Securing the Information and Communications Technology and Services Supply Chain: Connected Vehicles, 15066-15072 [2024-04382]
Download as PDF
15066
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
to amend the current version of that
order, FAA Order JO 7400.11H, dated
August 11, 2023, and effective
September 15, 2023. These updates
would be published subsequently in the
next update to FAA Order JO 7400.11.
That order is publicly available as listed
in the ADDRESSES section of this
document.
FAA Order JO 7400.11H lists Class A,
B, C, D, and E airspace areas, air traffic
service routes, and reporting points.
The Proposal
The FAA is proposing to amend 14
CFR part 71 by establishing Class E
airspace extending upward from 700
feet above the surface to within a 6.4mile radius of The Sigurd Anderson
Airport, Webster, SD.
The FAA is proposing this action due
to the development of new public
instrument procedures at this airport
and to support IFR operations.
Regulatory Notices and Analyses
The FAA has determined that this
proposed regulation only involves an
established body of technical
regulations for which frequent and
routine amendments are necessary to
keep them operationally current. It,
therefore: (1) is not a ‘‘significant
regulatory action’’ under Executive
Order 12866; (2) is not a ‘‘significant
rule’’ under DOT Regulatory Policies
and Procedures (44 FR 11034; February
26, 1979); and (3) does not warrant
preparation of a regulatory evaluation as
the anticipated impact is so minimal.
Since this is a routine matter that will
only affect air traffic procedures and air
navigation, it is certified that this
proposed rule, when promulgated, will
not have a significant economic impact
on a substantial number of small entities
under the criteria of the Regulatory
Flexibility Act.
Environmental Review
ddrumheller on DSK120RN23PROD with PROPOSALS1
This proposal will be subject to an
environmental analysis in accordance
with FAA Order 1050.1F,
‘‘Environmental Impacts: Policies and
Procedures’’ prior to any FAA final
regulatory action.
§ 71.1
[Amended]
2. The incorporation by reference in
14 CFR 71.1 of FAA Order JO 7400.11H,
Airspace Designations and Reporting
Points, dated August 11, 2023, and
effective September 15, 2023, is
amended as follows:
■
Paragraph 6005 Class E Airspace Areas
Extending Upward From 700 Feet or More
Above the Surface of the Earth.
*
*
*
*
*
AGL SD E5 Webster, SD [Establish]
The Sigurd Anderson Airport, SD
(Lat 45°17′35″ N, long 94°30′49″ W)
That airspace extending upward from 700
feet above the surface within a 6.4-mile
radius of The Sigurd Anderson Airport.
*
*
*
*
*
Issued in Fort Worth, Texas, on February
27, 2024.
Martin A. Skinner,
Acting Manager, Operations Support Group,
ATO Central Service Center.
[FR Doc. 2024–04317 Filed 2–29–24; 8:45 am]
BILLING CODE 4910–13–P
DEPARTMENT OF COMMERCE
Bureau of Industry and Security
15 CFR Part 7
[Docket No. 240227–0060]
RIN 0694–AJ56
Securing the Information and
Communications Technology and
Services Supply Chain: Connected
Vehicles
In this advance notice of
proposed rulemaking (ANPRM), the
Department of Commerce’s
(Department) Bureau of Industry and
Security (BIS) seeks public comment on
issues and questions related to
transactions involving information and
communications technology and
services (ICTS) that are designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
SUMMARY:
The Proposed Amendment
In consideration of the foregoing, the
Federal Aviation Administration
proposes to amend 14 CFR part 71 as
follows:
Jkt 262001
Authority: 49 U.S.C. 106(f), 106(g); 40103,
40113, 40120; E.O. 10854, 24 FR 9565, 3 CFR,
1959–1963 Comp., p. 389.
Bureau of Industry and
Security, U.S. Department of Commerce.
ACTION: Advance notice of proposed
rulemaking.
Airspace, Incorporation by reference,
Navigation (air).
17:53 Feb 29, 2024
1. The authority citation for 14 CFR
part 71 continues to read as follows:
■
AGENCY:
List of Subjects in 14 CFR Part 71
VerDate Sep<11>2014
PART 71—DESIGNATION OF CLASS A,
B, C, D, AND E AIRSPACE AREAS; AIR
TRAFFIC SERVICE ROUTES; AND
REPORTING POINTS
PO 00000
Frm 00002
Fmt 4702
Sfmt 4702
subject to the jurisdiction or direction of
foreign countries or foreign nongovernment persons identified in the
Department’s regulations, pursuant to
the Executive Order (E.O.) entitled
‘‘Securing the Information and
Communications Technology and
Services Supply Chain,’’ and that are
integral to connected vehicles (CVs), as
defined herein. This ANPRM will assist
BIS in determining the technologies and
market participants that may be most
appropriate for regulation pursuant to
the E.O.
DATES: Comments must be received on
or before April 30, 2024.
ADDRESSES: All comments must be
submitted by one of the following
methods:
• The Federal eRulemaking Portal:
https://www.regulations.gov at docket
number BIS–2024–0005.
• Email directly to: connected
vehicles@bis.doc.gov. Include ‘‘RIN
0694–AJ56’’ in the subject line.
• Instructions: Comments sent by any
other method, to any other address or
individual, or received after the end of
the comment period, may not be
considered. For those seeking to submit
confidential business information (CBI),
please clearly mark such submissions as
CBI and submit by email, as instructed
above. Each CBI submission must also
contain a summary of the CBI, clearly
marked as public, in sufficient detail to
permit a reasonable understanding of
the substance of the information for
public consumption. Such summary
information will be posted on
regulations.gov.
FOR FURTHER INFORMATION CONTACT:
Marc Coldiron, U.S. Department of
Commerce, telephone: 202–482–3678.
For media inquiries: Jeremy Horan,
Office of Congressional and Public
Affairs, Bureau of Industry and Security,
U.S. Department of Commerce: OCPA@
bis.doc.gov.
SUPPLEMENTARY INFORMATION:
I. Authorities
On May 15, 2019, the President issued
E.O. 13873, ‘‘Securing the Information
and Communications Technology and
Services Supply Chain,’’ pursuant to the
President’s authority under the
Constitution and the laws of the United
States, including the International
Emergency Economic Powers Act
(IEEPA), the National Emergencies Act
(50 U.S.C. 1601, et seq.), and Section
301 of Title 3, United States Code. E.O.
13873 declares a national emergency
regarding the ICTS supply chain,
finding that ‘‘the unrestricted
acquisition or use in the United States
of information and communications
E:\FR\FM\01MRP1.SGM
01MRP1
ddrumheller on DSK120RN23PROD with PROPOSALS1
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
technology or services designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
foreign adversaries augments the ability
of foreign adversaries to create and
exploit vulnerabilities in information
and communications technology or
services, with potentially catastrophic
effects, and thereby constitutes an
unusual and extraordinary threat to the
national security, foreign policy, and
economy of the United States.’’ The E.O.
further notes that ‘‘[t]his threat exists
both in the case of individual
acquisitions or uses of such technology
or services, and when acquisitions or
uses of such technologies are considered
as a class.’’
In accordance with the National
Emergencies Act, the President has
declared each year since E.O. 13873 was
published that the national emergency
continues in effect. Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 85 FR 29321
(May 14, 2020); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 86 FR 26339
(May 13, 2021); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 87 FR 29645
(May 13, 2022); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 88 FR 30635
(May 11, 2023).
To address identified risks to national
security from ICTS transactions, E.O.
13873 grants the Secretary of Commerce
(Secretary) (in consultation with other
agency heads identified in the E.O.) the
authority to review and, if necessary,
impose mitigation measures on or
prohibit any ICTS transaction, which
includes any acquisition, importation,
transfer, installation, dealing in, or use
of any ICTS by any person, or with
respect to any property, subject to
United States jurisdiction, when the
transaction involves any property in
which a foreign country or national has
any interest. In order to require
mitigation for or to prohibit an ICTS
transaction or class of transactions, the
Secretary, in consultation with other
agency heads, must first determine that
the ICTS transaction or class of
transactions at issue: (1) involves ICTS
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
VerDate Sep<11>2014
17:53 Feb 29, 2024
Jkt 262001
jurisdiction or direction of a foreign
adversary, which the E.O. defines as
‘‘any foreign government or foreign nongovernment person engaged in a longterm pattern or serious instances of
conduct significantly adverse to the
national security of the United States or
security and safety of United States
persons;’’ and (2) poses:
A. an undue risk of sabotage to or
subversion of the design, integrity,
manufacturing, production, distribution,
installation, operation, or maintenance
of information and communications
technology or services in the United
States;
B. an undue risk of catastrophic
effects on the security or resiliency of
United States critical infrastructure or
the digital economy of the United
States; or
C. otherwise poses an unacceptable
risk to the national security of the
United States or the security and safety
of United States persons.
These factors are collectively referred
to as ‘‘undue or unacceptable risks.’’
E.O. 13873 additionally provides the
Secretary with the authority to issue
rules establishing criteria by which
particular technologies or market
participants may be categorically
included in or categorically excluded
from prohibitions established pursuant
to the E.O. To date, the Department has
not pursued or used this authority to
regulate ICTS transactions on a
category- or class-wide basis.
Furthermore, E.O. 13873 grants the
Secretary the authority to identify a
mechanism and relevant factors for the
negotiation of mitigation measures that
would allow approval of an otherwise
prohibited transaction.
II. Background
a. Purpose
Pursuant to the authority delegated to
the Secretary under E.O. 13873, BIS is
considering proposing rules that would
prohibit certain ICTS transactions or
classes of ICTS transactions by or with
persons who design, develop,
manufacture, or supply ICTS integral to
CVs and are owned by, controlled by, or
subject to the jurisdiction or direction of
foreign governments or foreign nongovernment persons identified at 15
CFR 7.4 (hereinafter referred to as ‘‘15
CFR 7.4 entities’’). BIS is also
considering proposing measures that
would allow market participants to
engage in otherwise prohibited
transactions or classes of transactions if
the undue or unacceptable risks of those
ICTS transactions can be sufficiently
mitigated using measures that are
monitorable.
PO 00000
Frm 00003
Fmt 4702
Sfmt 4702
15067
The purpose of this ANPRM is to
gather information to support BIS’s
potential development of a rule
regarding ICTS integral to CVs. In
particular, BIS seeks public input on
certain definitions and its assessment of
how a class of transactions involving
ICTS integral to CVs, when designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
a 15 CFR 7.4 entity, could present
undue or unacceptable risks to U.S.
national security. These include risks
related to threats from 15 CFR 7.4
entities, capabilities of CVs that may
increase the likelihood of
vulnerabilities, and consequences to
U.S. persons and critical infrastructure
if these vulnerabilities are exploited or
intentionally inserted by 15 CFR 7.4
entities. BIS solicits input on the ICTS
most integral to CVs and most
vulnerable to compromise, as well as
input on mechanisms to address
identified risks through potential
design, implementation standards and
protocols, manufacturing integrity
protection systems and procedures, or
prohibitions.
BIS recognizes the benefits of CV
technologies and does not imply
through this ANPRM that technologies
such as vehicle-to-everything (V2X)
communications are generally unsafe for
use in the United States. Indeed, these
new vehicles often provide safer, more
fuel-efficient travel. However, E.O.
13873 is focused on risks that ICTS
transactions might present to national
security. Therefore, this ANPRM, which
is being issued pursuant to the
authorities granted under E.O. 13873,
seeks public comment on potential
means to narrowly address involvement
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
15 CFR 7.4 entities in the design,
development, manufacture, or supply of
ICTS integral to CVs where that
involvement may create undue or
unacceptable risk to U.S. national
security.
Additionally, BIS seeks comment on
whether to create a process for the
public to request approval to engage in
an otherwise prohibited transaction by
demonstrating that a particular
transaction adequately addresses the
risk to U.S. national security. BIS
encourages public feedback to help
inform the rulemaking process,
particularly regarding transactions
where ICTS supply chains may be
impacted by any proposed rule.
b. Definitions
As an initial matter, BIS is interested
in receiving comments on the applicable
E:\FR\FM\01MRP1.SGM
01MRP1
ddrumheller on DSK120RN23PROD with PROPOSALS1
15068
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
definition for connected vehicle or CV
within the context of transactions
involving ICTS incorporated into such
vehicles. BIS could define a connected
vehicle as an automotive vehicle that
integrates onboard networked hardware
with automotive software systems to
communicate via dedicated short-range
communication, cellular
telecommunications connectivity,
satellite communication, or other
wireless spectrum connectivity with any
other network or device. Such a
definition would likely include
automotive vehicles, whether personal
or commercial, capable of global
navigation satellite system (GNSS)
communication for geolocation;
communication with intelligent
transportation systems; remote access or
control; wireless software or firmware
updates; or on-device roadside
assistance.
CVs also integrate hardware that
enables connectivity within the vehicle
and/or external connectivity with
devices, networks, applications, and
services outside the vehicle. CV safety
applications are designed to increase
situational awareness and reduce traffic
accidents through vehicle-to-vehicle
(V2V), vehicle-to-infrastructure (V2I),
and increasingly, V2X communications,
as contemplated in a series of
Department of Transportation
workshops focusing on V2X
communications titled ‘‘Saving Lives
with Connectivity.’’ See Bill Canis,
Cong. Research Serv., R46398, Motor
Vehicle Safety: Issues for Congress 8
(2021), https://sgp.fas.org/crs/misc/
R46398.pdf; U.S. Dep’t of Transp., ITS
V2X Communications Summit (2023),
https://www.its.dot.gov/research_areas/
emerging_tech/htm/ITS_V2X_
CommunicationSummit.htm.
BIS arrived at this definition by
reviewing existing definitions for
connected vehicles from trade
associations and leading research
publications including the Connected
Vehicle Reference Implementation
Architecture, U.S. Department of
Transportation’s Intelligent
Transportation Systems Joint Program
Office, Institute of Electrical and
Electronics Engineers research, and
Society of Automotive Engineers
standards.
Various terms exist across industry
and the U.S. Government to refer to
vehicles that exhibit the connected
features explained above. In addition to
input on the term connected vehicle,
BIS is seeking comment on alternative
terminology that might better
correspond to the definition of
connected vehicle discussed above.
Such terminology could include
VerDate Sep<11>2014
17:53 Feb 29, 2024
Jkt 262001
‘‘networked vehicles,’’ ‘‘intelligent
connected vehicles,’’ ‘‘software-defined
vehicles,’’ or ‘‘connected autonomous
vehicles.’’
This ANPRM seeks comment on the
definitions to use for a rule regarding
transactions involving ICTS integral to
CVs, and specifically:
1. In what ways, if any, should BIS
elaborate on or amend the potential
definition of connected vehicle stated
above? If amended, how will the revised
definition enable BIS to better address
national security risks arising from
classes of transactions involving ICTS
integral to CVs?
2. Is the term connected vehicles
broad enough to include autonomous
vehicles and related equipment, electric
vehicles, or other alternative power
sources and related technologies? Does
a better term exist to describe the
broader scope?
3. Are there other commonly used
definitions for CVs that BIS should
consider when defining a class of ICTS
transactions, including definitions from
industry, civil society, and foreign
entities? If so, why would those
definitions be more appropriate for the
purposes of a rule?
c. Risks Associated With Connected
Vehicles
The automotive industry is constantly
undergoing innovation and change, and
as communications and broadband
technology advance, so do the
technologies used in automobiles.
Particularly relevant for the purposes of
this ANPRM, new technology has fueled
a rise in interconnectivity and
autonomous capabilities in new
vehicles. An automobile’s value is no
longer determined only by the engine,
steering system, and other traditional
automotive parts. Increasingly, an
automobile is a compilation of on-board
computers; sensors; cameras; batteries;
and various other categories of ICTS
software or hardware tied together
through automotive software systems.
Over time, vehicle connections to the
internet will evolve even further and
new communication technology will
advance vehicle capabilities. These
technological advances will continue to
rely on significant data collection not
only about the vehicle and its myriad
components, but also the driver, the
occupants, the vehicle’s surroundings,
and nearby infrastructure. Moreover,
CVs allow for information to be gathered
and shared to address both individual
and societal transportation needs. These
technologies may expose the vehicles,
and the sectors they support, to new
cyber-enabled attack vectors and
vulnerabilities, with the potential to
PO 00000
Frm 00004
Fmt 4702
Sfmt 4702
create novel and potentially profound
risks to national security and public
safety. Cyber-enabled vulnerabilities can
be exacerbated if the ICTS integral to
CVs is designed, developed,
manufactured, or supplied, by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a 15 CFR
7.4 entity.
i. Threat From 15 CFR 7.4 Entities
E.O. 13873 defines the term ‘‘foreign
adversary’’ to mean any foreign
government or foreign non-government
person engaged in a long-term pattern or
serious instances of conduct
significantly adverse to the national
security of the United States or security
and safety of U.S. persons. In the rules
implementing the E.O. at 15 CFR 7.4(a),
the Secretary has identified the
following as foreign adversaries: the
People’s Republic of China, including
the Hong Kong Special Administrative
Region (PRC); Republic of Cuba; Islamic
Republic of Iran; Democratic People’s
Republic of Korea; Russian Federation;
and Venezuelan politician Nicola´s
Maduro (Maduro Regime).
The incorporation of ICTS products
and services used in the United States
from persons owned by, controlled by,
or subject to the jurisdiction or direction
of 15 CFR 7.4 entities’ can offer a direct
entry point to sensitive U.S. technology
and data and bypass measures intended
to protect U.S. persons’ safety and
security. This may allow actors with
insider access to gain entry to the
systems the ICTS connects to and
ultimately engage in malicious cyber
activity. Consequently, this exploitation
may result in undue risks to ICTS and
critical infrastructure in the United
States and unacceptable risks to
national security.
The PRC presents a particularly acute
and persistent threat to the United
States ICTS supply chain. According to
the Office of the Director of National
Intelligence, the PRC likely represents
the broadest, most active, and persistent
cyber espionage threat to U.S.
Government and private-sector
networks. See Off. Of the Director of
Nat’l Intelligence, Annual Threat
Assessment of the U.S. Intelligence
Community 10 (2023), https://
www.dni.gov/files/ODNI/documents/
assessments/ATA-2023-UnclassifiedReport.pdf. The PRC is almost certainly
capable of launching cyber-attacks that
could disrupt critical infrastructure
services within the United States and
has conducted cyber espionage
operations that have compromised
telecommunications firms, providers of
managed services, and broadly used
software. Id. At 10. In short, the PRC has
E:\FR\FM\01MRP1.SGM
01MRP1
ddrumheller on DSK120RN23PROD with PROPOSALS1
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
engaged in a pattern of hacking and
cyber intrusion that demonstrates the
PRC’s intent to compromise and exploit
U.S. ICTS supply chains and critical
infrastructure, threatening U.S. national
security.
The PRC’s legal structure also gives
broad authority to the state to co-opt
private companies to pursue its
objectives. A host of laws give the PRC
government the authority to compel
companies located in the PRC,
including automakers and their
suppliers, to cooperate with PRC
intelligence and security services. The
PRC’s 2021 Data Security Law, for
example, makes all private data
available to the PRC state when it is
needed for ‘‘national security.’’ See
National People’s Congress, Data
Security Law of the People’s Republic of
China, Art. 35, https://www.npc.gov.cn/
englishnpc/c2759/c23934/202112/
t20211209_385109.html. The PRC’s
2017 National Intelligence Law imposes
affirmative obligations on entities and
persons subject to the PRC’s jurisdiction
to cooperate with intelligence
agencies—Article 17 allows PRC
intelligence officials to take control of a
private organization’s facilities,
including its communications
equipment. See National People’s
Congress, National Intelligence Law (as
amended, 2018), https://
www.npc.gov.cn/npc/c2/c30834/
201905/t20190521_281475.html. The
PRC’s 2015 National Security Law
obliges citizens and private companies
to provide security and military
agencies with all ‘‘necessary support
and assistance.’’ See State Council of the
People’s Republic of China, National
Security Law, Art. 77(5), https://
www.gov.cn/zhengce/2015-07/01/
content_2893902.htm. Beyond legal
obligations, companies established in
the PRC may be required to create
internal Chinese Communist Party
(CCP) committees that can exercise
influence over corporate decisions. See
National People’s Congress, Company
Law of the People’s Republic of China,
Art. 19, https://www.npc.gov.cn/zgrdw/
npc/xinwen/2018-11/05/content_
2065671.htm.
The combination of legal authorities
and opaque CCP influence make private
companies that are subject to the PRC’s
jurisdiction susceptible to requests from
intelligence and military officials. PRC
officials can compel PRC firms to
provide the PRC government with data,
logical access, encryption keys, and
other vital technical information, as
well as to install backdoors or bugs in
equipment which create security flaws
easily exploitable by PRC authorities.
U.S. Dep’t of Homeland Security, Data
VerDate Sep<11>2014
17:53 Feb 29, 2024
Jkt 262001
Security Business Advisory: Risks and
Considerations for Businesses Using
Data Services and Equipment from
Firms Linked to the Peoples Republic of
China 2 (2020), https://www.dhs.gov/
sites/default/files/publications/20_
1222_data-security-businessadvisory.pdf. Original equipment
manufacturers (OEMs) for vehicles in
the PRC, due to the vast amounts of data
generated by their products, are notable
targets for government access.
According to open-source reporting,
over 200 automakers that operate in the
PRC are legally obligated to transmit
real-time vehicle data, including
geolocation information, to government
monitoring centers. See Erika Kinetz, In
China Your Car Could Be Talking To
The Government, Associated Press
News (Nov. 29, 2018), https://apnews.
com/article/4a749a42119047848
26b45e812cff4ca. This pervasive data
sharing, which provides the PRC
government with detailed information
on the behaviors and habits of
individuals, is indicative of a broader
approach to co-opting private
companies—one that raises significant
concerns about how the PRC
government might exploit the growing
presence of PRC OEMs and
manufacturers of ICTS integral to CVs in
foreign markets. The combination of
these factors uniquely elevates BIS’s
concern regarding PRC participation in
the ICTS supply chain for CVs in the
United States.
BIS seeks to better understand the role
of persons owned by, controlled by, or
subject to the jurisdiction or direction of
15 CFR 7.4 entities, particularly the
PRC, in the ICTS supply chain for CVs,
and the leverage these entities might
exert as a result. In particular, the
ANPRM seeks comments on the
following issues:
4. Please describe the ICTS supply
chain for CVs in the United States.
Particularly useful responses may
include information regarding:
a. categories of ICTS, such as software
or hardware, that are integral to CVs
operating in the United States;
b. market leaders for each distinct
phase of the supply chain for ICTS
integral to CVs (such as design,
development, manufacturing, or supply)
including, but not limited to: OEMs, tier
one, tier two, and tier three suppliers,
and service providers;
c. geographic locations where
software (such as the vehicle operating
system), hardware (such as light
detection and ranging (LiDAR) sensors),
or other ICTS components integral to
CVs in use in the United States are
designed, developed, manufactured, or
supplied;
PO 00000
Frm 00005
Fmt 4702
Sfmt 4702
15069
d. involvement in any sector or subsector of the U.S. ICTS supply chain for
CVs by persons owned by, controlled
by, or subject to the jurisdiction or
direction of a 15 CFR 7.4 entity; and
e. geographic locations where data
from CVs in use in the United States is
transmitted, stored, or analyzed.
5. Are there ICTS integral to CVs for
which persons owned by, controlled by,
or subject to the jurisdiction or direction
of a 15 CFR 7.4 entity are sole source
suppliers? To what extent do OEMs of
CVs in use in the United States rely
upon suppliers wholly or partially
owned by a company based in or under
the control of a 15 CFR 7.4 entity?
6. In what ICTS hardware or software
for CVs do persons owned by,
controlled by, or subject to the
jurisdiction or direction of a 15 CFR 7.4
entity maintain a technological
advantage over U.S. and other foreign
counterparts and how may this dynamic
evolve in the coming years?
7. How, and to what degree, does CV
automotive software connect to GNSS
systems that are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a 15 CFR
7.4 entity? for geolocation and other
functions?
8. How might a disruption to the
supply of ICTS components for CVs in
use in the United States, including
hardware and software, from persons
owned by, controlled by, or subject to
the jurisdiction or direction of a 15 CFR
7.4 entity affect OEMs of CVs in use in
the United States and ICTS suppliers?
Where possible, please specify which
disruptions to component supply would
be particularly detrimental.
9. To what extent can OEMs procure
alternative sources of ICTS integral to
CVs that do not constitute ICTS from
persons owned by, controlled by, or
subject to the jurisdiction or direction of
15 CFR 7.4 entities?
10. Please describe the relationship
between OEMs of CVs in use in the
United States and their ICTS suppliers.
Particularly useful responses may
include the type of information that is
shared between OEMs of CVs in use in
the United States and their ICTS
suppliers in the normal course of
business, how this information is
shared, what access or administrative
privileges are typically granted, and if
suppliers have any capability for remote
access or ability to provide firmware or
software updates.
11. What risks might be posed by
aftermarket ICTS integrated onboard
CVs and interfaced with vehicle
systems, such as tracking devices,
cameras, and wireless-enabled
E:\FR\FM\01MRP1.SGM
01MRP1
15070
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS1
diagnostic interfaces? Should
aftermarket automotive systems or
components be considered integral to
CV operation?
12. To what extent are ICTS
components of CVs designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
a 15 CFR 7.4 entity present in critical
infrastructure sectors? Are there
instances of municipal, state, or federal
funding for procurement of such 15 CFR
7.4 entities’ ICTS integral to CVs for use
in critical infrastructure sectors?
13. What other instances exist where
persons owned by, controlled by, or
subject to the jurisdiction or direction of
a 15 CFR 7.4 entity, are integrated into
the ICTS supply chain for CVs?
ii. Capabilities of Connected Vehicles
May Increase the Likelihood of
Vulnerabilities 15 CFR 7.4 Entities
Could Exploit
CVs and the components that enable
their functionality present opportunities
for exploitation by 15 CFR 7.4 entities
via insider access, which could
potentially result in severe
consequences to U.S. persons and
critical infrastructure. Increasing the
number and scope of wireless connected
components in a vehicle also increases
the attack surfaces through which a
malicious actor can gain initial entry. As
CVs gain new and different connectivity
capabilities, design, implementation,
and operational protocols need to be
added to address new attack surfaces
and maintain the confidentiality,
integrity, and availability of the data
that traverse any one functional system.
As demonstrated in controlled
environments, attack vectors can be
exploited and may provide access to
other functional systems within a CV.
Moreover, once one subsystem has been
compromised, depending on the nature
of the vulnerability and the design of
the vehicle network architecture, the
attacker might have the ability to move
laterally and eventually gain access to
other functional automotive systems.
While integrated functionality may
provide seamless communication,
comfort, and operability for the
consumer, it is possible that
unauthorized remote access to a
particular sensor system could be
escalated to vehicle systems and
operations, potentially resulting in
injury, loss of life, and disruption to
critical infrastructure networks.
Preliminarily, BIS has identified the
following capabilities associated with
CVs that may increase the likelihood of
vulnerabilities that 15 CFR 7.4 entities
could exploit:
VerDate Sep<11>2014
17:53 Feb 29, 2024
Jkt 262001
Data Collection: CVs rely on the
collection and integration of broad and
varied data to improve the vehicle’s
functionality and safety. This data,
which can encompass vehicle-level data
(e.g., driver behavior, vehicle status,
geolocation, biometrics, driver mobile
phone data) and environmental-level
data (e.g., detailed mapping data, object
detection, traffic patterns), are extracted
through various onboard systems and
sensors. The Advanced DriverAssistance System (ADAS) of a CV, for
example, typically relies on a
combination of sensors—radar, LiDAR,
ultrasonic, audio, and video—that are
constantly collecting and processing
data. CVs now collect data inside the
cockpit as well. Consumer and
commercial CVs increasingly
incorporate driver monitoring systems
(DMS) to ensure the driver remains alert
and fully able to take control of the car
should autonomous systems fail, and to
ensure commercial truck drivers remain
on schedule. More sophisticated DMS
feature driver-facing cameras—
including eye tracking, facial
recognition, and microphones—collect
potentially sensitive information about
drivers and passengers. This increases
the sensitivity of the data that CVs
collect, potentially providing 15 CFR 7.4
entities with access to biometric
information in addition to
environmental data.
Connectivity: CVs are connected to
and can communicate with a range of
external sources, including the OEM
and third-party service providers, as
well as in-car devices like smart phones.
In an increasing subset of vehicles,
telematics systems connect the vehicle
with cloud-based services to provide
onboard systems with external data
streams (e.g., geolocation, streaming
service, assistance service, emergency
notification) and underlie many of a
CV’s core functionalities. V2X systems,
when widely implemented, will support
the broadcast and reception of messages
that enable safety alerts and mobility
advisories. Providing broadcast (radio)
communication capabilities that
facilitate driver assistance capabilities
may open cybersecurity vectors that
need to be addressed to ensure
broadcast message integrity and
authenticity through design, standards,
implementation and manufacturing
protocols, and to prevent possible
message and transmission misbehavior.
Further, interconnectivity in the
software or hardware components may
amplify risks posed by ICTS integral to
CVs that are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a 15 CFR
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
7.4 entity. For example, OEMs enable
communication with their vehicle after
sale even when a customer does not
subscribe to services, including by
providing software updates and
refinements, as well as by enabling or
disabling subscription-based features.
This access by the OEM to the CV
provides numerous opportunities for 15
CFR 7.4 entities that own, control, or
have the ability to exert jurisdiction or
direction over the OEM, to insert
vulnerabilities allowing for future
backdoor attacks and other malicious
behavior. Additionally, individually
connected components and sensors are
capable of transmitting data separately
from the vehicle’s broader
communications suite, including
receiving over the air (OTA) updates
without the knowledge or consent of the
vehicle owner or OEM. BIS seeks to
better understand the capabilities
associated with technical trends—both
current and future—in CV design and
the ICTS components therein. In
particular, the ANPRM seeks further
comment on the following:
14. What is the full scope of data
collection capabilities in CVs and the
aggregation and scale of data that CVs
could collect on U.S persons, entities,
geography, and infrastructure? Who has
authorized access to, or control of, data
collected by CVs?
15. What types of remote access or
control do OEMs have over their CVs?
Please describe what software or other
mechanisms allow for such remote
access or control by the OEM to occur.
16. What cybersecurity concerns may
arise from linkages between sensors in
CVs? To what extent can individual
sensors and components communicate
OTA independently from the CV’s
Operating System (OS)?
17. What standards, best practices,
and industry norms are used to secure
the interconnection between vehicles
and charging infrastructure? How are
battery management systems (BMS)
integrated into a vehicle’s automotive
software systems, and how are they
protected from malware?
18. How do manufacturers
supplement existing cybersecurity
standards and best practices such as the
National Highway Traffic Safety
Administration’s Cybersecurity Best
Practices for the Safety of Modern
Vehicles at each step of the CV supply
chain, including design, manufacturing,
and operation?
a. Particularly useful responses will
be specific about the types of programs
and practices used such as test and
verification, bug bounties, white hat
programs, or end-to-end encryption to
secure the link between vehicle and
E:\FR\FM\01MRP1.SGM
01MRP1
ddrumheller on DSK120RN23PROD with PROPOSALS1
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
server. See Nat’l Highway Traffic Safety
Admin., Cybersecurity Best Practices for
the Safety of Modern Vehicles (2022),
https://www.nhtsa.gov/sites/nhtsa.gov/
files/2022-09/cybersecurity-bestpractices-safety-modern-vehicles-2022tag.pdf; see also Cybersecurity and
Infrastructure Security Agency,
Autonomous Ground Vehicle Security
Guide: Transportation Systems Sector
(2021), https://www.cisa.gov/resourcestools/resources/autonomous-groundvehicle-security-guide.
19. Please describe the automotive
software development cycle. BIS is
particularly interested in learning:
a. The degree to which OEMs license
software, as opposed to developing it
internally;
b. The extent to which software is
developed outside the United States
and, if so, where;
c. What measures are taken to ensure
software security and integrity during
the development cycle;
d. If OEMs partner or co-develop
automotive software with any persons
owned by, controlled by, or subject to
the jurisdiction or direction of a 15 CFR
7.4 entity; and
e. The extent to which software that
is embedded in hardware (e.g.,
firmware) is subject to the development
cycle described above.
20. Please describe the relationship
between CV OEMs and cloud service
providers (CSPs). Particularly useful
responses may describe what access
privileges, controls, and remote
capabilities with respect to CV OEM
systems are afforded to the CSP.
Additionally, what are the common
shared responsibility models between a
CSP and a CV OEM and how are the
communication and systems protected?
21. How do CV OEMs verify the bill
of materials and software bill of
materials as authentic for vendors and
suppliers, specifically regarding OS,
telematic systems, ADAS, Automated
Driving Systems (ADS), satellite or
cellular telecommunication systems,
and BMS? If a software bill of materials
is required, to what extent does it
provide information regarding software
vulnerabilities, and how is this
information used, stored, and protected?
22. To what extent is software from
vendors and suppliers tested and
verified to comply with OEM
requirements?
23. What vendor-vetting and supply
chain security practices do OEMs
employ when procuring ICTS integral to
CVs?
iii. Consequences
The ability of a 15 CFR 7.4 entity to
compel private companies through
VerDate Sep<11>2014
17:53 Feb 29, 2024
Jkt 262001
applicable legal frameworks, combined
with the exploitation of vulnerabilities
created by the increase in capabilities of
the ICTS integral to CVs, has the
potential to create severe and, in certain
instances, catastrophic consequences for
U.S. persons and critical infrastructure.
Through ICTS designed, developed,
manufactured, or supplied by persons
subject to the ownership, control,
jurisdiction, or direction of a 15 CFR 7.4
entity, the intelligence agencies of that
entity could obtain access to a wide
range of information from companies in
the CV ICTS supply chain to exfiltrate,
collect, and aggregate sensitive data on
U.S. persons. These data include
location, traffic patterns, audio and
video recordings of the inside and
outside of the car, as well as information
about the driver’s identity, finances,
contacts, and home address, which can
be collected by CVs themselves or by a
passenger’s mobile device connected to
a CV.
In addition, backdoors embedded in a
CV’s software could enable a 15 CFR 7.4
entity under certain conditions to obtain
control over various vehicle functions
that could include the ability to disable
the vehicle completely. A group of
researchers were able to demonstrate a
vulnerability in an OEM’s Bluetooth
software that allowed access to some
vehicle control systems, initiating
remote actions such as activating the
brakes and turning the steering wheel.
See Consumer Watchdog, Kill Switch:
Why Connected Cars Can Be Killing
Machines and How to Turn Them Off
37–40 (2019), https://consumer
watchdog.org/sites/default/files/201907/KILL%20SWITCH%20%207-2919.pdf. A similar ability in the hands of
a 15 CFR 7.4 entity that can control or
direct an OEM could allow that entity
to disable the controls on an individual
vehicle while it was being driven or to
sabotage entire fleets without having
physical access to the vehicles. Finally,
because of CVs’ connectivity, they could
be used to access multiple critical
infrastructure systems with which they
interact, including telecommunications
networks, transportation systems, and
the electrical grid. As CV technology
advances, vehicles and charging
infrastructure may increasingly
communicate with these systems to
manage traffic flows and grid load. As
such, the proliferation of CVs containing
vulnerable ICTS from persons owned
by, controlled by, or subject to the
jurisdiction or direction of a 15 CFR 7.4
entity could provide that entity with a
platform for launching distributed
denial of service attacks against
intelligent transportation systems,
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
15071
satellite or cellular communications
hardware, or other critical
infrastructure. See Mohammad Ali
Sayed, et al., Electric Vehicle Attack
Impact on Power Grid Operation, 137
Int’l J. Electrical Power & Energy Sys.
107784 (2022), https://www.science
direct.com/science/article/abs/pii/
S0142061521010048; Numaan Huq, et
al., Cybersecurity for Connected Cars:
Exploring Risks in 5G, Cloud, and Other
Connected Technologies, Trend Micro
Res. (2021), https://documents.trend
micro.com/assets/white_papers/wpcybersecurity-for-connected-carsexploring-risks-in-5g-cloud-and-otherconnected-technologies.pdf; Anastasios
Giannaros, et al., Autonomous Vehicles:
Sophisticated Attacks, Safety Issues,
Challenges, Open Topics, Blockchain,
and Future Directions, 3 J. of
Cybersecurity and Privacy 493 (2023).
Given these threats, vulnerabilities, and
potential consequences, BIS is
considering identifying the following
automotive software systems as the
ICTS integral to CVs most likely to
present undue or unacceptable risks if
exploited by 15 CFR 7.4 entities: (i)
vehicle OS; (ii) telematics systems; (iii)
ADAS; (iv) ADS; (v) satellite or cellular
telecommunication systems; and (vi)
BMS.
As BIS considers whether and how to
regulate these software systems, it seeks
additional information, including:
24. Are there ICTS integral to CVs
other than those identified in this
ANPRM that could present material
risks if they were designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction of a 15 CFR 7.4 entity?
If so, please discuss how the ICTS could
be exploited to pose such a risk.
25. Of the ICTS integral to CVs
identified in this ANPRM, which
present the greatest risk to safety or
security if they are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a 15 CFR
7.4 entity?
26. As ADS systems evolve and
developers rely on cellular systems to
communicate with ADS-enabled
vehicles to support overall operational
capability (e.g., communications to a
fleet management office), what should
the U.S. government consider in order
to support the development of this
technology securely from 15 CFR 7.4
entity malign activity?
III. Additional Questions for Comment
This ANPRM seeks comment on
processes and mechanisms that BIS
could implement in a potential rule to
authorize an otherwise prohibited ICTS
E:\FR\FM\01MRP1.SGM
01MRP1
15072
Federal Register / Vol. 89, No. 42 / Friday, March 1, 2024 / Proposed Rules
transaction with the adoption of
mitigation measures.
ddrumheller on DSK120RN23PROD with PROPOSALS1
Authorizations and Mitigations
27. In what instances would granting
a temporary authorization to engage in
an otherwise prohibited transaction
under a proposed rule be necessary and
in the interest of the United States to
avoid supply chain disruptions or other
unintended consequences?
28. What review criteria should BIS
implement when considering an
application for a temporary
authorization?
29. What specific standards,
mitigation measures, or cybersecurity
best practices should BIS consider when
evaluating the appropriateness of a
requested authorization?
30. Are there any U.S. government
models, such as the Office of Foreign
Assets Control’s sanctions programs or
the Export Administration Regulations,
that this program should consider
emulating in granting authorizations?
Economic Impact
31. What economic impacts to U.S.
businesses or the public, if any, might
be associated with the regulation of
ICTS integral to CVs contemplated by
this ANPRM? If responding from
outside the United States, what
economic impacts to local businesses
and the public, if any, might be
associated with regulations of ICTS
integral to CVs?
32. What, if any, anticompetitive
effects may result from regulation of
ICTS that is integral to CVs as
contemplated by this ANPRM? And
what, if anything, can be done to
mitigate the anticompetitive effects of
regulation of ICTS?
33. What types of U.S. businesses or
firms (e.g., small businesses) would
likely be most impacted by the program
contemplated in this ANPRM? If
responding from outside the United
States, what types of local businesses or
firms (e.g., small businesses) would
likely be most impacted by the program
contemplated in this ANPRM?
34. What actions can BIS take, or
provisions could it add to any proposed
regulations, to minimize potential costs
borne by U.S. businesses or the public?
If responding from outside the United
States, what actions can BIS take, or
what provisions could it add to any
proposed regulations, to minimize
potential costs borne by local businesses
or the public?
35. What new due diligence,
compliance, and recordkeeping controls
will U.S. persons anticipate needing to
undertake to comply with any proposed
regulations regarding ICTS integral to
VerDate Sep<11>2014
17:53 Feb 29, 2024
Jkt 262001
CVs that are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of 15 CFR
7.4 entities?
Elizabeth L.D. Cannon,
Executive Director, Office of Information and
Communications Technology and Services.
[FR Doc. 2024–04382 Filed 2–29–24; 8:45 am]
BILLING CODE 3510–33–P
FEDERAL TRADE COMMISSION
16 CFR Part 461
RIN 3084–AB71
Trade Regulation Rule on
Impersonation of Government and
Businesses
Federal Trade Commission.
Supplemental notice of
proposed rulemaking; request for public
comment.
AGENCY:
ACTION:
The Federal Trade
Commission (FTC or Commission)
requests public comment on its proposal
to amend the trade regulation rule
entitled Rule on Impersonation of
Government and Businesses
(Impersonation Rule or Rule) to revise
the title of the Rule, add a prohibition
on the impersonation of individuals,
and extend liability for violations of the
Rule to parties who provide goods and
services with knowledge or reason to
know that those goods or services will
be used in impersonations of the kind
that are themselves unlawful under the
Rule. The Commission believes these
changes are necessary and such
impersonation is prevalent, based on all
comments it received on the Rule and
other information discussed in this
document. The Commission now
solicits written comment, data, and
arguments concerning the utility and
scope of the proposed revisions to the
Impersonation Rule.
DATES: Comments must be received on
or before April 30, 2024.
ADDRESSES: Interested parties may file a
comment online or on paper by
following the instructions in the
Comment Submissions part of the
SUPPLEMENTARY INFORMATION section
below. Write ‘‘Impersonation SNPRM,
R207000’’ on your comment and file
your comment online at https://
www.regulations.gov. If you prefer to
file your comment on paper, mail your
comment to the following address:
Federal Trade Commission, Office of the
Secretary, 600 Pennsylvania Avenue
NW, Mail Stop H–144 (Annex I),
Washington, DC 20580.
SUMMARY:
PO 00000
Frm 00008
Fmt 4702
Sfmt 4702
FOR FURTHER INFORMATION CONTACT:
Claire Wack, cwack@ftc.gov, (202–326–
2836).
SUPPLEMENTARY INFORMATION: The
Commission invites interested parties to
submit data, views, and arguments on
the proposed amendments to the
Impersonation Rule and, specifically, on
the questions set forth in Section VIII of
this supplementary notice of proposed
rulemaking (‘‘SNPRM’’). The comment
period will remain open until April 30,
2024. To the extent practicable, all
comments will be available on the
public record and posted at the docket
for this rulemaking on https://
www.regulations.gov. If interested
parties request to present their position
orally, the Commission will hold an
informal hearing, as specified in section
18(c) of the FTC Act, 15 U.S.C. 57a(c).
Any request for an informal hearing
must be submitted as a written comment
within the comment period and must
include: (1) a request to make an oral
submission, if desired; (2) a statement
identifying the person’s interests in the
proceeding; and (3) any proposals to
add disputed issues of material fact that
need to be resolved during the hearing.
See 16 CFR 1.11(e). Any comment
requesting an informal hearing should
also include a statement explaining why
an informal hearing is warranted and a
summary of any anticipated oral or
documentary testimony. If the comment
identifies disputed issues of material
fact, the comment should include
evidence supporting such assertions. If
the Commission schedules an informal
hearing, either on its own initiative or
in response to request by an interested
party, the FTC will publish a separate
document notifying the public pursuant
to 16 CFR 1.12(a) (‘‘initial notice of
informal hearing’’).
I. Background
A. Trade Regulation Rule on
Impersonation of Government and
Business
Published elsewhere in this issue of
the Federal Register is the
Commission’s final Trade Regulation
Rule entitled ‘‘Rule on Impersonation of
Government and Business,’’
promulgated under the authority of
section 18 of the FTC Act, 15 U.S.C.
57a(b)(2); the provisions of Part 1,
Subpart B, of the Commission’s Rules of
Practice, 16 CFR 1.7–1.20; and the
Administrative Procedure Act
(‘‘Impersonation Rule’’ or ‘‘Rule’’). This
authority permits the Commission to
promulgate, modify, or repeal trade
regulation rules that define with
specificity acts or practices that are
unfair or deceptive in or affecting
E:\FR\FM\01MRP1.SGM
01MRP1
Agencies
[Federal Register Volume 89, Number 42 (Friday, March 1, 2024)]
[Proposed Rules]
[Pages 15066-15072]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-04382]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
Bureau of Industry and Security
15 CFR Part 7
[Docket No. 240227-0060]
RIN 0694-AJ56
Securing the Information and Communications Technology and
Services Supply Chain: Connected Vehicles
AGENCY: Bureau of Industry and Security, U.S. Department of Commerce.
ACTION: Advance notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: In this advance notice of proposed rulemaking (ANPRM), the
Department of Commerce's (Department) Bureau of Industry and Security
(BIS) seeks public comment on issues and questions related to
transactions involving information and communications technology and
services (ICTS) that are designed, developed, manufactured, or supplied
by persons owned by, controlled by, or subject to the jurisdiction or
direction of foreign countries or foreign non-government persons
identified in the Department's regulations, pursuant to the Executive
Order (E.O.) entitled ``Securing the Information and Communications
Technology and Services Supply Chain,'' and that are integral to
connected vehicles (CVs), as defined herein. This ANPRM will assist BIS
in determining the technologies and market participants that may be
most appropriate for regulation pursuant to the E.O.
DATES: Comments must be received on or before April 30, 2024.
ADDRESSES: All comments must be submitted by one of the following
methods:
The Federal eRulemaking Portal: https://www.regulations.gov at docket number BIS-2024-0005.
Email directly to: [email protected]. Include
``RIN 0694-AJ56'' in the subject line.
Instructions: Comments sent by any other method, to any
other address or individual, or received after the end of the comment
period, may not be considered. For those seeking to submit confidential
business information (CBI), please clearly mark such submissions as CBI
and submit by email, as instructed above. Each CBI submission must also
contain a summary of the CBI, clearly marked as public, in sufficient
detail to permit a reasonable understanding of the substance of the
information for public consumption. Such summary information will be
posted on regulations.gov.
FOR FURTHER INFORMATION CONTACT: Marc Coldiron, U.S. Department of
Commerce, telephone: 202-482-3678. For media inquiries: Jeremy Horan,
Office of Congressional and Public Affairs, Bureau of Industry and
Security, U.S. Department of Commerce: [email protected].
SUPPLEMENTARY INFORMATION:
I. Authorities
On May 15, 2019, the President issued E.O. 13873, ``Securing the
Information and Communications Technology and Services Supply Chain,''
pursuant to the President's authority under the Constitution and the
laws of the United States, including the International Emergency
Economic Powers Act (IEEPA), the National Emergencies Act (50 U.S.C.
1601, et seq.), and Section 301 of Title 3, United States Code. E.O.
13873 declares a national emergency regarding the ICTS supply chain,
finding that ``the unrestricted acquisition or use in the United States
of information and communications
[[Page 15067]]
technology or services designed, developed, manufactured, or supplied
by persons owned by, controlled by, or subject to the jurisdiction or
direction of foreign adversaries augments the ability of foreign
adversaries to create and exploit vulnerabilities in information and
communications technology or services, with potentially catastrophic
effects, and thereby constitutes an unusual and extraordinary threat to
the national security, foreign policy, and economy of the United
States.'' The E.O. further notes that ``[t]his threat exists both in
the case of individual acquisitions or uses of such technology or
services, and when acquisitions or uses of such technologies are
considered as a class.''
In accordance with the National Emergencies Act, the President has
declared each year since E.O. 13873 was published that the national
emergency continues in effect. Continuation of the National Emergency
With Respect to Securing the Information and Communications Technology
and Services Supply Chain, 85 FR 29321 (May 14, 2020); Continuation of
the National Emergency With Respect to Securing the Information and
Communications Technology and Services Supply Chain, 86 FR 26339 (May
13, 2021); Continuation of the National Emergency With Respect to
Securing the Information and Communications Technology and Services
Supply Chain, 87 FR 29645 (May 13, 2022); Continuation of the National
Emergency With Respect to Securing the Information and Communications
Technology and Services Supply Chain, 88 FR 30635 (May 11, 2023).
To address identified risks to national security from ICTS
transactions, E.O. 13873 grants the Secretary of Commerce (Secretary)
(in consultation with other agency heads identified in the E.O.) the
authority to review and, if necessary, impose mitigation measures on or
prohibit any ICTS transaction, which includes any acquisition,
importation, transfer, installation, dealing in, or use of any ICTS by
any person, or with respect to any property, subject to United States
jurisdiction, when the transaction involves any property in which a
foreign country or national has any interest. In order to require
mitigation for or to prohibit an ICTS transaction or class of
transactions, the Secretary, in consultation with other agency heads,
must first determine that the ICTS transaction or class of transactions
at issue: (1) involves ICTS designed, developed, manufactured, or
supplied by persons owned by, controlled by, or subject to the
jurisdiction or direction of a foreign adversary, which the E.O.
defines as ``any foreign government or foreign non-government person
engaged in a long-term pattern or serious instances of conduct
significantly adverse to the national security of the United States or
security and safety of United States persons;'' and (2) poses:
A. an undue risk of sabotage to or subversion of the design,
integrity, manufacturing, production, distribution, installation,
operation, or maintenance of information and communications technology
or services in the United States;
B. an undue risk of catastrophic effects on the security or
resiliency of United States critical infrastructure or the digital
economy of the United States; or
C. otherwise poses an unacceptable risk to the national security of
the United States or the security and safety of United States persons.
These factors are collectively referred to as ``undue or
unacceptable risks.''
E.O. 13873 additionally provides the Secretary with the authority
to issue rules establishing criteria by which particular technologies
or market participants may be categorically included in or
categorically excluded from prohibitions established pursuant to the
E.O. To date, the Department has not pursued or used this authority to
regulate ICTS transactions on a category- or class-wide basis.
Furthermore, E.O. 13873 grants the Secretary the authority to identify
a mechanism and relevant factors for the negotiation of mitigation
measures that would allow approval of an otherwise prohibited
transaction.
II. Background
a. Purpose
Pursuant to the authority delegated to the Secretary under E.O.
13873, BIS is considering proposing rules that would prohibit certain
ICTS transactions or classes of ICTS transactions by or with persons
who design, develop, manufacture, or supply ICTS integral to CVs and
are owned by, controlled by, or subject to the jurisdiction or
direction of foreign governments or foreign non-government persons
identified at 15 CFR 7.4 (hereinafter referred to as ``15 CFR 7.4
entities''). BIS is also considering proposing measures that would
allow market participants to engage in otherwise prohibited
transactions or classes of transactions if the undue or unacceptable
risks of those ICTS transactions can be sufficiently mitigated using
measures that are monitorable.
The purpose of this ANPRM is to gather information to support BIS's
potential development of a rule regarding ICTS integral to CVs. In
particular, BIS seeks public input on certain definitions and its
assessment of how a class of transactions involving ICTS integral to
CVs, when designed, developed, manufactured, or supplied by persons
owned by, controlled by, or subject to the jurisdiction or direction of
a 15 CFR 7.4 entity, could present undue or unacceptable risks to U.S.
national security. These include risks related to threats from 15 CFR
7.4 entities, capabilities of CVs that may increase the likelihood of
vulnerabilities, and consequences to U.S. persons and critical
infrastructure if these vulnerabilities are exploited or intentionally
inserted by 15 CFR 7.4 entities. BIS solicits input on the ICTS most
integral to CVs and most vulnerable to compromise, as well as input on
mechanisms to address identified risks through potential design,
implementation standards and protocols, manufacturing integrity
protection systems and procedures, or prohibitions.
BIS recognizes the benefits of CV technologies and does not imply
through this ANPRM that technologies such as vehicle-to-everything
(V2X) communications are generally unsafe for use in the United States.
Indeed, these new vehicles often provide safer, more fuel-efficient
travel. However, E.O. 13873 is focused on risks that ICTS transactions
might present to national security. Therefore, this ANPRM, which is
being issued pursuant to the authorities granted under E.O. 13873,
seeks public comment on potential means to narrowly address involvement
by persons owned by, controlled by, or subject to the jurisdiction or
direction of 15 CFR 7.4 entities in the design, development,
manufacture, or supply of ICTS integral to CVs where that involvement
may create undue or unacceptable risk to U.S. national security.
Additionally, BIS seeks comment on whether to create a process for
the public to request approval to engage in an otherwise prohibited
transaction by demonstrating that a particular transaction adequately
addresses the risk to U.S. national security. BIS encourages public
feedback to help inform the rulemaking process, particularly regarding
transactions where ICTS supply chains may be impacted by any proposed
rule.
b. Definitions
As an initial matter, BIS is interested in receiving comments on
the applicable
[[Page 15068]]
definition for connected vehicle or CV within the context of
transactions involving ICTS incorporated into such vehicles. BIS could
define a connected vehicle as an automotive vehicle that integrates
onboard networked hardware with automotive software systems to
communicate via dedicated short-range communication, cellular
telecommunications connectivity, satellite communication, or other
wireless spectrum connectivity with any other network or device. Such a
definition would likely include automotive vehicles, whether personal
or commercial, capable of global navigation satellite system (GNSS)
communication for geolocation; communication with intelligent
transportation systems; remote access or control; wireless software or
firmware updates; or on-device roadside assistance.
CVs also integrate hardware that enables connectivity within the
vehicle and/or external connectivity with devices, networks,
applications, and services outside the vehicle. CV safety applications
are designed to increase situational awareness and reduce traffic
accidents through vehicle-to-vehicle (V2V), vehicle-to-infrastructure
(V2I), and increasingly, V2X communications, as contemplated in a
series of Department of Transportation workshops focusing on V2X
communications titled ``Saving Lives with Connectivity.'' See Bill
Canis, Cong. Research Serv., R46398, Motor Vehicle Safety: Issues for
Congress 8 (2021), https://sgp.fas.org/crs/misc/R46398.pdf; U.S. Dep't
of Transp., ITS V2X Communications Summit (2023), https://www.its.dot.gov/research_areas/emerging_tech/htm/ITS_V2X_CommunicationSummit.htm.
BIS arrived at this definition by reviewing existing definitions
for connected vehicles from trade associations and leading research
publications including the Connected Vehicle Reference Implementation
Architecture, U.S. Department of Transportation's Intelligent
Transportation Systems Joint Program Office, Institute of Electrical
and Electronics Engineers research, and Society of Automotive Engineers
standards.
Various terms exist across industry and the U.S. Government to
refer to vehicles that exhibit the connected features explained above.
In addition to input on the term connected vehicle, BIS is seeking
comment on alternative terminology that might better correspond to the
definition of connected vehicle discussed above. Such terminology could
include ``networked vehicles,'' ``intelligent connected vehicles,''
``software-defined vehicles,'' or ``connected autonomous vehicles.''
This ANPRM seeks comment on the definitions to use for a rule
regarding transactions involving ICTS integral to CVs, and
specifically:
1. In what ways, if any, should BIS elaborate on or amend the
potential definition of connected vehicle stated above? If amended, how
will the revised definition enable BIS to better address national
security risks arising from classes of transactions involving ICTS
integral to CVs?
2. Is the term connected vehicles broad enough to include
autonomous vehicles and related equipment, electric vehicles, or other
alternative power sources and related technologies? Does a better term
exist to describe the broader scope?
3. Are there other commonly used definitions for CVs that BIS
should consider when defining a class of ICTS transactions, including
definitions from industry, civil society, and foreign entities? If so,
why would those definitions be more appropriate for the purposes of a
rule?
c. Risks Associated With Connected Vehicles
The automotive industry is constantly undergoing innovation and
change, and as communications and broadband technology advance, so do
the technologies used in automobiles. Particularly relevant for the
purposes of this ANPRM, new technology has fueled a rise in
interconnectivity and autonomous capabilities in new vehicles. An
automobile's value is no longer determined only by the engine, steering
system, and other traditional automotive parts. Increasingly, an
automobile is a compilation of on-board computers; sensors; cameras;
batteries; and various other categories of ICTS software or hardware
tied together through automotive software systems. Over time, vehicle
connections to the internet will evolve even further and new
communication technology will advance vehicle capabilities. These
technological advances will continue to rely on significant data
collection not only about the vehicle and its myriad components, but
also the driver, the occupants, the vehicle's surroundings, and nearby
infrastructure. Moreover, CVs allow for information to be gathered and
shared to address both individual and societal transportation needs.
These technologies may expose the vehicles, and the sectors they
support, to new cyber-enabled attack vectors and vulnerabilities, with
the potential to create novel and potentially profound risks to
national security and public safety. Cyber-enabled vulnerabilities can
be exacerbated if the ICTS integral to CVs is designed, developed,
manufactured, or supplied, by persons owned by, controlled by, or
subject to the jurisdiction or direction of a 15 CFR 7.4 entity.
i. Threat From 15 CFR 7.4 Entities
E.O. 13873 defines the term ``foreign adversary'' to mean any
foreign government or foreign non-government person engaged in a long-
term pattern or serious instances of conduct significantly adverse to
the national security of the United States or security and safety of
U.S. persons. In the rules implementing the E.O. at 15 CFR 7.4(a), the
Secretary has identified the following as foreign adversaries: the
People's Republic of China, including the Hong Kong Special
Administrative Region (PRC); Republic of Cuba; Islamic Republic of
Iran; Democratic People's Republic of Korea; Russian Federation; and
Venezuelan politician Nicol[aacute]s Maduro (Maduro Regime).
The incorporation of ICTS products and services used in the United
States from persons owned by, controlled by, or subject to the
jurisdiction or direction of 15 CFR 7.4 entities' can offer a direct
entry point to sensitive U.S. technology and data and bypass measures
intended to protect U.S. persons' safety and security. This may allow
actors with insider access to gain entry to the systems the ICTS
connects to and ultimately engage in malicious cyber activity.
Consequently, this exploitation may result in undue risks to ICTS and
critical infrastructure in the United States and unacceptable risks to
national security.
The PRC presents a particularly acute and persistent threat to the
United States ICTS supply chain. According to the Office of the
Director of National Intelligence, the PRC likely represents the
broadest, most active, and persistent cyber espionage threat to U.S.
Government and private-sector networks. See Off. Of the Director of
Nat'l Intelligence, Annual Threat Assessment of the U.S. Intelligence
Community 10 (2023), https://www.dni.gov/files/ODNI/documents/assessments/ATA-2023-Unclassified-Report.pdf. The PRC is almost
certainly capable of launching cyber-attacks that could disrupt
critical infrastructure services within the United States and has
conducted cyber espionage operations that have compromised
telecommunications firms, providers of managed services, and broadly
used software. Id. At 10. In short, the PRC has
[[Page 15069]]
engaged in a pattern of hacking and cyber intrusion that demonstrates
the PRC's intent to compromise and exploit U.S. ICTS supply chains and
critical infrastructure, threatening U.S. national security.
The PRC's legal structure also gives broad authority to the state
to co-opt private companies to pursue its objectives. A host of laws
give the PRC government the authority to compel companies located in
the PRC, including automakers and their suppliers, to cooperate with
PRC intelligence and security services. The PRC's 2021 Data Security
Law, for example, makes all private data available to the PRC state
when it is needed for ``national security.'' See National People's
Congress, Data Security Law of the People's Republic of China, Art. 35,
https://www.npc.gov.cn/englishnpc/c2759/c23934/202112/t20211209_385109.html. The PRC's 2017 National Intelligence Law imposes
affirmative obligations on entities and persons subject to the PRC's
jurisdiction to cooperate with intelligence agencies--Article 17 allows
PRC intelligence officials to take control of a private organization's
facilities, including its communications equipment. See National
People's Congress, National Intelligence Law (as amended, 2018), https://www.npc.gov.cn/npc/c2/c30834/201905/t20190521_281475.html. The PRC's
2015 National Security Law obliges citizens and private companies to
provide security and military agencies with all ``necessary support and
assistance.'' See State Council of the People's Republic of China,
National Security Law, Art. 77(5), https://www.gov.cn/zhengce/2015-07/01/content_2893902.htm. Beyond legal obligations, companies established
in the PRC may be required to create internal Chinese Communist Party
(CCP) committees that can exercise influence over corporate decisions.
See National People's Congress, Company Law of the People's Republic of
China, Art. 19, https://www.npc.gov.cn/zgrdw/npc/xinwen/2018-11/05/content_2065671.htm.
The combination of legal authorities and opaque CCP influence make
private companies that are subject to the PRC's jurisdiction
susceptible to requests from intelligence and military officials. PRC
officials can compel PRC firms to provide the PRC government with data,
logical access, encryption keys, and other vital technical information,
as well as to install backdoors or bugs in equipment which create
security flaws easily exploitable by PRC authorities. U.S. Dep't of
Homeland Security, Data Security Business Advisory: Risks and
Considerations for Businesses Using Data Services and Equipment from
Firms Linked to the Peoples Republic of China 2 (2020), https://www.dhs.gov/sites/default/files/publications/20_1222_data-security-business-advisory.pdf. Original equipment manufacturers (OEMs) for
vehicles in the PRC, due to the vast amounts of data generated by their
products, are notable targets for government access. According to open-
source reporting, over 200 automakers that operate in the PRC are
legally obligated to transmit real-time vehicle data, including
geolocation information, to government monitoring centers. See Erika
Kinetz, In China Your Car Could Be Talking To The Government,
Associated Press News (Nov. 29, 2018), https://apnews.com/article/4a749a4211904784826b45e812cff4ca. This pervasive data sharing, which
provides the PRC government with detailed information on the behaviors
and habits of individuals, is indicative of a broader approach to co-
opting private companies--one that raises significant concerns about
how the PRC government might exploit the growing presence of PRC OEMs
and manufacturers of ICTS integral to CVs in foreign markets. The
combination of these factors uniquely elevates BIS's concern regarding
PRC participation in the ICTS supply chain for CVs in the United
States.
BIS seeks to better understand the role of persons owned by,
controlled by, or subject to the jurisdiction or direction of 15 CFR
7.4 entities, particularly the PRC, in the ICTS supply chain for CVs,
and the leverage these entities might exert as a result. In particular,
the ANPRM seeks comments on the following issues:
4. Please describe the ICTS supply chain for CVs in the United
States. Particularly useful responses may include information
regarding:
a. categories of ICTS, such as software or hardware, that are
integral to CVs operating in the United States;
b. market leaders for each distinct phase of the supply chain for
ICTS integral to CVs (such as design, development, manufacturing, or
supply) including, but not limited to: OEMs, tier one, tier two, and
tier three suppliers, and service providers;
c. geographic locations where software (such as the vehicle
operating system), hardware (such as light detection and ranging
(LiDAR) sensors), or other ICTS components integral to CVs in use in
the United States are designed, developed, manufactured, or supplied;
d. involvement in any sector or sub-sector of the U.S. ICTS supply
chain for CVs by persons owned by, controlled by, or subject to the
jurisdiction or direction of a 15 CFR 7.4 entity; and
e. geographic locations where data from CVs in use in the United
States is transmitted, stored, or analyzed.
5. Are there ICTS integral to CVs for which persons owned by,
controlled by, or subject to the jurisdiction or direction of a 15 CFR
7.4 entity are sole source suppliers? To what extent do OEMs of CVs in
use in the United States rely upon suppliers wholly or partially owned
by a company based in or under the control of a 15 CFR 7.4 entity?
6. In what ICTS hardware or software for CVs do persons owned by,
controlled by, or subject to the jurisdiction or direction of a 15 CFR
7.4 entity maintain a technological advantage over U.S. and other
foreign counterparts and how may this dynamic evolve in the coming
years?
7. How, and to what degree, does CV automotive software connect to
GNSS systems that are designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of a 15 CFR 7.4 entity? for geolocation and other functions?
8. How might a disruption to the supply of ICTS components for CVs
in use in the United States, including hardware and software, from
persons owned by, controlled by, or subject to the jurisdiction or
direction of a 15 CFR 7.4 entity affect OEMs of CVs in use in the
United States and ICTS suppliers? Where possible, please specify which
disruptions to component supply would be particularly detrimental.
9. To what extent can OEMs procure alternative sources of ICTS
integral to CVs that do not constitute ICTS from persons owned by,
controlled by, or subject to the jurisdiction or direction of 15 CFR
7.4 entities?
10. Please describe the relationship between OEMs of CVs in use in
the United States and their ICTS suppliers. Particularly useful
responses may include the type of information that is shared between
OEMs of CVs in use in the United States and their ICTS suppliers in the
normal course of business, how this information is shared, what access
or administrative privileges are typically granted, and if suppliers
have any capability for remote access or ability to provide firmware or
software updates.
11. What risks might be posed by aftermarket ICTS integrated
onboard CVs and interfaced with vehicle systems, such as tracking
devices, cameras, and wireless-enabled
[[Page 15070]]
diagnostic interfaces? Should aftermarket automotive systems or
components be considered integral to CV operation?
12. To what extent are ICTS components of CVs designed, developed,
manufactured, or supplied by persons owned by, controlled by, or
subject to the jurisdiction or direction of a 15 CFR 7.4 entity present
in critical infrastructure sectors? Are there instances of municipal,
state, or federal funding for procurement of such 15 CFR 7.4 entities'
ICTS integral to CVs for use in critical infrastructure sectors?
13. What other instances exist where persons owned by, controlled
by, or subject to the jurisdiction or direction of a 15 CFR 7.4 entity,
are integrated into the ICTS supply chain for CVs?
ii. Capabilities of Connected Vehicles May Increase the Likelihood of
Vulnerabilities 15 CFR 7.4 Entities Could Exploit
CVs and the components that enable their functionality present
opportunities for exploitation by 15 CFR 7.4 entities via insider
access, which could potentially result in severe consequences to U.S.
persons and critical infrastructure. Increasing the number and scope of
wireless connected components in a vehicle also increases the attack
surfaces through which a malicious actor can gain initial entry. As CVs
gain new and different connectivity capabilities, design,
implementation, and operational protocols need to be added to address
new attack surfaces and maintain the confidentiality, integrity, and
availability of the data that traverse any one functional system. As
demonstrated in controlled environments, attack vectors can be
exploited and may provide access to other functional systems within a
CV. Moreover, once one subsystem has been compromised, depending on the
nature of the vulnerability and the design of the vehicle network
architecture, the attacker might have the ability to move laterally and
eventually gain access to other functional automotive systems. While
integrated functionality may provide seamless communication, comfort,
and operability for the consumer, it is possible that unauthorized
remote access to a particular sensor system could be escalated to
vehicle systems and operations, potentially resulting in injury, loss
of life, and disruption to critical infrastructure networks.
Preliminarily, BIS has identified the following capabilities
associated with CVs that may increase the likelihood of vulnerabilities
that 15 CFR 7.4 entities could exploit:
Data Collection: CVs rely on the collection and integration of
broad and varied data to improve the vehicle's functionality and
safety. This data, which can encompass vehicle-level data (e.g., driver
behavior, vehicle status, geolocation, biometrics, driver mobile phone
data) and environmental-level data (e.g., detailed mapping data, object
detection, traffic patterns), are extracted through various onboard
systems and sensors. The Advanced Driver-Assistance System (ADAS) of a
CV, for example, typically relies on a combination of sensors--radar,
LiDAR, ultrasonic, audio, and video--that are constantly collecting and
processing data. CVs now collect data inside the cockpit as well.
Consumer and commercial CVs increasingly incorporate driver monitoring
systems (DMS) to ensure the driver remains alert and fully able to take
control of the car should autonomous systems fail, and to ensure
commercial truck drivers remain on schedule. More sophisticated DMS
feature driver-facing cameras--including eye tracking, facial
recognition, and microphones--collect potentially sensitive information
about drivers and passengers. This increases the sensitivity of the
data that CVs collect, potentially providing 15 CFR 7.4 entities with
access to biometric information in addition to environmental data.
Connectivity: CVs are connected to and can communicate with a range
of external sources, including the OEM and third-party service
providers, as well as in-car devices like smart phones. In an
increasing subset of vehicles, telematics systems connect the vehicle
with cloud-based services to provide onboard systems with external data
streams (e.g., geolocation, streaming service, assistance service,
emergency notification) and underlie many of a CV's core
functionalities. V2X systems, when widely implemented, will support the
broadcast and reception of messages that enable safety alerts and
mobility advisories. Providing broadcast (radio) communication
capabilities that facilitate driver assistance capabilities may open
cybersecurity vectors that need to be addressed to ensure broadcast
message integrity and authenticity through design, standards,
implementation and manufacturing protocols, and to prevent possible
message and transmission misbehavior.
Further, interconnectivity in the software or hardware components
may amplify risks posed by ICTS integral to CVs that are designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of a 15 CFR 7.4 entity.
For example, OEMs enable communication with their vehicle after sale
even when a customer does not subscribe to services, including by
providing software updates and refinements, as well as by enabling or
disabling subscription-based features. This access by the OEM to the CV
provides numerous opportunities for 15 CFR 7.4 entities that own,
control, or have the ability to exert jurisdiction or direction over
the OEM, to insert vulnerabilities allowing for future backdoor attacks
and other malicious behavior. Additionally, individually connected
components and sensors are capable of transmitting data separately from
the vehicle's broader communications suite, including receiving over
the air (OTA) updates without the knowledge or consent of the vehicle
owner or OEM. BIS seeks to better understand the capabilities
associated with technical trends--both current and future--in CV design
and the ICTS components therein. In particular, the ANPRM seeks further
comment on the following:
14. What is the full scope of data collection capabilities in CVs
and the aggregation and scale of data that CVs could collect on U.S
persons, entities, geography, and infrastructure? Who has authorized
access to, or control of, data collected by CVs?
15. What types of remote access or control do OEMs have over their
CVs? Please describe what software or other mechanisms allow for such
remote access or control by the OEM to occur.
16. What cybersecurity concerns may arise from linkages between
sensors in CVs? To what extent can individual sensors and components
communicate OTA independently from the CV's Operating System (OS)?
17. What standards, best practices, and industry norms are used to
secure the interconnection between vehicles and charging
infrastructure? How are battery management systems (BMS) integrated
into a vehicle's automotive software systems, and how are they
protected from malware?
18. How do manufacturers supplement existing cybersecurity
standards and best practices such as the National Highway Traffic
Safety Administration's Cybersecurity Best Practices for the Safety of
Modern Vehicles at each step of the CV supply chain, including design,
manufacturing, and operation?
a. Particularly useful responses will be specific about the types
of programs and practices used such as test and verification, bug
bounties, white hat programs, or end-to-end encryption to secure the
link between vehicle and
[[Page 15071]]
server. See Nat'l Highway Traffic Safety Admin., Cybersecurity Best
Practices for the Safety of Modern Vehicles (2022), https://www.nhtsa.gov/sites/nhtsa.gov/files/2022-09/cybersecurity-best-practices-safety-modern-vehicles-2022-tag.pdf; see also Cybersecurity
and Infrastructure Security Agency, Autonomous Ground Vehicle Security
Guide: Transportation Systems Sector (2021), https://www.cisa.gov/resources-tools/resources/autonomous-ground-vehicle-security-guide.
19. Please describe the automotive software development cycle. BIS
is particularly interested in learning:
a. The degree to which OEMs license software, as opposed to
developing it internally;
b. The extent to which software is developed outside the United
States and, if so, where;
c. What measures are taken to ensure software security and
integrity during the development cycle;
d. If OEMs partner or co-develop automotive software with any
persons owned by, controlled by, or subject to the jurisdiction or
direction of a 15 CFR 7.4 entity; and
e. The extent to which software that is embedded in hardware (e.g.,
firmware) is subject to the development cycle described above.
20. Please describe the relationship between CV OEMs and cloud
service providers (CSPs). Particularly useful responses may describe
what access privileges, controls, and remote capabilities with respect
to CV OEM systems are afforded to the CSP. Additionally, what are the
common shared responsibility models between a CSP and a CV OEM and how
are the communication and systems protected?
21. How do CV OEMs verify the bill of materials and software bill
of materials as authentic for vendors and suppliers, specifically
regarding OS, telematic systems, ADAS, Automated Driving Systems (ADS),
satellite or cellular telecommunication systems, and BMS? If a software
bill of materials is required, to what extent does it provide
information regarding software vulnerabilities, and how is this
information used, stored, and protected?
22. To what extent is software from vendors and suppliers tested
and verified to comply with OEM requirements?
23. What vendor-vetting and supply chain security practices do OEMs
employ when procuring ICTS integral to CVs?
iii. Consequences
The ability of a 15 CFR 7.4 entity to compel private companies
through applicable legal frameworks, combined with the exploitation of
vulnerabilities created by the increase in capabilities of the ICTS
integral to CVs, has the potential to create severe and, in certain
instances, catastrophic consequences for U.S. persons and critical
infrastructure. Through ICTS designed, developed, manufactured, or
supplied by persons subject to the ownership, control, jurisdiction, or
direction of a 15 CFR 7.4 entity, the intelligence agencies of that
entity could obtain access to a wide range of information from
companies in the CV ICTS supply chain to exfiltrate, collect, and
aggregate sensitive data on U.S. persons. These data include location,
traffic patterns, audio and video recordings of the inside and outside
of the car, as well as information about the driver's identity,
finances, contacts, and home address, which can be collected by CVs
themselves or by a passenger's mobile device connected to a CV.
In addition, backdoors embedded in a CV's software could enable a
15 CFR 7.4 entity under certain conditions to obtain control over
various vehicle functions that could include the ability to disable the
vehicle completely. A group of researchers were able to demonstrate a
vulnerability in an OEM's Bluetooth software that allowed access to
some vehicle control systems, initiating remote actions such as
activating the brakes and turning the steering wheel. See Consumer
Watchdog, Kill Switch: Why Connected Cars Can Be Killing Machines and
How to Turn Them Off 37-40 (2019), https://consumerwatchdog.org/sites/default/files/2019-07/KILL%20SWITCH%20%207-29-19.pdf. A similar ability
in the hands of a 15 CFR 7.4 entity that can control or direct an OEM
could allow that entity to disable the controls on an individual
vehicle while it was being driven or to sabotage entire fleets without
having physical access to the vehicles. Finally, because of CVs'
connectivity, they could be used to access multiple critical
infrastructure systems with which they interact, including
telecommunications networks, transportation systems, and the electrical
grid. As CV technology advances, vehicles and charging infrastructure
may increasingly communicate with these systems to manage traffic flows
and grid load. As such, the proliferation of CVs containing vulnerable
ICTS from persons owned by, controlled by, or subject to the
jurisdiction or direction of a 15 CFR 7.4 entity could provide that
entity with a platform for launching distributed denial of service
attacks against intelligent transportation systems, satellite or
cellular communications hardware, or other critical infrastructure. See
Mohammad Ali Sayed, et al., Electric Vehicle Attack Impact on Power
Grid Operation, 137 Int'l J. Electrical Power & Energy Sys. 107784
(2022), https://www.sciencedirect.com/science/article/abs/pii/S0142061521010048; Numaan Huq, et al., Cybersecurity for Connected
Cars: Exploring Risks in 5G, Cloud, and Other Connected Technologies,
Trend Micro Res. (2021), https://documents.trendmicro.com/assets/white_papers/wp-cybersecurity-for-connected-cars-exploring-risks-in-5g-cloud-and-other-connected-technologies.pdf; Anastasios Giannaros, et
al., Autonomous Vehicles: Sophisticated Attacks, Safety Issues,
Challenges, Open Topics, Blockchain, and Future Directions, 3 J. of
Cybersecurity and Privacy 493 (2023). Given these threats,
vulnerabilities, and potential consequences, BIS is considering
identifying the following automotive software systems as the ICTS
integral to CVs most likely to present undue or unacceptable risks if
exploited by 15 CFR 7.4 entities: (i) vehicle OS; (ii) telematics
systems; (iii) ADAS; (iv) ADS; (v) satellite or cellular
telecommunication systems; and (vi) BMS.
As BIS considers whether and how to regulate these software
systems, it seeks additional information, including:
24. Are there ICTS integral to CVs other than those identified in
this ANPRM that could present material risks if they were designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction of a 15 CFR 7.4 entity? If so,
please discuss how the ICTS could be exploited to pose such a risk.
25. Of the ICTS integral to CVs identified in this ANPRM, which
present the greatest risk to safety or security if they are designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of a 15 CFR 7.4 entity?
26. As ADS systems evolve and developers rely on cellular systems
to communicate with ADS-enabled vehicles to support overall operational
capability (e.g., communications to a fleet management office), what
should the U.S. government consider in order to support the development
of this technology securely from 15 CFR 7.4 entity malign activity?
III. Additional Questions for Comment
This ANPRM seeks comment on processes and mechanisms that BIS could
implement in a potential rule to authorize an otherwise prohibited ICTS
[[Page 15072]]
transaction with the adoption of mitigation measures.
Authorizations and Mitigations
27. In what instances would granting a temporary authorization to
engage in an otherwise prohibited transaction under a proposed rule be
necessary and in the interest of the United States to avoid supply
chain disruptions or other unintended consequences?
28. What review criteria should BIS implement when considering an
application for a temporary authorization?
29. What specific standards, mitigation measures, or cybersecurity
best practices should BIS consider when evaluating the appropriateness
of a requested authorization?
30. Are there any U.S. government models, such as the Office of
Foreign Assets Control's sanctions programs or the Export
Administration Regulations, that this program should consider emulating
in granting authorizations?
Economic Impact
31. What economic impacts to U.S. businesses or the public, if any,
might be associated with the regulation of ICTS integral to CVs
contemplated by this ANPRM? If responding from outside the United
States, what economic impacts to local businesses and the public, if
any, might be associated with regulations of ICTS integral to CVs?
32. What, if any, anticompetitive effects may result from
regulation of ICTS that is integral to CVs as contemplated by this
ANPRM? And what, if anything, can be done to mitigate the
anticompetitive effects of regulation of ICTS?
33. What types of U.S. businesses or firms (e.g., small businesses)
would likely be most impacted by the program contemplated in this
ANPRM? If responding from outside the United States, what types of
local businesses or firms (e.g., small businesses) would likely be most
impacted by the program contemplated in this ANPRM?
34. What actions can BIS take, or provisions could it add to any
proposed regulations, to minimize potential costs borne by U.S.
businesses or the public? If responding from outside the United States,
what actions can BIS take, or what provisions could it add to any
proposed regulations, to minimize potential costs borne by local
businesses or the public?
35. What new due diligence, compliance, and recordkeeping controls
will U.S. persons anticipate needing to undertake to comply with any
proposed regulations regarding ICTS integral to CVs that are designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of 15 CFR 7.4 entities?
Elizabeth L.D. Cannon,
Executive Director, Office of Information and Communications Technology
and Services.
[FR Doc. 2024-04382 Filed 2-29-24; 8:45 am]
BILLING CODE 3510-33-P