propose that EAS Participants certify to creating, annually updating, and implementing a cybersecurity risk management plan by checking a box as part of its annual filing of EAS Test Reporting System Form One. We seek comment on whether this is the most efficient way to implement a certification requirement for EAS Participants. If not, how should the certification be implemented? While the Commission does not intend to review each individual plan for sufficiency, we propose that the cybersecurity risk management plan be made available to the Commission upon request so that the Commission may review a specific plan as needed or proactively review a sample of EAS Participants’ plans to ensure that they are sufficient to ensure the confidentiality, integrity, and availability of the EAS. In such circumstances, cybersecurity risk management plans would be treated as presumptively confidential. We propose to delegate to the Bureau the authority to request review of such cybersecurity risk management plans and to evaluate them for sufficiency. We seek comment on this approach to evaluating plans. For how long we should require EAS Participants to retain prior versions of their cybersecurity risk management plans to enable the Bureau’s review? 91. We propose that the filing of, and subsequent compliance with, a cybersecurity risk management plan would not serve as a safe harbor or excuse or any other diminishment of responsibility for negligent security practices. We believe that allowing the filing of and compliance with a plan to have such an effect could create a perverse incentive. EAS Participants must remain constantly vigilant in preventing intrusions and can only satisfy that responsibility by acting reasonably in all circumstances. Any negligence in protecting the confidentially, integrity, and availability of EAS that results in transmission of false alerts or non-transmission of valid EAS messages would establish a violation of that duty, regardless of the content of the plan. Furthermore, we propose that an EAS Participant’s failure to sufficiently develop or implement their plan, would be treated as a violation of the proposed rules. We seek comment on the criteria or indicia that we should consider when determining whether a plan is insufficient to mitigate cyber risk. We also seek comment on any measures that the Commission should take to verify VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 whether EAS Participants have implemented of their plans. 92. We believe that the benefits of this proposal outweigh the costs. While we believe that it is impossible to quantify the precise dollar value of improvements to the public’s safety, life, and health, as a general matter, we nonetheless believe that very substantial public safety benefits will result from the rules we propose today: EAS will be better able to ensure that real alerts with lifesaving information are successfully delivered to the public and false alerts are prevented in order to preserve public trust and better ensure that the public takes appropriate action during real emergencies. As a consequence, we anticipate that the rule changes we adopt today will yield substantial lifesaving benefits. Independent of that analysis, the Commission has previously found that ‘‘a foreign adversary’s access to American communications networks could result in hostile actions to disrupt and surveil our communications networks, impacting our nation’s economy generally and online commerce specifically, and result in the breach of confidential data.’’ Consistent with the Commission’s past analysis, our national gross domestic product was nearly $23 trillion last year, adjusting for inflation. Accordingly, if creating and implementing a cybersecurity risk management plan prevents even a 0.005% disruption to our economy, we believe our proposed requirement would generate $1.15 billion in benefits. Likewise, the digital economy accounted for $3.31 trillion of our economy in 2020, and so we believe preventing a disruption of even 0.05% would produce benefits of $1.66 billion. As a check on our analysis, consider the impact of existing malicious cyber activity on the U.S. economy: $57 billion to $109 billion in 2016. Given the incentives and documented actions of hostile nation-state actors, reducing this activity (or preventing an expansion of such damage) by even 1% would produce benefits of $0.57 billion to $1.09 billion. Given this analysis, we believe the benefits of our rule to the American economy, commerce, and consumers are likely to significantly and substantially outweigh the costs of the proposed certification requirement. We seek comment on this analysis. Is there a more appropriate way to quantify these benefits? Are there any additional ways in which the proposed rules would benefit the public that the Commission should consider? 93. We estimate that the overall cost of our proposed cybersecurity risk management plan requirement will be PO 00000 Frm 00023 Fmt 4702 Sfmt 4702 71553 approximately $21 million. We believe that EAS Participants will, on average, require 10 hours annually to initially draft a plan and then update the plan and submit their certification annually. When developing this average we anticipate that many large EAS Participants already have cybersecurity risk management plans and will incur only de minimis costs to comply with this requirement. We also anticipate that many small EAS Participants will require less than 10 hours to develop or update a plan that is appropriate to the size of their organization. Based on this estimate, we believe that the overall cost for 25,644 EAS Participants to comply with the proposed certification requirement with 10 hours of labor from a General and Operations Manager who is compensated at $82 per hour will be $21,028,080. We seek comment on our analysis. 2. WEA Security 94. We propose to require Participating CMS Providers to certify that they are creating, annually updating, and implementing a cybersecurity risk management plan. As discussed above, WEA also faces security risks related to the transmission of false alerts and compromise of a Participating CMS Providers’ systems could disrupt the transmission of a legitimate WEA message. Are there additional cybersecurity risks to WEA about which we should be aware? To what extent do Participating CMS Providers already have cybersecurity risk management plans? We believe that the approach we propose above in the context of EAS—wherein we would afford flexibility for providers to assess what content should be in their cybersecurity risk management plans while proposing that it demonstrate how the provider identifies the cyber risks that they face, the controls they use to mitigate those risks, and how they ensure that these controls are applied effectively to their operations— lends itself to WEA as well. We seek comment on this tentative conclusion. Are there any fundamental differences in the transmission of WEA alerts or the threats that WEA faces that would require a different approach to ensuring WEA’s security? We seek comment on the least burdensome means by which Participating CMS Providers could submit their certification to the Commission, including via the Commission’s Electronic Comment Filing System, a designated Commission email address, or a WEA-specific database designed for this purpose. 95. As with the EAS, we propose that a cybersecurity risk management plan E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71554 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules should include security controls sufficient to ensure the confidentiality, integrity, and availability of WEA. We propose sufficient security measures could be demonstrated by implementing controls like the CISA Cybersecurity Baseline or appropriate CIS Implementation Group. As with EAS Participants as described above we propose to require that each plan include a baseline of security measures that address changing default passwords prior to operation, installing security updates in a timely manner, securing equipment behind properly configured firewalls or using other segmentation practices, requiring multifactor authentication where applicable, addressing the replacement of end-oflife equipment, and wiping, clearing, or encrypting user information before disposing of old devices. We expect that compliant cybersecurity risk management plans will not be limited to only these specific measures, as plans will need regular updates to keep up with an evolving threat environment. We seek comment on these proposed rules. Are there specific security measures that we should require Participating CMS Providers to implement? For example, as above, we seek comment on whether we should require Participating CMS Providers to conduct network security audits or vulnerability assessments to identify potential security vulnerabilities, implement Incident Response Plans that describe the procedures that Participating CMS Providers would follow when responding to an ongoing cybersecurity incident, or require Participating CMS Providers to conduct cybersecurity training for their employees or contractors. 96. We believe that the benefits of this proposal for WEA outweighs the costs. As discussed above for EAS, we believe that the rules we propose today would better ensure that real WEA alerts with lifesaving information are successfully delivered to the public and false alerts are prevented in order to preserve public trust and better ensure that the public takes appropriate action during real emergencies. We estimate that the overall cost of our proposed cybersecurity risk management plan requirement will be approximately $62,320. We anticipate that many large Participating CMS Providers already have cybersecurity risk management plans and will incur only de minimis costs to comply with this requirement. We also anticipate that many small Participating CMS Providers will require less than 10 hours to develop or update a plan that is appropriate to the VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 size of their organization. Based on this estimate, we believe that the overall cost for 76 Participating CMS Providers to comply with the proposed certification requirement with 10 hours of labor from a General and Operations Manager who is compensated at $82 per hour will be $62,320. We seek comment on this analysis. To what extent do Participating CMS Providers already implement a cybersecurity risk management framework? Are there alternatives that would be as effective but less burdensome, particularly to smaller providers? As with EAS above, we seek comment on whether there are industry groups, cybersecurity organizations, or other organizations that may be positioned to help Participating CMS providers create, implement, and maintain their cybersecurity risk management plans. What kinds of resources do these organizations offer, and how can Participating CMS providers make use of them? 97. We seek comment on whether there are other categories of communications service providers (e.g., services that support 911 calling) to which a cybersecurity risk management plan certification requirement should apply. Like emergency alerting, 911 is part of the nation’s emergency services critical infrastructure. Similarly, like the nation’s alert and warning capability, 911 service has faced instances of compromise by cyberattacks, and is regularly under threat. In light of those threats, should services that support 911 calling also be required to annually certify to creating, updating, and implementing cybersecurity risk management plans? If so, are there differences between emergency alerting and 911 that would warrant changes to the risk management plan requirements we propose today, if applied to services that support 911 calling? Are the benefits and costs of such a requirement commensurate with the benefits and costs of certification as described above? D. Displaying Only Valid WEA Messages on Mobile Devices 98. False alerts, such as the false ballistic missile alert that the Hawaii Emergency Management Agency accidentally sent during a training exercise in 2018, can cause panic, confusion, and damage the credibility of WEA. While that false alert was sent accidentally, bad actors could potentially exploit known WEA vulnerabilities to intentionally send false alerts to the public. The Commission’s rules require Participating CMS Providers’ network infrastructure to authenticate PO 00000 Frm 00024 Fmt 4702 Sfmt 4702 interactions with mobile devices and require mobile devices to authenticate interactions with CMS Provider infrastructure. In practice, however, the security handshake between Participating CMS Providers and mobile devices does not include a process for mobile devices to ensure that the base station to which it attaches is valid. As a result, mobile devices that are not actively engaged with a valid base station are vulnerable to receiving and presenting false alerts. This threat exists when a mobile device attempts authentication with the provider, switches base stations, or returns to active from idle mode. 99. Accordingly, we propose to require Participating CMS Providers transmit sufficient authentication information to allow mobile devices to present WEA alerts only if they come from valid base stations. Ongoing work in international standards bodies suggests that Participating CMS Providers could achieve this outcome by transmitting sufficient authentication information to allow mobile devices to authenticate either the alert or the base station itself. For example, Participating CMS Providers could provide for authentication of the base station using a unique identifier or an encryption key. To what extent do Participating CMS Providers already uniquely identify legitimate base stations with a selection of base station characteristics to defend against denial-of-service attacks and fraud (i.e., through base station fingerprinting)? Could Participating CMS Providers leverage base station fingerprinting to protect the public from false WEA alerts through updates to WEA standards and mobile device firmware? Alternatively, or in addition, could WEA-capable mobile devices receive an appropriate encryption key from the network and then use that key to confirm either that an alert is authentic or that the base station transmitting it is authentic before presenting the alert? Should our rules prohibit CMS Providers and equipment manufacturers from marketing devices as WEA-capable unless they have these technical capabilities? 100. We seek comment on the tradeoffs attendant to available technological approaches to protecting the public from false alerts. Could implementation of these approaches affect the ability of non-service initialized WEA-capable mobile devices, SIM-less WEA-capable mobile devices, or mobile devices that are no longer contractually associated with a CMS Provider to receive WEA alerts depending on the handset technology or generation of wireless network used? If so, how could the E:\FR\FM\23NOP1.SGM 23NOP1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 Commission mitigate these potential drawbacks by refining its proposed rules? To the extent that technological solutions have been implemented, is it still possible for a false alert of this type to be displayed on mobile devices, and if so, under what conditions? What steps could be taken to further minimize or eliminate these kinds of false alerts? 101. We estimate that Participating CMS Providers would incur a $14.5 million one-time cost to update the WEA standards and software necessary to comply with this requirement. This figure consists of approximately a $814,000 cost to update applicable WEA standards and approximately a $13.7 million cost to update applicable software. We quantify the cost of modifying standards as the annual compensation for 30 network engineers compensated at the national average for their field ($120,650/year; $58/hour), plus annual benefits ($60,325/year; 29/ hour) working for the amount of time that it takes to develop a standard (one hour every other week for one year, 26 hours) for 12 distinct standards. We quantify the cost of modifying software as the annual compensation for a software developer compensated at the national average for their field ($120,990/year), plus annual benefits ($60,495/year) working for the amount of time that it takes to develop software (one year) at each of the 76 CMS Providers that participate in WEA. We seek comment on these cost estimates and the underlying cost methodology we are using. We also seek comment on any other costs and benefits that would result from this proposal. Incidents of false WEA alerts can cause significant confusion and diminish the public’s trust in emergency alerts. For example, what harms could arise if an invalid base station sends a false alert to attendees to a public event, such as a parade or sporting event? For each technological approach considered, we urge commenters to address its effectiveness and cost of implementation, any additional latency that the measure could introduce into the delivery of WEA alerts, and the potential for the security measure to result in the suppression of legitimate alert content. E. WEA Infrastructure Functionality 102. Pursuant to the WARN Act, CMS Providers’ participation in WEA is voluntary, but CMS Providers that elect to participate in WEA must comply with all the WEA rules. The WEA rules provide that WEA functionality, both in Participating CMS Providers’ networks and in mobile devices, ‘‘are dependent upon the capabilities of the delivery VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 technologies implemented by a Participating CMS Provider’’ and certain WEA protocols ‘‘are defined and controlled by each Participating CMS Provider.’’ The inclusion of these statements may create the mistaken impression that Participating CMS Providers’ compliance with the rules that follow, including the base station authentication rules we propose today, would be conditioned on the Participating CMS Providers’ delivery technology. Emergency management agencies expect WEA to work as intended and when needed, and this language unintentionally could create uncertainties about the quality of WEA service that Participating CMS Providers offer. For these reasons, the Commission proposed to remove this language from the WEA rules in 2016. T-Mobile, ATIS, and CTIA, the only three commenters addressing this proposal, urged the Commission not to adopt it because ‘‘the rules should maximize the technological flexibility of CMS Providers participating in WEA.’’ In the ten years since WEA’s deployment, however, Participating CMS Providers have coalesced around cell broadcast as the wireless technology used to transmit WEA alerts to capable mobile devices, and ATIS has standardized system performance. 103. Accordingly, we seek to refresh the record on our proposal to remove these statements from the WEA rules. We believe these provisions introduce confusion and are unnecessary, particularly as we do not expect that any Participating CMS Provider would need to make changes to their WEA service as a result of this proposed amendment. We seek comment on this proposal, particularly from any CMS Provider that would need to make changes to their WEA offerings in the event that the rules were so amended. F. Promoting Digital Equity 104. The Commission, as part of its continuing effort to advance digital equity for all, including people of color, persons with disabilities, persons who live in rural or Tribal areas, and others who are or have been historically underserved, marginalized, or adversely affected by persistent poverty or inequality, invites comment on any equity-related considerations and benefits (if any) that may be associated with the proposals and issues discussed herein. Specifically, we seek comment on how our proposals may promote or inhibit advances in diversity, equity, inclusion, and accessibility, as well the scope of the Commission’s relevant legal authority. PO 00000 Frm 00025 Fmt 4702 Sfmt 4702 71555 G. Compliance Timeframes 105. Promoting the Operational Readiness of EAS Equipment. To the extent that we adopt requirements to improve the operational readiness of EAS, we seek comment on when those rules should go into effect. For example, if we were to adopt rules to hasten or improve the Commission’s visibility into the repair or replacement of nonoperational EAS equipment, should those rules go into effect 30 days from publication in the Federal Register of notice that the Office of Management and Budget has completed its review of the modified information collection? What factors should we consider when determining when alternative operational readiness requirements should go into effect? 106. Improving Awareness of Unauthorized Access to EAS Equipment. We propose that the revision of § 11.45 to require EAS Participants to report any incident of unauthorized access of their EAS equipment would be effective 60 days from publication in the Federal Register of notice that the Office of Management and Budget has completed its review of the modified information collection. We seek comment on this proposed timeframe. In the NDAA21 R&O, the Commission required EAS Participants to report false alerts to the Commission and, in a subsequent Public Notice, announced a compliance deadline approximately 60 days from publication in the Federal Register of notice that the Office of Management and Budget has approved the modified information collection. We seek comment on whether an EAS Participant’s process for ascertaining whether an incident of unauthorized access of its EAS equipment has occurred and reporting it to the Commission entails a level of effort comparable to compliance with the Commission’s false alert reporting requirement. Would EAS Participants’ compliance with the Commission’s false alert reporting requirement reduce the incremental burden of compliance with this proposal? 107. Certifying to the Implementation of Cybersecurity Risk Management Plans. We propose that EAS Participants and Participating CMS Providers must certify to the implementation of a cybersecurity risk management plan that includes measures sufficient to ensure the confidentiality, integrity, and reliability of their respective alerting systems within 12 months of the publication in the Federal Register of notice that the Office of Management and Budget has completed its review of the modified information collection. A E:\FR\FM\23NOP1.SGM 23NOP1 lotter on DSK11XQN23PROD with PROPOSALS1 71556 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules 12-month timeframe would be intended to provide time for EAS Participants that do not already have a risk management plan in place to create one, including by preparing the organization to manage security and privacy risks, categorizing the systems and the information that it processes, stores, and transmits, and selecting controls to protect the system. A 12-month timeframe could also provide time to implement the security controls that the plan describes, assess whether the controls are in place, operating as intended, and producing the desired results, appoint a senior official to authorize the system, and develop mechanisms to continuously monitor control implementation and risks to the system. We seek comment on these proposals. Should we offer EAS Participants and Participating CMS Providers who are small businesses an additional 12 months to comply with this requirement, with compliance required within 24 months of publication in the Federal Register of notice that the Office of Management and Budget has completed its review of the modified information collection? Is there any reason why EAS and Participating CMS Providers should have different implementation timeframes? 108. Displaying Only Valid WEA Messages on Mobile Devices. We propose that CMS Providers transmit sufficient authentication information to allow mobile devices to present WEA alerts only if they come from valid base stations 30 months from the publication of these rules in the Federal Register. The record in our WEA proceedings supports the premise that Participating CMS Providers require 12 months to work through appropriate industry bodies to publish relevant standards, another 12 months for Participating CMS Providers and mobile device manufacturers to develop, test, and integrate software upgrades consistent with those standards, and then 6 more months to deploy this new technology to the field during normal technology refresh cycles. We seek comment on the applicability of this approach and timeframe, with which Participating CMS Providers have experience, to this proposal. We seek comment, in the alternative, on whether the urgent public safety need to protect the public from false alerts necessitates an expedited compliance timeframe and, if so, what that compliance timeframe should be. 109. WEA Infrastructure Functionality. We propose to remove language from our WEA infrastructure and mobile device rules effective 30 VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 days after the rules’ publication in the Federal Register. We do not believe that Participating CMS Providers will need to make any changes to comply with these rules as revised because they offer a WEA service that is consistent with the rules as otherwise written. We seek comment on this compliance timeframe and on this view. III. Ordering Clauses 110. Accordingly, it is ordered that pursuant to sections 1, 2, 4(i), 4(n), 301, 303(b), 303(g), 303(r), 303(v), 307, 309, 335, 403, 624(g), and 706 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 154(n), 301, 303(b), 303(g), 303(r), 303(v), 307, 309, 335, 403, 544(g), and 606; The Warning, Alert and Response Network (WARN) Act, WARN Act sections 602(a), (b), (c), (f), 603, 604, and 606, 47 U.S.C. 1202(a), (b), (c), (f), 1203, 1204 and 1206; the Wireless Communications and Public Safety Act of 1999, Public Law 106–81, 47 U.S.C. 615, 615a, 615b; Section 202 of the Twenty-First Century Communications and Video Accessibility Act of 2010, as amended, 47 U.S.C. 613, this Notice of Proposed Rulemaking is hereby ADOPTED. List of Subjects 47 CFR Part 10 Communications common carriers, Radio. 47 CFR Part 11 Radio, Television. Federal Communications Commission Marlene Dortch, Secretary. Proposed Rules For the reasons discussed in this preamble, the Federal Communications Commission proposes to amend 47 CFR parts 10 and 11 as follows: PART 10—WIRELESS EMERGENCY ALERTS 1. The authority citation for part 10 continues to read as follows: ■ Authority: 47 U.S.C. 151, 154(i) and (o), 201, 303(r), 403, and 606, 1202(a), (b), (c), (f), 1203, 1204, and 1206. ■ 2. Revise § 10.330 to read as follows: § 10.330 Provider infrastructure requirements. This section specifies the general functions that a Participating CMS Provider is required to perform within its infrastructure. (a) Distribution of Alert Messages to mobile devices. PO 00000 Frm 00026 Fmt 4702 Sfmt 4702 (b) Authentication of interactions with mobile devices, including the transmission of sufficient authentication information to allow mobile devices to only present WEA alerts from valid base stations. (c) Reference Points D & E. Reference Point D is the interface between a CMS Provider gateway and its infrastructure. Reference Point E is the interface between a provider’s infrastructure and mobile devices including air interfaces. ■ 3. Add § 10.360 to subpart C to read as follows: § 10.360 Cybersecurity Risk Management Plan Certification. (a) Each participating CMS Provider shall submit a certification to the Commission that it has created, annually updated, and implemented a cybersecurity risk management plan. The cybersecurity risk management plan shall describe how the Participating CMS Provider employs its organizational resources and processes to ensure the confidentiality, integrity, and availability of WEA. The plan shall discuss how the Participating CMS Provider identifies the cyber risks that it faces, the controls it uses to mitigate those risks, and how it ensures that these controls are applied effectively to its operations. The plan shall address the security of all aspects of the Participating CMS Provider’s communications systems and services that potentially could affect its provision of WEA messages. The plan shall be made available to the Commission upon request. (b) Participating CMS Providers shall employ sufficient security controls to ensure the confidentially, integrity, and availability of the EAS. In furtherance of this requirement, the cybersecurity risk management plan shall address, but not be limited to, the following security controls: (1) Changing default passwords prior to operation; (2) Installing security updates in a timely manner; (3) Securing equipment behind properly configured firewalls or using other segmentation practices; (4) Requiring multifactor authentication where applicable; (5) Addressing the replacement of end-of-life equipment; and (6) Wiping, clearing, or encrypting user information before disposing of old devices. (c) Participating CMS Providers shall take reasonable measures to protect the confidentiality, integrity, and availability of EAS to avoid the transmission of false alerts or nontransmission of valid Alert Messages; E:\FR\FM\23NOP1.SGM 23NOP1 Federal Register / Vol. 87, No. 225 / Wednesday, November 23, 2022 / Proposed Rules failure to do so shall be, in addition to a violation of any specific provisions of this section, § 11.45(a) of this chapter, or § 10.520(d), an independent breach of this duty. ■ 4. Revise § 10.500 introductory text as follows: § 10.500 General requirements. Mobile devices are required to perform the following functions: * * * * * PART 11—EMERGENCY ALERT SYSTEM (EAS) 5. The authority citation for part 11 continues to read as follows: ■ Authority: 47 U.S.C. 151, 154 (i) and (o), 303(r), 544(g), 606, 1201, 1206. 6. Amend § 11.35 by adding paragraph (d) to read as follows: ■ § 11.35 Equipment operational readiness. lotter on DSK11XQN23PROD with PROPOSALS1 * * * * * (d) Annual EAS Security Certification. (1) The identifying information required by the ETRS as specified in § 11.61(a)(3)(iv) shall include a Certification to the Commission that the EAS Participant has created, annually updated, and implemented a cybersecurity risk management plan. The cybersecurity risk management plan shall describe how the EAS Participant employs its organizational resources and processes to ensure the confidentiality, integrity, and availability of the EAS. The plan shall discuss how the EAS Participant identifies the cyber risks that its faces, the controls it uses to mitigate those risks, and how it ensures that these controls are applied effectively to their operations. The plan shall address the security of all aspects of an EAS Participant’s communications systems and services that potentially could affect its provision of EAS messages. The plan shall be made available to the Commission upon request. (2) EAS Participants shall employ sufficient security controls to ensure the confidentially, integrity, and availability of the EAS. In furtherance of this requirement, the cybersecurity risk management plan shall address, but not be limited to, the following security controls: (i) Changing default passwords prior to operation; (ii) Installing security updates in a timely manner; (iii) Securing equipment behind properly configured firewalls or using other segmentation practices; (iv) Requiring multifactor authentication where applicable; VerDate Sep<11>2014 16:27 Nov 22, 2022 Jkt 259001 (v) Addressing the replacement of end-of-life equipment; and (vi) Wiping, clearing, or encrypting user information before disposing of old devices. (3) EAS Participants shall take reasonable measures to protect the confidentiality, integrity, and availability of EAS to avoid the transmission of false alerts or nontransmission of valid EAS messages; failure to do so shall be, in addition to a violation of any specific provisions of this section, § 11.45(a), or § 10.520(d) of this chapter, an independent breach of this duty. ■ 7. Amend § 11.45 by redesignating paragraph (c) as paragraph (d) and adding a new paragraph (c) to read as follows: § 11.45 Prohibition of false or deceptive EAS transmissions. * * * * * (c) No later than seventy-two (72) hours after an EAS Participant knows or should have known that its EAS equipment, or communications systems, or services that potentially could affect their provision of EAS, have been accessed in an unauthorized manner, the EAS Participant shall provide notification to the Commission identifying, if applicable, the date range of the incident, a description of the unauthorized access, the impact to the EAS Participant’s EAS operational readiness, a description of the vulnerabilities exploited and the techniques used to access the device, identifying information for each actor responsible for the incident, and contact information for the EAS Participant. When one event or set of events gives rise to obligations under both paragraphs (b) and (c) of this section, an EAS Participant remains subject to each requirement individually. The Participant may elect to send a single notification to the Commission within 24 hours providing all the information described in both paragraphs or separate notification to the Commission within 24 hours and 72 hours. * * * * * [FR Doc. 2022–25263 Filed 11–22–22; 8:45 am] BILLING CODE 6712–01–P PO 00000 Frm 00027 Fmt 4702 Sfmt 4702 71557 DEPARTMENT OF THE INTERIOR Fish and Wildlife Service 50 CFR Part 17 [Docket No. FWS–R6–ES–2012–0107; FF09E21000 FXES11110900000 234] Endangered and Threatened Wildlife and Plants; Request for New Information for the North American Wolverine Species Status Assessment Fish and Wildlife Service, Interior. ACTION: Request for new information. AGENCY: We, the U.S. Fish and Wildlife Service (Service), notify the public that we are requesting new information to update the Species Status Assessment (SSA) for the North American Wolverine (Gulo gulo luscus) occurring in the contiguous United States to make a final determination whether to list this species under the Endangered Species Act of 1973, as amended (Act). As a result of court action, the wolverine is now proposed for listing as a threatened species under the Act. The Service is updating the 2018 SSA and will reevaluate whether the North American wolverine occurring in the contiguous United States is a distinct population segment and, if so, whether the distinct population segment meets the definition of an endangered or threatened species under the Act. We now request new information regarding the North American wolverine to inform our SSA update and reevaluation under the Act. As directed by the court, the Service is to make a final listing determination by the end of November 2023. DATES: In order to fully consider and incorporate new information, the Service requests submittal of new information by close of business December 23, 2022. Information submitted electronically using the Federal eRulemaking Portal (see ADDRESSES, below) must be received by 11:59 p.m. eastern time on the closing date. ADDRESSES: Document availability: You may obtain copies of the 2013 proposed rule, the 2018 SSA report, and other supporting documents on the internet at https://ecos.fws.gov/ecp/species/5123 or at https://www.regulations.gov at Docket No. FWS–R6–ES–2012–0107 or by mail or email from the Region 1 Ecological Services Regional Office (see FOR FURTHER INFORMATION CONTACT). Submission of information: You may submit written information by one of the following methods: SUMMARY: E:\FR\FM\23NOP1.SGM 23NOP1

Agencies

[Federal Register Volume 87, Number 225 (Wednesday, November 23, 2022)]
[Proposed Rules]
[Pages 71539-71557]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-25263]


=======================================================================
-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Parts 10 and 11

[PS Docket Nos. 15-94, 15-91, 22-329; FCC 22-82; FR ID 113410]


Emergency Alert System; Wireless Emergency Alerts; Protecting the 
Nation's Communications Systems From Cybersecurity Threats

AGENCY: Federal Communications Commission.

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: In this document, the Commission proposes requirements for 
Emergency Alert System (EAS) Participants to report compromises of 
their EAS equipment, communications systems, and services to the 
Commission. Additionally, this document proposes requirements for EAS 
Participants and Commercial Mobile Service (CMS) providers that 
participate in Wireless Emergency Alerts (WEA) to annually certify to 
having a cybersecurity risk management plan in place and to employ 
sufficient security measures to ensure the confidentiality, integrity, 
and availability of their respective alerting systems. This document 
also proposes requirements for participating CMS providers to take 
steps to ensure that only valid alerts are displayed on consumer 
devices. These requirements would further protect the nation's 
communications systems from cybersecurity threats. With this Notice of 
Proposed Rulemaking, the Commission seeks comment on the proposed rules 
and any suitable alternatives.

DATES: Comments are due on or before December 23, 2022 and reply 
comments are due on or before January 23, 2023.

ADDRESSES: You may submit comments, identified by PS Docket Nos. 15-94, 
15-91, and 22-329, by any of the following methods:
     Electronic Filers: Comments may be filed electronically 
using the internet by accessing the ECFS: https://apps.fcc.gov/ecfs/.
     Paper Filers: Parties who choose to file by paper must 
file an original and one copy of each filing.
    Filings can be sent by commercial overnight courier, or by first-
class or overnight U.S. Postal Service mail. All filings must be 
addressed to the Commission's Secretary, Office of the Secretary, 
Federal Communications Commission.
     Commercial overnight mail (other than U.S. Postal Service 
Express Mail and Priority Mail) must be sent to 9050 Junction Drive, 
Annapolis Junction, MD 20701.
     U.S. Postal Service first-class, Express, and Priority 
mail must be addressed to 45 L Street NE, Washington, DC 20554.

[[Page 71540]]

     Effective March 19, 2020, and until further notice, the 
Commission no longer accepts any hand or messenger delivered filings. 
This is a temporary measure taken to help protect the health and safety 
of individuals, and to mitigate the transmission of COVID-19. See FCC 
Announces Closure of FCC Headquarters Open Window and Change in Hand-
Delivery Policy, Public Notice, DA 20-304 (March 19, 2020). https://www.fcc.gov/document/fcc-closes-headquarters-open-window-and-changes-hand-delivery-policy.
    People with Disabilities. To request materials in accessible 
formats for people with disabilities (braille, large print, electronic 
files, audio format), send an email to [email protected] or call the 
Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-
418-0432 (tty).

FOR FURTHER INFORMATION CONTACT: For further information regarding 
Notice of Proposed Rulemaking, please contact James Wiley, 
Cybersecurity and Communications Reliability Division, Public Safety 
and Homeland Security Bureau, (202) 418-1678, or by email to 
[email protected], or Steven Carpenter, Cybersecurity and 
Communications Reliability Division, Public Safety and Homeland 
Security Bureau, (202) 418-2313, or by email to 
[email protected]. For additional information concerning the 
Paperwork Reduction Act information collection requirements contained 
in this document, send an email to [email protected] or contact Nicole 
Ongele, Office of Managing Director, Performance Evaluation and Records 
Management, 202-418-2991, or by email to [email protected].

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Notice 
of Proposed Rulemaking (NPRM), in PS Docket Nos. 15-94, 15-91, 22-329; 
FCC 22-82, adopted and released on October 27, 2022. The full text of 
this document is available by downloading the text from the 
Commission's website at: https://docs.fcc.gov/public/attachments/FCC-22-82A1.pdf.

Paperwork Reduction Act

    This Notice of Proposed Rulemaking (NPRM) seeks comment on 
potential new or revised proposed information collection requirements. 
If the Commission adopts any new or revised final information 
collection requirements when the final rules are adopted, the 
Commission will publish a notice in the Federal Register inviting 
further comments from the public on the final information collection 
requirements, as required by the Paperwork Reduction Act of 1995, 
Public Law 104-13 (44 U.S.C. 3501-3520). The Commission, as part of its 
continuing effort to reduce paperwork burdens, invites the general 
public and OMB to comment on the information collection requirements 
contained in this document, as required by the PRA. Public and agency 
comments on the PRA proposed information collection requirements are 
due January 23, 2023.
    Comments should address: (a) whether the proposed collection of 
information is necessary for the proper performance of the functions of 
the Commission, including whether the information shall have practical 
utility; (b) the accuracy of the Commission's burden estimates; (c) 
ways to enhance the quality, utility, and clarity of the information 
collected; (d) ways to minimize the burden of the collection of 
information on the respondents, including the use of automated 
collection techniques or other forms of information technology; and (e) 
way to further reduce the information collection burden on small 
business concerns with fewer than 25 employees. In addition, pursuant 
to the Small Business Paperwork Relief Act of 2002, Public Law 107-198, 
see 44 U.S.C. 3506(c)(4), we seek specific comment on how we might 
further reduce the information collection burden for small business 
concerns with fewer than 25 employees.

I. Initial Regulatory Flexibility Analysis

    1. As required by the Regulatory Flexibility Act of 1980, as 
amended (RFA), the Commission has prepared this Initial Regulatory 
Flexibility Analysis (IRFA) of the possible significant economic impact 
on a substantial number of small entities by the policies and rules 
proposed in the NPRM. Written public comments are requested on this 
IRFA. Comments must be identified as responses to the IRFA and must be 
filed by the deadlines for comments on the NPRM. The Commission will 
send a copy of the NPRM, including this IRFA, to the Chief Counsel for 
Advocacy of the Small Business Administration (SBA). In addition, the 
NPRM and IRFA (or summaries thereof) will be published in the Federal 
Register.

A. Need for, and Objectives of, the Proposed Rules

    2. The NPRM raises awareness concerning security of the nation's 
alert and warning systems is essential to helping safeguard the lives 
and property of all Americans. To ensure that the EAS and WEA remain 
strong, the Commission must act proactively in its oversight of 
stakeholders associated with these systems. The Commission has 
previously encouraged stakeholders to ensure that their systems are 
secure and provided guidance on specific steps that communications 
providers could take to secure their equipment. According to data 
collected by the Public Safety and Homeland Security Bureau (Bureau) 
during the nationwide EAS test in August 2021 however, more than 5,000 
EAS Participants were using outdated software or using equipment that 
no longer supported regular software updates. Moreover, in the area of 
equipment operational readiness, the test also revealed that an 
appreciable number of EAS Participants were unable to participate in 
testing due to equipment failure. This was despite receiving advanced 
notice that the test was going to be conducted. The Commission 
therefore believes the information revealed in the nationwide EAS test 
signals that we should take action to ensure and enhance the security 
of the EAS and WEA. In the NPRM, the Commission acts to improve the 
security and reliability of the EAS and WEA by proposing and seeking 
comment on rules promoting the operational readiness of EAS equipment, 
improving awareness of unauthorized access to EAS equipment, 
communications systems, or services, protecting the nation's alerting 
systems through the development, implementation, and certification of a 
cybersecurity risk management plan and displaying only valid WEA 
messages on mobile devices.
    3. The NPRM includes specific proposals upon which the Commission 
seeks comment include: requiring EAS Participants and Participating CMS 
Providers to annually certify to having a cybersecurity risk management 
plan in place and employing sufficient security controls to ensure the 
confidentiality, integrity, and availability of their respective 
alerting systems (including certain baseline security controls); 
requiring EAS Participants to report any incident of unauthorized 
access of their EAS equipment, communications systems, or services 
(i.e., regardless of whether that compromise has resulted in the 
transmission of a false alert) to the Commission via NORS within 72 
hours of when it knew or should have known that an incident has 
occurred, and provide details concerning the incident and requiring 
that mobile devices only present WEA alerts from valid base stations. 
In addition, the Commission seeks comment on whether and how to promote 
the operational readiness of EAS. The Commission also

[[Page 71541]]

seeks comment to refresh the record on previously proposed changes to 
the WEA infrastructure functionality rules, and on how our proposals in 
the NPRM may promote or inhibit advances in diversity, equity, 
inclusion, and accessibility, as well as on the scope of the 
Commission's relevant legal authority.

B. Legal Basis

    4. The proposed action is authorized pursuant to sections 1, 2, 
4(i), 4(n), 301, 303(b), 303(g), 303(r), 303(v), 307, 309, 335, 403, 
624(g), and 706 of the Communications Act of 1934, as amended, 47 
U.S.C. 151, 152, 154(i), 154(n), 301, 303(b), 303(g), 303(r), 303(v), 
307, 309, 335, 403, 544(g), and 606; The Warning, Alert and Response 
Network (WARN) Act, WARN Act sections 602(a), (b), (c), (f), 603, 604, 
and 606, 47 U.S.C. 1202(a),(b),(c), (f), 1203, 1204 and 1206; the 
Wireless Communications and Public Safety Act of 1999, Pub. L. 106-81, 
47 U.S.C. 615, 615a, 615b; Section 202 of the Twenty-First Century 
Communications and Video Accessibility Act of 2010, as amended, 47 
U.S.C. 613.

C. Description and Estimate of the Number of Small Entities to Which 
the Proposed Rules Will Apply

    5. The RFA directs agencies to provide a description of and, where 
feasible, an estimate of, the number of small entities that may be 
affected by the proposed rules, if adopted. The RFA generally defines 
the term ``small entity'' as having the same meaning as the terms 
``small business,'' ``small organization,'' and ``small governmental 
jurisdiction.'' In addition, the term ``small business'' has the same 
meaning as the term ``small business concern'' under the Small Business 
Act. A ``small business concern'' is one which: (1) is independently 
owned and operated; (2) is not dominant in its field of operation; and 
(3) satisfies any additional criteria established by the Small Business 
Administration (SBA).
    6. Small Businesses, Small Organizations, Small Governmental 
Jurisdictions. Our actions, over time, may affect small entities that 
are not easily categorized at present. We therefore describe here, at 
the outset, three broad groups of small entities that could be directly 
affected herein. First, while there are industry specific size 
standards for small businesses that are used in the regulatory 
flexibility analysis, according to data from the SBA's Office of 
Advocacy, in general a small business is an independent business having 
fewer than 500 employees. These types of small businesses represent 
99.9% of all businesses in the United States, which translates to 32.5 
million businesses.
    7. Next, the type of small entity described as a ``small 
organization'' is generally ``any not-for-profit enterprise which is 
independently owned and operated and is not dominant in its field.'' 
The Internal Revenue Service (IRS) uses a revenue benchmark of $50,000 
or less to delineate its annual electronic filing requirements for 
small exempt organizations. Nationwide, for tax year 2020, there were 
approximately 447,689 small exempt organizations in the U.S. reporting 
revenues of $50,000 or less according to the registration and tax data 
for exempt organizations available from the IRS.
    8. Finally, the small entity described as a ``small governmental 
jurisdiction'' is defined generally as ``governments of cities, 
counties, towns, townships, villages, school districts, or special 
districts, with a population of less than fifty thousand.'' U.S. Census 
Bureau data from the 2017 Census of Governments indicate that there 
were 90,075 local governmental jurisdictions consisting of general 
purpose governments and special purpose governments in the United 
States. Of this number there were 36,931 general purpose governments 
(county, municipal and town or township) with populations of less than 
50,000 and 12,040 special purpose governments--independent school 
districts with enrollment populations of less than 50,000. Accordingly, 
based on the 2017 U.S. Census of Governments data, we estimate that at 
least 48,971 entities fall into the category of ``small governmental 
jurisdictions.''
    9. Wireless Telecommunications Carriers (except Satellite). This 
industry comprises establishments engaged in operating and maintaining 
switching and transmission facilities to provide communications via the 
airwaves. Establishments in this industry have spectrum licenses and 
provide services using that spectrum, such as cellular services, paging 
services, wireless internet access, and wireless video services. The 
SBA size standard for this industry classifies a business as small if 
it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show 
that there were 2,893 firms in this industry that operated for the 
entire year. Of that number, 2,837 firms employed fewer than 250 
employees. Additionally, based on Commission data in the 2021 Universal 
Service Monitoring Report, as of December 31, 2020, there were 797 
providers that reported they were engaged in the provision of wireless 
services. Of these providers, the Commission estimates that 715 
providers have 1,500 or fewer employees. Consequently, using the SBA's 
small business size standard, most of these providers can be considered 
small entities.
    10. Broadband Personal Communications Service. The broadband 
personal communications services (PCS) spectrum encompasses services in 
the 1850-1910 and 1930-1990 MHz bands. The closest industry with a SBA 
small business size standard applicable to these services is Wireless 
Telecommunications Carriers (except Satellite). The SBA small business 
size standard for this industry classifies a business as small if it 
has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show 
that there were 2,893 firms that operated in this industry for the 
entire year. Of this number, 2,837 firms employed fewer than 250 
employees. Thus under the SBA size standard, the Commission estimates 
that a majority of licensees in this industry can be considered small.
    11. Based on Commission data as of November 2021, there were 
approximately 5,060 active licenses in the Broadband PCS service. The 
Commission's small business size standards with respect to Broadband 
PCS involve eligibility for bidding credits and installment payments in 
the auction of licenses for these services. In auctions for these 
licenses, the Commission defined ``small business'' as an entity that, 
together with its affiliates and controlling interests, has average 
gross revenues not exceeding $40 million for the preceding three years, 
and a ``very small business'' as an entity that, together with its 
affiliates and controlling interests, has had average annual gross 
revenues not exceeding $15 million for the preceding three years. 
Winning bidders claiming small business credits won Broadband PCS 
licenses in C, D, E, and F Blocks.
    12. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these, at this time we are not able to estimate the 
number of licensees with active licenses that would qualify as small

[[Page 71542]]

under the SBA's small business size standard.
    13. Narrowband Personal Communications Services. Narrowband 
Personal Communications Services (Narrowband PCS) are PCS services 
operating in the 901-902 MHz, 930-931 MHz, and 940-941 MHz bands. PCS 
services are radio communications that encompass mobile and ancillary 
fixed communication that provide services to individuals and businesses 
and can be integrated with a variety of competing networks. Wireless 
Telecommunications Carriers (except Satellite) is the closest industry 
with a SBA small business size standard applicable to these services. 
The SBA small business size standard for this industry classifies a 
business as small if it has 1,500 or fewer employees. U.S. Census 
Bureau data for 2017 show that there were 2,893 firms that operated in 
this industry for the entire year. Of this number, 2,837 firms employed 
fewer than 250 employees. Thus under the SBA size standard, the 
Commission estimates that a majority of licensees in this industry can 
be considered small.
    14. According to Commission data as of December 2021, there were 
approximately 4,211 active Narrowband PCS licenses. The Commission's 
small business size standards with respect to Narrowband PCS involve 
eligibility for bidding credits and installment payments in the auction 
of licenses for these services. For the auction of these licenses, the 
Commission defined a ``small business'' as an entity that, together 
with affiliates and controlling interests, has average gross revenues 
for the three preceding years of not more than $40 million. A ``very 
small business'' is defined as an entity that, together with affiliates 
and controlling interests, has average gross revenues for the three 
preceding years of not more than $15 million. Pursuant to these 
definitions, 7 winning bidders claiming small and very small bidding 
credits won approximately 359 licenses. One of the winning bidders 
claiming a small business status classification in these Narrowband PCS 
license auctions had an active license as of December 2021.
    15. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as small under the SBA's small business size standard.
    16. Wireless Communications Services. Wireless Communications 
Services (WCS) can be used for a variety of fixed, mobile, 
radiolocation, and digital audio broadcasting satellite services. 
Wireless spectrum is made available and licensed for the provision of 
wireless communications services in several frequency bands subject to 
Part 27 of the Commission's rules. Wireless Telecommunications Carriers 
(except Satellite) is the closest industry with a SBA small business 
size standard applicable to these services. The SBA small business size 
standard for this industry classifies a business as small if it has 
1,500 or fewer employees. U.S. Census Bureau data for 2017 show that 
there were 2,893 firms that operated in this industry for the entire 
year. Of this number, 2,837 firms employed fewer than 250 employees. 
Thus under the SBA size standard, the Commission estimates that a 
majority of licensees in this industry can be considered small.
    17. The Commission's small business size standards with respect to 
WCS involve eligibility for bidding credits and installment payments in 
the auction of licenses for the various frequency bands included in 
WCS. When bidding credits are adopted for the auction of licenses in 
WCS frequency bands, such credits may be available to several types of 
small businesses based average gross revenues (small, very small and 
entrepreneur) pursuant to the competitive bidding rules adopted in 
conjunction with the requirements for the auction and/or as identified 
in the designated entities section in Part 27 of the Commission's rules 
for the specific WCS frequency bands.
    18. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as small under the SBA's small business size standard.
    19. 700 MHz Guard Band Licensees. The 700 MHz Guard Band 
encompasses spectrum in 746-747/776-777 MHz and 762-764/792-794 MHz 
frequency bands. Wireless Telecommunications Carriers (except 
Satellite) is the closest industry with a SBA small business size 
standard applicable to licenses providing services in these bands. The 
SBA small business size standard for this industry classifies a 
business as small if it has 1,500 or fewer employees. U.S. Census 
Bureau data for 2017 show that there were 2,893 firms that operated in 
this industry for the entire year. Of this number, 2,837 firms employed 
fewer than 250 employees. Thus under the SBA size standard, the 
Commission estimates that a majority of licensees in this industry can 
be considered small.
    20. According to Commission data as of December 2021, there were 
approximately 224 active 700 MHz Guard Band licenses. The Commission's 
small business size standards with respect to 700 MHz Guard Band 
licensees involve eligibility for bidding credits and installment 
payments in the auction of licenses. For the auction of these licenses, 
the Commission defined a ``small business'' as an entity that, together 
with its affiliates and controlling principals, has average gross 
revenues not exceeding $40 million for the preceding three years, and a 
``very small business'' an entity that, together with its affiliates 
and controlling principals, has average gross revenues that are not 
more than $15 million for the preceding three years. Pursuant to these 
definitions, five winning bidders claiming one of the small business 
status classifications won 26 licenses, and one winning bidder claiming 
small business won two licenses. None of the winning bidders claiming a 
small business status classification in these 700 MHz Guard Band 
license auctions had an active license as of December 2021.
    21. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as

[[Page 71543]]

small under the SBA's small business size standard.
    22. Lower 700 MHz Band Licenses. The lower 700 MHz band encompasses 
spectrum in the 698-746 MHz frequency bands. Permissible operations in 
these bands include flexible fixed, mobile, and broadcast uses, 
including mobile and other digital new broadcast operation; fixed and 
mobile wireless commercial services (including FDD- and TDD-based 
services); as well as fixed and mobile wireless uses for private, 
internal radio needs, two-way interactive, cellular, and mobile 
television broadcasting services. Wireless Telecommunications Carriers 
(except Satellite) is the closest industry with a SBA small business 
size standard applicable to licenses providing services in these bands. 
The SBA small business size standard for this industry classifies a 
business as small if it has 1,500 or fewer employees. U.S. Census 
Bureau data for 2017 show that there were 2,893 firms that operated in 
this industry for the entire year. Of this number, 2,837 firms employed 
fewer than 250 employees. Thus under the SBA size standard, the 
Commission estimates that a majority of licensees in this industry can 
be considered small.
    23. According to Commission data as of December 2021, there were 
approximately 2,824 active Lower 700 MHz Band licenses. The 
Commission's small business size standards with respect to Lower 700 
MHz Band licensees involve eligibility for bidding credits and 
installment payments in the auction of licenses. For auctions of Lower 
700 MHz Band licenses the Commission adopted criteria for three groups 
of small businesses. A very small business was defined as an entity 
that, together with its affiliates and controlling interests, has 
average annual gross revenues not exceeding $15 million for the 
preceding three years, a small business was defined as an entity that, 
together with its affiliates and controlling interests, has average 
gross revenues not exceeding $40 million for the preceding three years, 
and an entrepreneur was defined as an entity that, together with its 
affiliates and controlling interests, has average gross revenues not 
exceeding $3 million for the preceding three years. In auctions for 
Lower 700 MHz Band licenses seventy-two winning bidders claiming a 
small business classification won 329 licenses, twenty-six winning 
bidders claiming a small business classification won 214 licenses, and 
three winning bidders claiming a small business classification won all 
five auctioned licenses.
    24. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as small under the SBA's small business size standard.
    25. Upper 700 MHz Band Licenses. The upper 700 MHz band encompasses 
spectrum in the 746-806 MHz bands. Upper 700 MHz D Block licenses are 
nationwide licenses associated with the 758-763 MHz and 788-793 MHz 
bands. Permissible operations in these bands include flexible fixed, 
mobile, and broadcast uses, including mobile and other digital new 
broadcast operation; fixed and mobile wireless commercial services 
(including FDD- and TDD-based services); as well as fixed and mobile 
wireless uses for private, internal radio needs, two-way interactive, 
cellular, and mobile television broadcasting services. Wireless 
Telecommunications Carriers (except Satellite) is the closest industry 
with a SBA small business size standard applicable to licenses 
providing services in these bands. The SBA small business size standard 
for this industry classifies a business as small if it has 1,500 or 
fewer employees. U.S. Census Bureau data for 2017 show that there were 
2,893 firms that operated in this industry for the entire year. Of that 
number, 2,837 firms employed fewer than 250 employees. Thus, under the 
SBA size standard, the Commission estimates that a majority of 
licensees in this industry can be considered small.
    26. According to Commission data as of December 2021, there were 
approximately 152 active Upper 700 MHz Band licenses. The Commission's 
small business size standards with respect to Upper 700 MHz Band 
licensees involve eligibility for bidding credits and installment 
payments in the auction of licenses. For the auction of these licenses, 
the Commission defined a ``small business'' as an entity that, together 
with its affiliates and controlling principals, has average gross 
revenues not exceeding $40 million for the preceding three years, and a 
``very small business'' an entity that, together with its affiliates 
and controlling principals, has average gross revenues that are not 
more than $15 million for the preceding three years. Pursuant to these 
definitions, three winning bidders claiming very small business status 
won five of the twelve available licenses.
    27. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as small under the SBA's small business size standard.
    28. Advanced Wireless Services (AWS)--(1710-1755 MHz and 2110-2155 
MHz bands (AWS-1); 1915-1920 MHz, 1995-2000 MHz, 2020-2025 MHz and 
2175-2180 MHz bands (AWS-2); 2155-2175 MHz band (AWS-3); 2000-2020 MHz 
and 2180-2200 MHz (AWS-4). Spectrum is made available and licensed in 
these bands for the provision of various wireless communications 
services. Wireless Telecommunications Carriers (except Satellite) is 
the closest industry with a SBA small business size standard applicable 
to these services. The SBA small business size standard for this 
industry classifies a business as small if it has 1,500 or fewer 
employees. U.S. Census Bureau data for 2017 show that there were 2,893 
firms that operated in this industry for the entire year. Of this 
number, 2,837 firms employed fewer than 250 employees. Thus, under the 
SBA size standard, the Commission estimates that a majority of 
licensees in this industry can be considered small.
    29. According to Commission data as December 2021, there were 
approximately 4,472 active AWS licenses. The Commission's small 
business size standards with respect to AWS involve eligibility for 
bidding credits and installment payments in the auction of licenses for 
these services. For the auction of AWS licenses, the Commission defined 
a ``small business'' as an entity with average annual gross revenues 
for the preceding three years not exceeding $40 million, and a ``very 
small business'' as an entity with average annual gross revenues for 
the preceding three years not exceeding $15 million. Pursuant to these 
definitions,

[[Page 71544]]

57 winning bidders claiming status as small or very small businesses 
won 215 of 1,087 licenses. In the most recent auction of AWS licenses 
15 of 37 bidders qualifying for status as small or very small 
businesses won licenses.
    30. In frequency bands where licenses were subject to auction, the 
Commission notes that as a general matter, the number of winning 
bidders that qualify as small businesses at the close of an auction 
does not necessarily represent the number of small businesses currently 
in service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as small under the SBA's small business size standard.
    31. Broadband Radio Service and Educational Broadband Service. 
Broadband Radio Service systems, previously referred to as Multipoint 
Distribution Service (MDS) and Multichannel Multipoint Distribution 
Service (MMDS) systems, and ``wireless cable,'' transmit video 
programming to subscribers and provide two-way high speed data 
operations using the microwave frequencies of the Broadband Radio 
Service (BRS) and Educational Broadband Service (EBS) (previously 
referred to as the Instructional Television Fixed Service (ITFS)). 
Wireless cable operators that use spectrum in the BRS often 
supplemented with leased channels from the EBS, provide a competitive 
alternative to wired cable and other multichannel video programming 
distributors. Wireless cable programming to subscribers resembles cable 
television, but instead of coaxial cable, wireless cable uses microwave 
channels.
    32. In light of the use of wireless frequencies by BRS and EBS 
services, the closest industry with a SBA small business size standard 
applicable to these services is Wireless Telecommunications Carriers 
(except Satellite). The SBA small business size standard for this 
industry classifies a business as small if it has 1,500 or fewer 
employees. U.S. Census Bureau data for 2017 show that there were 2,893 
firms that operated in this industry for the entire year. Of this 
number, 2,837 firms employed fewer than 250 employees. Thus under the 
SBA size standard, the Commission estimates that a majority of 
licensees in this industry can be considered small.
    33. According to Commission data as December 2021, there were 
approximately 5,869 active BRS and EBS licenses. The Commission's small 
business size standards with respect to BRS involves eligibility for 
bidding credits and installment payments in the auction of licenses for 
these services. For the auction of BRS licenses, the Commission adopted 
criteria for three groups of small businesses. A very small business is 
an entity that, together with its affiliates and controlling interests, 
has average annual gross revenues exceed $3 million and did not exceed 
$15 million for the preceding three years, a small business is an 
entity that, together with its affiliates and controlling interests, 
has average gross revenues exceed $15 million and did not exceed $40 
million for the preceding three years, and an entrepreneur is an entity 
that, together with its affiliates and controlling interests, has 
average gross revenues not exceeding $3 million for the preceding three 
years. Of the ten winning bidders for BRS licenses, two bidders 
claiming the small business status won 4 licenses, one bidder claiming 
the very small business status won three licenses and two bidders 
claiming entrepreneur status won six licenses. One of the winning 
bidders claiming a small business status classification in the BRS 
license auction has an active licenses as of December 2021.
    34. The Commission's small business size standards for EBS define a 
small business as an entity that, together with its affiliates, its 
controlling interests and the affiliates of its controlling interests, 
has average gross revenues that are not more than $55 million for the 
preceding five (5) years, and a very small business is an entity that, 
together with its affiliates, its controlling interests and the 
affiliates of its controlling interests, has average gross revenues 
that are not more than $20 million for the preceding five (5) years. In 
frequency bands where licenses were subject to auction, the Commission 
notes that as a general matter, the number of winning bidders that 
qualify as small businesses at the close of an auction does not 
necessarily represent the number of small businesses currently in 
service. Further, the Commission does not generally track subsequent 
business size unless, in the context of assignments or transfers, 
unjust enrichment issues are implicated. Additionally, since the 
Commission does not collect data on the number of employees for 
licensees providing these services, at this time we are not able to 
estimate the number of licensees with active licenses that would 
qualify as small under the SBA's small business size standard.
    35. The Educational Broadcasting Services. Cable-based educational 
broadcasting services fall under the broad category of the Wired 
Telecommunications Carriers industry. The Wired Telecommunications 
Carriers industry comprises establishments primarily engaged in 
operating and/or providing access to transmission facilities and 
infrastructure that they own and/or lease for the transmission of 
voice, data, text, sound, and video using wired telecommunications 
networks. Transmission facilities may be based on a single technology 
or a combination of technologies. Establishments in this industry use 
the wired telecommunications network facilities that they operate to 
provide a variety of services, such as wired telephony services, 
including VoIP services; wired (cable) audio and video programming 
distribution; and wired broadband internet services.
    36. The SBA small business size standard for this industry 
classifies businesses having 1,500 or fewer employees as small. U.S. 
Census Bureau data for 2017 show that there were 3,054 firms in this 
industry that operated for the entire year. Of this total, 2,964 firms 
operated with fewer than 250 employees. Thus, under this size standard, 
the majority of firms in this industry can be considered small. 
Additionally, according to Commission data as of December 2021, there 
were 4,477 active EBS licenses. The Commission estimates that the 
majority of these licenses are held by non-profit educational 
institutions and school districts and are likely small entities.
    37. Radio and Television Broadcasting and Wireless Communications 
Equipment Manufacturing. This industry comprises establishments 
primarily engaged in manufacturing radio and television broadcast and 
wireless communications equipment. Examples of products made by these 
establishments are: transmitting and receiving antennas, cable 
television equipment, GPS equipment, pagers, cellular phones, mobile 
communications equipment, and radio and television studio and 
broadcasting equipment. The SBA small business size standard for this 
industry classifies businesses having 1,250 employees or less as small. 
U.S. Census Bureau data for 2017 show that there were 656 firms in this 
industry that operated for the entire year. Of this number, 624 firms 
had fewer than 250 employees. Thus, under the SBA size

[[Page 71545]]

standard, the majority of firms in this industry can be considered 
small.
    38. Software Publishers. This industry comprises establishments 
primarily engaged in computer software publishing or publishing and 
reproduction. Establishments in this industry carry out operations 
necessary for producing and distributing computer software, such as 
designing, providing documentation, assisting in installation, and 
providing support services to software purchasers. These establishments 
may design, develop, and publish, or publish only. The SBA small 
business size standard for this industry classifies businesses having 
annual receipts of $41.5 million or less as small. U.S. Census Bureau 
data for 2017 indicate that 7,842 firms in this industry operated for 
the entire year. Of this number 7,226 firms had revenue of less than 
$25 million. Based on this data, we conclude that a majority of firms 
in this industry are small.
    39. Noncommercial Educational (NCE) and Public Broadcast Stations. 
Noncommercial educational broadcast stations and public broadcast 
stations are television or radio broadcast stations which under the 
Commission's rules are eligible to be licensed by the Commission as a 
noncommercial educational radio or television broadcast station and are 
owned and operated by a public agency or nonprofit private foundation, 
corporation, or association; or are owned and operated by a 
municipality which transmits only noncommercial programs for education 
purposes.
    40. The SBA small business size standards and U.S. Census Bureau 
data classify radio stations and television broadcasting separately and 
both categories may include both noncommercial and commercial stations. 
The SBA small business size standard for both radio stations and 
television broadcasting classify firms having $41.5 million or less in 
annual receipts as small. For Radio Stations, U.S. Census Bureau data 
for 2017 show that 1,879 of the 2,963 firms that operated during that 
year had revenue of less than $25 million per year. For Television 
Broadcasting, U.S. Census Bureau data for 2017 show that 657 of the 744 
firms that operated for the entire year had revenue of less than 
$25,000,000. While the U.S. Census Bureau data does not indicate the 
number of non-commercial stations, we estimate that under the 
applicable SBA size standard the majority of noncommercial educational 
broadcast stations and public broadcast stations are small entities.
    41. According to Commission data as of March 31, 2022, there were 
4,503 licensed noncommercial educational radio and television stations. 
In addition, the Commission estimates as of March 31, 2022, there were 
384 licensed noncommercial educational (NCE) television stations, 383 
Class A TV stations, 1,840 LPTV stations and 3,231 TV translator 
stations. The Commission does not compile and otherwise does not have 
access to financial information for these stations that permit it to 
determine how many stations qualify as small entities under the SBA 
small business size standards. However, given the nature of these 
services, we will presume that all noncommercial educational and public 
broadcast stations qualify as small entities under the above SBA small 
business size standards.
    42. Radio Stations. This industry is comprised of ``establishments 
primarily engaged in broadcasting aural programs by radio to the 
public.'' Programming may originate in their own studio, from an 
affiliated network, or from external sources. The SBA small business 
size standard for this industry classifies firms having $41.5 million 
or less in annual receipts as small. U.S. Census Bureau data for 2017 
show that 2,963 firms operated in this industry during that year. Of 
this number, 1,879 firms operated with revenue of less than $25 million 
per year. Based on this data and the SBA's small business size 
standard, we estimate a majority of such entities are small entities.
    43. The Commission estimates that as of March 31, 2022, there were 
4,508 licensed commercial AM radio stations and 6,763 licensed 
commercial FM radio stations, for a combined total of 11,271 commercial 
radio stations. Of this total, 11,269 stations (or 99.98%) had revenues 
of $41.5 million or less in 2021, according to Commission staff review 
of the BIA Kelsey Inc. Media Access Pro Database (BIA) on June 1, 2022, 
and therefore these licensees qualify as small entities under the SBA 
definition. In addition, the Commission estimates that as of March 31, 
2022, there were 4,119 licensed noncommercial (NCE) FM radio stations, 
2,049 low power FM (LPFM) stations, and 8,919 FM translators and 
boosters. The Commission however does not compile, and otherwise does 
not have access to financial information for these radio stations that 
would permit it to determine how many of these stations qualify as 
small entities under the SBA small business size standard. 
Nevertheless, given the SBA's large annual receipts threshold for this 
industry and the nature of these radio station licensees, we presume 
that all of these entities qualify as small entities under the above 
SBA small business size standard.
    44. We note, however, that in assessing whether a business concern 
qualifies as ``small'' under the above definition, business (control) 
affiliations must be included. Our estimate, therefore, likely 
overstates the number of small entities that might be affected by our 
action, because the revenue figure on which it is based does not 
include or aggregate revenues from affiliated companies. In addition, 
another element of the definition of ``small business'' requires that 
an entity not be dominant in its field of operation. We are unable at 
this time to define or quantify the criteria that would establish 
whether a specific radio or television broadcast station is dominant in 
its field of operation. Accordingly, the estimate of small businesses 
to which the rules may apply does not exclude any radio or television 
station from the definition of a small business on this basis and is 
therefore possibly over-inclusive. An additional element of the 
definition of ``small business'' is that the entity must be 
independently owned and operated. Because it is difficult to assess 
these criteria in the context of media entities, the estimate of small 
businesses to which the rules may apply does not exclude any radio or 
television station from the definition of a small business on this 
basis and similarly may be over-inclusive.
    45. FM Translator Stations and Low-Power FM Stations. FM 
translators and Low Power FM Stations are classified in the industry 
for Radio Stations. The Radio Stations industry comprises 
establishments primarily engaged in broadcasting aural programs by 
radio to the public. Programming may originate in their own studio, 
from an affiliated network, or from external sources. The SBA small 
business size standard for this industry classifies firms having $41.5 
million or less in annual receipts as small. U.S. Census Bureau data 
for 2017 show that 2,963 firms operated during that year. Of that 
number, 1,879 firms operated with revenue of less than $25 million per 
year. Therefore, based on the SBA's size standard we conclude that the 
majority of FM Translator stations and Low Power FM Stations are small. 
Additionally, according to Commission data, as of March 31, 2022, there 
were 8,919 FM Translator Stations and 2,049 Low Power FM licensed 
broadcast stations. The Commission however does not compile and 
otherwise does not have access to information on the revenue of these 
stations that would permit it to

[[Page 71546]]

determine how many of the stations would qualify as small entities. For 
purposes of this regulatory flexibility analysis, we presume the 
majority of these stations are small entities.
    46. Television Broadcasting. This industry is comprised of 
``establishments primarily engaged in broadcasting images together with 
sound.'' These establishments operate television broadcast studios and 
facilities for the programming and transmission of programs to the 
public. These establishments also produce or transmit visual 
programming to affiliated broadcast television stations, which in turn 
broadcast the programs to the public on a predetermined schedule. 
Programming may originate in their own studio, from an affiliated 
network, or from external sources. The SBA small business size standard 
for this industry classifies businesses having $41.5 million or less in 
annual receipts as small. 2017 U.S. Census Bureau data indicate that 
744 firms in this industry operated for the entire year. Of that 
number, 657 firms had revenue of less than $25,000,000. Based on this 
data we estimate that the majority of television broadcasters are small 
entities under the SBA small business size standard.
    47. The Commission estimates that as of March 31, 2022, there were 
1,373 licensed commercial television stations. Of this total, 1,280 
stations (or 93.2%) had revenues of $41.5 million or less in 2021, 
according to Commission staff review of the BIA Kelsey Inc. Media 
Access Pro Television Database (BIA) on June 1, 2022, and therefore 
these licensees qualify as small entities under the SBA definition. In 
addition, the Commission estimates as of March 31, 2022, there were 384 
licensed noncommercial educational (NCE) television stations, 383 Class 
A TV stations, 1,840 LPTV stations and 3,231 TV translator stations. 
The Commission however does not compile, and otherwise does not have 
access to financial information for these television broadcast stations 
that would permit it to determine how many of these stations qualify as 
small entities under the SBA small business size standard. 
Nevertheless, given the SBA's large annual receipts threshold for this 
industry and the nature of these television station licensees, we 
presume that all of these entities qualify as small entities under the 
above SBA small business size standard.
    48. Cable and Other Subscription Programming. The U.S. Census 
Bureau defines this industry as establishments primarily engaged in 
operating studios and facilities for the broadcasting of programs on a 
subscription or fee basis. The broadcast programming is typically 
narrowcast in nature (e.g., limited format, such as news, sports, 
education, or youth-oriented). These establishments produce programming 
in their own facilities or acquire programming from external sources. 
The programming material is usually delivered to a third party, such as 
cable systems or direct-to-home satellite systems, for transmission to 
viewers. The SBA small business size standard for this industry 
classifies firms with annual receipts less than $41.5 million as small. 
Based on U.S. Census Bureau data for 2017, 378 firms operated in this 
industry during that year. Of that number, 149 firms operated with 
revenue of less than $25 million a year and 44 firms operated with 
revenue of $25 million or more. Based on this data, the Commission 
estimates that the majority of firms operating in this industry are 
small.
    49. Cable System Operators (Rate Regulation Standard). The 
Commission has developed its own small business size standard for the 
purpose of cable rate regulation. Under the Commission's rules, a 
``small cable company'' is one serving 400,000 or fewer subscribers 
nationwide. Based on industry data, there are about 420 cable companies 
in the U.S. Of these, only seven have more than 400,000 subscribers. In 
addition, under the Commission's rules, a ``small system'' is a cable 
system serving 15,000 or fewer subscribers. Based on industry data, 
there are about 4,139 cable systems (headends) in the U.S. Of these, 
about 639 have more than 15,000 subscribers. Accordingly, the 
Commission estimates that the majority of cable companies and cable 
systems are small.
    50. Cable System Operators (Telecom Act Standard). The 
Communications Act of 1934, as amended, contains a size standard for a 
``small cable operator,'' which is ``a cable operator that, directly or 
through an affiliate, serves in the aggregate fewer than one percent of 
all subscribers in the United States and is not affiliated with any 
entity or entities whose gross annual revenues in the aggregate exceed 
$250,000,000.'' For purposes of the Telecom Act Standard, the 
Commission determined that a cable system operator that serves fewer 
than 677,000 subscribers, either directly or through affiliates, will 
meet the definition of a small cable operator based on the cable 
subscriber count established in a 2001 Public Notice. Based on industry 
data, only six cable system operators have more than 677,000 
subscribers. Accordingly, the Commission estimates that the majority of 
cable system operators are small under this size standard. We note 
however, that the Commission neither requests nor collects information 
on whether cable system operators are affiliated with entities whose 
gross annual revenues exceed $250 million. Therefore, we are unable at 
this time to estimate with greater precision the number of cable system 
operators that would qualify as small cable operators under the 
definition in the Communications Act.
    51. Satellite Telecommunications. This industry comprises firms 
``primarily engaged in providing telecommunications services to other 
establishments in the telecommunications and broadcasting industries by 
forwarding and receiving communications signals via a system of 
satellites or reselling satellite telecommunications.'' Satellite 
telecommunications service providers include satellite and earth 
station operators. The SBA small business size standard for this 
industry classifies a business with $35 million or less in annual 
receipts as small. U.S. Census Bureau data for 2017 show that 275 firms 
in this industry operated for the entire year. Of this number, 242 
firms had revenue of less than $25 million. Additionally, based on 
Commission data in the 2021 Universal Service Monitoring Report, as of 
December 31, 2020, there were 71 providers that reported they were 
engaged in the provision of satellite telecommunications services. Of 
these providers, the Commission estimates that approximately 48 
providers have 1,500 or fewer employees. Consequently using the SBA's 
small business size standard, a little more than of these providers can 
be considered small entities.
    52. All Other Telecommunications. This industry is comprised of 
establishments primarily engaged in providing specialized 
telecommunications services, such as satellite tracking, communications 
telemetry, and radar station operation. This industry also includes 
establishments primarily engaged in providing satellite terminal 
stations and associated facilities connected with one or more 
terrestrial systems and capable of transmitting telecommunications to, 
and receiving telecommunications from, satellite systems. Providers of 
internet services (e.g. dial-up ISPs) or voice over internet protocol 
(VoIP) services, via client-supplied telecommunications connections are 
also included in this industry. The SBA small business size standard 
for this industry classifies firms with annual receipts of $35 million 
or less as small. U.S. Census Bureau data for 2017 show that there

[[Page 71547]]

were 1,079 firms in this industry that operated for the entire year. Of 
those firms, 1,039 had revenue of less than $25 million. Based on this 
data, the Commission estimates that the majority of ``All Other 
Telecommunications'' firms can be considered small.
    53. Direct Broadcast Satellite (``DBS'') Service. DBS service is a 
nationally distributed subscription service that delivers video and 
audio programming via satellite to a small parabolic ``dish'' antenna 
at the subscriber's location. DBS is included in the Wired 
Telecommunications Carriers industry which comprises establishments 
primarily engaged in operating and/or providing access to transmission 
facilities and infrastructure that they own and/or lease for the 
transmission of voice, data, text, sound, and video using wired 
telecommunications networks. Transmission facilities may be based on a 
single technology or combination of technologies. Establishments in 
this industry use the wired telecommunications network facilities that 
they operate to provide a variety of services, such as wired telephony 
services, including VoIP services, wired (cable) audio and video 
programming distribution; and wired broadband internet services. By 
exception, establishments providing satellite television distribution 
services using facilities and infrastructure that they operate are 
included in this industry.
    54. The SBA small business size standard for Wired 
Telecommunications Carriers classifies firms having 1,500 or fewer 
employees as small. U.S. Census Bureau data for 2017 show that 3,054 
firms operated in this industry for the entire year. Of this number, 
2,964 firms operated with fewer than 250 employees. Based on this data, 
the majority of firms in this industry can be considered small under 
the SBA small business size standard. According to Commission data 
however, only two entities provide DBS service--DIRECTV (owned by AT&T) 
and DISH Network, which require a great deal of capital for operation. 
DIRECTV and DISH Network both exceed the SBA size standard for 
classification as a small business. Therefore, we must conclude based 
on internally developed Commission data, in general DBS service is 
provided only by large firms.

D. Description of Projected Reporting, Recordkeeping, and Other 
Compliance Requirements for Small Entities

    55. We expect the actions proposed in the NPRM, if adopted, will 
impose additional reporting, recordkeeping and/or other compliance 
obligations on small as well as other entities who are EAS Participants 
and Participating CMS Providers. More specifically, if adopted, EAS 
Participants and Participating CMS Providers would be required to 
annually certify to creating, updating, and implementing a 
cybersecurity risk management plan to ensure the confidentiality, 
integrity, and availability of their respective alerting systems. The 
cybersecurity risk management plan must contain among other things, a 
description of how organizational resources are employed to ensure the 
confidentiality, integrity, and availability of the alerting system. 
Further, any incident involving the unauthorized access to EAS 
equipment, communications systems, or services, regardless of whether 
the event resulted in the transmission of a false alert would require 
EAS Participants to report the unauthorized access to the Commission 
within 72 hours of when the EAS Participant knew or should have known 
that an incident has occurred. The Commission also seeks comment on 
whether and how to strengthen the operational readiness of the EAS.
    56. In assessing the cost of compliance with our proposed rule to 
create a cybersecurity risk management plan, we estimate the cost for 
each small EAS Participant and each Participating CMS Providers to be 
approximately $820. These costs are based on 10 hours of labor at $82 
an hour and apply to all EAS Participants and Participating CMS 
Providers not just small entities. We anticipate however, that many 
small EAS Participants and Participating CMS Providers will not require 
10 hours to develop or update a cybersecurity risk management plan 
tailored to the size of their organization. The cost for reporting an 
unauthorized access incident we believe would be similar to the cost of 
reporting a false alert, which the Commission has estimated to have a 
total cost of $11,600 per year across 290 EAS Participants. This total 
cost when apportioned to each EAS Participant comes out to 
approximately $40 per EAS Participant.
    57. We estimate a $9.2 million one-time cost for all Participating 
CMS Providers, not just small providers, to update the WEA standards 
and software necessary to comply with our proposed rule that 
Participating CMS Providers transmit sufficient authentication 
information to allow mobile devices to present WEA alerts only if they 
come from valid base stations. This figure consists of approximately a 
$500,000 cost to update applicable WEA standards and approximately an 
$8.7 million cost to update applicable software. We quantify the cost 
of modifying standards as the annual compensation for 30 network 
engineers compensated at the national average for their field ($85,816/
year; $41.26/hour), plus annual benefits ($26,775/year; 12.87/hour) 
working for the amount of time that it takes to develop a standard (one 
hour every other week for one year, 26 hours) for 12 distinct 
standards. We quantify the cost of modifying software as the annual 
compensation for a software engineer compensated at the national 
average for their field ($86,998/year), plus annual benefits ($27,143/
year) working for the amount of time that it takes to develop software 
(one year) at each of the 76 CMS Providers that participate in WEA.
    58. At this time the Commission cannot quantify the cost of 
compliance for small entities to comply with the other proposals or 
approaches on which it seeks comment in the NPRM. We believe that the 
modifications to improve and enhance the security of the EAS that we 
discuss in the NPRM are the most efficient and least burdensome 
approach and do not believe small entities will have to hire 
professionals to meet the requirements discussed in the NPRM, if 
adopted. To help the Commission more fully evaluate the cost of 
compliance for small entities should our proposals be adopted, in the 
NPRM, we request comments on the cost implications of our proposals and 
ask whether there are more efficient and less burdensome alternatives 
(including cost estimates) for the Commission to consider. We expect 
the information we receive in comments including cost and benefit 
analyses, will help the Commission identify and evaluate relevant 
matters for small entities, including compliance costs and other 
burdens that may result from the proposals and inquiries we make in the 
NPRM.

E. Steps Taken To Minimize the Significant Economic Impact on Small 
Entities, and Significant Alternatives Considered

    59. The RFA requires an agency to describe any significant, 
specifically small business alternatives that it has considered in 
reaching its proposed approach, which may include (among others) the 
following four alternatives: (1) the establishment of differing 
compliance or reporting requirements or timetables that take into 
account the resources available to small entities; (2) the 
clarification, consolidation, or simplification of compliance or 
reporting requirements under the rule for such small entities; (3) the 
use of performance, rather than design, standards; and (4) and 
exemption from

[[Page 71548]]

coverage of the rule, or any part thereof, for such small entities.
    60. The Commission has taken steps to minimize the impact of the 
proposals in the NPRM as a general matter, and specifically targeting 
small entities, has sought comment on the extent to which we can limit 
the overall economic impact of these proposed requirements if we 
provide increased flexibility for businesses classified as small under 
the SBA small business size standard. Below we discuss actions taken 
and alternatives considered by the Commission for the rules proposed 
promoting the operational readiness of EAS equipment, improving 
awareness of unauthorized access to EAS equipment, communications 
systems, and services, and requiring the development, implementation, 
and certification of a cybersecurity risk management plan.
    61. To further the Commission's objectives to promote EAS equipment 
operational readiness, in the NPRM we seek comment on whether to 
require EAS Participants to repair EAS equipment with prompt and 
reasonable diligence, on whether the EAS Participants should notify the 
Commission of the status of their repairs, and, if so, on the timing, 
content, and means of that notification.
    62. We seek comment on whether a compliance timeframe of 30 days 
from publication in the Federal Register of notice that the Office of 
Management and Budget (OMB) has completed its review of the modified 
information collection to improve the Commission's visibility into the 
repair or replacement of non-operational EAS equipment would not impose 
a burden on small entities. Small and other EAS Participants currently 
make entries in their broadcast station logs and cable system records 
showing the date and time equipment was removed and restored to 
service, and therefore already have processes and procedures in place 
to record information about the operational status of their EAS 
equipment in station logs that could be utilized for the proposed 
notification requirement. In the event that the Commission were to 
alternatively require this notification to be provided through NORS, 
the requirement would become effective within 30 days from publication 
in the Federal Register of notice that the OMB has approved the 
modified information collection or upon publication in the Federal 
Register of a Public Notice announcing that NORS is technically capable 
of receiving such notifications, whichever is later. Similarly, this 
requirement should not impose a burden on small entities for the reason 
stated above and since EAS Participants are already likely to be using 
NORS.
    63. Our approach to improving awareness of unauthorized access to 
EAS equipment, communications systems, and services relies on our 
belief that significant public safety benefits will accrue if EAS 
Participants were required to provide the Commission with notification 
that their EAS equipment, communications systems, and services have 
been accessed without authorization, even in the absence of a 
subsequent transmission of a false alert. The reporting requirement we 
proposed in the NPRM requiring EAS Participants to provide notification 
to the Commission via NORS within 72 hours of when an EAS Participant 
knew or should have known that an incident has occurred should result 
in low marginal costs for small and other EAS participants since our 
requirement parallels the reporting obligations EAS Participants may 
have to other government agencies that require critical infrastructure 
sector entities to report cyber incidents. This would allow the 
requirement to be satisfied by reporting substantially similar 
information to another federal agency in a similar timeframe. We 
believe the cost to report unauthorized access is comparable to the 
cost of reporting false alerts which further supports our belief that 
these costs will be relatively low for small and other EAS 
Participants. In the NPRM we have requested comments and cost and 
benefit analyses on our proposal and beliefs. In addition, we have 
requested alternative proposals (accompanied by cost analyses) for 
unauthorized access reporting requirements that would be less costly 
for small and other EAS Participants while producing similar or greater 
benefits.
    64. The requirement for EAS Participants to report any incident of 
unauthorized access of its EAS equipment, communications systems, or 
services would be effective 60 days from publication in the Federal 
Register of notice that the OMB has approved the modified information 
collection. Since we consider the requirement to report unauthorized 
access similar to the Commission's false alert reporting requirement, 
there are likely to be compliance synergies for small and other EAS 
Participants, and less of a burden than there would be in the absence 
of the similarity. We therefore seek comment in the NPRM on whether an 
EAS Participant's process for ascertaining whether an incident of 
unauthorized access of its EAS equipment, communications systems, or 
services has occurred and reporting it to the Commission entails a 
level of effort comparable to compliance with the Commission's false 
alert reporting requirement.
    65. To further explore the impact of the cybersecurity risk 
management plan requirement proposed in the NPRM which requires small 
and other EAS Participants and Participating CMS Providers to create, 
implement, and annually update a cybersecurity risk management plan and 
submit an annual certification attesting to compliance with 
requirement, Commission seeks comment on steps that it could take to 
limit various burdens. In particular, the Commission requests comment 
on whether the steps that it describes for EAS Participants and 
Participating CMS Providers to submit their risk management plans are 
the most efficient way to implement a certification requirement. In the 
NPRM, we propose to afford each EAS Participant and Participating CMS 
Provider the flexibility to include content in its plan that is 
tailored to its organization, provided that the plan demonstrates how 
the EAS Participant or Participating CMS Provider identifies the cyber 
risks that they face, the controls they use to mitigate those risks, 
and how they ensure that these controls are applied effectively to 
their operations.
    66. The Commission also proposes to require that each plan include 
security controls sufficient to ensure the confidentiality, integrity, 
and availability (CIA) of the EAS. While we believe there are numerous 
methods to satisfy this aspect of the requirement, we have proposed to 
allow the requirement to be satisfied by providing evidence of the 
successful implementation of an established set of cybersecurity best 
practices, such as applicable Center for internet Security (CIS) 
Critical Security Controls or the Cybersecurity & Infrastructure 
Security Agency (CISA) Cybersecurity Baseline. We believe adopting this 
flexible approach will allow EAS Participants and Participating CMS 
Providers to develop a plan that is appropriate for their 
organization's size and available resources, while still ensuring that 
the plan results in ongoing and material improvements in EAS and WEA 
security. The Commission anticipates that this flexibility will reduce 
the costs imposed on small business EAS Participants and Participating 
CMS Providers, which will have different cybersecurity needs than 
larger EAS Participants and Participating CMS Providers, respectively. 
We do note, however, that to ensure that every EAS

[[Page 71549]]

Participant implements a baseline of security controls, the Commission 
proposes to require that each plan include certain security measures: 
changing default passwords prior to operation, installing security 
updates in a timely manner, securing equipment behind properly 
configured firewalls or using other segmentation practices, requiring 
multifactor authentication where applicable, addressing the replacement 
of end-of-life equipment, and wiping, clearing, or encrypting user 
information before disposing of old devices.
    67. The Commission proposes to require compliance with the 
requirement to implement a cybersecurity risk management plan and 
certification within twelve months of the publication in the Federal 
Register of notice that the OMB has approved the modified information 
collection. We recognize that larger EAS Participants are likely to 
already have cybersecurity risk management plans in place. We ask 
whether we should allow small entities a two-year timeframe to 
implement this requirement. The two-year timeframe should provide 
sufficient time for small EAS Participants and small Participating CMS 
Providers that do not already have a risk management plan in place to 
create one. The timeframe would also be sufficient to prepare their 
organizations to manage security and privacy risks, categorize their 
systems and the information being processed, stored, and transmitted, 
and select controls to protect their systems. Further, a two-year 
timeframe would provide time for these entities to implement the 
security controls that the plan describes, assess whether the controls 
are in place, operating as intended, and producing the desired results, 
appoint a senior official to authorize the system, and develop 
mechanisms to continuously monitor control implementation and risks to 
the system.
    68. In the NPRM, the Commission identifies alternative approaches 
on several matters that might minimize the economic impact for small 
entities. For example, the Commission requests alternatives to 
providing a second notification to the Commission once repairs of EAS 
equipment have been completed, and the EAS Participant's EAS systems 
have been tested and determined to once again be fully functional. The 
Commission seeks comment on potential alternatives to, and additional 
aspects of, the discussed approach, as well as their accompanying costs 
and benefits. The Commission recommends that EAS Participants file the 
required notifications regarding EAS equipment failures and repairs in 
the NORS database, but requests comment on other means EAS Participants 
could use to submit the notifications such as via email to a designated 
email address.
    69. The Commission expects to more fully consider the economic 
impact and alternatives for small entities following the review of 
comments filed in response to the NPRM, including costs and benefits 
analyses. Having data on the costs and economic impacts of proposals 
and approaches will allow the Commission to better evaluate options and 
alternatives for minimization of any significant economic impact on 
small entities as a result of the proposals and approaches raised in 
the NPRM. The Commission's evaluation of this information will shape 
the final alternatives it considers to minimize any significant 
economic impact that may occur on small entities, the final conclusions 
it reaches, and any final rules it promulgates in this proceeding.

F. Federal Rules That May Duplicate, Overlap, or Conflict With the 
Proposed Rules

    70. None.

II. Notice of Proposed Rulemaking

A. Promoting the Operational Readiness of EAS Equipment

    71. We observe that, according to the Bureau's last nationwide EAS 
test report, an appreciable number of EAS Participants were unable to 
participate in testing due to equipment failure--despite advance notice 
that such test was to take place--suggesting that equipment failures 
are not addressed by EAS Participants as swiftly as reasonably possible 
and that more needs to be done to improve EAS operational readiness. 
Today, EAS Participants may continue operations for a period of 60 days 
despite having defective equipment that preclude their participation in 
EAS. We seek comment on whether this approach is effective at ensuring 
the operational readiness of EAS. How frequently does EAS equipment 
encounter defects that prevent it from receiving or retransmitting 
alerts? What are the most common types of defects that are experienced? 
What steps are necessary to repair these defects, and how often do they 
typically take to repair? Do EAS Participants take prompt steps to 
repair their EAS equipment, or do they typically take several days or 
weeks before seeking repairs? Do other EAS stakeholders, such as alert 
originators, have concerns about equipment failures preventing the 
transmission of emergency alerts to the public? We encourage commenters 
to highlight any specific incidences in which an EAS equipment defect 
prevented members of the public from being alerted to an emergency.
    72. We seek comment on how to better promote the operational 
readiness of EAS equipment. For example, instead of requiring repairs 
within 60 days, would it serve the public interest to require EAS 
Participants to conduct repairs promptly and with reasonable diligence? 
Are all EAS Participants already doing so? If so, what are the reasons 
why some EAS Participants are not able to conduct repairs promptly and 
diligently? What factors should we consider when determining whether 
repairs are made promptly and with reasonable diligence? What barriers 
prevent equipment from being repaired promptly and what steps can we 
take to remove those barriers?
    73. Would it improve EAS operational readiness and public safety in 
general to increase the situational awareness of the Commission, alert 
originators, and others about the occurrence of equipment defects that 
might prevent alerts from reaching the public? For example, would such 
an approach allow us to better enforce our operational readiness rules 
and identify persistent technical problems, and make contingency plans 
for alert delivery? If so, should we adopt an EAS equipment defect 
notification requirement? For example, should we require EAS 
Participants to report EAS equipment defects and submit a follow-up 
notification when the equipment is repaired? Within what timeframe 
should they perform that notification to ensure that stakeholders are 
aware of possible impacts on EAS (e.g. 24 hours)? What content should 
the notification contain? For example, should notifications include the 
same information that is already included in requests for additional 
repair time that are required sent to the Regional Director of the FCC 
field office for the area that the EAS Participant serves? We seek 
comment on how, if at all, the Commission should share information to 
promote situational awareness among relevant stakeholders, such as 
alert originators State Emergency Communications Committees. We also 
seek comment on whether to treat this information as confidential and, 
if so, how to protect it. Are there other steps that we should take to 
better ensure that EAS is ready and available when it is needed?
    74. We seek comment on any measures that the Commission could take 
to reduce burdens on EAS Participants if it were to take further

[[Page 71550]]

steps to promote the operational readiness of EAS equipment. Should we 
remove the requirement under Sec.  11.35(b) that EAS Participants make 
entries in their own broadcast station log and cable system records 
showing the date and time the equipment was removed and restored to 
service? Would the elimination of the ``60 day'' rule in favor of a 
prompt repair rule reduce certain burdens on EAS Participants? We seek 
comments on the costs of any approaches to improving EAS operational 
readiness that commenters propose that we consider. In doing so, 
commenters should offer specific cost estimates where possible. For 
example, we seek comment on whether it would be reasonable to estimate 
that EAS Participants would transmit a maximum of 2,000 EAS equipment 
defect notifications annually under the approach discussed above, as 
565 EAS Participants reported their equipment was defective during the 
2021 Nationwide EAS Test? Would it be reasonable to estimate that 2,000 
annual notifications would require one hour of labor each from a 
General and Operations Manager who is compensated at $82 per hour, 
resulting in an overall cost of $164,000? We seek similarly detailed 
analysis on potential alternatives to improve EAS operational 
readiness.

B. Improving Awareness of Unauthorized Access to EAS Equipment

    75. Section 11.45(b) of the Commission's rules requires that an EAS 
Participant notify the Commission by email within 24 hours of its 
discovery that it has transmitted or otherwise sent a false alert to 
the public, including details concerning the event. We believe that it 
would be in the public interest to strengthen this rule in view of the 
increasing threats that cyber attacks pose to EAS networks and 
equipment. Accordingly, we propose to revise this rule to further 
require that an EAS Participant report any incident of unauthorized 
access of its EAS equipment (i.e., regardless of whether that 
compromise has resulted in the transmission of a false alert), to the 
Commission via NORS within 72 hours of when it knew or should have 
known that an incident has occurred and provide details concerning the 
incident. We seek comment on this proposal.
    76. We observe that protecting EAS equipment alone is unlikely to 
be sufficient to protect the EAS from a cyber attack. Even without 
directly accessing an EAS Participant's EAS equipment, a bad actor 
could send a false alert or prevent a legitimate alert with lifesaving 
information from reaching the public by gaining unauthorized access to 
EAS Participants' communications systems and services. For this reason, 
we also propose to require that an EAS Participant report any incident 
of unauthorized access to any aspects of an EAS Participant's 
communications systems and services that potentially could affect their 
provision of EAS. This would include infrastructure that serves to 
prevent unauthorized access to EAS equipment, including firewalls and 
Virtual Private Networks. We seek comment on this proposal and on any 
suitable alternatives.
    77. We believe the proposed rule is justified in light of the 
instances of false EAS alerts in recent years, caused by compromised 
EAS equipment being used to transmit a false message. As recounted 
above, we are aware of several situations in the past decade in which 
bad actors were either capable of obtaining, or actually obtained 
unauthorized access to EAS equipment. We seek comment on these views. 
Are there any other past or present security incidents involving EAS 
about which the Commission should be aware? Does unauthorized access to 
EAS equipment provide bad actors with the ability to disrupt EAS 
Participants' regularly scheduled programming, which has the potential 
to inflict financial harm in relation to their advertisers and 
reputational harm with their audiences? Are there any other kinds of 
harms resulting from unauthorized access to EAS equipment that the 
Commission should consider?
    78. We believe significant public safety benefits would accrue if 
EAS Participants were required to provide the Commission with 
notification that their EAS equipment, communications systems, or 
services have been accessed without authorization, even in the absence 
of a subsequent transmission of a false alert. This view is based on 
our observation that, after a system is compromised, many attackers 
will position themselves to attack connected systems in several 
different ways. For example, we have observed that it is characteristic 
of some cyber attacks that an attacker will start by compromising one 
device and then, prior to launching a specific attack, spend time and 
effort to identify and compromise other devices in the network, 
potentially using the initially comprised device as an access point to 
other devices. The Commission could use the proposed notifications to 
work with providers and other government agencies to resolve an 
equipment compromise before the compromise is actually exploited to 
cause false EAS transmissions in at least some instances. We further 
believe that the Commission could leverage information on the frequency 
and nature of equipment compromise to better understand the prevalence 
and trends associated such attacks across the nation. The Commission 
and its government partners would thus be better apprised of the risks 
posed to EAS and in a position to use this information to inform 
further measures that might be necessary to secure EAS.
    79. We seek comment on these views, including detailed information 
as to the associated costs and benefits of the proposed approach. For 
example, what would be a reasonable estimate of the financial harm that 
such a cyber attack would inflict upon an EAS Participant, and how 
should such estimates be calculated? We believe the cost of reporting 
an unauthorized access incident would tend to be similar to the cost of 
reporting a false alert, which the Commission has estimated to have a 
total cost of $11,600 per year across all EAS Participants. We seek 
comment on that estimate. Are EAS Participants already conducting 
investigations and gathering information about suspected incidents of 
unauthorized access to EAS equipment, communications systems, and 
services? Are there less costly alternatives to an unauthorized access 
reporting requirement that would achieve similar or greater benefits? 
We believe that the marginal costs of an unauthorized access reporting 
requirement are likely to be low, as the requirement parallels the 
requirements of an upcoming CISA rulemaking. Specifically, CISA is 
required by the Cyber Incident Reporting for Critical Infrastructure 
Act of 2022 (CIRCIA) to adopt rules requiring critical infrastructure 
sector entities to report cyber incidents, but allows the requirement 
to be satisfied by reporting substantially similar information to 
another federal agency in a similar timeframe. We seek comment on that 
belief.
    80. We propose to define ``unauthorized access'' to EAS equipment, 
communications systems, and services for the purposes of today's 
proposal to refer to any incident involving either remote or local 
access to EAS equipment, communications systems, or services by an 
individual or other entity that either does not have permission to 
access the equipment or exceeds their authorized access. We seek 
comment on this definition. For example, does this proposed definition 
mirror the methods that have been, and are likely to be, used by cyber-
attackers to infiltrate EAS? We seek comment on whether it is 
appropriate to require that

[[Page 71551]]

EAS Participants provide notification to the Commission within 72 hours 
of when they knew or should have known that an incident has occurred. 
Is this time frame appropriate or would it, for example, put undue 
pressure on EAS Participants at a critical time when they may be 
attempting to fully diagnose and resolve the compromise to their 
systems? On the other hand, is this time frame too slow to provide the 
Commission and government partners with timely notice of an incident? 
For example, consistent with the NORS reporting deadlines for 
interconnected VoIP outages, should the Commission be notified within 
24 hours of a reasonable belief that an incident has occurred? In the 
alternative, should we require EAS Participants to provide notification 
to the Commission within 72 hours of ``its reasonable belief that an 
incident has occurred,'' consistent with the approach to cyber incident 
reporting outlined by CIRCIA? Or, would this approach create 
disincentives for a provider to monitor the security of its own 
network? Would any alternative approach be more effective? Similar to 
what is contemplated by CIRCIA, should EAS Participants be required to 
submit updates to the Commission if substantial new or different 
information becomes available, until the date that the Commission is 
notified that the incident has concluded and been fully mitigated and 
resolved? Is the overall approach we propose today consistent with the 
incident reporting requirements of other federal and state government 
agencies, and if not, how should our proposal be harmonized to be more 
consistent with those requirements?
    81. We seek comment on the kinds of information that should be 
included in reports of unauthorized access. We propose that reports 
include, to the extent it is applicable and available at the time of 
reporting, the date range of the incident, a description of the 
unauthorized access, the impact to the EAS Participant's EAS 
operational readiness, a description of the vulnerabilities exploited 
and the techniques used to access the device, identifying information 
for each actor responsible for the incident, and contact information 
for the EAS Participant. We believe this information is necessary to 
understand the unauthorized access incident, resolve it before the 
compromise is actually exploited to send a false alert, and harmonize 
our requirements with those of other federal agencies. We seek comment 
on the proposed content of these reports and whether it should be 
modified. We propose that the contents of these reports be treated as 
presumptively confidential and only shared on a confidential basis with 
other Federal agencies and state government agencies that agree to 
protect them to the same extent and in the same manner as the 
Commission would and, to the extent that the policies or regulations of 
those agencies are stricter, to the same extent and in the same manner 
as they would if they had collected the information themselves. We also 
propose to allow disclosure by the Commission, or by parties with whom 
the Commission has shared the notifications, of anonymized information 
about breaches that might be useful for industry, security researchers, 
policymakers, and the general public. We seek comment on this approach 
to cyber incident information sharing.
    82. We seek comment on how these reports should be submitted to the 
Commission. Should they be submitted to the FCC Operation Center by 
email, in similar fashion to the false alert reports that EAS 
Participants are already required to file with the Commission? Should 
these reports be submitted in NORS to better capture the required 
contents in clearly defined fields and more easily facilitate sharing 
with federal partners? Or should we develop a new electronic database 
to collect the content of the reports? Are there other approaches we 
should consider? What are the costs and benefits associated with each 
approach? We seek comment on whether Participating CMS Providers should 
also be required to report incidents of unauthorized access to their 
WEA systems, or services. Similar to EAS, we believe that such a 
requirement would allow the Commission and its government partners to 
better identify and evaluate risks posed to EAS and inform further 
measures that might be necessary to secure WEA. Should reports be 
required in the same timeframe and with the same content as proposed 
for EAS? Are there any differences between EAS and WEA that would 
warrant differing unauthorized access reporting requirements for WEA? 
If so, what are those differences and how should the requirements be 
modified to reflect them?

C. Protecting the Nation's Alerting Systems Through the Development, 
Implementation, and Certification of a Cybersecurity Risk Management 
Plan

1. EAS Security
    83. As discussed above, the EAS has faced cybersecurity risks for 
more than a decade, with PSHSB regularly advising EAS Participants to 
follow cybersecurity best practices and take other steps to improve 
their cybersecurity posture. Despite these admonitions, however, we 
have not observed meaningful security improvements. For example, PSHSB 
has frequently advised EAS Participants to update their EAS software to 
ensure that they have installed the most recent security patches, 
including one such round of outreach in 2020 after the discovery that 
certain EAS equipment was potentially vulnerable to IP-based attacks. 
However, in filings related to the Nationwide EAS Test in August 2021, 
the Bureau observed that more than 5,000 EAS Participants were using 
outdated software or using equipment that no longer supported regular 
software updates. In light of these failures, we believe the Commission 
should take action to ensure the security of EAS.
    84. We propose to require EAS Participants to submit an annual 
certification attesting that they have created, updated, and 
implemented a cybersecurity risk management plan. The cybersecurity 
risk management plan would describe how the EAS Participant employs 
their organizational resources and processes to ensure the 
confidentiality, integrity, and availability of the EAS. The plan must 
discuss how the EAS Participant identifies the cyber risks that they 
face, the controls they use to mitigate those risks, and how they 
ensure that these controls are applied effectively to their operations. 
We believe that this certification requirement would improve the 
overall security of EAS by ensuring that EAS Participants are regularly 
taking steps to address security threats as part of their 
organization's day-to-day strategic and operational planning. We also 
believe the creation and implementation of cybersecurity risk 
management plans would help to ensure EAS operational readiness and 
eliminate false alerts, which divert public safety and other government 
resources from other important activities, impose costs on EAS 
Participants that have to deal with many of the consequences and, 
ultimately, desensitize the public to legitimate alerts. We seek 
comment on this proposal. Do stakeholders agree this proposal would 
improve the security of the EAS? Are there other benefits that may 
accrue from the creation and implementation of cybersecurity risk 
management plans by EAS Participants? Is an annual certification the 
right frequency with which to file certifications, or are there 
circumstances

[[Page 71552]]

where more (or less) frequent filings might be necessary?
    85. We propose to afford each EAS Participant flexibility to 
structure its plan in a manner that is tailored to its organization, 
provided that the plan demonstrate that the EAS Participant is taking 
affirmative steps to analyze security risks and improve its security 
posture. While we believe there are many ways for EAS Participants to 
satisfy this requirement, we propose that EAS Participants can 
successfully demonstrate that they have satisfied this requirement by 
structuring their plans to follow an established risk management 
framework, such as the National Institute of Standards and Technology 
(NIST) Risk Management Framework or the NIST Cybersecurity Framework. 
We believe this flexible approach would allow EAS Participants to 
develop a plan that is appropriate for their organization's size and 
available resources, while still ensuring that the plan results in 
ongoing and material improvements in EAS security. We also anticipate 
that this requirement would reduce the costs imposed on smaller EAS 
Participants, which may have different cybersecurity needs than larger 
EAS Participants. We seek comment on this proposal. Alternatively, 
should we require EAS Participants to structure their plans to follow 
the NIST Risk Management Framework or the NIST Cybersecurity Framework? 
If so, should we require EAS Participants to follow the current version 
of each framework (i.e., Risk Management Framework for Information 
Systems and Organizations, NIST Special Publication 800-37, Revision 2; 
NIST Cybersecurity Framework V1.1)? If we take this approach, we 
anticipate that NIST may one day release updated versions of these 
frameworks, and we would then expect to seek notice and comment on 
whether we should require EAS Participants to follow the updated 
versions. We seek comment on this approach.
    86. We propose that each cybersecurity risk management framework 
include security controls sufficient to ensure the confidentiality, 
integrity, and availability (CIA) of the EAS. We expect that reasonable 
security measures will include measures that are commonly the subject 
of best practices. While we believe there are potentially many ways for 
EAS Participants to satisfy this aspect of the requirement, we propose 
that EAS Participants will have satisfied it if they demonstrate they 
have successfully implemented an established set of cybersecurity best 
practices, such as applicable CIS Critical Security Controls or the 
CISA Cybersecurity Baseline. To ensure that every EAS Participant 
implements a baseline of security controls, however, we propose to 
require that each plan include security measures that address changing 
default passwords prior to operation, installing security updates in a 
timely manner, securing equipment behind properly configured firewalls 
or using other segmentation practices, requiring multifactor 
authentication where applicable, addressing the replacement of end-of-
life equipment, and wiping, clearing, or encrypting user information 
before disposing of old devices. We expect that compliant cybersecurity 
risk management plans will not be limited to only these specific 
measures, as plans will vary based on individual providers' needs and 
circumstances and will need regular updates to keep up with an evolving 
threat environment. We seek comment on these proposed rules. Are there 
other specific security measures that we should require EAS 
Participants to implement? For example, should we require EAS 
Participants to conduct network security audits or vulnerability 
assessments to identify potential security vulnerabilities? If so, how 
often should they be conducted? Should we require EAS Participants to 
report to the Commission when their network audits, network 
vulnerability assessments, or penetration testing reports reveal 
critical vulnerabilities? If so, how should we define a ``critical 
vulnerability'' for this purpose? Should we require EAS Participants to 
implement Incident Response Plans that describe how the procedures that 
EAS Participants would follow when respond to an ongoing cybersecurity 
incident? Should we require EAS Participants to conduct cybersecurity 
training for their employees or contractors and if so, what should the 
contents of that training be? What kinds of security measures have EAS 
Participants already implemented to protect the EAS, and how effective 
are they at mitigating cybersecurity risks? Should we require EAS 
Participants to keep records that demonstrate how they have implemented 
each of the baseline security controls? If so, what specific types of 
information should the records include and for how long should they be 
kept? Have EAS Participants identified unsuccessful attempts to access 
their systems, and if so, what specific security measures best thwarted 
those attempts?
    87. Does this approach strike the appropriate balance between 
improving EAS security, complementing EAS Participants' existing 
cybersecurity activities, and reducing burdens on small EAS 
Participants? If not, how should this requirement be modified to 
achieve that balance? We seek comment on whether this approach grants 
too much flexibility and will not result in improvements to EAS 
security. We also seek comment on alternative approaches that would be 
effective at improving EAS security. For example, should we require EAS 
Participants to address a specified list of cybersecurity subject 
matters in their risk management plans? Instead of requiring the use of 
a risk management plan, should we require EAS Participants to take 
specific steps to secure their EAS equipment? If so, could such a 
requirement be drafted in a way to encourage EAS Participants to 
continually examine and improve their cybersecurity posture, rather 
than merely check items off a list? Is our proposed certification 
requirement too burdensome on small EAS Participants? If so, what would 
be a more cost-effective way to promote EAS security for small EAS 
Participants?
    88. We observe that protecting EAS equipment alone is unlikely to 
be sufficient to protect the EAS from a cyber attack. In addition to 
the risk of a bad actor sending a false alert, a bad actor could attack 
other elements of an EAS Participant's systems or service as a way to 
prevent a legitimate alert with lifesaving information from reaching 
the public. For this reason, we propose to require that the 
cybersecurity risk management plan address not only the security of EAS 
equipment, but also the security of all aspects of an EAS Participant's 
communications systems and services that potentially could affect their 
provision of EAS. We seek comment on this requirement. Are there 
alternative requirements that we should consider to ensure that bad 
actors cannot prevent the transmission of legitimate alerts (or engage 
in the transmission of false ones)?
    89. We seek comment on whether there are industry groups, 
cybersecurity organizations, or other organizations that may be 
positioned to help EAS Participants create, implement, and maintain 
their cybersecurity risk management plan. What kinds of resources do 
these organizations offer, and how can EAS Participants make use of 
them? For example, are there organizations that offer, or that would be 
able to begin offering, authoritative sources of cybersecurity 
information and expertise? Are there organizations that can support EAS 
Participants by offering cybersecurity training, risk management plan 
templates, or otherwise promote the cybersecurity? If so, to what 
extent can these

[[Page 71553]]

organizations help reduce the burdens related to the proposed 
certification requirement and make EAS more secure?
    90. We propose that EAS Participants certify to creating, annually 
updating, and implementing a cybersecurity risk management plan by 
checking a box as part of its annual filing of EAS Test Reporting 
System Form One. We seek comment on whether this is the most efficient 
way to implement a certification requirement for EAS Participants. If 
not, how should the certification be implemented? While the Commission 
does not intend to review each individual plan for sufficiency, we 
propose that the cybersecurity risk management plan be made available 
to the Commission upon request so that the Commission may review a 
specific plan as needed or proactively review a sample of EAS 
Participants' plans to ensure that they are sufficient to ensure the 
confidentiality, integrity, and availability of the EAS. In such 
circumstances, cybersecurity risk management plans would be treated as 
presumptively confidential. We propose to delegate to the Bureau the 
authority to request review of such cybersecurity risk management plans 
and to evaluate them for sufficiency. We seek comment on this approach 
to evaluating plans. For how long we should require EAS Participants to 
retain prior versions of their cybersecurity risk management plans to 
enable the Bureau's review?
    91. We propose that the filing of, and subsequent compliance with, 
a cybersecurity risk management plan would not serve as a safe harbor 
or excuse or any other diminishment of responsibility for negligent 
security practices. We believe that allowing the filing of and 
compliance with a plan to have such an effect could create a perverse 
incentive. EAS Participants must remain constantly vigilant in 
preventing intrusions and can only satisfy that responsibility by 
acting reasonably in all circumstances. Any negligence in protecting 
the confidentially, integrity, and availability of EAS that results in 
transmission of false alerts or non-transmission of valid EAS messages 
would establish a violation of that duty, regardless of the content of 
the plan. Furthermore, we propose that an EAS Participant's failure to 
sufficiently develop or implement their plan, would be treated as a 
violation of the proposed rules. We seek comment on the criteria or 
indicia that we should consider when determining whether a plan is 
insufficient to mitigate cyber risk. We also seek comment on any 
measures that the Commission should take to verify whether EAS 
Participants have implemented of their plans.
    92. We believe that the benefits of this proposal outweigh the 
costs. While we believe that it is impossible to quantify the precise 
dollar value of improvements to the public's safety, life, and health, 
as a general matter, we nonetheless believe that very substantial 
public safety benefits will result from the rules we propose today: EAS 
will be better able to ensure that real alerts with lifesaving 
information are successfully delivered to the public and false alerts 
are prevented in order to preserve public trust and better ensure that 
the public takes appropriate action during real emergencies. As a 
consequence, we anticipate that the rule changes we adopt today will 
yield substantial life-saving benefits. Independent of that analysis, 
the Commission has previously found that ``a foreign adversary's access 
to American communications networks could result in hostile actions to 
disrupt and surveil our communications networks, impacting our nation's 
economy generally and online commerce specifically, and result in the 
breach of confidential data.'' Consistent with the Commission's past 
analysis, our national gross domestic product was nearly $23 trillion 
last year, adjusting for inflation. Accordingly, if creating and 
implementing a cybersecurity risk management plan prevents even a 
0.005% disruption to our economy, we believe our proposed requirement 
would generate $1.15 billion in benefits. Likewise, the digital economy 
accounted for $3.31 trillion of our economy in 2020, and so we believe 
preventing a disruption of even 0.05% would produce benefits of $1.66 
billion. As a check on our analysis, consider the impact of existing 
malicious cyber activity on the U.S. economy: $57 billion to $109 
billion in 2016. Given the incentives and documented actions of hostile 
nation-state actors, reducing this activity (or preventing an expansion 
of such damage) by even 1% would produce benefits of $0.57 billion to 
$1.09 billion. Given this analysis, we believe the benefits of our rule 
to the American economy, commerce, and consumers are likely to 
significantly and substantially outweigh the costs of the proposed 
certification requirement. We seek comment on this analysis. Is there a 
more appropriate way to quantify these benefits? Are there any 
additional ways in which the proposed rules would benefit the public 
that the Commission should consider?
    93. We estimate that the overall cost of our proposed cybersecurity 
risk management plan requirement will be approximately $21 million. We 
believe that EAS Participants will, on average, require 10 hours 
annually to initially draft a plan and then update the plan and submit 
their certification annually. When developing this average we 
anticipate that many large EAS Participants already have cybersecurity 
risk management plans and will incur only de minimis costs to comply 
with this requirement. We also anticipate that many small EAS 
Participants will require less than 10 hours to develop or update a 
plan that is appropriate to the size of their organization. Based on 
this estimate, we believe that the overall cost for 25,644 EAS 
Participants to comply with the proposed certification requirement with 
10 hours of labor from a General and Operations Manager who is 
compensated at $82 per hour will be $21,028,080. We seek comment on our 
analysis.
2. WEA Security
    94. We propose to require Participating CMS Providers to certify 
that they are creating, annually updating, and implementing a 
cybersecurity risk management plan. As discussed above, WEA also faces 
security risks related to the transmission of false alerts and 
compromise of a Participating CMS Providers' systems could disrupt the 
transmission of a legitimate WEA message. Are there additional 
cybersecurity risks to WEA about which we should be aware? To what 
extent do Participating CMS Providers already have cybersecurity risk 
management plans? We believe that the approach we propose above in the 
context of EAS--wherein we would afford flexibility for providers to 
assess what content should be in their cybersecurity risk management 
plans while proposing that it demonstrate how the provider identifies 
the cyber risks that they face, the controls they use to mitigate those 
risks, and how they ensure that these controls are applied effectively 
to their operations--lends itself to WEA as well. We seek comment on 
this tentative conclusion. Are there any fundamental differences in the 
transmission of WEA alerts or the threats that WEA faces that would 
require a different approach to ensuring WEA's security? We seek 
comment on the least burdensome means by which Participating CMS 
Providers could submit their certification to the Commission, including 
via the Commission's Electronic Comment Filing System, a designated 
Commission email address, or a WEA-specific database designed for this 
purpose.
    95. As with the EAS, we propose that a cybersecurity risk 
management plan

[[Page 71554]]

should include security controls sufficient to ensure the 
confidentiality, integrity, and availability of WEA. We propose 
sufficient security measures could be demonstrated by implementing 
controls like the CISA Cybersecurity Baseline or appropriate CIS 
Implementation Group. As with EAS Participants as described above we 
propose to require that each plan include a baseline of security 
measures that address changing default passwords prior to operation, 
installing security updates in a timely manner, securing equipment 
behind properly configured firewalls or using other segmentation 
practices, requiring multifactor authentication where applicable, 
addressing the replacement of end-of-life equipment, and wiping, 
clearing, or encrypting user information before disposing of old 
devices. We expect that compliant cybersecurity risk management plans 
will not be limited to only these specific measures, as plans will need 
regular updates to keep up with an evolving threat environment. We seek 
comment on these proposed rules. Are there specific security measures 
that we should require Participating CMS Providers to implement? For 
example, as above, we seek comment on whether we should require 
Participating CMS Providers to conduct network security audits or 
vulnerability assessments to identify potential security 
vulnerabilities, implement Incident Response Plans that describe the 
procedures that Participating CMS Providers would follow when 
responding to an ongoing cybersecurity incident, or require 
Participating CMS Providers to conduct cybersecurity training for their 
employees or contractors.
    96. We believe that the benefits of this proposal for WEA outweighs 
the costs. As discussed above for EAS, we believe that the rules we 
propose today would better ensure that real WEA alerts with lifesaving 
information are successfully delivered to the public and false alerts 
are prevented in order to preserve public trust and better ensure that 
the public takes appropriate action during real emergencies. We 
estimate that the overall cost of our proposed cybersecurity risk 
management plan requirement will be approximately $62,320. We 
anticipate that many large Participating CMS Providers already have 
cybersecurity risk management plans and will incur only de minimis 
costs to comply with this requirement. We also anticipate that many 
small Participating CMS Providers will require less than 10 hours to 
develop or update a plan that is appropriate to the size of their 
organization. Based on this estimate, we believe that the overall cost 
for 76 Participating CMS Providers to comply with the proposed 
certification requirement with 10 hours of labor from a General and 
Operations Manager who is compensated at $82 per hour will be $62,320. 
We seek comment on this analysis. To what extent do Participating CMS 
Providers already implement a cybersecurity risk management framework? 
Are there alternatives that would be as effective but less burdensome, 
particularly to smaller providers? As with EAS above, we seek comment 
on whether there are industry groups, cybersecurity organizations, or 
other organizations that may be positioned to help Participating CMS 
providers create, implement, and maintain their cybersecurity risk 
management plans. What kinds of resources do these organizations offer, 
and how can Participating CMS providers make use of them?
    97. We seek comment on whether there are other categories of 
communications service providers (e.g., services that support 911 
calling) to which a cybersecurity risk management plan certification 
requirement should apply. Like emergency alerting, 911 is part of the 
nation's emergency services critical infrastructure. Similarly, like 
the nation's alert and warning capability, 911 service has faced 
instances of compromise by cyberattacks, and is regularly under threat. 
In light of those threats, should services that support 911 calling 
also be required to annually certify to creating, updating, and 
implementing cybersecurity risk management plans? If so, are there 
differences between emergency alerting and 911 that would warrant 
changes to the risk management plan requirements we propose today, if 
applied to services that support 911 calling? Are the benefits and 
costs of such a requirement commensurate with the benefits and costs of 
certification as described above?

D. Displaying Only Valid WEA Messages on Mobile Devices

    98. False alerts, such as the false ballistic missile alert that 
the Hawaii Emergency Management Agency accidentally sent during a 
training exercise in 2018, can cause panic, confusion, and damage the 
credibility of WEA. While that false alert was sent accidentally, bad 
actors could potentially exploit known WEA vulnerabilities to 
intentionally send false alerts to the public. The Commission's rules 
require Participating CMS Providers' network infrastructure to 
authenticate interactions with mobile devices and require mobile 
devices to authenticate interactions with CMS Provider infrastructure. 
In practice, however, the security handshake between Participating CMS 
Providers and mobile devices does not include a process for mobile 
devices to ensure that the base station to which it attaches is valid. 
As a result, mobile devices that are not actively engaged with a valid 
base station are vulnerable to receiving and presenting false alerts. 
This threat exists when a mobile device attempts authentication with 
the provider, switches base stations, or returns to active from idle 
mode.
    99. Accordingly, we propose to require Participating CMS Providers 
transmit sufficient authentication information to allow mobile devices 
to present WEA alerts only if they come from valid base stations. 
Ongoing work in international standards bodies suggests that 
Participating CMS Providers could achieve this outcome by transmitting 
sufficient authentication information to allow mobile devices to 
authenticate either the alert or the base station itself. For example, 
Participating CMS Providers could provide for authentication of the 
base station using a unique identifier or an encryption key. To what 
extent do Participating CMS Providers already uniquely identify 
legitimate base stations with a selection of base station 
characteristics to defend against denial-of-service attacks and fraud 
(i.e., through base station fingerprinting)? Could Participating CMS 
Providers leverage base station fingerprinting to protect the public 
from false WEA alerts through updates to WEA standards and mobile 
device firmware? Alternatively, or in addition, could WEA-capable 
mobile devices receive an appropriate encryption key from the network 
and then use that key to confirm either that an alert is authentic or 
that the base station transmitting it is authentic before presenting 
the alert? Should our rules prohibit CMS Providers and equipment 
manufacturers from marketing devices as WEA-capable unless they have 
these technical capabilities?
    100. We seek comment on the trade-offs attendant to available 
technological approaches to protecting the public from false alerts. 
Could implementation of these approaches affect the ability of non-
service initialized WEA-capable mobile devices, SIM-less WEA-capable 
mobile devices, or mobile devices that are no longer contractually 
associated with a CMS Provider to receive WEA alerts depending on the 
handset technology or generation of wireless network used? If so, how 
could the

[[Page 71555]]

Commission mitigate these potential drawbacks by refining its proposed 
rules? To the extent that technological solutions have been 
implemented, is it still possible for a false alert of this type to be 
displayed on mobile devices, and if so, under what conditions? What 
steps could be taken to further minimize or eliminate these kinds of 
false alerts?
    101. We estimate that Participating CMS Providers would incur a 
$14.5 million one-time cost to update the WEA standards and software 
necessary to comply with this requirement. This figure consists of 
approximately a $814,000 cost to update applicable WEA standards and 
approximately a $13.7 million cost to update applicable software. We 
quantify the cost of modifying standards as the annual compensation for 
30 network engineers compensated at the national average for their 
field ($120,650/year; $58/hour), plus annual benefits ($60,325/year; 
29/hour) working for the amount of time that it takes to develop a 
standard (one hour every other week for one year, 26 hours) for 12 
distinct standards. We quantify the cost of modifying software as the 
annual compensation for a software developer compensated at the 
national average for their field ($120,990/year), plus annual benefits 
($60,495/year) working for the amount of time that it takes to develop 
software (one year) at each of the 76 CMS Providers that participate in 
WEA. We seek comment on these cost estimates and the underlying cost 
methodology we are using. We also seek comment on any other costs and 
benefits that would result from this proposal. Incidents of false WEA 
alerts can cause significant confusion and diminish the public's trust 
in emergency alerts. For example, what harms could arise if an invalid 
base station sends a false alert to attendees to a public event, such 
as a parade or sporting event? For each technological approach 
considered, we urge commenters to address its effectiveness and cost of 
implementation, any additional latency that the measure could introduce 
into the delivery of WEA alerts, and the potential for the security 
measure to result in the suppression of legitimate alert content.

E. WEA Infrastructure Functionality

    102. Pursuant to the WARN Act, CMS Providers' participation in WEA 
is voluntary, but CMS Providers that elect to participate in WEA must 
comply with all the WEA rules. The WEA rules provide that WEA 
functionality, both in Participating CMS Providers' networks and in 
mobile devices, ``are dependent upon the capabilities of the delivery 
technologies implemented by a Participating CMS Provider'' and certain 
WEA protocols ``are defined and controlled by each Participating CMS 
Provider.'' The inclusion of these statements may create the mistaken 
impression that Participating CMS Providers' compliance with the rules 
that follow, including the base station authentication rules we propose 
today, would be conditioned on the Participating CMS Providers' 
delivery technology. Emergency management agencies expect WEA to work 
as intended and when needed, and this language unintentionally could 
create uncertainties about the quality of WEA service that 
Participating CMS Providers offer. For these reasons, the Commission 
proposed to remove this language from the WEA rules in 2016. T-Mobile, 
ATIS, and CTIA, the only three commenters addressing this proposal, 
urged the Commission not to adopt it because ``the rules should 
maximize the technological flexibility of CMS Providers participating 
in WEA.'' In the ten years since WEA's deployment, however, 
Participating CMS Providers have coalesced around cell broadcast as the 
wireless technology used to transmit WEA alerts to capable mobile 
devices, and ATIS has standardized system performance.
    103. Accordingly, we seek to refresh the record on our proposal to 
remove these statements from the WEA rules. We believe these provisions 
introduce confusion and are unnecessary, particularly as we do not 
expect that any Participating CMS Provider would need to make changes 
to their WEA service as a result of this proposed amendment. We seek 
comment on this proposal, particularly from any CMS Provider that would 
need to make changes to their WEA offerings in the event that the rules 
were so amended.

F. Promoting Digital Equity

    104. The Commission, as part of its continuing effort to advance 
digital equity for all, including people of color, persons with 
disabilities, persons who live in rural or Tribal areas, and others who 
are or have been historically underserved, marginalized, or adversely 
affected by persistent poverty or inequality, invites comment on any 
equity-related considerations and benefits (if any) that may be 
associated with the proposals and issues discussed herein. 
Specifically, we seek comment on how our proposals may promote or 
inhibit advances in diversity, equity, inclusion, and accessibility, as 
well the scope of the Commission's relevant legal authority.

G. Compliance Timeframes

    105. Promoting the Operational Readiness of EAS Equipment. To the 
extent that we adopt requirements to improve the operational readiness 
of EAS, we seek comment on when those rules should go into effect. For 
example, if we were to adopt rules to hasten or improve the 
Commission's visibility into the repair or replacement of non-
operational EAS equipment, should those rules go into effect 30 days 
from publication in the Federal Register of notice that the Office of 
Management and Budget has completed its review of the modified 
information collection? What factors should we consider when 
determining when alternative operational readiness requirements should 
go into effect?
    106. Improving Awareness of Unauthorized Access to EAS Equipment. 
We propose that the revision of Sec.  11.45 to require EAS Participants 
to report any incident of unauthorized access of their EAS equipment 
would be effective 60 days from publication in the Federal Register of 
notice that the Office of Management and Budget has completed its 
review of the modified information collection. We seek comment on this 
proposed timeframe. In the NDAA21 R&O, the Commission required EAS 
Participants to report false alerts to the Commission and, in a 
subsequent Public Notice, announced a compliance deadline approximately 
60 days from publication in the Federal Register of notice that the 
Office of Management and Budget has approved the modified information 
collection. We seek comment on whether an EAS Participant's process for 
ascertaining whether an incident of unauthorized access of its EAS 
equipment has occurred and reporting it to the Commission entails a 
level of effort comparable to compliance with the Commission's false 
alert reporting requirement. Would EAS Participants' compliance with 
the Commission's false alert reporting requirement reduce the 
incremental burden of compliance with this proposal?
    107. Certifying to the Implementation of Cybersecurity Risk 
Management Plans. We propose that EAS Participants and Participating 
CMS Providers must certify to the implementation of a cybersecurity 
risk management plan that includes measures sufficient to ensure the 
confidentiality, integrity, and reliability of their respective 
alerting systems within 12 months of the publication in the Federal 
Register of notice that the Office of Management and Budget has 
completed its review of the modified information collection. A

[[Page 71556]]

12-month timeframe would be intended to provide time for EAS 
Participants that do not already have a risk management plan in place 
to create one, including by preparing the organization to manage 
security and privacy risks, categorizing the systems and the 
information that it processes, stores, and transmits, and selecting 
controls to protect the system. A 12-month timeframe could also provide 
time to implement the security controls that the plan describes, assess 
whether the controls are in place, operating as intended, and producing 
the desired results, appoint a senior official to authorize the system, 
and develop mechanisms to continuously monitor control implementation 
and risks to the system. We seek comment on these proposals. Should we 
offer EAS Participants and Participating CMS Providers who are small 
businesses an additional 12 months to comply with this requirement, 
with compliance required within 24 months of publication in the Federal 
Register of notice that the Office of Management and Budget has 
completed its review of the modified information collection? Is there 
any reason why EAS and Participating CMS Providers should have 
different implementation timeframes?
    108. Displaying Only Valid WEA Messages on Mobile Devices. We 
propose that CMS Providers transmit sufficient authentication 
information to allow mobile devices to present WEA alerts only if they 
come from valid base stations 30 months from the publication of these 
rules in the Federal Register. The record in our WEA proceedings 
supports the premise that Participating CMS Providers require 12 months 
to work through appropriate industry bodies to publish relevant 
standards, another 12 months for Participating CMS Providers and mobile 
device manufacturers to develop, test, and integrate software upgrades 
consistent with those standards, and then 6 more months to deploy this 
new technology to the field during normal technology refresh cycles. We 
seek comment on the applicability of this approach and timeframe, with 
which Participating CMS Providers have experience, to this proposal. We 
seek comment, in the alternative, on whether the urgent public safety 
need to protect the public from false alerts necessitates an expedited 
compliance timeframe and, if so, what that compliance timeframe should 
be.
    109. WEA Infrastructure Functionality. We propose to remove 
language from our WEA infrastructure and mobile device rules effective 
30 days after the rules' publication in the Federal Register. We do not 
believe that Participating CMS Providers will need to make any changes 
to comply with these rules as revised because they offer a WEA service 
that is consistent with the rules as otherwise written. We seek comment 
on this compliance timeframe and on this view.

III. Ordering Clauses

    110. Accordingly, it is ordered that pursuant to sections 1, 2, 
4(i), 4(n), 301, 303(b), 303(g), 303(r), 303(v), 307, 309, 335, 403, 
624(g), and 706 of the Communications Act of 1934, as amended, 47 
U.S.C. 151, 152, 154(i), 154(n), 301, 303(b), 303(g), 303(r), 303(v), 
307, 309, 335, 403, 544(g), and 606; The Warning, Alert and Response 
Network (WARN) Act, WARN Act sections 602(a), (b), (c), (f), 603, 604, 
and 606, 47 U.S.C. 1202(a), (b), (c), (f), 1203, 1204 and 1206; the 
Wireless Communications and Public Safety Act of 1999, Public Law 106-
81, 47 U.S.C. 615, 615a, 615b; Section 202 of the Twenty-First Century 
Communications and Video Accessibility Act of 2010, as amended, 47 
U.S.C. 613, this Notice of Proposed Rulemaking is hereby ADOPTED.

List of Subjects

47 CFR Part 10

    Communications common carriers, Radio.

47 CFR Part 11

    Radio, Television.

Federal Communications Commission
Marlene Dortch,
Secretary.

Proposed Rules

    For the reasons discussed in this preamble, the Federal 
Communications Commission proposes to amend 47 CFR parts 10 and 11 as 
follows:

PART 10--WIRELESS EMERGENCY ALERTS

0
1. The authority citation for part 10 continues to read as follows:

    Authority: 47 U.S.C. 151, 154(i) and (o), 201, 303(r), 403, and 
606, 1202(a), (b), (c), (f), 1203, 1204, and 1206.

0
2. Revise Sec.  10.330 to read as follows:


Sec.  10.330  Provider infrastructure requirements.

    This section specifies the general functions that a Participating 
CMS Provider is required to perform within its infrastructure.
    (a) Distribution of Alert Messages to mobile devices.
    (b) Authentication of interactions with mobile devices, including 
the transmission of sufficient authentication information to allow 
mobile devices to only present WEA alerts from valid base stations.
    (c) Reference Points D & E. Reference Point D is the interface 
between a CMS Provider gateway and its infrastructure. Reference Point 
E is the interface between a provider's infrastructure and mobile 
devices including air interfaces.
0
3. Add Sec.  10.360 to subpart C to read as follows:


Sec.  10.360  Cybersecurity Risk Management Plan Certification.

    (a) Each participating CMS Provider shall submit a certification to 
the Commission that it has created, annually updated, and implemented a 
cybersecurity risk management plan. The cybersecurity risk management 
plan shall describe how the Participating CMS Provider employs its 
organizational resources and processes to ensure the confidentiality, 
integrity, and availability of WEA. The plan shall discuss how the 
Participating CMS Provider identifies the cyber risks that it faces, 
the controls it uses to mitigate those risks, and how it ensures that 
these controls are applied effectively to its operations. The plan 
shall address the security of all aspects of the Participating CMS 
Provider's communications systems and services that potentially could 
affect its provision of WEA messages. The plan shall be made available 
to the Commission upon request.
    (b) Participating CMS Providers shall employ sufficient security 
controls to ensure the confidentially, integrity, and availability of 
the EAS. In furtherance of this requirement, the cybersecurity risk 
management plan shall address, but not be limited to, the following 
security controls:
    (1) Changing default passwords prior to operation;
    (2) Installing security updates in a timely manner;
    (3) Securing equipment behind properly configured firewalls or 
using other segmentation practices;
    (4) Requiring multifactor authentication where applicable;
    (5) Addressing the replacement of end-of-life equipment; and
    (6) Wiping, clearing, or encrypting user information before 
disposing of old devices.
    (c) Participating CMS Providers shall take reasonable measures to 
protect the confidentiality, integrity, and availability of EAS to 
avoid the transmission of false alerts or non-transmission of valid 
Alert Messages;

[[Page 71557]]

failure to do so shall be, in addition to a violation of any specific 
provisions of this section, Sec.  11.45(a) of this chapter, or Sec.  
10.520(d), an independent breach of this duty.
0
4. Revise Sec.  10.500 introductory text as follows:


Sec.  10.500  General requirements.

    Mobile devices are required to perform the following functions:
* * * * *

PART 11--EMERGENCY ALERT SYSTEM (EAS)

0
5. The authority citation for part 11 continues to read as follows:

    Authority:  47 U.S.C. 151, 154 (i) and (o), 303(r), 544(g), 606, 
1201, 1206.

0
6. Amend Sec.  11.35 by adding paragraph (d) to read as follows:


Sec.  11.35  Equipment operational readiness.

* * * * *
    (d) Annual EAS Security Certification.
    (1) The identifying information required by the ETRS as specified 
in Sec.  11.61(a)(3)(iv) shall include a Certification to the 
Commission that the EAS Participant has created, annually updated, and 
implemented a cybersecurity risk management plan. The cybersecurity 
risk management plan shall describe how the EAS Participant employs its 
organizational resources and processes to ensure the confidentiality, 
integrity, and availability of the EAS. The plan shall discuss how the 
EAS Participant identifies the cyber risks that its faces, the controls 
it uses to mitigate those risks, and how it ensures that these controls 
are applied effectively to their operations. The plan shall address the 
security of all aspects of an EAS Participant's communications systems 
and services that potentially could affect its provision of EAS 
messages. The plan shall be made available to the Commission upon 
request.
    (2) EAS Participants shall employ sufficient security controls to 
ensure the confidentially, integrity, and availability of the EAS. In 
furtherance of this requirement, the cybersecurity risk management plan 
shall address, but not be limited to, the following security controls:
    (i) Changing default passwords prior to operation;
    (ii) Installing security updates in a timely manner;
    (iii) Securing equipment behind properly configured firewalls or 
using other segmentation practices;
    (iv) Requiring multifactor authentication where applicable;
    (v) Addressing the replacement of end-of-life equipment; and
    (vi) Wiping, clearing, or encrypting user information before 
disposing of old devices.
    (3) EAS Participants shall take reasonable measures to protect the 
confidentiality, integrity, and availability of EAS to avoid the 
transmission of false alerts or non-transmission of valid EAS messages; 
failure to do so shall be, in addition to a violation of any specific 
provisions of this section, Sec.  11.45(a), or Sec.  10.520(d) of this 
chapter, an independent breach of this duty.
0
7. Amend Sec.  11.45 by redesignating paragraph (c) as paragraph (d) 
and adding a new paragraph (c) to read as follows:


Sec.  11.45  Prohibition of false or deceptive EAS transmissions.

* * * * *
    (c) No later than seventy-two (72) hours after an EAS Participant 
knows or should have known that its EAS equipment, or communications 
systems, or services that potentially could affect their provision of 
EAS, have been accessed in an unauthorized manner, the EAS Participant 
shall provide notification to the Commission identifying, if 
applicable, the date range of the incident, a description of the 
unauthorized access, the impact to the EAS Participant's EAS 
operational readiness, a description of the vulnerabilities exploited 
and the techniques used to access the device, identifying information 
for each actor responsible for the incident, and contact information 
for the EAS Participant. When one event or set of events gives rise to 
obligations under both paragraphs (b) and (c) of this section, an EAS 
Participant remains subject to each requirement individually. The 
Participant may elect to send a single notification to the Commission 
within 24 hours providing all the information described in both 
paragraphs or separate notification to the Commission within 24 hours 
and 72 hours.
* * * * *
[FR Doc. 2022-25263 Filed 11-22-22; 8:45 am]
BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.