Securing the Information and Communications Technology and Services Supply Chain: Connected Vehicles, 79088-79123 [2024-21903]
Download as PDF
79088
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
• The Regulatory Impact Analysis is
available at https://www.regulations.gov
at docket number BIS–2024–0005.
FOR FURTHER INFORMATION CONTACT:
Marc Coldiron, U.S. Department of
Commerce, telephone: (202) 482–3678.
For media inquiries: Jessica Stallone,
Office of Congressional and Public
Affairs, Bureau of Industry and Security,
U.S. Department of Commerce: OCPA@
bis.doc.gov.
SUPPLEMENTARY INFORMATION:
DEPARTMENT OF COMMERCE
Bureau of Industry and Security
15 CFR Part 791
[Docket No. 240919–0245]
RIN 0694–AJ56
Securing the Information and
Communications Technology and
Services Supply Chain: Connected
Vehicles
AGENCY:
I. Background
In this notice of proposed
rulemaking (NPRM), the Department of
Commerce’s (Department) Bureau of
Industry and Security (BIS) proposes a
rule to address undue or unacceptable
risks to national security and U.S.
persons posed by classes of transactions
involving information and
communications technology and
services (ICTS) that are designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
certain foreign adversaries, and which
are integral to connected vehicles, as
defined herein. BIS is soliciting
comment on this proposed rule, which
builds on the advance notice of
proposed rulemaking (ANPRM) issued
by BIS on March 1, 2024.
DATES: Comments to this proposed rule
must be received on or before October
28, 2024.
ADDRESSES: All comments must be
submitted by one of the following
methods:
• By the Federal eRulemaking Portal:
https://www.regulations.gov at docket
number BIS–2024–0005.
• By email directly to:
connectedvehicles@bis.doc.gov. Include
‘‘RIN 0694–AJ56’’ in the subject line.
• Instructions: Comments sent by any
other method, to any other address or
individual, or received after the end of
the comment period, may not be
considered. For those seeking to submit
confidential business information (CBI),
please clearly mark such submissions as
CBI and submit by email, as instructed
above. Each CBI submission must also
contain a summary of the CBI, clearly
marked as public, in sufficient detail to
permit a reasonable understanding of
the substance of the information for
public consumption. Such summary
information will be posted on
regulations.gov. Comments that contain
profanity, vulgarity, threats, or other
inappropriate language or content will
not be considered.
In this notice, BIS solicits comment
on a proposed rule to prohibit
transactions involving Vehicle
Connectivity System (VCS) hardware
and covered software designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the People’s Republic of China,
including the Hong Kong Special
Administrative Region (PRC), or the
Russian Federation (Russia). It follows
an advance notice of proposed
rulemaking (ANPRM), 89 FR 15066
(Mar. 1, 2024), in which BIS sought
public comment to inform a rulemaking
that would address the undue or
unacceptable risks, as identified in
Executive Order (E.O.) 13873, ‘‘Securing
the Information and Communications
Technology and Services Supply
Chain,’’ 84 FR 22689 (May 17, 2019),
posed by a class of transactions that
involve information and
communications technology and
services (ICTS) designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a foreign
adversary and integral to Connected
Vehicles.
In E.O. 13873, the President delegated
to the Secretary of Commerce
(Secretary), to the extent necessary to
implement the order, the authority
granted under the International
Emergency Economic Powers Act
(IEEPA) (50 U.S.C. 1701, et seq.), ‘‘to
deal with any unusual and
extraordinary’’ foreign threat to the
United States’ national security, foreign
policy, or economy, if the President
declares a national emergency with
respect to such threat. 50 U.S.C. 1701(a).
In E.O. 13873, the President declared a
national emergency with respect to the
‘‘unusual and extraordinary’’ foreign
threat posed to the ICTS supply chain
and has, in accordance with the
National Emergencies Act (NEA),
extended the declaration of this national
emergency in each year since E.O.
13873’s publication. See Continuation
of the National Emergency With Respect
Bureau of Industry and
Security, Department of Commerce.
ACTION: Notice of proposed rulemaking.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
SUMMARY:
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
to Securing the Information and
Communications Technology and
Services Supply Chain, 85 FR 29321
(May 14, 2020); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 86 FR 26339
(May 13, 2021); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 87 FR 29645
(May 13, 2022); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 88 FR 30635
(May 11, 2023); Continuation of the
National Emergency With Respect to
Securing the Information and
Communications Technology and
Services Supply Chain, 89 FR 40353
(May 9, 2024).
Specifically, the President identified
the ‘‘unrestricted acquisition or use in
the United States of ICTS designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
foreign adversaries’’ as ‘‘an unusual and
extraordinary’’ foreign threat to the
national security, foreign policy, and
economy of the United States that
‘‘exists both in the case of individual
acquisitions or uses of such technology
or services, and when acquisitions or
uses of such technologies are considered
as a class.’’ See E.O. 13873, and 50
U.S.C. 1701(a)–(b).
Once the President declares a national
emergency, IEEPA empowers the
President to, among other acts,
investigate, regulate, prevent, or
prohibit, any ‘‘acquisition, holding,
withholding, use, transfer, withdrawal,
transportation, importation or
exportation of, or dealing in, or
exercising any right, power, or privilege
with respect to, or transactions
involving, any property in which any
foreign country or a national thereof has
any interest by any person, or with
respect to any property, subject to the
jurisdiction of the United States.’’ 50
U.S.C. 1702(a)(1)(B).
To address the identified risks to
national security from ICTS
transactions, the President in E.O. 13873
imposed a prohibition on transactions
determined by the Secretary, in
consultation with relevant agency
heads, to involve foreign adversary ICTS
and to pose certain risks to U.S. national
security, technology, or critical
infrastructure. Specifically, to fall
within the scope of the prohibition, the
Secretary must determine that a
transaction: (1) ‘‘involves [ICTS]
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
designed, developed, manufactured, or
supplied, by persons owned by,
controlled by, or subject to the
jurisdiction or direction of a foreign
adversary,’’ defined in E.O. 13873 as
‘‘any foreign government or foreign nongovernment person engaged in a longterm pattern or serious instances of
conduct significantly adverse to the
national security of the United States or
security and safety of United States
persons;’’ and (2):
A. ‘‘Poses an undue risk of sabotage
to or subversion of the design, integrity,
manufacturing, production, distribution,
installation, operation, or maintenance
of information and communications
technology or services in the United
States;’’
B. ‘‘Poses an undue risk of
catastrophic effects on the security or
resiliency of United States critical
infrastructure or the digital economy of
the United States;’’ or
C. ‘‘Otherwise poses an unacceptable
risk to the national security of the
United States or the security and safety
of United States persons.’’
These factors are collectively referred
to as ‘‘undue or unacceptable risks.’’
Further, E.O. 13873 grants the Secretary
the authority to design or negotiate
mitigation measures that would allow
an otherwise prohibited transaction to
proceed. E.O. 13873 section 1(b).
The President also delegated to the
Secretary the ability to promulgate
regulations that, among other things,
establish when transactions involving
particular technologies may be
categorically prohibited. E.O. 13873
section 2(a)–(b); see also 3 U.S.C. 301–
02. Specifically, the Secretary may issue
rules establishing criteria, consistent
with section 1 of E.O. 13873, by which
particular technologies or market
participants may be categorically
included in or categorically excluded
from prohibitions established pursuant
to E.O. 13873.
II. Introduction
Today’s vehicles contain a myriad of
connected components that provide
greater convenience for consumers and
increase road safety for both drivers and
pedestrians, such as Wi-Fi, Bluetooth,
cellular, and satellite connectivity.
However, the incorporation of
progressively more complex hardware
and software systems that facilitate
these features has also increased the
attack surfaces through which malign
actors may exploit vulnerabilities to
gain access to a vehicle. As BIS outlined
in its March 1, 2024, ANPRM, certain
ICTS integral to Connected Vehicles
could present an undue or unacceptable
risk to U.S. national security when those
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
systems are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a foreign
adversary.
In the Securing the Information and
Communications Technology and
Services Supply Chain interim final
rule, 86 FR 4909 (January 19, 2021), the
Secretary determined that certain
foreign governments or foreign nongovernment persons including the PRC,
Republic of Cuba, Islamic Republic of
Iran, Democratic People’s Republic of
Korea, Russia, and Venezuelan
politician Nicolás Maduro constitute
foreign adversaries for purposes of E.O.
13873 and rules promulgated pursuant
to E.O. 13873. See 15 CFR 791.4 (to the
extent that the list of foreign adversaries
identified in 15 CFR 791.4 is updated to
add or remove governments or nongovernment persons, this proposed rule
intends to reflect the most up-to-date
designations of foreign adversaries).
Additionally, E.O. 13873 provides that
the Secretary may issue rules that
identify particular technologies or
countries with respect to which
transactions involving ICTS warrant
particular scrutiny. E.O. 13873 2(b). For
the purposes of this proposed rule
regarding transactions involving ICTS
integral to Connected Vehicles, BIS is
focusing its regulatory efforts on ICTS
that are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia. BIS has identified that, for the
purposes of addressing the national
security risks posed by Connected
Vehicles, these two foreign adversaries
pose particular risks to U.S. national
security because of their legal, political,
and regulatory regimes, combined with
their current and anticipated growth
and involvement in the automotive
sector, to include Connected Vehicles.
However, BIS specifically seeks public
comment on whether the other
identified foreign adversaries pose
similar risks to U.S. national security in
the connected vehicle supply chain.
The PRC and Russia are able to
leverage domestic legislation and
regulatory regimes to compel companies
subject to their jurisdiction, including
carmakers and their suppliers, to
cooperate with security and intelligence
services. Such control over companies
and their products and services means
that equipment is easily exploitable by
PRC and Russian authorities. The
privileged access that the PRC and
Russia may gain to Connected Vehicles
through their components, including
software, could enable those foreign
adversaries to exfiltrate sensitive data
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
79089
collected by connected vehicles and,
potentially, allow remote access and
manipulation of connected vehicles
driven by U.S. persons. Pursuant to E.O.
13873, BIS has determined that certain
classes of transactions that facilitate the
exfiltration of data and remote
manipulation of connected vehicles
pose undue or unacceptable risks to
U.S. national security and the safety and
security of U.S. persons.
a. Overview of Proposed Rule
To address these identified undue or
unacceptable risks, BIS is proposing
regulations that would, absent a General
or Specific Authorization, (1) prohibit
VCS Hardware Importers from
knowingly importing into the United
States certain hardware for VCS (‘‘VCS
Hardware,’’ as further defined below);
(2) prohibit connected vehicle
manufacturers from knowingly
importing into the United States
completed connected vehicles
incorporating certain software that
supports the function of VCS or ADS
(VCS and ADS software are collectively
referred to herein as ‘‘covered software,’’
as further defined below); (3) prohibit
connected vehicle Manufacturers from
knowingly Selling within the United
States completed connected vehicles
that incorporate covered software; and
(4) prohibit connected vehicle
manufacturers who are owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia from knowingly selling in the
United States completed connected
vehicles that incorporate VCS hardware
or covered software. The prohibitions
would apply when such VCS hardware
or covered software is designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia.
If, following consideration of
comments received on this proposed
rule, BIS issues a final rule to adopt the
proposal, that final rule would take
effect 60 days after publication in the
Federal Register. However, VCS
Hardware Importers would be permitted
to engage in otherwise Prohibited
Transactions involving VCS Hardware
and exempt from certain requirements
so long as: (1) for VCS Hardware not
associated with a Model Year, the
import of the VCS Hardware takes place
prior to January 1, 2029; or (2) the VCS
Hardware unit is associated with a
vehicle Model Year prior to 2030 or the
VCS Hardware is integrated into a
connected vehicle (completed or
incomplete) with a Model Year prior to
2030. connected vehicle manufacturers
would be permitted to engage in
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79090
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
otherwise prohibited transactions
involving covered software and exempt
from certain requirements, so long as
the completed connected vehicle that is
imported, or sold within the United
States, is of a model year prior to 2027.
connected vehicle Manufacturers that
are owned by, controlled by, or subject
to the jurisdiction or direction of the
PRC or Russia would be permitted to
sell completed connected vehicles with
a model year prior to 2027 that
incorporate VCS hardware or covered
software.
BIS is also proposing to implement
several mechanisms to facilitate
compliance with these prohibitions: (1)
Declarations of Conformity submitted to
BIS by VCS hardware importers and
connected vehicle manufacturers to
confirm that they are not engaging in
prohibited transactions involving VCS
hardware or covered software, as
defined herein; (2) Advisory opinions to
allow VCS hardware importers and
connected vehicle manufacturers to seek
guidance from BIS on whether a
prospective transaction may be
prohibited; (3) General authorizations to
allow certain VCS hardware importers
and connected vehicle manufacturers to
engage in otherwise prohibited
transactions without the need to notify
BIS prior to the prohibited activity if
they qualify under stated conditions; (4)
Specific authorizations which,
following an application to and
approval by BIS, grant VCS hardware
importers and connected vehicle
manufacturers the ability to engage in
otherwise prohibited transactions,
including because the associated undue
or unacceptable risks have been, or can
be, mitigated; and (5) A process to
inform VCS hardware importers and
connected vehicle manufacturers that a
specific authorization may be required
because an activity could constitute a
Prohibited Transaction.
This proposed rule benefits from the
responses received during the public
comment period for the ANPRM and
incorporates significant portions of that
feedback. For example, BIS considered
public feedback to define the scope of
connected vehicles, identify ICTS
integral to Connected Vehicles, and
better understand the effects of any
potential prohibition. Determining the
scope of the prohibitions outlined in
this proposed rule required balancing
the need to address the undue or
unacceptable risk posed by foreign
adversary involvement in the connected
vehicles supply chain with the impact
on the public and industry.
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
III. Comments on the Advance Notice of
Proposed Rulemaking
On March 1, 2024, the Department
published in the Federal Register an
ANPRM, 89 FR 15066, pursuant to the
authority the President delegated to the
Secretary in E.O. 13873. The purpose of
the ANPRM was to solicit stakeholder
feedback and to gather information to
further BIS’s consideration of a
proposed rule to address any undue or
unacceptable risks to U.S. national
security posed by ICTS used in
connected vehicles, when designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
a foreign adversary. Specifically, BIS
sought public input on certain
definitions, capabilities of connected
vehicles that may increase the
likelihood of vulnerabilities, and
consequences to U.S. persons and
critical infrastructure if these
vulnerabilities are exploited by a foreign
adversary. BIS also solicited input on
the ICTS most integral to connected
vehicles and most vulnerable to
compromise, as well as input on
mechanisms to address identified risks
through potential design,
implementation standards and
protocols, manufacturing integrity
protection systems and procedures, or
prohibitions.
BIS received 57 comment submissions
in response to the ANPRM, from
original equipment manufacturers
(OEMs), component suppliers, two
foreign governments, nonprofit
organizations, and individuals. Five
comments contained CBI, and one
comment was retracted at the request of
the commenter. Each of the comments is
available on the public rulemaking
docket at https://www.regulations.gov.
In general, commenters expressed
agreement with BIS on the overall risks
posed by compromised ICTS in
Connected Vehicles, as outlined in the
ANPRM. Commenters were also
generally aligned on the need for further
clarity on what would constitute a
person ‘‘owned by, controlled by, or
subject to the jurisdiction or direction’’
of a foreign adversary, the challenge of
implementing due diligence
requirements due to the complexity of
the global automotive supply chain, the
need for substantial lead time to
implement a regulation given the
difficulty of sourcing alternative
suppliers, the breadth and depth of data
collected by ICTS integral to Connected
Vehicles, and the potential negative
impact such a regulation could have on
long-term U.S. innovation,
competitiveness, and health and safety.
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
On the other hand, commenters
disagreed on a number of issues,
including the ICTS most integral to
connected vehicles, the level of risk that
may be posed by transactions involving
the identified connected vehicle
systems, the definition of connected
vehicle, and approaches for how the
proposed rule could be most effective in
risk mitigation.
Below, BIS addresses in more detail
the key issues raised by the comments
received and describes how they were
considered and, where applicable,
addressed in the proposed rule.
a. Definitions
In the ANPRM, BIS sought comments
on the definition of the term ‘‘connected
vehicle,’’ proposing to define it as ‘‘an
automotive vehicle that integrates
onboard networked hardware with
automotive software systems to
communicate via dedicated short-range
communication, cellular
telecommunications connectivity,
satellite communication, or other
wireless spectrum connectivity with any
other network or device.’’ Commenters
offered differing views on BIS’s
proposed definition with some, but not
all, commenters agreeing that it
appropriately captured the platform BIS
seeks to regulate.
Commenters that disagreed with BIS’s
proposed definition offered several
reasons. For example, many
commenters viewed the term as overly
broad and noted that it failed to identify
the specific types of vehicles that would
be captured by a regulation (e.g.,
commercial, industrial, agricultural,
rolling stock). Commenters also noted
that the phrase ‘‘connected vehicle’’ is
an existing term of art within the
automotive industry referring to
vehicles with external communication
capabilities, particularly in short-range
communication. As an alternative, some
commenters suggested that BIS adopt
the term ‘‘networked vehicle’’ to capture
the ability of a vehicle to communicate
with networks or devices external to a
vehicle while others suggested the term
‘‘software-defined vehicles’’ which
would encompass the technologies and
capabilities outlined in the ANPRM’s
proposed connected vehicle definition
while also capturing internal software
capabilities for functions within a
vehicle beyond communication (e.g.,
starting a vehicle, malfunction checks,
navigation).
After full consideration of each of the
comments, BIS maintains the use of the
term ‘‘connected vehicle’’ in the
proposed rule. However, BIS proposes
to narrow its definition to mean, ‘‘[a]
vehicle driven or drawn by mechanical
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
power and manufactured primarily for
use on public streets, roads, and
highways, that integrates onboard
networked hardware with automotive
software systems to communicate via
dedicated short-range communication,
cellular telecommunications
connectivity, satellite communication,
or other wireless spectrum connectivity
with any other network or device.
Vehicles operated only on a rail line are
not included in this definition.’’ This
definition captures the vehicles that
would be subject to the rule (e.g.,
passenger vehicles, motorcycles, buses,
small and medium trucks, class 8
commercial trucks, recreational
vehicles), while excluding those that
pose a less acute risk of data exfiltration,
modification, or sabotage by foreign
adversaries. BIS further believes that the
term connected vehicle, as defined in
this proposed rule, will capture future
trends in vehicle development,
particularly as software comes to play a
larger role in vehicle operation. BIS
emphasizes its belief that, with very few
exceptions, all new vehicles sold in the
United States will be captured by this
definition. BIS seeks comment on this
assessment. In the interest of issuing a
rule that is narrow, yet also would
address the risks posed by connected
vehicles, BIS declines to extend this
definition to all ‘‘rolling stock’’ or
unmanned aerial vehicles as suggested
by some comments, although BIS does
not preclude the possibility of
addressing these vehicles in future
regulation. BIS believes that these
sectors, to include vehicles operating on
a rail line, are materially different from
the connected vehicle sector as defined
by this proposed rule, and capturing
these vehicles in a regulation primarily
targeting wheeled on-road vehicles
could lead to unintended consequences
and supply chain disruption.
A subset of commenters requested
further clarity on what would constitute
an entity ‘‘subject to the jurisdiction or
direction’’ of a foreign adversary and
expressed concerns that foreign
subsidiaries of U.S. businesses or
foreign nationals working in the United
States would potentially be captured by
this term. Others suggested that BIS
should ensure that the subsidiaries of
companies located in foreign adversary
countries are captured by the proposed
rule, even when the subsidiaries are
located in third countries outside the
United States that are not foreign
adversaries, but supply entities within
the United States.
After full consideration of the
comments, BIS has adopted the
definition of a ‘‘person owned by,
controlled by, or subject to the
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
jurisdiction or direction of a foreign
adversary’’ to mean, (a) any person,
wherever located, who acts as an agent,
representative, or employee, or any
person who acts in any other capacity
at the order, request, or under the
direction or control, of a foreign
adversary or of a person whose activities
are directly or indirectly supervised,
directed, controlled, financed, or
subsidized in whole or in majority part
by a foreign adversary; (b) any person,
wherever located, who is a citizen or
resident of a foreign adversary or a
country controlled by a foreign
adversary, and is not a United States
citizen or permanent resident of the
United States; (c) any corporation,
partnership, association, or other
organization with a principal place of
business in, headquartered in,
incorporated in, or otherwise organized
under the laws of a foreign adversary or
a country controlled by a foreign
adversary; or (d) any corporation,
partnership, association, or other
organization, wherever organized or
doing business, that is owned or
controlled by a foreign adversary, to
include circumstances in which any
person identified in paragraphs (a)
through (c) possesses the power, direct
or indirect, whether or not exercised,
through the ownership of a majority or
a dominant minority of the total
outstanding voting interest in an entity,
board representation, proxy voting, a
special share, contractual arrangements,
formal or informal arrangements to act
in concert, or other means, to determine,
direct, or decide important matters
affecting an entity. BIS has also
provided, below in Section V, numerous
non-exhaustive examples to explain
how this term will apply in various
representative situations.
b. ICTS Supply Chain for Connected
Vehicles
In the ANPRM, BIS sought comments
on ‘‘the ICTS supply chain for
Connected Vehicles in the United
States,’’ in order to better understand
the role played by persons owned by,
controlled by, or subject to the
jurisdiction or direction of foreign
adversaries within it. Public comments
broadly discussed the ICTS
incorporated into Connected Vehicles
and noted the difficulty that
manufacturers and suppliers may face
in conducting supply chain due
diligence for the purposes of complying
with any potential final rule.
Submissions explained the complexity
of ICTS systems contained within
Connected Vehicles and outlined
several categories of technologies
incorporated into Connected Vehicles,
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
79091
including microcontrollers, applications
processors, analog products (e.g., power
management integrated circuits and
transceiver physical layers), automotive
software operating systems (OS),
automotive vision, light detection and
ranging (LiDAR) systems, radar, and
other application software systems.
Many commenters who identified as
OEMs also noted that they do not
always know the source of all inputs
from hardware and software suppliers,
making conducting due diligence
beyond tier one and tier two suppliers
particularly difficult. Moreover,
submissions highlighted that suppliers
are often capable of updating the
firmware on their components
independently of an OEM, further
complicating efforts to understand
which entities have access to software
and when such access occurs.
The comments received on this topic
highlight the depth and complexity of
connected vehicle supply chains,
indicating that it is not always clear to
OEMs which suppliers have access to
connected vehicle software and when
they have access to it. As some
commenters pointed out, some of these
technologies and their associated supply
chains are still in development and will
grow even more complex as the industry
develops. Such existing and growing
complexity, coupled with the likelihood
of ICTS that is designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a foreign
adversary being incorporated into
connected vehicles, demonstrates the
need for regulation to protect U.S.
national security. Such regulation will
also incentivize greater supply chain
transparency for not only existing
supply chains but also for developing
supply chains. To facilitate compliance,
the rule would include a delayed
implementation timeline so that
industry can adjust their existing supply
chains and plans for future supply
chains. BIS is not currently proposing
specific due diligence requirements.
Instead, VCS hardware importers and
connected vehicle manufactures are
given flexibility to provide evidence of
compliance efforts tailored to their
unique operations. Such efforts could
include using third-party researchers or
independently conducting supply chain
diligence.
Several commenters raised a variety
of potential trade-related concerns
relating to this proposed rulemaking
and other recent U.S. government
actions related to automotive trade
involving the PRC. While some
commenters explicitly advocated for
exclusionary tariffs on the import of all
E:\FR\FM\26SEP3.SGM
26SEP3
79092
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
PRC vehicles into the United States,
others cautioned BIS to avoid creating
unnecessary trade barriers when crafting
a proposed rule. One commenter
specifically warned that BIS regulation
of connected vehicle software could
amount to a digital trade barrier and
urged BIS to avoid certain policies such
as data localization requirements, digital
service taxes, or forced code inspection.
BIS underscores the U.S. government’s
commitment to the trusted and secure
flow of data across borders. This
proposed rule seeks to narrowly
address, pursuant to E.O. 13873, the
acute national security concerns posed
by certain foreign adversary ICTS in
connected vehicle supply chains while
minimizing any unnecessary
disruptions in manufacturing and trade.
BIS has drafted this proposed rule
irrespective of any other automobilerelated trade actions taken by the U.S.
government.
c. ICTS Most Integral to Connected
Vehicles and Their Capabilities
In its ANPRM, BIS identified six
systems (i.e., vehicle operating systems
(OS), telematics systems, Advanced
Driver-Assistance System (ADAS),
Automated Driving Systems (ADS),
satellite or cellular telecommunications
systems, and battery management
systems (BMS)) that it was considering
identifying as the ICTS in Connected
Vehicles most likely to present undue or
unacceptable risks if exploited by
foreign adversaries. BIS requested
comment on the levels of risk associated
with these various ICTS as well as any
additional ICTS that commenters might
consider integral to Connected Vehicles.
Commenters held differing views on
which ICTS are integral to connected
vehicles and should be captured by the
scope of a rule. For example, whereas
some commenters noted that ADAS
present a low risk of data exfiltration
given that these systems often lack
direct external connectivity, others
noted that such systems may
nevertheless be indirectly connected to
external devices and systems (e.g.,
microcontrollers), thus offering indirect
access to the data they collect. As
another example, while many
commenters identified LiDAR systems
as a concern, there was disagreement
about the nature of the vulnerability
posed by these systems. Some
commenters noted that LiDAR systems
could be manipulated to cause grave
harm (e.g., to ignore pedestrians) given
their instrumental role in vehicle
guidance. However, BIS’s further
technical analysis found that LiDAR
generally lacks the ability to transmit
from the vehicle and does not, as a
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
standalone system, control the vehicle.
Importantly, BIS notes that in many
cases, ADS exerts control over both
LiDAR and the vehicle and thus
presents a higher risk. Other
commenters pointed to the growing role
of mobile applications that allow drivers
to access and control core functions of
the vehicle remotely (e.g., keyless
driving). A number of commenters also
highlighted concerns related to
aftermarket connected devices. These
devices, which often feature some forms
of connectivity, are introduced to the
vehicle after manufacture and sale and
may contain vulnerabilities over which
OEMs have little to no oversight.
Several submissions expressed a
desire for BIS to tailor any regulation as
narrowly as possible, arguing that BIS
should focus only on those systems with
direct connectivity to the connected
vehicle or the ability to transmit from
the connected vehicle. Some
commenters pointed specifically to
devices that connect to a vehicle’s
controller area network (CAN) bus as
posing a specific cybersecurity risk.
Others recommended that BIS should
critically examine electric vehicle
charging infrastructure and associated
technologies due to a potential risk of
exploitation by foreign adversaries. A
few OEM commenters ascribed the
highest level of potential risk to
‘‘finished’’ or ‘‘vertically integrated’’
vehicles from suppliers with a foreign
adversary nexus that are operating in
the United States. One commenter
pointed to ICTS components inside
safety-critical systems (e.g., braking
systems, steering systems, traction
systems, battery-charging and
management systems, airbag systems) as
posing greater levels of potential risk.
On the other hand, some commenters
recommended that BIS should aim to
address the widest possible aperture of
risk by regulating a wide variety of the
technologies enumerated in the ANPRM
along with additional technology
categories (e.g., microcontrollers, analog
products).
Following consideration of these
comments, BIS is proposing a rule that
aims to strike a balance between
minimizing supply chain disruptions
and the need to address the national
security risks posed by Connected
Vehicles. BIS proposes to achieve this
balance by focusing the rule only on
those systems that most directly
facilitate the transmission of data both
into and from the vehicle, rather than
focusing on all systems. Therefore, BIS
is proposing to regulate transactions
involving two systems of ICTS integral
to connected vehicles, VCS and ADS. As
further discussed below, in many cases,
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
these systems serve as controllers for
subordinate systems within the
Connected Vehicle, like those
highlighted in the ANPRM, making
them a target for exploitation related to
data exfiltration or remote vehicle
manipulation. After reviewing
comments, BIS has determined that
aftermarket telematics devices,
including fleet tracking devices and
systems, that fulfill functions consistent
with the definition of VCS hardware are
covered by this proposed rule.
Additionally, the proposed rule does
not cover ICTS with the function of
enabling the transmission, receipt,
conversion, or processing of radio
frequency communications at a
frequency below 450 megahertz. Setting
such a threshold enables BIS to capture
those ICTS that pose a higher risk due
to their connectivity and transmission
functions, while lowering compliance
burden by excluding from regulation
those ICTS with functions that pose a
lower risk and offer high utility to
consumers (e.g., tire pressure
monitoring systems, electronic key
fobs).
For similar reasons, BIS ultimately
chose to exclude other systems
highlighted in the ANPRM—such as OS,
ADAS, or BMS—from this proposed
rule unless they have VCS components
and fall within the proposed rule’s
definition of VCS hardware. For
example, automotive software systems
like BMS and automotive OS do not
have their own connectivity, and
require communication through a VCS,
thereby making VCS a more effective
focus for rulemaking. BMS traditionally
do not have their own external wireless
data link and instead rely on VCS for
wireless communication through a VCS.
Likewise, automotive OS software,
which generally resides on an in-vehicle
infotainment unit or centralized head
unit, are characterized by a wide
diversity in architecture, design, and
supply chain among OEMs while also
generally lacking their own data link,
instead relying on communication
through a VCS. Given how these
systems are typically placed within
connected vehicles and the ways in
which they achieve connectivity, BIS
has chosen to focus on the systems that
ultimately facilitate the transmission of
data both to and from the vehicle as
opposed to these subordinate systems.
Additionally, to reduce unnecessary
economic impacts and supply
disruption, BIS is proposing to regulate
ADS software rather than the hardware
components of ADAS and ADS. The
hardware that enables ADAS and ADS
varies widely between different OEMs.
In contrast, the hardware that enables
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
VCS are relatively consistent across
different automotive architectures and
designs. ADAS and ADS hardware
encompasses a wide variety of different
sensors, distributed electronic control
units (ECUs), centralized computing
units, actuators, and signaling units,
among others. These sensors and
internal vehicle networking hardware
rarely have independent connectivity.
Most, if not all, scalable cybersecurity
vulnerabilities to these systems are
achieved by connectivity through VCS
systems. A rule that coherently and
feasibly addresses these varied supply
chains would have disproportionate
economic and supply chain impacts
relative to the reduction of national
security risks. Further, focusing on the
ADS software supply chain
appropriately mitigates the national
security risks that they present while
limiting the supply chain and economic
impact. While BIS recognizes that the
scope of data captured by connected
automotive systems is vast and that
multiple systems may pose national
security risks, as discussed above, it has
decided to focus its current efforts on
VCS hardware and covered software.
However, BIS does not foreclose the
possibility of further addressing other
systems, including additional aspects of
VCS and ADS, in future regulation. BIS
therefore also specifically seeks
comment on its determination that VCS
and ADS are automotive ICTS integral
to Connected Vehicles and pose the
greatest and most addressable national
security risk, and on its decision to
focus this rule on those systems. BIS
also specifically seeks comment on
whether any risks posed by other
connected vehicle ICTS should also be
addressed in this rule.
d. Cybersecurity Best Practices
In the ANPRM, the Department
requested comments regarding
cybersecurity concerns with the
connected vehicle supply chain, as well
as standards, best practices, and norms
that are relied upon and built up by the
connected vehicle industry.
Commenters largely emphasized that
OEMs dedicate significant resources to
bolstering the cybersecurity of
connected vehicle systems in addition
to following or conforming to relevant,
established best practices and standards.
Some commenters referenced work by
vehicle manufacturers to deploy
advanced encryption techniques as well
as the importance of conducting
thorough testing on connected vehicle
systems and components, to include
penetration testing, fuzz testing, and
static code analysis. Others identified
specific techniques and best practices,
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
including role-based access controls.
Among the best practices and standards
most referenced by commenters were
the National Highway Traffic Safety
Administration’s (NHTSA)
Cybersecurity Best Practices for the
Safety of Modern Vehicles, International
Organization for Standardization’s (ISO)
and SAE International’s standard ISO/
SAE 21434, Institute of Electrical and
Electronics Engineers Standards
Association’s (IEEE) standard IEEE
1609.2, SAE J3061, and SAE J3161. At
the international level, commenters also
referenced the United Nations Economic
Commission for Europe (UNECE)
Regulations 155 (R155) and R156, which
address whole-of-vehicle and software
update cybersecurity, respectively. One
commenter encouraged BIS to pay
particular attention to R155 and R156
given the standards’ mandatory
coverage in UNECE member states and
their ability to provide common best
practices to vehicle manufacturers
globally.
Many commenters underscored that
security is a shared responsibility
between OEMs and cloud service
providers (CSPs), explaining that while
CSPs manage the infrastructure layer,
CSP customers are responsible for
implementing appropriate
configurations and controls in the cloud
to protect their data. Commenters also
emphasized that practices for
automotive cloud security and cloud
data access vary between OEMs and
according to the specific contractual
terms between the OEM and CSP. Some
submissions pointed to ISO’s and
International Electrotechnical
Commission’s (IEC) standard ISO/IEC
27001 and third-party certifications and
attestations, such as the Cloud Security
Alliance Cloud Controls Matrix, as
models for cloud security best practices
and standards. With regard to electric
vehicle charging infrastructure,
commenters pointed to ISO 15118,
National Institute of Standards and
Technology’s (NIST) Internal Report (IR)
8473, and German technical
specification DIN 70121, but they
emphasized that specific practices vary
according to OEM due to differing
battery types and configurations.
BIS acknowledges that cybersecurity
standards and best practices,
particularly many of those mentioned in
submissions, serve a crucial function in
promoting the safety and security of
vehicles. While BIS generally
encourages the use of cyber security
standards and best practices, BIS also
acknowledges that no standard BIS is
aware of or that was identified in
comments—either currently in effect or
under development—would sufficiently
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
79093
mitigate the undue or unacceptable risks
posed by foreign adversary involvement
in connected vehicle ICTS supply
chains as described in this proposed
rule, even if widely adopted by
industry. The standards and guidance
BIS reviewed are primarily focused on
hardening automotive systems from
external access. Standards and guidance
alone are insufficient to address risks
from within the supply chain, as the
systems are not, and cannot be hardened
against the OEM or tier 1 and 2
suppliers that have or maintain
privileged access to them. As a result,
BIS is not proposing to adopt
cybersecurity standards and best
practices as part of the rule but may
consider the scope and nature of their
adoption on a case-by-case basis as part
of the Specific Authorizations process
described in greater detail below.
e. Authorizations and Mitigations
In the ANPRM, BIS sought comment
on processes and mechanisms that BIS
could implement to authorize an
otherwise prohibited transaction with
the adoption of mitigation measures.
Commenters were generally aligned
regarding authorizations and potential
mitigation schemes. Several
commenters requested that BIS adopt (1)
an advisory opinion program for
connected vehicles; (2) a trusted trader
program to simplify compliance and
avoid the complexity and uncertainty
associated with a licensing regime; and
(3) a program allowing OEMs and
suppliers to self-certify compliance with
the regulation. BIS has considered each
of the comments in full and is proposing
an advisory opinion program;
procedures for VCS hardware importers
and connected vehicle manufacturers to
submit Declarations of Conformity,
which allow OEMs and suppliers to
self-certify their compliance with the
regulation; as well as procedures for
VCS hardware importers and connected
vehicle manufacturers to determine
eligibility for a General Authorization or
apply for a Specific Authorization. BIS
is not proposing a trusted trader
program at this time because of the
complexity, scale, and opacity of
existing connected vehicle supply
chains, but may consider establishing
such a program to facilitate compliance
as supply chains evolve and welcomes
comment on such a program as well as
any other alternate compliance
mechanisms.
A significant portion of commenters
raised and rejected data localization
requirements as a potential solution to
the data exfiltration concerns associated
with connected vehicles. Instead, many
argued that data exfiltration concerns
E:\FR\FM\26SEP3.SGM
26SEP3
79094
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
could instead be mitigated by securing
a demonstrated commitment to privacy
and security from OEMs and suppliers,
primarily through the adoption of
industry cybersecurity best practices
and standards. Some commenters also
pointed to company membership in the
Automotive Information Sharing and
Analysis Center (Auto-ISAC) as another
method for entities to demonstrate
commitment to cybersecurity best
practices. As discussed above, BIS has
opted not to require adherence to any
specific standard or best practice as a
prerequisite to securing an authorization
to engage in an otherwise prohibited
transaction, but BIS reserves the right to
consider compliance with them on a
case-by-case basis in conjunction with
other potential mitigations.
f. Economic Impacts
Comments generally agreed that
prohibitions affecting a major supplier
of a component used in Connected
Vehicles could result in negative
economic outcomes. Commenters raised
several concerns, including increased
manufacturing costs for U.S. auto
manufacturers that would likely be
passed onto consumers; a decline in
long-term U.S. competitiveness vis-à-vis
foreign auto manufacturers;
disincentivizing further investment in
connected vehicles and autonomous
vehicle research and development
(R&D), potentially reducing future
employment in the U.S. auto industry;
and a decline in the safety and quality
of connected vehicles available to U.S.
consumers. Several commenters also
noted that regulation may have an
outsized impact on small businesses,
which often lack the due diligence and
compliance resources of their larger
competitors. To mitigate these
outcomes, several commenters
requested substantial lead time for
manufacturers to identify and source
from alternative suppliers. Lastly,
multiple submissions emphasized that
not all components in connected
vehicles produced by entities owned by,
controlled by, or subject to the
jurisdiction or direction of a foreign
adversary necessarily pose a
cybersecurity or national security risk,
especially for components with minimal
or no connectivity capability.
Following consideration of these
comments, BIS proposes to allow (1)
until Model Year 2027, for connected
vehicle manufacturers to come into
compliance for transactions involving
covered software, (2) until model year
2030, or January 1, 2029, for VCS
hardware importers to come into
compliance for transactions involving
VCS hardware; and (3) until model year
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
2027 for connected vehicle
manufacturers that are owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia to sell connected vehicles with
VCS hardware and/or covered software.
Moreover, to address concerns about the
resources small businesses are able to
devote to compliance, BIS is proposing
a general authorization that would
permit certain small businesses to
engage in otherwise prohibited
transactions. BIS also emphasizes that
this rule would narrowly target the
specific automotive systems that pose
the greatest risk when designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
certain foreign adversaries. As such, the
rule would not broadly prohibit the
import of connected vehicle
technologies from foreign adversary
nations, nor would it require market
participants to alter supply chains for
low-risk or unconnected components.
BIS believes that the implementation
timeline strikes an appropriate balance
between minimizing significant
disruptions to the connected vehicles
supply chain and mitigating the
national security risk posed by foreign
adversary involvement in the connected
vehicles supply chain. Given the
relatively limited amount of foreign
adversary linked hardware and software
in U.S. vehicles today, the software
prohibitions proposed in this rule
would address the most immediate
threats to U.S. national security while
allowing industry time to come into
compliance with the prohibitions on
VCS Hardware.
IV. Risks Associated With Vehicle
Connectivity Systems and Automated
Driving Systems When Designed,
Developed, Manufactured, or Supplied
by Persons Owned by, Controlled by, or
Subject to the Jurisdiction or Direction
of the PRC and Russia
Following consideration of comments
received on the ANPRM, and further
consideration of the risks and
vulnerabilities associated with various
ICTS components that are critical to the
operation of CVs, BIS proposes to focus
its rule on two integral ICTS systems—
VCS and ADS—when designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
two foreign adversary entities—the PRC
and Russia. Below, BIS further explains
its understanding of the undue and
unacceptable risks associated with these
particular systems, and these particular
foreign adversaries, and seeks public
comment on the systems and foreign
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
adversaries addressed in the proposed
rule.
a. Vulnerabilities Associated With
Vehicle Connectivity Systems and
Automated Driving Systems
1. Vehicle Connectivity Systems
The term VCS encompasses hardware
and software systems—such as the
telematics control unit (TCU), cellular
modems and antennas, and other
automotive components—that integrate
various radio frequency communication
technologies and enable Connected
Vehicles to access external data sources,
facilitate vehicle-to-vehicle
communication, and provide enhanced
services to users through seamless
connectivity options. For example, as
the primary automotive VCS
component, a TCU acts as the primary
interface between the internal network
and external communication channels.
It collects data from onboard sensors
such as GPS, accelerometers,
gyroscopes, BMS, and other ECUs via
wired networks like CAN bus, LIN,
FlexRay, Automotive Ethernet, K-Line,
as well as wireless protocols such as
Bluetooth and Wi-Fi. Some systems use
cameras and microphones to facilitate
facial recognition of drivers, or to
respond to voice commands of drivers.
Once gathered, the TCU converts this
internal data into radio frequency
signals suitable for transmission over
the chosen wireless protocol. In other
words, as the vast array of sensors on a
connected vehicle collect information
about a driver’s location, speed, voice
patterns, battery state of charge, or other
vehicle diagnostic and operational
information, the TCU converts that data
into a format that can be transmitted to
systems outside the vehicle and then
enables that transmission.
While the increased degree of vehicle
connectivity offers benefits to both
consumers and manufacturers, it also
increases risks to consumers and
manufacturers due to the number of
access points into the internal vehicle
network, each of which may present
multiple new software vulnerabilities
for adversaries to exploit. See National
Renewable Energy Laboratory, ‘‘Vehicle
Cybersecurity Threats and Mitigation
Approaches,’’ (Aug. 2019), https://
www.nrel.gov/docs/fy19osti/74247.pdf.
Such compromise of VCS software
could occur at various points of the
software development lifecycle,
including tool development, source
code repositories, open-source
dependencies, software updates, and
shipment interdiction. For instance,
Upstream’s 2024 Global Automotive
Cybersecurity Report documented a case
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
where security researchers installed
malicious software on the VCS by
performing a simulated jailbreak attack
of an OEM’s VCS using a voltage fault
injection on the chip-maker’s processor.
This malicious software unlocked
vehicle manipulating features such as
acceleration and heated seats, provided
access to private user data such as a
user’s phonebook and calendar entries,
and enabled decryption of encrypted
Non-Volatile Memory Express (NVMe)
storage, manipulation of the car’s
identity, and extraction of the vehicleunique credential used for
authenticating and authorizing the
OEM’s internal service network. See
Upstream, 2024 Global Automotive
Cybersecurity Report (Feb. 2024),
https://upstream.auto/reports/globalautomotive-cybersecurity-report/. By
compromising software or its
dependencies, malign actors may
surveil, disrupt, damage, or otherwise
exploit the data or systems of those who
use the software. See National
Counterintelligence and Security
Center, ‘‘Software Supply Chain
Attacks,’’ (Mar. 2021), https://
www.dni.gov/files/NCSC/documents/
supplychain/Software_Supply_Chain_
Attacks.pdf.
The threat of such a cyber operation
by malicious actors can grow
significantly when firmware or
hardware components are intentionally
designed with vulnerabilities. Access to
the hardware supply chain for VCS
provides an avenue for threat actors to
manipulate or insert, with malicious
intent, hardware, or firmware modules
into telematics hardware components
such as modems, Systems on Chip
(SoC), Printed Circuit Boards (PCB),
central processing units, and antennae.
Manipulating or modifying hardware
and associated firmware in the supply
chain could also allow foreign
adversaries to insert a backdoor,
granting them control over the VCS. See
Cybersecurity and Infrastructure
Security Agency, Defending Against
Software Supply Chain Attacks (April
2021), https://www.cisa.gov/sites/
default/files/publications/defending_
against_software_supply_chain_
attacks_508.pdf, and National
Counterintelligence and Security
Center, ‘‘Software Supply Chain
Attacks,’’ (Apr. 2023), https://
www.dni.gov/files/NCSC/documents/
supplychain/Software-Supply-ChainAttacks.pdf. For instance, cellular and
satellite telecommunications
transceivers are pivotal connectivity
components in the VCS, utilizing radio
frequency (RF) energy to facilitate the
transmission and reception of data
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
between a vehicle and the external
world. If these transceivers are
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, such actors would have the
means and capability to introduce
vulnerabilities that could be exploited
to intercept and/or compromise the
information exchanged between the
connected vehicle and the external
world.
2. Automated Driving Systems
The complexity of ADS software, the
large foundation of data sources, and the
driving responsibilities inherent to ADS
render it a valuable target for
exploitation. An ADS encompasses the
upper end of the spectrum of autonomy
levels that dictate the vehicle’s
independence and the extent of driver
intervention required. As defined by the
SAE J3016, autonomy levels range from
Level 0 (no automation) where the
driver controls all aspects of driving, to
Level 5 (full automation) where the
vehicle can operate independently
under all conditions without human
intervention. Levels 1 and 2 offer driver
assistance through systems that control
either steering or acceleration and
braking, while Levels 3 through 5
(which generally comprise ADS)
progressively increase the system’s
responsibility for driving tasks, with
Level 4 requiring the ability to complete
all driving functions within defined
operational design domains (ODDs). As
the autonomy level increases, the
reliability and safety of the ADS become
increasingly reliant on the system’s
operational performance, safety
protocols, and cybersecurity measures.
See Taxonomy and Definitions for
Terms Related to Driving Automation
Systems for On-Road Motor Vehicles,
SAE International, (Apr. 2021), https://
www.sae.org/standards/content/j3016_
202104/.
An ADS must be able to execute
Dynamic Driving Tasks (DDTs) within
specific ODDs. DDTs include critical
tasks such as steering, braking,
acceleration, and Object and Event
Detection, Classification and Response
(OEDR). OEDR enables an ADS to
perceive and respond to surrounding
objects and events, a responsibility that
shifts progressively from the driver to
the ADS itself as the degree of vehicle
autonomy increases. See Edward
Griffor, David Wollman, and
Christopher Greer ‘‘Automated Driving
System Safety Measures Part 1:
Operating Envelope Specification,’’
NIST Special Publication 1900–301
(2021), https://nvlpubs.nist.gov/
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
79095
nistpubs/SpecialPublications/NIST.
SP.1900-301.pdf.
An ADS relies on a large foundation
of connected information sources for
decisions and outputs which in turn
could create inherent vulnerabilities. As
a result, the complex software systems
that drive decisions for an ADS are
valuable targets for malicious actors to
exploit. Software-based threats to
Connected Vehicles equipped with an
ADS include manipulation of sensors to
create phantom objects; manipulation of
ADS software to detect, capture, and
retain information about specific
geographic areas or other sensitive data;
or other manipulation of sensor fusion
processing software that could lead to
faulty and dangerous vehicle decision
making, to include unauthorized control
over the Connected Vehicle. See
National Counterintelligence and
Security Center, ‘‘Autonomous
Automotive Vehicle Supply Chain
Risk,’’ (2022), https://www.dni.gov/files/
NCSC/documents/supplychain/
autonomous-vehicles-placemat-2022D9A54B50-.pdf.
A compromised ADS creates
opportunities for data exfiltration and
unauthorized vehicle manipulation due
to the direct access it has to the internal
vehicle network (IVN). The IVN controls
the communication framework within a
Connected Vehicle, overseeing the ECUs
responsible for engine control, traction
control, door locks, climate control,
battery management, powertrain,
airbags, cameras, and radar
functionalities. These ECUs also
communicate via overlayed
communication networking protocols
such as a CAN bus, Local Interconnect
Network (LIN), and ethernet. See
Anastasios Giannaros, et al.
‘‘Autonomous Vehicles: Sophisticated
Attacks, Safety Issues, Challenges, Open
Topics, Blockchain and Future
Directions,’’ Journal of Cybersecurity
and Privacy 3.3 (2023). Because ADS
interacts with ECUs through the IVN, a
compromised ADS has the capability to
execute functions that affect nearly all
of a Connected Vehicle’s software and
hardware components. For example, an
update to an ADS could alter the
outputs the ADS makes to a body
control unit, enabling the ADS to
erroneously and dangerously open a
vehicle’s door while in motion.
Moreover, because many Connected
Vehicles maintain their own networks
and actively scan their operating
environment for other proximate
networks, an ADS can also potentially
be used to impact the IVN of other
vehicles or transportation infrastructure
networks through vehicle-to-vehicle
communication. See National
E:\FR\FM\26SEP3.SGM
26SEP3
79096
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Counterintelligence and Security
Center, Autonomous Automotive
Vehicle Supply Chain Risk, (Apr. 2022),
https://www.dni.gov/files/NCSC/
documents/supplychain/autonomousvehicles-placemat-2022-D9A54B50-.pdf,
and Patrick Wagner, Nikolai Puch, and
David Emeis, ‘‘Cybersecurity risk
analysis of an automated driving
system,’’ Fraunhofer Institute AISEC,
(Oct. 2023), https://publica.
fraunhofer.de/entities/publication/
4d66e81e-3570-4c49-9f8c8c9967a34ca6/details.
Given the significant processing
power and complex decision-making
ability of an ADS, the risks arising from
ADS designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of a foreign
adversary extend beyond the IVN itself
and can include risks to the fidelity and
integrity of data that flows to
downstream or adjacent transportation
infrastructure. Foreign adversaries can
corrupt ADS data by exploiting existing
vulnerabilities in ADS connectivity
environments (see section IV(b) below).
As such, direct access to an ADS
afforded to a malicious actor through
the design, development, manufacture,
or supply of ADS software has the
potential to cause severe adverse
consequences to U.S. national security
and U.S. persons.
b. Threats Associated With the PRC and
Russia
The design, development,
manufacture, or supply of certain VCS
and ADS components by persons owned
by, controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia poses undue or unacceptable
risks to national security and U.S.
persons. The PRC and Russia have
adopted political, legal, and regulatory
regimes that enable their governments to
exercise direct and indirect ownership,
control, or influence over entities in the
connected vehicle supply chain. Unlike
other foreign adversaries, the PRC and
Russia also have certain current and
anticipated industrial capabilities and
expertise that uniquely position them
within the global automotive market to
pose an outsized risk, particularly when
paired with the vulnerabilities present
within certain connected vehicle
systems.
1. PRC
The PRC’s role in the U.S. connected
vehicle supply chain presents undue
and unacceptable risks. The PRC has a
large and growing automotive sector
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
with strong connections to non-PRC,
including U.S., automakers providing it
potential increased access to the U.S.
automotive market. Further, the PRC’s
automotive sector has historical and
ongoing links to the PRC military and is
influenced by pervasive government
intervention, including through legal
and regulatory structures that increase
government oversight of and control
over PRC-based companies and their
foreign subsidiaries. See Du Xiaoying
and Wang Siyi, ‘‘Dongfeng plays pivotal
role in supporting China’s military,’’
China Daily, (Sept. 25, 2015), https://
www.chinadaily.com.cn/cndy/2015-09/
25/content_21976945.htm, and Matthew
Funaiole et al., ‘‘China Accelerates
Construction of ‘Ro-Ro’ Vessels, with
Potential Military Implications,’’ Center
for Strategic and International Studies,
(Oct. 2023), https://chinapower.csis.org/
analysis/china-construct-ro-ro-vesselsmilitary-implications/. Moreover, the
PRC possesses advanced cyber
espionage capacities that it exercises
through both state and non-state cyber
actors exacerbating such risks.
First, the size and scale of state
control in the PRC auto sector poses
outsized risks, increasing the vectors by
which the national security threats
associated with Connected Vehicles can
enter the United States. The PRC
automotive sector has played an
important role in its domestic industrial
policy since 1986, when the sector was
first named a ‘‘pillar industry’’ in the
Seventh Five-Year Plan. The Fourteenth
Five-Year Plan, the latest strategic
framework for the PRC, continues to
prioritize the technology innovation and
sustainable development of the
automobile market, including new
energy vehicles and connected vehicle
software and hardware systems. See Ben
Murphy, ‘‘Outline of the People’s
Republic of China 14th Five-Year Plan
for National Economic and Social
Development and Long-Range
Objectives for 2035,’’ Center for Security
and Emerging Technology, (May 2021),
https://cset.georgetown.edu/wp-content/
uploads/t0284_14th_Five_Year_Plan_
EN.pdf. For many years, the state has
pursued a number of policies and
practices to further its industrial policy
objectives in the automotive sector,
including mandatory joint venture
requirements, foreign equity
restrictions, massive subsidies and other
financial support measures, and various
other preferences and discriminatory
policies and practices. The PRC
automotive sector’s growth was also led
in part by several prominent state-
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
owned firms that began as military
equipment suppliers (e.g., Chang’an
Automobile, Changhe, Hunan
Changfeng Motor) or have since risen to
become prominent state-owned firms
(e.g., GAC Group, Chery Automobile
Co.). See Mattias Holweg, Jianxi Luo,
and Nick Oliver, The past, present and
future of China’s automotive industry: a
value chain perspective, International
Journal of Technological Learning,
Innovation and Development 2 (Feb.
2009), https://www.pure.ed.ac.uk/ws/
portalfiles/portal/7765689/Oliver.pdf. In
recent years, this growth and
development has led to a massive surge
in domestic vehicle production, with
Chinese vehicle production increasing
by 1.5 times over the 15-year span
between 2008 and 2023. Indeed, in
2023, the PRC alone was responsible for
nearly 33 percent of global passenger
vehicle production. See VDA, Global
passenger vehicle production in 2023,
by country [Graph], (Retrieved July 23,
2024), https://www.statista.com/
statistics/277055/global-market-shareof-regions-on-auto-production/, and
OICA & Statista, China’s share in global
vehicle production from 2008 to 2021
[Graph], (Mar. 17, 2022), https://
www.statista.com/statistics/233942/
chinas-share-of-global-productioncapacity-of-the-automobile-industry/.
Amid this significant growth in the
PRC’s domestic auto industry, Chinese
automakers, both state-owned and
private firms, have leveraged their
significant state-backed support,
including subsidies, to fuel a global
expansion that has seen Chinese
automakers establishing foreign
operations in countries like South
Africa, the Netherlands, Thailand,
Japan, and Brazil, among others,
increasing the risks stemming from PRC
auto manufacturing in third countries.
This expansion, combined with recent
investment announcements, has spurred
concerns that Chinese automakers may
soon seek to further expand into the
United States either through exports or
the establishment of additional
manufacturing facilities. Some PRCbased companies have announced plans
to establish manufacturing facilities in
Mexico, which could enable them to
receive favorable trade terms contained
in the U.S.-Mexico-Canada Agreement
(USMCA). Such a significant position
within the global auto sector greatly
expands the number of potential nexus
points between PRC connected vehicle
suppliers and U.S. automakers and U.S.
consumers, including indirectly through
auto manufacturers in third countries.
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Second, the military linkage between
the PRC government and the automotive
sector continues to the current day with
the PRC’s military-civil fusion
strategy—which seeks to, among other
goals, exploit investment and
innovation within the PRC’s private
sector to achieve military modernization
goals—and has prioritized specific
information and communication
technologies that are integral to
connected vehicle supply chains (e.g.,
telecommunications, artificial
intelligence). See Ben Murphy, ‘‘Outline
of the People’s Republic of China 14th
Five-Year Plan for National Economic
and Social Development and LongRange Objectives for 2035,’’ Center for
Security and Emerging Technology
(May 2021), https://
cset.georgetown.edu/wp-content/
uploads/t0284_14th_Five_Year_Plan_
EN.pdf. Strategies to achieve these goals
include mandating collaboration
between PRC-based companies and the
military and establishing public and
private firms as vectors to facilitate
technology transfer, industrial
espionage, and intellectual property
theft that would be advantageous for the
PRC military. See Office of the Dir. of
Nat’l Intelligence, Annual Threat
Assessment of the U.S. Intelligence
Community, (Feb. 6, 2023), https://
www.odni.gov/files/ODNI/documents/
assessments/ATA-2023-UnclassifiedReport.pdf.
Third, even beyond military-civil
fusion, the role of the PRC government
in the auto sector has only grown as
government intervention in the market
increases, including through direct
ownership of prominent industry
participants, the purchasing of so-called
‘‘golden shares’’ to gain significant
levels of influence within otherwise
private firms, embedding Chinese
Communist Party (CCP) representatives
within corporate boards and
management, and the forceful
application, or threat thereof, of the
PRC’s expanding security laws,
including its digital era legal structure.
See Lingling Wei, ‘‘China’s New Way to
Control Its Biggest Companies: Golden
Shares,’’ Wall Street Journal (Mar.
2023), https://www.wsj.com/articles/xijinpings-subtle-strategy-to-controlchinas-biggest-companies-ad001a63.
Laws promulgated in recent years
provide the PRC government increased
oversight and control over PRC-based
companies and their foreign
subsidiaries, providing a lever for
influence over corporate operations that
further exacerbates the threat that the
PRC poses to U.S. national security.
These laws require PRC-based
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
companies, wherever located, to comply
with certain access and information
requests upon demand from the PRC,
and therefore could be used by the PRC
to obtain business or other data from
PRC-based companies involved in the
connected vehicle supply chain.
Companies operating under these laws
frequently highlight the lack of
transparency, consistency, clarity, and
predictability of the enforcement of
these laws, publicly stating that PRC
laws relating to cybersecurity, data
storage, or cryptography are not subject
to the same degree of judicial
accountability as they might be in other
jurisdictions. In particular, BIS notes the
PRC may utilize a suite of national
security laws (e.g., Counter-Espionage
Law of the People’s Republic of China
[promulgated by the Standing
Committee of the National People’s
Congress, Nov. 1, 2014, amended Apr.
26, 2023, effective July 1, 2023];
National Security Law of the People’s
Republic of China [promulgated by the
Standing Committee of the National
People’s Congress, July 1, 2015, effective
July 1, 2015]; National Intelligence Law
of the People’s Republic of China
[promulgated by the Standing
Committee of the National People’s
Congress, June 27, 2017, effective June
28, 2017, amended Apr. 27, 2018]; AntiTerrorism Law of the People’s Republic
of China [promulgated by the Standing
Committee of the National People’s
Congress, Dec. 27, 2015, effective Jan. 1,
2016, amended Apr. 27, 2018]) to
compel companies, including those in
the connected vehicle supply chain, to
support national security efforts—which
are more broadly defined in the PRC
than in the United States—or military
agents upon request, including in some
cases through the creation of backdoors
and security vulnerabilities in products
sold abroad, and in many cases, the PRC
prohibits companies from disclosing
that such a request was made. See U.S.
Department of Homeland Security,
‘‘Data Security Business Advisory: Risks
and Considerations for Businesses Using
Data Services and Equipment from
Firms Linked to the People’s Republic
of China,’’ (Dec. 2022), https://
www.dhs.gov/sites/default/files/
publications/20_1222_data-securitybusiness-advisory.pdf. Additionally,
PRC authorities have established a
regulatory system that effectively allows
them to stockpile cyber vulnerabilities.
Entities subject to these regulations,
including automotive systems
manufacturers, are required to report
vulnerabilities upon discovery to PRC
authorities before patching them. See
Cyberspace Administration of China,
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
79097
‘‘Provisions on the Management of
Security Vulnerabilities of Network
Products,’’ (Jul. 2021), https://
www.cac.gov.cn/2021-07/13/c_
1627761607640342.htm. This
requirement drastically increases the
ability of the PRC government and PRCbacked cyber actors to take action
against the United States using
connected hardware and its associated
software by creating an accessible
library of known and potentially
unpatched vulnerabilities. And fourth,
the PRC has demonstrated a high level
of competency in cyber malfeasance.
The recent Volt Typhoon action
exemplified how PRC cyber actors preposition themselves across U.S. critical
infrastructure and military assets in
order to, at a potential future date,
launch an attack and impede U.S.
decision making, induce social panic,
and interfere with the deployment of
U.S. military forces. See Cybersecurity
and Infrastructure Security Agency,
‘‘PRC State-Sponsored Actors
Compromise and Maintain Persistent
Access to U.S. Critical Infrastructure,’’
(Feb. 2024), https://www.cisa.gov/newsevents/cybersecurity-advisories/aa24038a. A 2022 Annual Report to Congress
by the U.S.-China Economic and
Security Review Commission found that
the PRC’s ability and willingness to
‘‘weaponize’’ its own industries,
particularly its cybersecurity industry,
grants the country an asymmetric
advantage over the United States; an
argument that was further supported in
reporting earlier this year that detailed
the methods by which known
government-affiliated cyber threat
groups utilize private firms to carry out
their attacks. See U.S.-China Economic
and Security Review Commission,
‘‘2022 Annual Report to Congress,’’
(Nov. 2022), https://www.uscc.gov/sites/
default/files/2022-11/2022_Annual_
Report_to_Congress.pdf; Christian
Shepherd et al., ‘‘Leaked files from
Chinese firms show vast international
hacking efforts,’’ The Washington Post
(Feb. 22, 2024), https://
www.washingtonpost.com/world/2024/
02/21/china-hacking-leak-documentsisoon/. Additionally, a 2012 report from
United States Senate Permanent Select
Committee on Intelligence examining
the national security risks posed by the
PRC-based companies Huawei and ZTE
specifically argued that there are
numerous opportunities for PRC-based
threat actors to insert malicious
hardware or software components into
ICTS products throughout the product
development stage. See Permanent
Select Committee on Intelligence,
‘‘Investigative Report on the U.S.
E:\FR\FM\26SEP3.SGM
26SEP3
79098
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
National Security Issues Posed by
Chinese Telecommunications
Companies Huawei and ZTE’’ (Oct.
2012), https://intelligence.house.gov/
sites/intelligence.house.gov/files/
documents/huawei-zte%20
investigative%20report%20(final).pdf.
This risk has not diminished, as
indicated by a study of designed
vulnerabilities in products conducted
by the Georgetown Security Studies
Review, which outlines five years of
persistent insertion of malicious code by
PRC-based threat actors. See
Georgetown Security Studies Review,
‘‘Flawed by design electronics with preinstalled malware’’ (May 2018), https://
georgetownsecuritystudiesreview.org/
2018/05/23/flawed-by-designelectronics-with-pre-installed-malware/.
Given the above, the PRC’s access to the
U.S. connected vehicle supply chain
through its growing automotive sector,
military-civil fusion and other corporate
governance policies, and legal
institutions paired with its development
of mature cyber espionage capabilities
have increased the risk that the PRC
could alter the systems in, or obtain and
manipulate information to or about,
market participants who use connected
vehicle ICTS designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC.
2. Russia
The Russian state has prioritized the
growth of its automotive manufacturing
industry, instituted a legal and
regulatory framework to compel
company data sharing with the state,
and maintained a long history of
malicious cyber operations against the
U.S. Under these circumstances, there is
an increasing likelihood that Russia
emerges as a supplier of connected
vehicles technologies for the U.S.
market, providing the Russian
government a means of exploiting U.S.
connected vehicles. Moreover,
incorporating Russian hardware or
software into the U.S. connected vehicle
supply chain poses undue and
unacceptable risks to U.S critical
infrastructure and U.S. persons.
First, while Russia has historically
been less active in the global automotive
sector than the PRC, the Russian
government has recently sought to
revitalize its own domestic auto
manufacturing industry following the
exodus of foreign automakers after the
imposition of significant additional
sanctions in 2022. In 2024 alone, the
Russian auto market is projected to
experience a 15 percent increase in
passenger vehicle sales, marking a noted
uptick since the market crashed
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
following sanctions and some Russian
auto manufacturers have continued
introducing new models even amid
broader economic headwinds. See
Reuters, ‘‘Russia’s 2024 car sales
forecast raised to 1.45 mln, units, AEB
says,’’ (Jul. 2024), https://
www.reuters.com/business/autostransportation/russias-2024-car-salesforecast-raised-145-mln-units-aeb-says2024-07-03. The void left by many
foreign firms has made Russia a
valuable export market for Chinese auto
manufacturers seeking to expand their
presence globally with some Chinese
auto brands seizing significant market
share from Russian competitors
accounting for almost 56 percent of
domestic auto sales in August 2023. See
Gleb Stolayrov and Alexander Marrow,
‘‘Exclusive: Chinese car sales boom in
Russia levels off amid shaky local
recovery,’’ Reuters (Nov. 2023), https://
www.reuters.com/business/autostransportation/chinese-car-sales-boomrussia-levels-off-amid-shaky-localrecovery-2023-11-24/. In Russia, the
revitalization of the domestic economy,
in particular the domestic auto sector,
has become a key focus of the
government since the imposition of
sanctions in recent years. The Russian
government has released several plans
pointing to a prioritization of the
development of its domestic automotive
market with a particular focus on
research and development for new
technology, including autonomous
vehicles and V2X vehicle connectivity
systems. See Russian Federation, Order
of the Government of the Russian
Federation of December 28, 2022 No.
4261–r On Approval of the Strategy for
the Development of the Automotive
Industry of the Russian Federation until
2035 (Jan. 4, 2023), https://
www.garant.ru/products/ipo/prime/doc/
405963861/#1000 and See Russian
Federation, Order of the Government of
the Russian Federation of August 23,
2021 No. 2290–r On Approval of the
Concept for the Development of Electric
Vehicle Production and the Transport
Strategy of 2030, (2023), https://static.
government.ru/media/files/
bW9wGZ2rDs3BkeZHf7ZsaxnlbJzQ
bJJt.pdf. The development of these
interlocking national transportation and
automotive industry strategies involved
stakeholders from domestic automakers,
technology sectors, and the Russian
government, illustrating a coordinated
effort across the Russian state and its
domestic automotive industry. In order
to extend the reach of the state into the
Russian auto industry, in February
2024, Russia established a state-owned
corporation named Rosavto that will act
PO 00000
Frm 00012
Fmt 4701
Sfmt 4702
as liaison between government and
industry and will develop production
plans for vehicles and automotive spare
parts, oversee the development of new
models and technologies, and manage
order distribution, legislative initiatives,
and workforce training. See Eugene
Gerden, ‘‘New State Corporation to
Oversee Russian Auto Industry,’’ Wards
Auto (Feb. 2024), https://
www.wardsauto.com/regulatory/newstate-corporation-to-oversee-russianauto-industry. Concerted efforts by the
Russian government to grow the
domestic Russian automotive industry
increase the likelihood that Russianmanufactured VCS hardware or covered
software will enter the U.S. connected
vehicle supply chain, which, as
described below, would present an
undue or unacceptable risk to U.S.
national security.
Second, like the PRC, the Russian
government employs a suite of laws that
enable it to compel domestic companies
with overseas operations to provide data
gleaned through foreign ventures or to
surrender similar operational assets to
the Russian state. These laws (e.g.,
Russian Law Federal Security Service
No. 40–FZ, ‘‘Operational-Investigative
Activity’’ No. 144–FZ, 2014 Amdt. to
No. 97–FZ) provide the Russian
government direct control over Russian
corporations’ activities and facilities,
including data or customer information,
and mandate that companies cooperate
with assisting counterintelligence
actions as requested by the state,
including the Federal Security Service
of the Russian Federation (FSB). The
FSB can, in some cases, mandate that
companies allow the FSB to install
equipment on their infrastructure or
collect data. Firms that are required to
facilitate this surveillance or intrusion
activity can also be required to actively
obfuscate such requests and must
provide the state with any information
essential to the decryption of any
communications captured. Together,
these laws enable the Russian state to
collect and exploit sensitive data on or
about U.S. persons via Russian
businesses and, should Russian
companies become more prominent in
the connected vehicle supply chain,
create a pathway by which the Russian
government could secure wide-ranging
access to the vast amounts of data
collected and processed by Connected
Vehicles in the United States. See
internet Governance, ‘‘Report of Peter B.
Maggs,’’ (Dec. 2017), https://
www.internetgovernance.org/wpcontent/uploads/12-7-Exhibit-AR-Part6-Maggs-report.pdf. Public reports have
consistently raised concerns about
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Russian government laws concerning
data collection, citing a lack of
appropriate safeguards to prevent
misuse, to include judicial or public
oversight. More broadly, reports have
repeatedly documented the uneven
application of the rule of law, lack of
judicial accountability, recurrent
violations of judicial proceedings, and
challenges with judicial independence.
See Justin Sherman, ‘‘Russia is
weaponizing its data laws against
foreign organizations,’’ Brookings, (Sept.
2022), https://www.brookings.edu/
articles/russia-is-weaponizing-its-datalaws-against-foreign-organizations/;
Evegeni Moyakine and A. Tabachnik,
‘‘Struggling to strike the right balance
between interests at stake: The
‘Yarovaya’, ‘Fake news’ and ‘Disrespect’
laws as examples of ill-conceived
legislation in the age of modern
technology,’’ Computer Law & Security
Review 40, (Apr. 2021), https://
www.sciencedirect.com/science/article/
pii/S0267364920301175.
Third, apart from the access codified
in Russia’s legal framework, the country
has a longstanding pattern of utilizing
cyber operations to gain illicit access to
systems that advance the strategic ends
of Russian authorities. For example, in
December 2020 the company
SolarWinds announced it was the target
of a two-year-long cyber operation
perpetrated by Russian hackers in the
Russian Foreign Intelligence Services
(SVR). See U.S. Securities and Exchange
Commission, ‘‘SEC Charges SolarWinds
and Chief Information Security Officer
with Fraud, Internal Control Failures,’’
(Oct. 2023), https://www.sec.gov/
newsroom/press-releases/2023-227. The
perpetrators of the SolarWinds supply
chain attack used a software update to
deliver its malware to the platform’s
users after Russian intelligence services
obtained covert access to the computer
systems on which the platform was
installed and ultimately impacted more
than 18,000 users, including more than
100 companies and nine U.S.
Government agencies. This attack
credibly demonstrates how Russian
actors can infiltrate global enterprise
systems via software updates and
exemplifies how they could similarly
leverage software as a means to exploit
connected vehicles in the United States.
Additionally, a 2023 Cyber Security
Advisory suggests that exploitation of
information technology firms and their
software will continue to be a persistent
tactic leveraged by the Russian
government to collect intelligence. See
Joint Cyber Security Advisory, ‘‘Russian
Foreign Intelligence Service (SVR)
Exploiting JetBrains TeamCity CVE
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
Globally’’ (Dec. 2023), https://
www.cisa.gov/news-events/
cybersecurity-advisories/aa23-347a. BIS
has further identified Kaspersky Lab as
an example of how Russia has leveraged
software companies to give it the ability
to collect and weaponize the personal
information of Americans. See Bureau
of Industry and Security, ‘‘Final
Determination: Case No. ICTS–2021–
002, Kaspersky Lab, Inc.’’ (Jun. 2024),
https://www.federalregister.gov/
documents/2024/06/24/2024-13532/
final-determination-case-no-icts-2021002-kaspersky-lab-inc. These political,
legal, and regulatory frameworks,
combined with the PRC’s and Russia’s
demonstrated capability to exploit ICTS
supply chains through malicious cyber
activity, exacerbate BIS’s concern that
the threats posed by these foreign
adversaries could be directed at the U.S.
connected vehicle supply chain,
including integral systems such as VCS
and ADS. The persistent connectivity
and software-driven capabilities of VCS
and ADS, combined with the vast
amounts of data that traverse these
systems, make them valuable and likely
targets for the PRC and Russian
governments to compromise.
c. Consequences
Taken together, VCS and ADS
designed, developed, manufactured, or
supplied by persons under the
ownership, control, jurisdiction, or
direction of the PRC or Russia manifest
undue and unacceptable risks to United
States national security in several ways.
If left unaddressed, the interaction of
threats and vulnerabilities could result
in the exfiltration of sensitive U.S.
persons’ data to foreign adversaries or
the remote or automated manipulation
of Connected Vehicles by the PRC and
Russia, among other concerns.
First, the integration of compromised
VCS or ADS into a completed vehicle
could undermine the reliability of a
connected vehicle or its underlying
control systems. Compromised
components in VCS or ADS could result
in increased frequency and severity of
connected vehicle malfunctions that
could in turn detrimentally impact U.S.
national security, including the
resiliency of U.S. critical infrastructure,
or the safety of U.S. persons.
Given the persistent connectivity of
VCS and ADS and the essential
functions that they service in the
operation of Connected Vehicles, these
systems, if compromised and co-opted
by an adversary, could serve as a node
through which a foreign actor could
probe or breach broader ICTS systems
within the United States. According to
research by Upstream, remote malicious
PO 00000
Frm 00013
Fmt 4701
Sfmt 4702
79099
cyber activities—which rely on network
connectivity (e.g., Wi-Fi, Bluetooth, 3/4/
5G networks)—have increased
significantly in recent years and
consistently outnumber malicious cyber
activities carried out through physical
access to devices since at least 2010,
accounting for 95 percent of all
malicious cyber activities in 2023. See
Upstream, Upstream’s 2024 Global
Automotive Cybersecurity Report (2024),
https://upstream.auto/reports/globalautomotive-cybersecurity-report/.
Considering the increasingly
sophisticated methodologies employed
by foreign adversaries to gain access to
critical U.S. cyber infrastructure,
compromised VCS and ADS, with their
inherent connectivity, would easily
present another attack surface for
foreign adversaries to exploit. As
detailed in the previous analysis of
vulnerabilities inherent in VCS,
adversaries with access to VCS, such as
to telematics systems, could inject
malicious code into a vehicle’s
operational systems. Additionally, such
malware could be developed in such a
way as to exploit vehicle connectivity to
propagate itself across multiple systems
as the vehicle travels and connects to
those discrete systems. In this way, not
only would the ICTS integral to
Connected Vehicles be compromised,
but vehicle systems could be exploited
to spread malware with the intent of
harming all ICTS systems to which a
vehicle connects. See Anastasios
Giannaros, et al. ‘‘Autonomous
Vehicles: Sophisticated Attacks, Safety
Issues, Challenges, Open Topics,
Blockchain and Future Directions,’’
Journal of Cybersecurity and Privacy 3.3
(2023).
Second, as discussed, both VCS and
ADS have significant control over and
access to critical vehicle functions,
including steering, braking, speed
control, ignition, and almost all other
mechanical functions of the vehicle.
Such extensive control over vehicle
operations could enable a foreign
adversary to use a compromised VCS or
ADS component to hamper vehicle
functions or even to manipulate a
connected vehicle for malicious
purposes. As VCS and ADS control or
link to integral vehicle functions, a
foreign adversary could even exploit
compromised VCS or ADS components
to impair or disable a connected vehicle
while in transit. Disabled, impaired, or
otherwise improperly functioning
vehicles could result in grave damage or
impediment to critical infrastructure
within the United States, or in physical
harm to U.S. persons. A disabled,
impaired, or erratically functioning
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79100
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Connected Vehicle, or potentially
multiple Connected Vehicles all
experiencing such problems
simultaneously, could result not only in
traffic patterns that would effectively
block critical transportation arteries, but
could cause collisions ultimately
damaging transportation features (e.g.,
roadways, bridges, tunnels) and energy,
telecommunications, and similar
infrastructure situated near
transportation systems. The potential
consequences of widespread connected
vehicle impairment could be
particularly acute if the targets were
fleet vehicles operating in support of
infrastructure vital to transportation,
energy, water, waste,
telecommunications, and other essential
services.
The risks to the resiliency of critical
U.S. infrastructure posed by connected
vehicle components designed,
developed, manufactured, or supplied
by persons that are owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia are further compounded by the
potential for VCS and ADS to collect
data on infrastructure. Advances in VCS
and ADS necessitate increasingly
cutting-edge sensor suites incorporating
radar, LiDAR, camera, sonar, and
computer vision to gather information
on the surrounding environment for
both onboard computing and remote
cloud computing to process data in
informing vehicle operating decisions.
This vast wealth of data, collected over
time by multiple vehicles likely
contains valuable information such as
location data about critical U.S.
infrastructure. For example, data
gathered from GPS/GNSS systems in a
connected vehicle could be crossreferenced and collated with a
multitude of other data to produce
information about the location,
function, and operational trends of
various transportation, energy, or other
critical infrastructure. A foreign
adversary could extract such critical
infrastructure data using its control over
designers, developers, manufacturers, or
suppliers of VCS and ADS components
subject to the foreign adversary’s
ownership, control, jurisdiction, or
direction, thereby increasing the risk
and precision of attacks on such critical
infrastructure.
Finally, given the volume of
information collected by vehicles to
support VCS and ADS operation,
exploitation of these systems could
enable an adversary to cull a
tremendous amount of data on vehicle
movement across the United States.
This information could potentially
include data generated on or from fleet
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
vehicles used by emergency response,
law enforcement, or the military. This
data, and particularly all metadata and
derived data that can be drawn from the
raw data, can provide considerable
insight into fleet size, composition, and
capabilities, as well as information on
organizational response times and
response procedures. Such information
would prove valuable to an adversary
seeking to disrupt U.S. emergency
response operations. Any potential risks
to U.S. national security arising from
disrupting emergency response
activities are further compounded by
the potential for an adversary to exploit
access to VCS and ADS to leverage the
persistent connectivity required for
malign operations, including exploits to
trigger improper engine shutdown,
brake activation, or electrical system
deactivation. Any of these actions have
serious consequences for U.S. persons’
health and safety. The PRC or Russia
could use similar methods to target U.S.
persons other than institutions, thereby
imperiling the safety and security of
individual U.S. citizens or residents.
VCS and ADS, if corrupted by the
producer at the direction of a foreign
adversary, could improperly access
driver mobile devices to collect,
exfiltrate, and exploit personally
identifiable information (PII) or even
protected health information (PHI). It is
also possible that a foreign adversary
could use covert access to VCS and ADS
to provide false or misleading
information to a driver, causing
degraded and dangerous vehicle
operation conditions. Such tactics could
be used either indiscriminately to sow
panic and cause disruption, or to
intentionally target specific drivers.
Additionally, and as noted by the Office
of the Director of National Intelligence
in the 2024 National
Counterintelligence Strategy, foreign
adversaries, like the PRC and Russia,
view this kind of PII and PHI as
particularly valuable as it provides them
‘‘not only economic and R&D benefits,
but also useful [counterintelligence]
information, as hostile intelligence
services can use vulnerabilities gleaned
from such data to target and blackmail
individuals.’’ See The Director of Nat’l
Intelligence, 2024 National
Counterintelligence Strategy (Aug.
2024), https://www.dni.gov/files/NCSC/
documents/features/NCSC_CI_Strategypages-20240730.pdf.
Even when such systems are not
subject to compromise, companies
owned by, controlled by, or subject to
the jurisdiction or direction of a foreign
adversary, if occupying certain positions
within the supply chain, may
PO 00000
Frm 00014
Fmt 4701
Sfmt 4702
potentially legally gain access to their
users’ personal data. For example, one
prominent Chinese auto manufacturer
with operations in the United States
publicly states in its U.S. privacy policy
that the personal data it may collect
(e.g., identifiers, customer records
information, internet or other electronic
network activity information,
geolocation information, professional or
employment-related information) is
only stored in the United States ‘‘in
principle,’’ but goes on to note that
personal data ‘‘may be transferred to our
headquarters in China’’ for processing
and storage. While the incorporation in
the U.S. supply chain of VCS hardware
and covered software designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia poses one type of risk,
transactions involving VCS hardware
and covered software pose a separate
risk when the connected vehicle
manufacturer is, itself, owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, even when the connected
vehicle manufacturer is located in the
United States. connected vehicle
manufacturers have privileged and
direct access to all systems in the
vehicle, including the VCS hardware
and covered software. Not only are VCS
hardware and covered software built to
the connected vehicle manufacturers’
specifications but prior to the sale of a
completed connected vehicle,
connected vehicle Manufacturers are
able to exercise significant levels of
control over that VCS hardware and
covered software with little to no
external oversight prior to the sale of the
completed connected vehicle. Based on
the foregoing, BIS assesses that ICTS
transactions involving VCS hardware or
covered software designed, developed,
manufactured, or supplied by persons
owned or controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia—including transactions to
supply the VCS hardware or covered
software into the United States market
as part of the sale of the completed
connected vehicle—present undue or
unacceptable risks to the national
security of the United States within the
meaning of E.O. 13873. BIS welcomes
comment on the vulnerabilities and
risks it has identified.
V. Discussion of the Proposed Rule and
Request for Comments
BIS proposes a regulation that
would—absent a general or specific
authorization otherwise—(1) prohibit
VCS hardware importers from
knowingly importing into the United
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
States certain hardware for VCS; (2)
prohibit connected vehicle
manufacturers from knowingly
importing into the United States
completed connected vehicles
incorporating covered software; (3)
prohibit connected vehicle
manufacturers from knowingly selling
within the United States completed
connected vehicles that incorporate
covered software; and (4) prohibit
connected vehicle manufacturers who
are persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia from knowingly
Selling in the United States completed
connected vehicles that incorporate VCS
hardware or covered software
(collectively, ‘‘Prohibited
Transactions’’). These prohibitions
would apply to transactions when such
VCS hardware or covered software is
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia.
BIS anticipates that this rule would
primarily impact market participants
who could be considered VCS Hardware
Importers or connected vehicle
manufacturers, such as OEMs and
importers of completed connected
vehicles, as well as Tier 1 and Tier 2
suppliers of VCS Hardware. For these
entities, three compliance
mechanisms—Declarations of
Conformity, general authorizations, and
specific authorizations—are available,
depending on whether the VCS
hardware importer or connected vehicle
manufacturer wishes to engage in an
otherwise prohibited transaction.
Importantly, because VCS hardware
importers and connected vehicle
manufacturers frequently offer many
different types of products, any one of
the three mechanisms may not be
available for their entire business.
Rather, depending on the product, VCS
hardware importers and connected
vehicle manufacturers could be required
to use a combination of these three
mechanisms to meet their obligations
under the rule.
First, Declarations of Conformity
would have to be submitted to BIS by
VCS hardware importers and connected
vehicle manufacturers who have not
engaged in a prohibited transaction,
unless otherwise specified. Such VCS
hardware importers and connected
vehicle manufacturers would, in this
Declaration of Conformity, certify, once
per calendar year or model year (or
whenever material changes occur) to
BIS that the submitter has not engaged
in a prohibited transaction and provide
certain information on the import of
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
VCS hardware and/or the import or sale
of completed connected vehicles.
Second, a general authorization could
be available for VCS hardware importers
and/or connected vehicle manufacturers
seeking to engage in an otherwise
prohibited transaction, depending on
the circumstances. A general
authorization would allow the VCS
hardware Importer and/or connected
vehicle manufacturer to engage in the
otherwise prohibited transaction,
without the need to notify or seek
approval from BIS. General
authorizations would be available only
in a narrow set of circumstances in
which the conditions of the otherwise
prohibited transaction appropriately
mitigate the level of risk associated with
the particular transaction. Such
conditions would include, for example,
when VCS hardware is imported from
the PRC or Russia solely for testing
purposes, or where the completed
connected vehicle that incorporates VCS
hardware or covered software from the
PRC or Russia will be driven on public
roads for fewer than 30 calendar days
per year. Those availing themselves of a
general authorization would be required
to continuously monitor their use of the
VCS hardware or completed connected
vehicles covered by the General
Authorization to ensure the
authorization still applies. If a change
would render the transaction ineligible
for a general authorization, such as a
change in the vehicle’s use, the VCS
hardware importer or connected vehicle
manufacturer would be required to
apply for a specific authorization and to
cease engaging in such transaction
unless and until a Specific
Authorization is granted. For example,
if a completed connected vehicle that
incorporates covered software or VCS
Hardware that is designed, developed,
manufactured, or supplied by a person
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia is no longer used solely for
display, research, or testing, the VCS
hardware importer or the connected
vehicle manufacturer would be required
to seek a specific authorization.
Similarly, if the VCS Hardware Importer
or connected vehicle manufacturer
meets or exceeds total model year
production of 1,000 units, or if a
completed connected vehicle that
incorporates covered software or VCS
hardware that is designed, developed,
manufactured, or supplied by a person
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia is to be used on public
roadways for 30 or more days in any
calendar year, the VCS hardware
PO 00000
Frm 00015
Fmt 4701
Sfmt 4702
79101
importer or connected vehicle
manufacturer would be required to seek
a specific authorization from BIS.
Lastly, for VCS hardware importers
and connected vehicle manufacturers
who wish to engage in a prohibited
transaction, but do not otherwise qualify
for a general authorization, a specific
authorization from BIS would be
required before they could proceed with
the prohibited transaction. A specific
authorization would only be available in
circumstances where BIS determines,
based on the information submitted by
the applicant and other collected
information, that the otherwise
prohibited transaction does not present
an undue or unacceptable risk to U.S.
national security. However, as a
condition of approving the specific
authorization, BIS might impose certain
requirements and mitigation measures
upon the VCS hardware importers and
connected vehicles manufacturers
seeking to proceed with the prohibited
transaction.
VCS hardware importers and
connected vehicle manufacturers could
appeal to the Under Secretary for
Industry and Security (Under Secretary)
any decision by BIS to deny an
application for a Specific Authorization,
suspend or revoke a previously granted
specific authorization, or issue a written
notification that a VCS hardware
importer or connected vehicle
manufacturer is ineligible for a general
authorization. Further, the regulation
would establish a method for VCS
hardware importers and connected
vehicle Manufacturers to seek guidance
from BIS, in the form of advisory
opinions, on prospective transactions
that may be prohibited. BIS also
proposes to establish a process through
which BIS may inform VCS hardware
importers or connected vehicle
manufacturers that certain of their
activities could constitute a prohibited
transaction.
In proposing this rule, BIS recognizes
that Section 203(b) of IEEPA—i.e., the
‘‘Berman Amendment’’—limits the
scope of the authority to regulate or
prohibit transactions relating to
‘‘information’’ or ‘‘informational
materials.’’ In relevant part, the Berman
Amendment states that the ‘‘authority
granted to the President by this section
does not include the authority to
regulate or prohibit, directly or
indirectly . . . the importation from any
country, or the exportation to any
country, whether commercial or
otherwise, regardless of format or
medium of transmission, of any
information or informational materials,
including but not limited to,
publications, films, posters, phonograph
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79102
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
records, photographs, microfilms,
microfiche, tapes, compact disks, CD
ROMs, artworks, and newswire feeds.’’
50 U.S.C. 1702(b)(3). Consistent with
the statute’s text and purpose, as
demonstrated by legislative history and
context, as well as judicial
interpretations, BIS understands the
phrase ‘‘information or informational
materials’’ to refer to expressive
materials and mediums that may be
carrying such expressive content. See,
e.g., United States v. Amirnazmi, 645
F.3d 564, 586–87 (3d Cir. 2011).
Accordingly, the Berman Amendment
prevents BIS from regulating, directly or
indirectly, the import or export of
expressive materials. It does not,
however, prevent BIS from imposing a
regulation that is aimed at the
functional capabilities of technology.
The proposed rule is consistent with
the Berman Amendment. Its purpose is
to regulate transactions involving
certain hardware and software based on
functional capabilities that can be
exploited by foreign adversaries, not the
exchange of ideas and expression that
the Berman Amendment protects. As
discussed in Section IV, VCS Hardware
and covered software process and
transmit data such as geolocation
information or systems diagnostics
reports, which are used to monitor and
control the vehicle’s safe operation, and
that a foreign adversary could also
manipulate in ways that could impair or
disable the vehicle’s function, leading to
dangerous outcomes that pose a harm to
U.S. national security. Similarly, the
functional data collected by Covered
Software—such as high-definition
mapping data of infrastructure and
roadways—would pose serious risks to
that critical infrastructure if collected
and exploited by a foreign adversary. As
a result, BIS has determined that the
proposed prohibitions in this rule are
consistent with the Berman
Amendment, which was intended to
protect materials involving the free
exchange of ideas from regulation under
IEEPA. BIS is considering whether and
how to address the term ‘‘information or
informational materials’’ within the
context of the proposed rule and may
consider further changes to the final
rule to reflect our interpretation of this
term. BIS welcomes comment on this
issue.
Each section of the proposed rule is
discussed below. BIS invites comments
on all aspects of this proposed rule.
software that, collectively, are capable
of performing the entire dynamic
driving task for a completed connected
vehicle on a sustained basis, regardless
of whether it is limited to a specific
ODD. This definition is consistent with
the terminology industry uses for
systems that operate at certain advanced
levels of autonomy. It is also consistent
with definitions issued by NHTSA.
Specifically, this definition corresponds
to automation levels 3, 4, and 5 as
defined by SAE International standard
J3016.
a. Definitions
BIS proposes to define a ‘‘connected
vehicle manufacturer’’ to mean a U.S.
person (1) manufacturing or assembling
completed connected vehicles in the
United States; and/or (2) importing
1. Automated Driving System (ADS)
BIS proposes to define ‘‘Automated
Driving System’’ to mean hardware and
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
2. Completed Connected Vehicle
BIS proposes to define ‘‘completed
connected vehicle’’ to mean a connected
vehicle that requires no further
manufacturing operations to perform its
intended function. This definition is
consistent with definitions issued by
NHTSA. Additionally, for the purposes
of this proposed definition, the
integration of an ADS into a connected
vehicle constitutes a manufacturing
operation for a Completed Connected
Vehicle. BIS intends this caveat to
clarify that a person owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, whose sole manufacturing or
assembly operation is integrating ADS
into an otherwise Completed Connected
Vehicle, would be subject to the
prohibitions in the rule and would need
to obtain a Specific Authorization before
importing or Selling that completed
connected vehicle in the United States.
3. Connected Vehicle
BIS proposes to define ‘‘connected
vehicle’’ to mean a vehicle driven or
drawn by mechanical power and
manufactured primarily for use on
public streets, roads, and highways, that
integrates onboard networked hardware
with automotive software systems to
communicate via dedicated short-range
communication, cellular
telecommunications connectivity,
satellite communication, or other
wireless spectrum connectivity with any
other network or device. Vehicles
operated only on a rail line are not
included in this definition. This
definition incorporates the suggestions
of commenters to the ANPRM, many of
whom requested that the definition of
connected vehicle specify the types of
vehicles that would be covered.
4. Connected Vehicle Manufacturer
PO 00000
Frm 00016
Fmt 4701
Sfmt 4702
completed connected vehicles for Sale
in the United States.
5. Covered Software
BIS proposes to define ‘‘covered
software’’ to mean the software-based
components, in which there is a foreign
interest, executed by the primary
processing unit of the respective
systems that are part of an item that
supports the function of VCS or ADS at
the vehicle level. covered software does
not include firmware, which is
characterized as software specifically
programmed for a hardware device with
a primary purpose of controlling,
configuring, and communicating with
that hardware device. At a minimum,
this definition of covered software
would include operating systems such
as a real-time operating system (RTOS),
and general-purpose operating systems.
An example of covered software within
the ADS is, if included in the system,
the machine learning software that
performs the functions of object
detection, classification, and decision
making.
Covered software does not include
open-source software. BIS understands
open-source software as software that
can be freely used, modified, and
distributed by anyone, with both access
to the source code and the ability to
contribute to the software’s
development and improvement. Given
these qualities of open-source software,
it is not designed, developed,
manufactured, or supplied by any
attributable entity. Therefore, the
inclusion of open-source software as a
component of covered software is not
subject to prohibition. However, if
licensed open-source software is
modified to create proprietary enterprise
software for a specific use not meant for
redistribution, the resulting software
could be subject to prohibition if the
person modifying the open-source
software is owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia. In addition to other
aspects of this proposed rule, BIS
specifically seeks comment on this
definition.
6. FCC ID Number
BIS proposes to define ‘‘FCC ID
Number’’ as the unique alphanumeric
code identifying a product subject to
certification by the Federal
Communications Commission (FCC)
composed of a (1) grantee code and (2)
product code.
7. Foreign Interest
For the purposes of this rule, BIS is
considering ‘‘foreign interest,’’ when
used with respect to property, as any
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
interest in property, of any nature
whatsoever, whether direct or indirect,
by a non-U.S. person. Under this
definition, a foreign interest can
include, but is not limited to, an interest
through ownership, intellectual
property, contract—e.g., ongoing supply
commitments such as maintenance, any
license agreement related to the use of
intellectual property—profit-sharing or
fee arrangement, as well as any other
cognizable interest. This definition is
consistent with the definition of
‘‘interest’’ used in the context of Office
of Foreign Asset Control sanctions,
which are, in relevant part, also
established pursuant to the statutory
requirements of IEEPA. See 31 CFR
Chapter V, and, e.g., 31 CFR 510.313,
535.312.
Consistent with IEEPA, BIS proposes
to regulate only transactions involving
property in which a foreign country or
national thereof has any such interest. A
transaction would be subject to the
prohibitions in the proposed rule only
if it involves ICTS, specifically VCS
hardware or covered software, that is
designed, developed, manufactured, or
supplied by a person owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia. VCS hardware importers and
connected vehicle manufacturers
wishing to engage in transactions that
this rule proposes to prohibit would
need to qualify for a general
authorization or obtain a specific
authorization. In order to provide
sufficient visibility into the supply
chains of VCS Hardware and covered
software including to verify that the
transaction does not involve VCS
Hardware or covered software that is
designed, developed, manufactured, or
supplied by a person owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia (see Section V(c) of this notice
and proposed Section 791.305), BIS is
proposing to require that VCS hardware
importers and connected vehicle
manufacturers that import VCS
hardware, or import or sell completed
connected vehicles that contain covered
software in which there is any other
foreign interest, submit an annual
Declaration of Conformity containing
relevant details about the import or
Sale. BIS seeks comment on this
regulatory approach, including the
necessity and efficacy of requiring
Declarations of Conformity with respect
to VCS hardware and covered software
in which there is a foreign interest,
though not a foreign adversary interest.
BIS also seeks comment on the
availability and efficacy of any
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
alternative approach that would require
a narrower set of VCS hardware
importers and completed connected
vehicle manufacturers to submit
Declarations of Conformity, while still
achieving the goals of the Declaration of
Conformity requirement and addressing
the declared emergency under Executive
Order 13873.
With respect to VCS hardware that is
designed, developed, manufactured, or
supplied by a person owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, BIS proposes to regulate the
importation of VCS hardware, making
VCS hardware importers responsible for
compliance.
With respect to Covered Software,
based on discussions with connected
vehicle manufacturers, automotive
suppliers, and other stakeholders, BIS
has come to understand that typically,
ADS and VCS software are designed or
developed to a connected vehicle
manufacturer’s specifications. ADS and
VCS software is frequently designed,
developed, or supplied by foreign
persons, and those persons frequently
retain a legally cognizable interest in the
underlying software, even after it has
been integrated into the connected
vehicle. For example, foreign software
developers may earn profits from use of
their software; retain data access and
sharing rights to the software; or have
obligations to maintain and update the
software. Such arrangements are among
the types of interests that BIS
contemplates as giving rise to an
obligation to submit a Declaration of
Conformity or, if the software designer,
developer, or supplier is a person
owned by, controlled by, or subject to
the jurisdiction or direction of a foreign
adversary, to qualify for a General
Authorization or seek a Specific
Authorization under the proposed rule.
BIS therefore proposes to regulate
covered software by regulating the
importation or sale of completed
connected vehicles, making connected
vehicle Manufacturers responsible for
compliance. BIS seeks comment on this
understanding of foreign interests in
covered software as well as other
arrangements in which foreign
designers, developers, or suppliers of
covered software retain a cognizable
legal interest in the software after it is
integrated into a connected vehicle.
Finally, in addition to the general
regulations related to VCS hardware and
covered software described above, with
respect to connected vehicle
manufacturers who are owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, BIS additionally proposes to
PO 00000
Frm 00017
Fmt 4701
Sfmt 4702
79103
regulate VCS hardware and covered
software by regulating the sale of
completed connected vehicles that
incorporate VCS hardware or covered
software. In this circumstance, BIS
understands from extensive engagement
with connected vehicle manufacturers
and automotive suppliers that persons
who own, control, or direct the
operations of the connected vehicle
manufacturer would maintain an
interest in the vehicle transactions that
the connected vehicle manufacturer
carries out. For example, this could
include, but is not limited to, profit
sharing agreements between a parent
company and its U.S. subsidiary, or data
sharing agreements between the same.
BIS understands this to be standard for
the automotive industry and would
welcome comments on this issue.
Additionally, because the PRC and
Russian legal regimes discussed in
Section IV of this notice could compel
a PRC or Russia-based parent company
of a connected vehicle manufacturer to
provide those governments with
information on or access to the
operations of the U.S.-based connected
vehicle manufacturer, BIS understands
that the foreign parent company
typically retains a legal right to access
the data collected by the U.S.
subsidiary, representing a foreign
interest in that U.S. subsidiary and its
connected vehicle sales.
BIS seeks comment on the nature of
foreign interests in transactions related
to the connected vehicle supply chain,
including as described in the
prohibitions outlined herein. BIS also
seeks comment as to its understanding
of the nature and presence of a Foreign
Interest in property subject to the
prohibitions described above, as well as
whether there are other types of
transactions that would involve Foreign
Interests, as described above.
8. Hardware Bill of Materials
BIS proposes to define ‘‘Hardware Bill
of Materials’’ or HBOM as a
comprehensive list of parts, assemblies,
documents, drawings, and components
required to create a physical product.
This term includes information
identifying the manufacturer, related
firmware, technical information, and
descriptive information.
9. Import
BIS proposes to define ‘‘import’’ to
mean, with respect to any article, the
entry of such article into the United
States Customs Territory. It does not
include admission of an article from
outside the United States into a foreigntrade zone for storage pending further
assembly in the foreign-trade zone, or
E:\FR\FM\26SEP3.SGM
26SEP3
79104
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
shipment to a foreign country. This
definition only applies to subpart D of
15 CFR part 791.
10. Item
BIS proposes to define ‘‘item’’ as a
component or set of components with a
specific function at the vehicle level. A
system may also be considered an item
if it implements a function. This
definition is consistent with ISO/SAE
Standard 21434.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
11. Knowingly
BIS proposes to define ‘‘knowingly’’
to have the same meaning given to
‘‘knowledge’’ in the Export
Administration Regulations (15 CFR
772.1). Knowledge of a circumstance
(the term may be a variant, such as
‘‘know,’’ ‘‘reason to know,’’ or ‘‘reason
to believe’’) includes not only positive
knowledge that the circumstance exists
or is substantially certain to occur, but
also an awareness of a high probability
of its existence or future occurrence.
Such awareness is inferred from
evidence of the conscious disregard of
facts known to a person and is also
inferred from a person’s willful
avoidance of facts.
12. Model Year
Consistent with the definition used by
NHTSA, BIS proposes to define ‘‘model
year’’ as the year used to designate a
discrete vehicle model, irrespective of
the calendar year in which the vehicle
was actually produced, provided that
the production period does not exceed
24 months. Throughout this proposed
rule, BIS refers to both calendar year
and model year when referring to the
import of VCS Hardware, particularly
for the submission of Declarations of
Conformity (791.305) and the
implementation timeline (791.308
(Exemptions)). BIS generally
understands that most VCS hardware is
imported into the United States already
destined for a known, specific model
year of vehicle. BIS also understands
that some VCS hardware units may be
imported without being associated with
a specific vehicle model year. As such,
the proposed rule provides separate
timelines for each of these cases to
accommodate business timelines for
VCS hardware importers. BIS is
particularly interested in comment on
this approach.
13. Person Owned by, Controlled by, or
Subject to the Jurisdiction or Direction
of a Foreign Adversary
BIS proposes to define ‘‘person owned
by, controlled by, or subject to the
jurisdiction or direction of a foreign
adversary’’ to mean, (a) any person,
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
wherever located, who acts as an agent,
representative, or employee, or any
person who acts in any other capacity
at the order, request, or under the
direction or control, of a foreign
adversary or of a person whose activities
are directly or indirectly supervised,
directed, controlled, financed, or
subsidized in whole or in majority part
by a foreign adversary; (b) any person,
wherever located, who is a citizen or
resident of a foreign adversary or a
country controlled by a foreign
adversary, and is not a United States
citizen or permanent resident of the
United States; (c) any corporation,
partnership, association, or other
organization with a principal place of
business in, headquartered in,
incorporated in, or otherwise organized
under the laws of a foreign adversary or
a country controlled by a foreign
adversary; or (d) any corporation,
partnership, association, or other
organization, wherever organized or
doing business, that is owned or
controlled by a foreign adversary, to
include circumstances in which any
person identified in paragraphs (a)
through (c) possesses the power, direct
or indirect, whether or not exercised,
through the ownership of a majority or
a dominant minority of the total
outstanding voting interest in an entity,
board representation, proxy voting, a
special share, contractual arrangements,
formal or informal arrangements to act
in concert, or other means, to determine,
direct, or decide important matters
affecting an entity.
14. Prohibited Transactions
BIS proposes to define ‘‘prohibited
transactions’’ as, collectively, the
transactions described in §§ 791.302
(Prohibited VCS hardware transactions),
791.303 (Prohibited covered software
transactions), or 791.304 (Related
prohibited transactions). The term
prohibited transactions refers to the
prohibitions on the knowing import of
VCS hardware into the United States
that is designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia, as specified in section
791.302; the knowing Sale within, or
import into, the United States of a
completed connected vehicle containing
covered software that is designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia, as specified in
§ 791.303; and the knowing Sale of
completed connected vehicles that
incorporate VCS Hardware or covered
software by connected vehicle
PO 00000
Frm 00018
Fmt 4701
Sfmt 4702
Manufacturers who are owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, as specified in § 791.304.
15. Sale
BIS proposes to define ‘‘sale,’’ in the
context of this subpart, as distributing
for purchase, lease, or other commercial
operations a new completed connected
vehicle for a price, to include the
transfer of completed connected
vehicles from a connected vehicle
manufacturer to a dealer or distributor,
as those terms are defined in 49 U.S.C.
30102. This definition also applies to
the related terms such as sell or selling.
This would include direct-to-consumer
sales of completed connected vehicles
from the connected vehicle
manufacturer to the ultimate purchaser.
16. Software Bill of Materials
BIS proposes to define ‘‘Software Bill
of Materials’’ or SBOM as a formal and
dynamic, machine-readable inventory
detailing the software supply chain
relationships between software
components and subcomponents,
including software dependencies,
hierarchical relationships, and baseline
software attributes, including author’s
name, timestamp, supplier name,
component name, version string,
component hash, package URL, unique
identifier, and dependency
relationships to other software
components.
BIS understands that this definition
generally conforms to industry
standards. However, BIS is specifically
seeking comment on the feasibility,
technical burden, cost, and effectiveness
of identifying and disclosing to BIS the
listed SBOM attributes.
17. Vehicle Connectivity System
BIS proposes to define ‘‘Vehicle
Connectivity System’’ or VCS as a
hardware or software item for a
completed connected vehicle that has
the function of enabling the
transmission, receipt, conversion, or
processing of radio frequency
communications at a frequency over 450
megahertz. This definition would
exempt most remote keyless entry fobs
and immobilizers and certain internal
wireless sensors and relays. VCS
software is included in the definition of
Covered Software.
18. VCS Hardware
BIS proposes to define ‘‘VCS
hardware’’ as the following softwareenabled or programmable components
and subcomponents that support the
function of Vehicle Connectivity
Systems or that are part of an item that
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
supports the function of Vehicle
Connectivity Systems: microcontroller,
microcomputers or modules, systems on
a chip, networking or telematics units,
cellular modem/modules, Wi-Fi
microcontrollers or modules, Bluetooth
microcontrollers or modules, satellite
navigation systems, satellite
communication systems, other wireless
communication microcontrollers or
modules, and external antennas. VCS
hardware does not include component
parts that do not contribute to the
communication function of VCS
hardware (e.g., brackets, fasteners,
plastics, and passive electronics). VCS
hardware would include aftermarket
devices not contained in a completed
connected vehicle at sale but that could
be later integrated into or attached to the
vehicle to perform VCS functions.
BIS believes this definition
appropriately identifies the various
components, contained within a TCU or
other connected systems of a connected
vehicle, that facilitate off-board data
transmission, and, thus, are most likely
to pose the risks identified in Section IV
of this notice. BIS specifically seeks
comment on this list of components and
the appropriateness of their inclusion to
address the national security risks that
BIS has identified in this notice.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
19. VCS Hardware Importer
BIS proposes to define ‘‘VCS
hardware importer’’ as a U.S. person
importing VCS hardware for further
manufacturing, integration, resale, or
distribution. A connected vehicle
manufacturer may be a VCS Hardware
Importer if VCS hardware has already
been installed in a connected vehicle
when imported by the connected
vehicle manufacturer.
This definition would capture OEMs,
and tier 1 and tier 2 suppliers importing
VCS hardware into the United States.
BIS specifically seeks comment on the
scope of this definition, particularly
regarding whether it captures the
breadth of market participants dealing
in VCS Hardware.
20. United States
BIS proposes to define ‘‘United
States’’ to mean the United States of
America, the States of the United States,
the District of Columbia, and any
commonwealth, territory, dependency,
or possession of the United States, or
any subdivision thereof, and the
territorial sea of the United States.
b. Prohibitions on Certain Transactions
Related to Connected Vehicles
1. Prohibited Transactions
Under the proposed rule, VCS
hardware importers would be
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
prohibited from knowingly importing
into the United States any VCS
hardware that is designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia. BIS specifically seeks
comment on this approach and whether
additional components should be
included in or excluded from this
prohibition.
Connected vehicle manufacturers
would be prohibited from knowingly
Selling within the United States, or
importing into the United States,
completed connected vehicles that
incorporate covered software designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia.
Connected vehicle manufacturers who
are owned by, controlled by, or subject
to the jurisdiction or direction of the
PRC or Russia would also be prohibited
from knowingly Selling in the United
States completed connected vehicles
that incorporate covered software or
VCS hardware. As with other connected
vehicle manufacturers, connected
vehicle manufacturers who are owned
by, controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia participate in the design and
development of VCS hardware and
covered software, which are generally
built to the manufacturers’
specifications. However, this
prohibition applies even if connected
vehicle manufacturers who are owned
by, controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia were not involved in the design
or development of the VCS Hardware
and Covered Software. Their Sale of
those completed connected vehicles
constitutes the supply of VCS hardware
and covered software and is thus
captured by this prohibition. To be
clear, BIS anticipates that because of the
role connected vehicle manufacturers
play in the design and development of
the key components in connected
vehicles, in many cases, this prohibition
will be duplicative of the other
prohibitions in this proposed rule. BIS
seeks comments on the efficacy of all of
the proposed prohibitions detailed
above.
As noted above, for the purposes of
this proposed rule, BIS defines the term
‘‘person owned by, controlled by, or
subject to the jurisdiction or direction of
a foreign adversary’’ to mean (a) any
person, wherever located, who acts as
an agent, representative, or employee, or
any person who acts in any other
capacity at the order, request, or under
the direction or control, of a foreign
PO 00000
Frm 00019
Fmt 4701
Sfmt 4702
79105
adversary or of a person whose activities
are directly or indirectly supervised,
directed, controlled, financed, or
subsidized in whole or in majority part
by a foreign adversary; (b) any person,
wherever located, who is a citizen or
resident of a foreign adversary or a
country controlled by a foreign
adversary, and is not a United States
citizen or permanent resident of the
United States; (c) any corporation,
partnership, association, or other
organization with a principal place of
business in, headquartered in,
incorporated in, or otherwise organized
under the laws of a foreign adversary or
a country controlled by a foreign
adversary; or (d) any corporation,
partnership, association, or other
organization, wherever organized or
doing business, that is owned or
controlled by a foreign adversary, to
include circumstances in which any
person identified in paragraphs (a)
through (c) possesses the power, direct
or indirect, whether or not exercised,
through the ownership of a majority or
a dominant minority of the total
outstanding voting interest in an entity,
board representation, proxy voting, a
special share, contractual arrangements,
formal or informal arrangements to act
in concert, or other means, to determine,
direct, or decide important matters
affecting an entity.
To provide further clarity regarding
transactions involving VCS hardware
and covered software that would be
prohibited, BIS offers the following
examples of persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC and
Russia:
Example 1: Company A, incorporated
in the United States, is a wholly owned
subsidiary of Company B. Company B is
a state-owned enterprise of the PRC or
Russia. Because Company B is a stateowned enterprise, Company A would be
considered ‘‘owned by’’ the PRC or
Russia.
Example 2: Company A is a joint
venture between Company B and
Company C where Company C owns a
majority share of Company A. Company
B is a corporation incorporated in a
third-party jurisdiction. Company C is a
state-owned enterprise of the PRC or
Russia. Company A would be
considered ‘‘owned by’’ the PRC or
Russia.
Example 3: Company A is majority
owned in aggregate by multiple stateowned enterprises and state-owned
investment funds of the PRC or Russia.
Company A would be considered
‘‘owned by’’ the PRC or Russia.
Example 4: Company A, incorporated
in the United States, is a subsidiary of
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79106
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Company B. Company B is a private
company incorporated in the PRC or
Russia with its principal place of
business in the PRC or Russia. Because
Company B is subject to the jurisdiction
of the PRC or Russia, Company B’s
subsidiary, Company A, is controlled by
an entity subject to the jurisdiction of
the PRC or Russia and would be
considered ‘‘controlled by’’ and ‘‘subject
to the direction of’’ the PRC or Russia.
Example 5: Company A is a
multinational company where a
majority of the voting power is held by
Company B, a PRC or Russian
government investment fund. Company
A would be ‘‘controlled by’’ and
‘‘subject to the direction of’’ the PRC or
Russia.
Example 6: Company A is a holding
company organized in a tax-advantaged
jurisdiction. Company A is publicly
listed on a stock exchange and its
corporate voting structure is
characterized by Class A and Class B
shares, Class B shares having ten times
the voting power of Class A shares. If
the aggregate voting power of
shareholders subject to the jurisdiction
of the PRC or Russia holding either
Class A and Class B shares constitutes
a majority or a dominant minority of
total voting power, then Company A
would be ‘‘controlled by’’ and ‘‘subject
to the direction of’’ the PRC or Russia.
Example 7: Company A, a company
that is organized under the laws of the
PRC or Russia, owns a minority interest
in Company B, a U.S. business. Based
on special voting powers vested in that
minority interest, Company A maintains
certain veto rights that determine
important matters affecting Company B,
including the right to veto the dismissal
of senior executives of Company B.
Company B would be considered
‘‘controlled by’’ and ‘‘subject to the
direction of’’ Company A, and therefore
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia.
Example 8: Company A is an entity
incorporated in a third country and
Company B is an entity incorporated in
the PRC or Russia. Company A and
Company B create a new joint venture,
Company C, to design, develop, and
manufacture a new product. Company A
and Company B own minority shares of
the joint venture while Company D, a
holding company wholly owned by a
PRC citizen, owns the largest minority
share. If aggregate voting power of
Company B and Company D constitutes
majority or dominant minority voting
share, Company C would be ‘‘controlled
by’’ and ‘‘subject to the direction of’’ the
PRC or Russia.
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
Example 9: Company A has eight
members on its board of directors.
Company A is characterized by a
shareholder and corporate governance
structure that requires a 75 percent
supermajority for any significant
business decision. Three of the members
of the board are citizens of, and
therefore subject to the jurisdiction of,
the PRC or Russia. Because these three
members make up 37.5 percent of the
voting power of the board, they can
block any supermajority and therefore
determine, direct, or decide important
matters affecting Company A. Company
A would be ‘‘controlled by’’ or ‘‘subject
to the direction of’’ the PRC or Russia.
Example 10: The PRC or Russian
government, through an investment
fund, acquires a 1% special
management share in Company A. This
share grants the PRC or Russian
government the right to appoint a
director to the board of Company A and
veto certain key business decisions,
such as major strategic changes or
mergers. This share allows the
government to influence Company A’s
operations and strategy. Company A
would be ‘‘controlled by’’ the PRC or
Russia.
Example 11: Company A maintains its
principal place of business in the PRC
or Russia. Company A would be
‘‘subject to the jurisdiction’’ of the PRC
or Russia.
Example 12: Company A is a publicly
listed U.S. corporate entity. Company A
has a wholly owned subsidiary,
Company B, that is organized under the
laws of the PRC or Russia and
manufactures goods in the PRC or
Russia. Because Company B is
organized under the laws of the PRC or
Russia, Company B would be subject to
the jurisdiction of the PRC or Russia.
However, Company A is not subject to
the jurisdiction of the PRC or Russia by
nature of its subsidiary, Company B,
being ‘‘subject to the jurisdiction’’ of the
PRC or Russia.
Example 13: Company A is privately
held and incorporated in the United
States. One member of Company A’s
board of directors, Person X, a former
chairman of the board of a large PRC
corporation, has known ties to the
government of the PRC, owns a large
minority share of Company A, and has
previously made significant investments
in other companies founded by
Company A’s chief executive officer.
Person X also facilitated a large minority
investment in Company A by the large
PRC corporation where they were
previously chairman of the board.
Person X’s professional background
indicates that they are directly or
indirectly supervised, directed,
PO 00000
Frm 00020
Fmt 4701
Sfmt 4702
controlled, financed, or subsidized by
the PRC government. The combination
of Person X’s close ties to Company A’s
CEO, Person’s X’s ownership interest
and ability to direct investment from
large, highly regulated PRC corporate
entities, and Person X’s close ties to the
PRC government indicate that Company
A would be ‘‘subject to the direction’’ of
the PRC.
BIS seeks comment on whether the
definition of, and examples provided to
illuminate, who is a ‘‘person owned by,
controlled by, or subject to the
jurisdiction or direction of a foreign
adversary,’’ provides sufficient clarity
regarding the circumstances under
which the rule’s prohibitions might
apply.
For additional clarity in determining
whether a transaction involving VCS
hardware or covered software designed,
developed, manufactured, or supplied
by entities described above would be
prohibited under the proposed rule, BIS
offers the below examples. In offering
these examples, BIS emphasizes that
VCS hardware and covered software
would not be considered designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia, solely based on the
country of citizenship of natural persons
who are employed, contracted, or
otherwise similarly engaged to
participate in the design, development,
manufacture, or supply of that VCS
hardware or covered software:
Example 14: A U.S. person has a
contractual relationship with a foreign
person to import a cellular module, and
the cellular module will later be
integrated into a VCS for a completed
connected vehicle. The U.S. person is,
under the proposed rule, a VCS
hardware importer. The U.S. person
knows the cellular module was
manufactured at a facility located in the
PRC or Russia and is being imported
through a third country. Since the entity
manufacturing the module would, at a
minimum, be ‘‘subject to the
jurisdiction’’ of the PRC or Russia, the
import of the module would be a
prohibited transaction under the
proposed rule, unless it qualifies for a
general authorization or a specific
authorization from BIS.
Example 15: A U.S. person imports a
TCU that was assembled in a third
country, but that contains a
microcontroller that is manufactured in
the PRC or Russia and is Sold to the
third-country assembler of the TCU. The
U.S. person knows that the
microcontroller was manufactured by an
entity located in the PRC or Russia. As
the microcontroller is included in the
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
definition of VCS hardware, the import
of the TCU for a completed connected
vehiclewould be a prohibited
transaction under the proposed rule
unless it qualifies for a general
authorization, or a specific
authorization granted by BIS.
Example 16: A U.S. person imports a
completed connected vehicle, making
the U.S. person a connected vehicle
manufacturer under the proposed rule’s
definition. The completed connected
vehicle contains a TCU that operates
software supporting off-vehicle
connectivity above 450 MHz, and that
software is designed, developed, or
otherwise supplied (in whole or in part)
by an entity located in the PRC or
Russia. Under the proposed rule, the
import of the completed connected
vehicle would be prohibited, unless it
was authorized by a general
authorization or a Specific
Authorization.
Example 17: A U.S. person who is a
connected vehicle manufacturer that
manufactures or assembles completed
connected vehicles in the United States
Sells to a dealer within the United
States a completed connected vehicle in
which the vehicle’s ADS software for
object detection, classification, and
decision making is proprietary software
designed, developed, or supplied by an
entity in the PRC or Russia. The Sale or
transfer of the completed connected
vehicle would be a prohibited
transaction under the proposed rule
unless it qualifies for a general
authorization or specific authorization
granted by BIS.
Example 18: A U.S. person who is a
connected vehicle manufacturer utilizes
foreign VCS and ADS software
development teams through various
subsidiaries, joint ventures, and contract
arrangements, some of which retain
servicing obligations, contractual and
licensing rights, and other interests in
the software they have developed. One
of those software development teams is
located in the PRC or Russia, and as
such, that software team is subject to the
jurisdiction of the PRC or Russia. Given
the role of PRC or Russian developers in
the creation of the VCS or ADS software
(covered software), the sale of a
completed connected vehicle within the
United States that integrates this
proprietary covered software, would be
a prohibited transaction under the
proposed rule, unless it qualifies for a
general authorization or specific
authorization granted by BIS.
Example 19: A U.S. person who is a
connected vehicle manufacturer utilizes
VCS and ADS software development
teams around the world through various
subsidiaries, joint ventures, and contract
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
arrangements. One of those software
development teams is comprised of
individuals who are PRC or Russian
citizens working in a foreign
jurisdiction other than the PRC or
Russia for a company that is not owned
by, controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia. Although the individuals
technically meet the definition of
‘‘person owned by, controlled by, or
subject to the direction of a foreign
adversary,’’ the sole fact that PRC or
Russian citizens work on the connected
vehicle manufacturer’s software
development would not make the Sale
of a completed connected vehicle
within the United States that integrates
this VCS or ADS software a Prohibited
Transaction under the proposed rule.
Example 20: Company A, which is a
wholly owned subsidiary of a foreign
corporation in which a PRC or Russian
entity owns a controlling interest,
imports completed connected vehicles
that incorporate covered software and
VCS hardware, none of which was
originally designed, developed,
manufactured, or supplied by an entity
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia. In such rare circumstance
where Company A did not participate in
the design or development of the
covered software or VCS hardware,
Company A would submit (once per
Model Year) a Declaration of Conformity
for the import of the completed
connected vehicles containing covered
software and VCS hardware. However,
any subsequent sale by Company A of
such completed connected vehicle in
the United States would be prohibited.
For example, Company A subsequently
Sells such completed connected
vehicles to a dealer in the United States.
Because Company A is a person
controlled by the PRC or Russia and has
direct privileged access to the VCS
Hardware and covered software prior to
the sale, the knowing sale by Company
A of the completed connected vehicle
with VCS hardware and covered
software would be a prohibited
transaction under the proposed rule,
and a specific authorization from BIS
would be required before engaging in
such a transaction.
Example 21: Company A, a wholly
owned subsidiary of a PRC or Russia
corporation manufactures completed
connected vehicles in the United States.
The completed connected vehicles that
Company A manufactures incorporate
covered software and VCS hardware
provided by Company B, a company
that is not owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia. Because Company A
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
79107
is owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia, participated in the design and
development of the covered software or
VCS hardware, and in any event, has
direct and privileged access to its
completed connected vehicles—
including the incorporated covered
software and VCS hardware—Company
A’s sale of the completed connected
vehicles is a prohibited transaction
under the proposed rule, and a specific
authorization from BIS would be
required before engaging in such a
transaction.
c. Compliance
1. Declaration of Conformity
BIS proposes to require VCS
Hardware Importers and connected
vehicle manufacturers engaged in
specified transactions to submit
Declarations of Conformity to BIS
certifying that they have not engaged in
a prohibited transaction. Under the
proposed rule, declarants would be
responsible for submitting information
to BIS, including documentation
collected from suppliers of components
of VCS hardware and from suppliers of
covered software, to verify compliance
with the regulations. These
requirements include obtaining and
analyzing the HBOMs for VCS hardware
and the SBOMs for covered software
and providing documentation of the
steps the declarant took to verify that
the transactions comply with the
provisions of the rule. In an effort to
facilitate compliance, BIS is not
currently proposing to mandate
particular due diligence requirements
but would rather allow VCS hardware
importers and connected vehicle
Manufacturers to provide evidence of
their own efforts tailored to their unique
operations. BIS seeks comment on this
approach.
The proposed rule generally
contemplates that Declarations of
Conformity would be submitted in three
instances by persons not engaged in
prohibited transactions: (1) Declarations
submitted by VCS hardware importers;
(2) Declarations submitted by connected
vehicle manufacturers importing
completed connected vehicles
containing covered software into the
United States; and (3) Declarations
submitted by connected vehicle
manufacturers selling completed
connected vehicles in the United States
that they have manufactured or
assembled in the United States and
which contain covered software, so long
as there is a continuing foreign interest
in the covered software. Persons
required to submit a Declaration of
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79108
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Conformity need do so once per model
year for units associated with a vehicle
model year, or calendar year for units
not associated with a vehicle model
year, and only for the categories of
transactions they seek to execute during
that period. VCS hardware importers or
connected vehicle manufacturers
engaging in multiple transactions that
require submissions of Declarations of
Conformity under separate paragraphs
of § 791.305 may, if they prefer, submit
a single compiled Declaration of
Conformity containing all required
information for all transactions. For
example, an OEM that manufactures or
assembles completed connected
vehicles in the United States, imports
connected vehicles into the United
States, and imports VCS hardware into
the United States would be able to
submit a single Declaration of
Conformity based on vehicle make,
model, and trim and VCS hardware that
will be imported or manufactured that
Model Year.
BIS believes that Declarations of
Conformity will be an important tool for
advancing the goals of this proposed
rule, and addressing the emergency
declared in E.O. 13873. Declarations of
Conformity will first and foremost
provide BIS with a means to verify VCS
hardware importers’ and completed
connected vehicle manufacturers’
compliance with the proposed
prohibitions. Through extensive
engagement with connected vehicle
manufacturers and automotive
suppliers, BIS has come to understand
that connected vehicle supply chains
are complex and often opaque, with
potentially hundreds of suppliers for a
single connected vehicle in a given
model year. Such complexity and
opacity could result in the incorporation
into connected vehicles of VCS
hardware and covered software that is
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of foreign
adversaries, without the full knowledge
of the connected vehicle manufacturer.
While connected vehicle manufacturers
typically have strong relationships with
their immediate suppliers, to include
the development of years-long supply
contracts that span entire vehicle
generations, their understanding of the
deeper supply chain (to include who is
supplying their suppliers) is
substantially weaker. Additionally,
while the COVID–19 pandemic and
associated supply chain crisis forced
connected vehicle manufacturers to
more critically evaluate their hardware
supply chains, illumination of software
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
supply chains remains largely
unachieved. Consequently, BIS believes
that the requirement to submit annual
Declarations of Conformity will serve as
an important mechanism for ensuring
that parties subject to this proposed rule
implement the due diligence and other
procedures necessary to fully
understand the supply chains for their
VCS hardware and covered software and
thus comply the proposed rule’s
prohibitions on the incorporation of
VCS Hardware or covered software that
has been designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia.
BIS also believes that the collection of
annual Declarations of Conformity from
connected vehicle manufacturers and
VCS hardware importers would
facilitate enforcement of the proposed
rule, including by allowing BIS to
proactively identify red flags and
potential violations of the proposed
prohibitions. For example, BIS may rely
on the broad perspective provided by
the Declarations of Conformity from
multiple connected vehicle
manufacturers and VCS hardware
importers to identify previously
undetected participation by PRC or
Russian designers, developers,
manufacturers, or suppliers that are
subject to the prohibitions of this
proposed rule yet remain entrenched in
the U.S. connected vehicle supply
chain. Additionally, these Declarations
of Conformity would allow BIS to
maintain an understanding of
technological advancements and
changes in the U.S. connected vehicle
industry—both in hardware and
software—and consequently enable BIS
to propose updates to the rule as needed
to maximize its effectiveness in
mitigating the undue and unacceptable
risks posed by the PRC and Russia while
minimizing burden on industry.
The sections below explain in greater
detail the types of Declaration of
Conformity that would be required
under the proposed rule. BIS seeks
comment on this regulatory approach,
including the necessity and efficacy of
requiring Declarations of Conformity
with respect to VCS hardware and
covered software in which there is a
Foreign Interest. BIS also seeks
comment on the availability and
efficacy of any alternative approach that
would require a narrower set of VCS
Hardware Importers and completed
connected vehicle manufacturers to
submit Declarations of Conformity,
while still achieving the goals of the
Declaration of Conformity requirement
PO 00000
Frm 00022
Fmt 4701
Sfmt 4702
and addressing the declared emergency
under E.O. 13873.
i. Import of VCS Hardware
The Declaration of Conformity
described in § 791.305(a)(1) would
require VCS hardware Importers to
provide information on the specific VCS
hardware that the declarant plans to
import into the United States for a given
model year, or, for units not associated
with a model year, a given calendar
year. BIS proposes to require the
Declaration of Conformity to contain the
FCC ID number(s) of the VCS hardware,
and, if applicable, any subcomponents
in the VCS hardware that also have an
FCC ID number. FCC regulations at 47
CFR 2.925 require any electronic device
that emits RF waves, including those
imported into the United States, to have
an FCC ID number, which is used to
identify and certify that the device
meets the necessary regulatory
standards for wireless communication.
The proposed rule would additionally
require VCS Hardware Importers to
report all third-party information
technology external endpoints to which
the VCS Hardware is programmed to
connect, including the country in which
said endpoint is located and/or the
identity and location of the service
provider. This would include any thirdparty that is not the VCS hardware
importer nor the final recipient, such as
the connected vehicle manufacturer that
integrates the VCS hardware and
receives data on an episodic or ongoing
basis from the VCS hardware.
Additionally, VCS hardware importers
would be required to submit an HBOM
as part of the Declaration of Conformity.
BIS would expect, consistent with the
proposed definition for this term, this
HBOM to include a comprehensive list
of parts and technical information,
including the provenance of
subcomponents contained within the
VCS hardware.
ii. Import of Completed Connected
Vehicles
The Declaration of Conformity
described in section 791.305(a)(2)
would require connected vehicle
manufacturers that import completed
connected vehicles, including U.S.based OEMs and foreign-headquartered
OEMs with operations in the United
States, to provide information to BIS on
the make, model, and trim (if known) of
the imported group of completed
connected vehicles and the covered
software contained within the
completed connected vehicles. BIS
proposes to require declarants to submit
an SBOM for the covered software
related to both VCS and ADS. The
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
minimum requirements for the SBOM
are author’s name, timestamp, supplier
name, component name, version string,
component hash, package URL, unique
identifier, and dependency
relationships to other software
components. Declarants may submit
additional SBOM information as
evidence demonstrating the covered
software is not sourced from PRC or
Russian-linked entities. BIS seeks
comment on all aspects of this SBOM
requirement.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
iii. Manufacture or Assembly of
Completed Connected Vehicles for Sale
in the United States
Similarly, this proposed rule, as
described in section 791.305(a)(3),
would require connected vehicle
Manufacturers that manufacture or
assemble completed connected vehicles
for sale in the United States to submit
a Declaration of Conformity that
includes information on the make,
model, and trim of the group of
completed connected vehicles and the
covered software contained within the
completed connected vehicles that the
connected vehicle manufacturer will
sell for a Model Year. BIS emphasizes
that this requirement would apply only
to connected vehicle manufacturers
whose vehicles incorporate covered
software in which there is a foreign
interest. Connected vehicle
manufacturers who manufacture or
assemble completed connected vehicles
in the United States and whose vehicles
contain no covered software in which
there is a foreign interest would not be
required to submit a Declaration of
Conformity. However, given the global
nature of automotive software supply
chains, BIS anticipates that nearly all
connected vehicle manufacturers of
completed connected vehicles for Sale
in the United States would be required
to submit an annual Declaration of
Conformity covering all completed
connected vehicles by make, model, and
trim to be manufactured for Sale in the
United States for each Model Year. As
detailed above, this requirement would
include the submission of an SBOM for
covered software incorporated into the
group of completed connected vehicles.
iv. Procedures To Submit Declarations
of Conformity
VCS Hardware Importers and
connected vehicle manufacturers
submitting a Declaration of Conformity
under this rule would be required to
submit the Declaration of Conformity to
BIS annually, 60 days prior to the first
sale or first import of a Vehicle
Identification Number (VIN) series of
completed connected vehicles
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
comprised of a single model year, or 60
days prior to the import of VCS
hardware covered by the Declaration of
Conformity. VCS hardware importers
and connected vehicle manufacturers
may, at their discretion, submit a
combined Declaration of Conformity, or
may submit separate Declarations of
Conformity (e.g., one Declaration
covering import of VCS hardware and
another covering import of completed
connected vehicles). Declarations of
Conformity covering both the import or
manufacture of completed connected
vehicles and the import of VCS
Hardware should be submitted by the
earlier of the two reporting dates.
connected vehicle manufacturers that
would submit a Declaration of
Conformity for the import of a group of
completed connected vehicles into the
United States should not submit a
Declaration of Conformity related to the
subsequent Sale of that same group of
Completed Connected Vehicles. In the
event of material changes that impact
the content of the Declaration of
Conformity, VCS hardware importers or
connected vehicle manufacturers would
be required to submit an updated
Declaration of Conformity and an
updated HBOM or SBOM within 30
days of such a change. Such changes
may include changes in the suppliers of
key subcomponents or functional
aspects of the VCS hardware or covered
software incorporated in the completed
connected vehicle. BIS would make a
web portal available on its website
(https://www.bis.gov) through which
VCS Hardware Importers and connected
vehicle manufacturers may submit
Declarations of Conformity.
2. General Authorizations
General Authorizations would allow
certain VCS Hardware Importers and
connected vehicle manufacturers to
engage in otherwise prohibited
transactions without the need to notify
BIS prior to engaging in the transaction.
connected vehicle manufacturers or
VCS hardware importers (and entities
under common control, including
parents) who produce small quantities
of completed connected vehicles or VCS
hardware, which the proposed rule
defines as fewer than 1,000 units in a
calendar year, would be eligible for a
general authorization. This is in line
with requirements for high-volume and
low-volume manufacturers found in 49
CFR part 565. BIS specifically seeks
comment on this threshold for both
completed connected vehicles and VCS
Hardware. connected vehicle
manufacturers would be eligible for a
general authorization if the completed
connected vehicle is otherwise subject
PO 00000
Frm 00023
Fmt 4701
Sfmt 4702
79109
to a prohibition but will be used on
public roadways fewer than 30 days in
any calendar year. For purposes of this
general authorization, each use of a
completed connected vehicle on public
roadways on a distinct calendar day will
count toward the 30-day limit,
regardless of the duration of a vehicle’s
use on a particular day. VCS hardware
importers and connected vehicle
manufacturers would also qualify for a
general authorization for otherwise
prohibited transactions involving
completed connected vehicles
incorporating covered software or VCS
hardware if the completed connected
vehicles are used only for testing
display, or research purposes and not on
public roads in the United States.
Lastly, VCS hardware importers or
connected vehicle manufacturers would
qualify for a general authorization for
the importation of completed connected
vehicles incorporating covered software
or the importation of VCS Hardware
solely for the purposes of repair,
alteration, or competition off public
roads, and the vehicle or hardware will
be reexported from the United States
within one year of the time of import.
BIS proposes to allow persons using
General Authorizations to self-certify
their compliance with the applicable
General Authorization. As such, these
persons would not need to submit
documentation to BIS but would be
required to gather and maintain full
records for a period of 10 years
documenting compliance for all
completed connected vehicles and VCS
hardware covered by the general
authorization. Furthermore, persons
availing themselves of a general
authorization would be required to
continuously monitor for any changes
that render a transaction ineligible for
continued reliance on the general
authorization. A VCS hardware importer
or connected vehicle manufacturer that
is no longer eligible for a general
authorization would need to apply for
and receive a specific authorization
before engaging in an otherwise
prohibited transaction. For example,
connected vehicle manufacturers who
import a certain model or trim of
completed connected vehicles
containing covered software that are
originally used for display or testing
purposes must seek a specific
authorization before importing that
model or trim of completed connected
vehicle for more general use in the
United States.
A connected vehicle manufacturer or
VCS hardware importer that is a
subsidiary, joint venture, affiliate, or
other entity subject to the ownership,
control, jurisdiction, or direction of the
E:\FR\FM\26SEP3.SGM
26SEP3
79110
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
PRC or Russia would be ineligible for
general authorizations and would be
required to apply for a specific
authorization before engaging in an
otherwise prohibited transaction.
3. Specific Authorizations
VCS hardware importers and
connected vehicle manufacturers
wishing to engage in an otherwise
prohibited transaction who are
ineligible for an exemption or general
authorization would have to apply for
and receive a specific authorization to
engage in the otherwise prohibited
transaction. The purpose of specific
authorizations is to allow BIS on a caseby-case basis to determine the nature
and scope of the undue or unacceptable
risk to U.S. national security posed by
transactions involving VCS hardware
and covered software, including the
extent of foreign adversary involvement
in the transactions, as well as potential
mitigations.
VCS hardware importers and
connected vehicle manufacturers must
not engage in an otherwise prohibited
transaction until BIS grants the
application for a specific authorization.
If a party engages in a prohibited
transaction prior to receiving a specific
authorization from BIS, that transaction
would constitute a violation of the
regulation. Specific authorization
requests will be reviewed on a case-bycase basis, and the time to reach a
decision on an application for a specific
authorization will vary based on the
complexity of the case. However, BIS
will respond to applicants with a
processing update within 90 days of the
initial application for a specific
authorization, and typically endeavor to
provide either a request for more
information or a decision within that
time period.
Applications for a specific
authorization must contain complete
information on the proposed
transaction, including every party
involved, an overview of the covered
software and/or the VCS hardware
designed, developed, manufactured, or
supplied by a person owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, the intended use of the covered
software and/or VCS hardware, and
documentation to support the
information contained in the
application. Persons seeking a specific
authorization would submit an
application via a web portal that would
be available on the BIS website.
Applicants should take care to submit to
BIS only one copy of an application
pertaining to each transaction for which
they seek specific authorization to avoid
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
processing delays. BIS may request
additional information from an
applicant about any matter related to the
specific authorization request. In rare
situations, as part of its review of an
application for specific authorization,
BIS may, in its sole discretion, request
an oral briefing by the applicant and any
other relevant parties. At any point
between initial submission of an
application for specific authorization
and a final decision issued by BIS, an
applicant may submit additional
information to bolster the application or
provide clarity on any aspect thereof.
When reviewing applications for a
specific authorization, BIS will consider
the factors that may pose undue or
unacceptable risks, particularly as they
relate to transactions that could result in
the exfiltration of connected vehicle or
U.S. persons’ data, or the remote
manipulation or operation of a
connected vehicle. Examples of factors
that BIS may consider include: the
applicant’s ability to limit PRC or
Russian government access to, or
influence over the design, development,
manufacture, or supply of the VCS
hardware or covered software; security
standards used by the applicant and if
such standards can be validated by BIS
or a third-party; and other actions or
proposals the applicant offers to
implement as a way to mitigate undue
or unacceptable risk.
BIS’s decision regarding any
application for specific authorization
will apply only to the specific parties
and transaction outlined in the
application and described in the
decision notice. Additionally, the
decision notice from BIS to the
applicant(s) may contain any conditions
that must be met by the parties for a
transaction to be authorized. Such
conditions, which are subject to revision
by BIS, may include technical controls
(e.g., software validation) or operational
controls (e.g., physical and logical
access monitoring procedures), that are
either permanent or temporary. These
controls will focus on the supply chain
element that involves a link to a foreign
adversary to mitigate any undue or
unacceptable risk posed by the
transaction. For connected vehicle
manufacturers owned by, controlled by,
or subject to the jurisdiction or direction
of the PRC or Russia, a specific
authorization may include a
requirement that all VCS hardware and
covered software be assembled and
integrated into the connected vehicle in
the United States. In the approval letter
for specific authorization, BIS will
determine the effective date and
duration of the authorization on a caseby-case basis.
PO 00000
Frm 00024
Fmt 4701
Sfmt 4702
While applicants denied
authorizations would not be precluded
from submitting new applications for
specific authorizations with regard to
different transactions (involving
different parties and/or different
covered software or VCS hardware), BIS
will reconsider a previously denied
application for a specific authorization
only if the applicant demonstrates a
material change in circumstances.
4. Exemptions
Transactions by VCS hardware
importers and connected vehicle
manufacturers would be exempt from
the proposed prohibitions for a limited
period. BIS proposes a shorter
implementation period for transactions
involving covered software and
proposes a longer implementation
period for transactions involving VCS
hardware to allow market participants
adequate time to establish alternative
supply chains if necessary. This reflects
BIS’s understanding, and numerous
public comments underscoring, that
hardware supply chains for Connected
Vehicles are complex and require
multiple years to alter. VCS hardware
importers would be permitted to engage
in otherwise prohibited transactions
involving VCS Hardware and would
also be exempt from a requirement to
submit a Declaration of Conformity for
transactions not otherwise prohibited so
long as: (1) for VCS hardware units not
associated with a vehicle model year,
the import of the VCS hardware takes
place prior to January 1, 2029; or (2) the
VCS hardware is integrated into a
connected vehicle (completed or
incomplete) or destined for a connected
vehicle with a model year prior to 2030.
Beginning January 1, 2029, any VCS
hardware importer seeking to engage in
a transaction subject to the VCS
hardware prohibitions in § 791.302
(other than the import of a connected
vehicle with a model year prior to 2030)
would be required to obtain a specific
authorization if the transaction is not
otherwise permitted by a general
authorization. Furthermore, VCS
hardware importers seeking to import
VCS hardware beginning on January 1,
2029, or VCS Hardware in completed
connected vehicles or that is destined
for connected vehicles starting with
Model Year 2030, would be required to
submit an annual Declaration of
Conformity to BIS, unless obligated to
seek a Specific Authorization.
Connected vehicle manufacturers would
be permitted to engage in otherwise
Prohibited Transactions involving
covered software designed, developed,
manufactured, or supplied by a person
owned by, controlled by, or subject to
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
the jurisdiction or direction of the PRC
or Russia, so long as the completed
connected vehicle that is imported or
sold is of a model year prior to 2027.
Beginning Model Year 2027 (as
imported into or sold in the United
States), any connected vehicle
manufacturer seeking to engage in a
prohibited transaction involving
covered software specified in section
791.303 would be required to obtain a
specific authorization if the transaction
is not otherwise permitted by a general
authorization. Furthermore, connected
vehicle manufacturers would be
required to submit an applicable
Declaration of Conformity for imports or
Sales of all completed connected
vehicles beginning in Model Year 2027.
Connected vehicle manufacturers who
are owned by, controlled by, or subject
to the jurisdiction or direction of the
PRC or Russia would be permitted to
engage in otherwise prohibited
transactions so long as the completed
connected vehicle that is Sold is of a
Model Year prior to 2027. Beginning
Model Year 2027 (as Sold in the United
States), these particular connected
vehicle manufacturers seeking to engage
in a prohibited transaction specified in
§ 791.304 would be required to obtain a
specific authorization if the transaction
is not otherwise permitted by a general
authorization.
5. Appeals
BIS proposes to create a mechanism
by which any person whose application
for a specific authorization is denied,
whose specific authorization is
suspended or revoked, or who has
received a written notification of
ineligibility for a general authorization
may appeal that decision to the Under
Secretary. Appeals must be submitted in
writing by email or mail to the Office of
the Under Secretary within 45 days of
the date on the notice of the adverse
administrative action by BIS. The
appeal must detail how the party
submitting the appeal has been directly
and adversely affected by BIS’s action,
and the reasons that BIS’s action should
be reversed or otherwise modified. The
Under Secretary, at his or her discretion,
may delegate to the Deputy Under
Secretary for Industry and Security or
another BIS official the review of
appeals, including arranging, at the
official’s discretion, informal hearings
with relevant parties regarding the
appeal.
Appellants may submit
supplementary information in support
of their appeal, whether sua sponte or
at the request of the Under Secretary or
the designated official, but, though the
Under Secretary or designated official
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
generally would not consider additional
information submitted sua sponte more
than 30 days after submission of the
original appeal. If the Under Secretary
or designated official requests
supplementary information, appellants
will have no more than 30 calendar days
to respond to the request. Appellants
may also request an in-person informal
hearing in writing at the time of
submission. A hearing is not required,
and the Under Secretary or designated
official may, at his or her discretion,
grant or deny a request for an informal
hearing.
6. Advisory Opinions
In response to public comments
regarding the ANPRM, BIS proposes to
include a mechanism for BIS to issue
advisory opinions, similar to the process
outlined in the Export Administration
Regulations (EAR). BIS anticipates this
process will provide connected vehicle
manufacturers, VCS hardware
importers, and other interested parties
with greater clarity about how to
comply with the proposed rule on an asneeded basis. As with the EAR, BIS
emphasizes that advisory opinions
provided under this proposed rule
would in no way serve as evidence that
the ICTS transaction addressed in the
opinion is not subject to the jurisdiction
of another U.S. Government agency. BIS
may publish on its website an advisory
opinion that may be of broad interest to
the public, with redactions where
necessary to protect Confidential
Business Information. To solicit an
advisory opinion from BIS, persons
would be required to submit a written
request to BIS by email or through a
portal that will be available on the BIS
website. BIS will not accept advisory
opinion requests submitted by mail. A
request for an advisory opinion must
contain contact information for the
submitter as well as all current
information on the prospective
transaction to assist BIS in making a
determination. This would include
technical details on the involved VCS
hardware or covered software,
information on the completed
connected vehicle (if applicable), the
SBOM and/or HBOM for the covered
software and/or VCS hardware, and any
other supporting materials that the
submitter assesses will assist BIS in
determining if the transaction may be
prohibited by this rule. Persons seeking
an advisory opinion are encouraged to
submit as much pertinent information
as possible in the initial request for an
advisory opinion, but BIS may request
more information as needed to
formulate its opinion. BIS will only
consider advisory opinion requests for
PO 00000
Frm 00025
Fmt 4701
Sfmt 4702
79111
actual, not hypothetical, prospective
transactions in which all parties, as
opposed to anonymous parties, are
identified. Additionally, parties may
only rely on an advisory opinion when
engaging in a transaction if the original
Advisory Opinion request contained
complete and accurate information and
only so long as such information
remains accurate following the issuance
of the Advisory Opinion.
7. ‘‘Is-Informed’’ Notices
BIS could notify connected vehicle
manufacturers or VCS hardware
importers, either through direct letters
or through a Federal Register notice
meant to inform a broader set of
persons, that a transaction involving
certain covered software, VCS hardware,
or entities requires a specific
authorization because it would
constitute a Prohibited Transaction
according to the terms of this proposed
rule. Any person who engages in a
transaction covered by an ‘‘Is-Informed’’
notice without first receiving a Specific
Authorization from BIS would have
knowledge that such transaction is
prohibited and would therefore be in
violation of the rule. Is-Informed notices
may only be delivered by or at the
direction of the Under Secretary or a BIS
employee designated by the Under
Secretary.
8. Recordkeeping and Reporting
Requirements
BIS proposes to require connected
vehicle manufacturers and VCS
hardware importers to maintain
complete records related to any
transaction for which a Declaration of
Conformity, general authorization, or
specific authorization would be
required by this rule, for a period of ten
years. This recordkeeping requirement
applies regardless of whether the
transaction is subject to a general
authorization, specific authorization, or
whether the connected vehicle
manufacturer or VCS hardware importer
has not yet sought an authorization. BIS
would expect said records to include all
information pertinent to a general
authorization or submitted when
applying for a Specific Authorization, as
well as business records related to the
execution of the transaction, such as
contracts, import records, bills of sale,
relevant correspondence, and all other
files specified in sections 791.312 and
791.313 to assess compliance with the
rule.
All connected vehicle manufacturers
and VCS hardware importers would be
required to submit records when
requested by BIS related to any
transaction for which a Declaration of
E:\FR\FM\26SEP3.SGM
26SEP3
79112
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Conformity, general authorization, or
specific authorization would be
required by this rule, whether or not
said transaction was carried out under
a general authorization, specific
authorization, or without an
authorization from BIS. As such, BIS
would be allowed to request business
records, before, during, or after the
transaction in question has taken place.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
d. Enforcement
1. Penalties
IEEPA authorizes this rulemaking.
Thus, persons who violate, attempt to
violate, conspire to violate, or
knowingly cause a violation of this rule,
if finalized, may be subject to civil and/
or criminal penalties under IEEPA (50
U.S.C. 1705), depending on the
circumstances of the violation. Potential
violations of this proposed rule that
would be subject to penalties include
engaging in a prohibited transaction
without an applicable general
authorization or specific authorization,
or failure to abide by the conditions
enumerated in a specific authorization.
Willfully providing false or fictitious
information to the U.S. Government
may be subject to criminal fines,
imprisonment, or both. A civil penalty
may be imposed on any person who
violates, attempts to violate, conspires
to violate, or causes a violation of any
authorization, order, regulation, or
prohibition issued under IEEPA.
Under the Federal Civil Penalties
Inflation Adjustment Act Improvements
Act of 2015, the specific maximum civil
penalty will be adjusted by notice in the
Federal Register effective each calendar
year by the Office of the Secretary of the
Department of Commerce. At the time of
publishing of this proposed rule, the
maximum civil penalty for violations of
IEEPA is $368,136 per violation and the
maximum criminal penalty is
$1,000,000.
Under the proposed rule, should BIS
have reason to believe that a violation
has occurred and intends to issue a civil
monetary penalty, it will inform the
alleged violator through a written notice
of the intent to impose a penalty (‘‘PrePenalty Notice’’). BIS will generally
transmit the Pre-Penalty Notice
electronically but may additionally
issue a mailed notice. The recipient of
a Pre-Penalty Notice may respond in
writing to BIS to provide additional
information or otherwise contest the
penalty. BIS must receive this response
within 30 days of the transmission of
the original pre-penalty notice. A
response to a pre-penalty notice does
not constitute a formal appeal, but it
allows the recipient of the pre-penalty
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
notice to contest facts set forth by BIS
in the pre-penalty notice, provide
exculpatory evidence, or otherwise
respond to the pre-penalty notice. BIS
may seek to initiate settlement
discussions in the pre-penalty notice or
may conduct separate outreach
following transmission of the prepenalty notice. Recipients of a prepenalty notice may additionally request
to initiate settlement discussions in
their response to BIS or may conduct
separate outreach to do so.
Following the delivery of the prepenalty notice and after considering any
responses from the alleged violator, BIS
will inform the alleged violator in
writing as to whether it has found that
a violation in fact occurred. Should BIS
find that a violation has indeed taken
place and no settlement has been
reached, BIS will issue a final penalty
notice to the violator specifying the
violation and determining the specific
civil monetary penalty to be imposed.
This penalty may not be appealed
following the procedures in section
791.309, but is a final agency action that
the violator may contest in the
appropriate U.S. District Court.
Should a violator fail to pay the
penalty as specified in the final penalty
notice or fail to make alternative
payment arrangements approved by BIS,
BIS may refer the matter to the
Department of Treasury for
administrative collection or to the
Department of Justice for collection via
civil suit in U.S. District Court.
2. Finding a Violation
Under the proposed rule, there may
be cases in which BIS determines that
a violation has taken place but that a
civil monetary penalty is not
appropriate. In such cases, BIS would
issue a finding of violation that
identifies the violation. The finding of
violation could also contain an
administrative response other than a
civil monetary penalty, such as an order
to cease and desist from conduct or
activities that are prohibited by the
proposed rule. Consistent with the
procedures listed above regarding a prepenalty notice, recipients of a finding of
violation may file a response within 30
days contesting the facts of the finding
of violation and/or providing
information relevant to BIS’s
determination of whether a violation
has occurred. BIS will consider any new
information and inform the party in
writing whether a violation has or has
not occurred. A recipient that does not
respond within 30 days of receipt of the
finding of violation will be deemed to
have waived the right to respond. Any
action taken in a finding of violation
PO 00000
Frm 00026
Fmt 4701
Sfmt 4702
issued by BIS constitutes a final agency
action that is not subject to appeal
following the procedures in section
791.309.
3. Severability
BIS intends for the provisions of this
proposed rule, as finalized to be
severable from each other. If a court
holds that any provision in a final 15
CFR part 791, subpart D, is invalid or
unenforceable, BIS intends that the
remaining provisions of a final 15 CFR
part 791, subpart D, as relevant, would
continue in effect to the greatest extent
possible. In addition, if a court holds
that any such provision is invalid or
unenforceable as to a particular person
or circumstance, BIS intends that the
provision would remain in effect as to
any other person or circumstance.
Depending on the circumstances and
the scope of the court’s order, BIS
believes that the remaining provisions
of a final rule likely could continue to
function sensibly independent of any
provision or application held invalid or
unenforceable. For example, the
prohibitions related to transactions
involving VCS Hardware could continue
to apply as intended, even if a court
finds that the prohibitions on
transactions involving ADS are invalid.
Similarly, the proposed rule could be
applied with respect to relevant
hardware and software designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC, even if a court finds its
application with respect to relevant
hardware and software from Russianlinked persons is invalid.
e. Classification
1. Executive Order 12866
Executive Order 12866, as reaffirmed
by Executive Order 13563 and amended
by Executive Order 14094, directs
agencies to assess all costs and benefits
of available regulatory alternatives and,
if regulation is necessary, to select
regulatory approaches that maximize
net benefits (including potential
economic, environmental, public health
and safety effects, distributed impacts,
and equity). This proposed rule has
been designated a significant regulatory
action by the Office of Information and
Regulatory Affairs (OIRA) under section
3(f)(1) of Executive Order 12866, as
amended by Executive Order 14094.
2. Unfunded Mandates Reform Act of
1995
This proposed rule would not
produce a federal mandate (under the
regulatory provisions of title II of the
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
Unfunded Mandates Reform Act of
1995) for state, local, and tribal
governments or the private sector.
3. Executive Order 13132 (Federalism)
This proposed rule does not contain
policies having federalism implications
requiring preparations of a Federalism
Summary Impact Statement.
4. Executive Order 12630
(Governmental Actions and Interference
With Constitutionally Protected
Property Rights)
This proposed rule does not contain
policies that have takings implications.
5. Executive Order 13175 (Consultation
and Coordination With Indian Tribes)
The Department has analyzed this
proposed rule under Executive Order
13175 and has determined that the
action would not have a substantial
direct effect on one or more Indian
tribes, would not impose substantial
direct compliance costs on Indian tribal
governments, and would not preempt
tribal law.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
6. National Environmental Policy Act
The Department has reviewed this
rulemaking action for the purposes of
the National Environmental Policy Act
(42 U.S.C. 4321, et seq.). It has been
determined that this proposed rule
would not have a significant impact on
the quality of the human environment.
7. Paperwork Reduction Act
The Paperwork Reduction Act of 1995
(44 U.S.C. 3501, et seq.) (PRA) provides
that an agency generally cannot conduct
or sponsor a collection of information,
and no person is required to respond
nor be subject to a penalty for failure to
comply with a collection of information
subject to the requirements of the PRA,
unless that collection has obtained OMB
approval and displays a currently valid
Office of Management and Budget
(OMB) Control Number.
This proposed rule will create new
information collection requirements,
which are subject to review and
approval by OMB under the PRA.
Specifically, this proposed rule would
require connected vehicle
manufacturers and VCS hardware
importers to submit annual Declarations
of Conformity certifying that their
import of VCS hardware and/or import
or manufacture of completed connected
vehicles does not involve hardware or
software subject to the prohibitions in
this proposed rule. Additional
requirements for the Declarations of
Conformity include supplying technical
information regarding the hardware or
software in question and providing a
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
Bill of Materials for applicable software,
hardware, or both.
Moreover, entities seeking specific
authorizations from BIS to engage in
otherwise prohibited transactions will
have to file information with the
Department, submissions of which are
also subject to the PRA. Applications for
a specific authorization would require,
but are not limited to, a description of
the nature of the otherwise prohibited
transaction(s). For entities that are
covered by a General Authorization, a
self-certification, without need to notify
BIS, would be required (see Section VI
of the NPRM). BIS proposes to require
connected vehicle manufacturers and
VCS hardware importers to maintain
complete records related to any
transaction for which a Declaration of
Conformity, general authorization, or
specific authorization would be
required by this rule for a period of ten
years, consistent with IEEPA’s statute of
limitations. These records would
include any transaction for which the
connected vehicle manufacturer or VCS
hardware importer has not yet sought an
authorization. BIS expects said records
to include all information submitted in
applications, as well as business records
related to the execution of any ICTS
transaction subject to the rule, such as
contracts, import records, bills of sale,
and all other files BIS may deem
pertinent in assessing compliance with
this proposed rule. Lastly, entities
seeking an advisory opinion from BIS
would have to file information with the
Department, though this is an optional
process for parties looking for additional
clarity on proposed transactions. BIS
anticipates that this collection would be
largely similar to its program in
administering 15 CFR 748.3, as it would
require similar information and the
process for submission is analogous. BIS
seeks comment on how many entities
would request an advisory opinion in
order to better understand the
associated costs.
BIS estimates that the initial burden
placed on applicable entities would be
180 to 240 hours. This estimate takes
into account the one-time initial cost (in
hours) per entity to comply with the
rule, including reading and
understanding the rule’s provisions.
Every subsequent year, BIS anticipates
that the total annual cost burden (in
hours) for applicable entities to
implement the rule would be 100 to 500
hours.
BIS assesses that there are 42 to 281
entities potentially impacted by the
proposed rule and that the initial cost
burden for these entities is between
$30,964 and $38,554. This estimate
takes into account the one-time initial
PO 00000
Frm 00027
Fmt 4701
Sfmt 4702
79113
cost per entity to comply with the rule,
including reading and understanding
the rule’s provisions. Every subsequent
year, BIS anticipates that the total
annual cost burden for applicable
entities to implement the rule will be
$16,133 to $80,667 a year (average of
operations manager, engineer, and
lawyer hourly salaries in Table 2 [$484/
hour/3 = $161.33] * [100 and 500
hours]). The annual cost burden placed
on impacted entities includes (but is not
limited to) producing the necessary
HBOMs and SBOMs and documenting
due diligence efforts. These hour and
cost estimates are subject to variations
among responsible entities due to
application type. Declarations of
Conformity will need to be submitted
annually at minimum, while Specific
Authorizations will need to be updated
on an as-needed basis.
The estimated annual federal salary
cost to the U.S. Government is
$1,130,000 [500 Declaration of
Conformity/Specific Authorization
notifications per year * two staff at a
GS–13 salary ($113/hour * 2 = $226/
hour) * average of 10 hours each to
review each notification]. The $113 per
staff member per hour cost estimate for
this information collection is consistent
with the GS-scale salary data for a GS–
13 Step 1 (https://www.opm.gov/policydata-oversight/pay-leave/salarieswages/salary-tables/pdf/2024/DCB.pdf)
multiplied by a factor of 2 to include the
cost of benefits and overhead.
The total estimated annual cost to the
U.S. Government is $1,437,982.00. The
calculation is as follows: Federal
Employee Salaries (2 full-time
employees) [$1,130,000.00] + Federal
Government Overhead @20%
[$226,000.00] + Legal Support (GS–15
Step 1 salary (multiplied by 2 to include
the cost of benefits and overhead) @
25%) [$81,982.00] = $1,437,982.00.
BIS requests comments on the
information collection and
recordkeeping requirements associated
with this proposed rule. These
comments will help BIS:
i. Evaluate whether the information
collection is necessary for the proper
performance of our agency’s functions,
including whether the information will
have practical utility;
ii. Evaluate the accuracy of our
estimate of the burden of the
information collection, including the
validity of the methodology and
assumptions used;
iii. Enhance the quality, utility, and
clarity of the information to be
collected; and
iv. Minimize the burden of the
information collection on those who are
to respond (such as through the use of
E:\FR\FM\26SEP3.SGM
26SEP3
79114
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
khammond on DSKJM1Z7X2PROD with PROPOSALS3
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology, e.g., permitting
electronic submission of responses).
8. Regulatory Flexibility Act
In compliance with Section 603 of the
Regulatory Flexibility Act (RFA), 5
U.S.C. 601–612, the Department has
prepared an initial regulatory flexibility
analysis (IRFA) for this proposed rule.
The IRFA describes the economic
impacts the proposed action may have
on small entities. The Department seeks
comments on all aspects of the IRFA.
1. A description of the reasons why
action by the agency is being
considered. Connected Vehicles contain
a growing number of connected
components. While these components
provide greater safety and convenience
through features like Wi-Fi, Bluetooth,
cellular telecommunication, and
satellite connectivity, the incorporation
of progressively complex hardware and
software systems enabling vehicle
connectivity has also increased the
attack surfaces through which malign
actors may exploit vulnerabilities to
gain access to a vehicle. ICTS integral to
Connected Vehicles present an undue or
unacceptable risk to U.S. national
security when those systems are
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia. Furthermore, the PRC and
Russia are able to leverage legal and
regulatory regimes to compel private
companies subject to their jurisdiction,
including carmakers and vehicle
suppliers, to cooperate with state
security and intelligences services.
Cooperation can include providing data,
logical access, encryption keys, and
other vital technical information, as
well as by installing backdoors or bugs
on equipment or in software updates,
ultimately making vehicle equipment
exploitable by foreign adversaries. Such
privileged access potentially enables the
PRC and Russia to exfiltrate sensitive
data collected by Connected Vehicles
through their components and allow
remote manipulation for vehicles driven
by U.S. persons.
2. A succinct statement of the
objectives of, and legal basis for, the
proposed rule. The Department is
proposing this rule pursuant to
authority under the International
Emergency Economic Powers Act
(IEEPA) (50 U.S.C. 1701, et seq.), the
National Emergencies Act (NEA) (50
U.S.C. 1601, et seq.), and Section 301 of
Title 3, United States Code, and in
accordance with E.O. 13873, ‘‘Securing
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
the Information and Communications
Technology and Services Supply
Chain,’’ 84 FR 22689 (May 17, 2019),
which delegated to the Secretary of
Commerce (Secretary) certain
authorities provided to the President by
IEEPA, the NEA, and Section 301 of
Title 3 of the United States Code. In
accordance with the National
Emergencies Act, the President has
declared each year since E.O. 13873 was
published that the national emergency
declared in E.O. 13873 regarding the
ICTS supply chain continues to remain
in effect.
To address identified risks to national
security from ICTS transactions, E.O.
13873 directs the Secretary (in
consultation with other agency heads
identified in E.O. 13873) to review any
ICTS transaction, defined as any
acquisition, importation, transfer,
installation, dealing in, or use of any
ICTS by any person, or with respect to
any property, subject to United States
jurisdiction, where the transaction
involves any property in which a
foreign country or national has any
interest. When the Secretary, in
consultation with the appropriate
agency heads, finds that an ICTS
transaction or class of ICTS transactions
pose undue risks (including of sabotage,
subversion, or catastrophic effects on
the security and resiliency of U.S.
critical infrastructure), or unacceptable
risks to national security or the security
and safety of U.S. persons, the Secretary
may identify the ICTS transaction as
prohibited by Section 1 of E.O. 13873 or
impose mitigation measures on the ICTS
transaction or class of ICTS transactions
reviewed. E.O. 13873 additionally
provides that the Secretary issue rules
establishing criteria by which particular
technologies or market participants may
be categorically included in or
categorically excluded from
prohibitions established pursuant to the
E.O.
3. A description of and, where
feasible, an estimate of the number of
small entities to which the proposed
rule will apply. BIS anticipates that the
entities primarily responsible for
compliance with this regulation will be
connected vehicle manufacturers and
VCS hardware importers. BIS assesses,
based on publicly available information,
that the U.S. connected vehicle market
is dominated by a small set of
manufacturers, few of which would be
considered ‘‘small entities’’ under the
Small Business Administration’s
definitions. The Small Business
Administration small business size
standard for NAICS 336110: Automobile
and Light Duty Motor Vehicle
Manufacturing and NAICS 336120:
PO 00000
Frm 00028
Fmt 4701
Sfmt 4702
Heavy Duty Truck Manufacturing is
1,500 employees or fewer. However, BIS
has limited data on how many of these
suppliers engage in covered software
and VCS hardware transactions, and
therefore cannot estimate how many of
these suppliers qualify as small entities.
BIS specifically seeks comments on the
number of suppliers engaged in covered
software and VCS Hardware
transactions in the United States, as
well as the percentage of those entities
that might or could qualify as small
entities.
4. A description of the projected
reporting, recordkeeping, and other
compliance requirements of the
proposed rule, including an estimate of
the classes of small entities that will be
subject to the requirement and the type
of professional skills necessary for
preparation of the report or record. As
stated above, connected vehicle
manufacturers and VCS hardware
importers will bear the majority of the
proposed rule’s compliance costs. BIS
estimates that the recordkeeping and
compliance burden placed on
responsible small entities would involve
operations managers, engineers, and
lawyers. On an annual basis, these
entities will need to, at minimum and
if applicable, submit a Declaration of
Conformity certifying that their import
of VCS hardware and/or import or
manufacture of completed connected
vehicles does not involve hardware or
software subject to the prohibitions in
this proposed rule. The Declaration of
Conformity would also include
technical information regarding the
hardware or software in question and a
Bill of Materials for applicable software,
hardware, or both.
BIS proposes to require connected
vehicle manufacturers and VCS
hardware importers to maintain
complete records related to any
transaction for which a Declaration of
Conformity, general authorization, or
specific authorization would be
required by this rule, for a period of ten
years, consistent with IEEPA’s statute of
limitations. These records would be
expected to assist BIS’s enforcement
efforts for the prohibitions in the
proposed rule. The required records
would include those related to any
transaction that is subject to a general
authorization (including records of any
entities producing fewer than 1,000
connected vehicle or VCS hardware
units in a calendar year), any
transaction that is subject to a specific
authorization, and any transaction
involving covered software or VCS
Hardware for which the connected
vehicle manufacturer or VCS hardware
importer has not yet sought an
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
authorization. BIS expects such records
to include all information submitted in
applications, as well as business records
related to the execution of any ICTS
transaction subject to the rule, such as
contracts, import records, bills of sale,
and all other files BIS may deem
pertinent in assessing compliance with
this proposed rule.
Because small entities could avail
themselves of a general authorization,
the maintenance of records in support of
such authorization would be the only
compliance requirement. These records
would serve as the small entities’ selfcertification, which does not need to be
submitted to BIS. A general
authorization would allow the VCS
hardware importer and/or connected
vehicle manufacturer to engage in the
otherwise prohibited transaction,
without the need to notify or seek
approval from BIS. General
Authorizations would be available only
in a narrow set of circumstances in
which the conditions of the otherwise
prohibited transaction appropriately
mitigate the level of risk associated with
the particular transaction. Such
conditions would include, for example,
when VCS hardware is imported from
the PRC or Russia solely for testing
purposes, or where the completed
connected vehicle that incorporates VCS
hardware or covered software from the
PRC or Russia will not be driven on
public roads for more than 30 calendar
days per year. Those availing
themselves of a general authorization
would be required to continuously
monitor their use of the VCS hardware
or completed connected vehicles
covered by the general authorization to
ensure the authorization still applies. If
a change would render the transaction
ineligible for a general authorization,
such as a change in the vehicle’s use,
the VCS hardware importer or
connected vehicle manufacturer would
be required to apply for a specific
authorization and to cease engaging in
such transaction unless and until a
specific authorization is granted. For
example, if a completed connected
vehicle that incorporates covered
software or VCS Hardware that is
designed, developed, manufactured, or
supplied by a person owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia is no longer engaged in display,
research, or testing, the VCS hardware
importer or the connected vehicle
manufacturer would be required to seek
a specific authorization. Similarly, if the
VCS Hardware Importer or connected
vehicle manufacturer exceeds total
model year production of 1,000 units, or
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
if a completed connected vehicle that
incorporates covered software or VCS
hardware that is designed, developed,
manufactured, or supplied by a person
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia is to be used on public
roadways for 30 or more days in any
calendar year, the VCS hardware
importer or connected vehicle
manufacturer would be required to seek
a specific authorization from BIS.
5. An identification, to the extent
practicable, of all relevant Federal rules
that may duplicate, overlap, or conflict
with the proposed rule. This rulemaking
does not duplicate or conflict with any
Federal rules.
6. A description of any significant
alternatives to the proposed rule that
accomplish the stated objectives of
Executive Order 13984 and Executive
Order 14110 and applicable statutes
and that would minimize any
significant economic impact of the
proposed rule on small entities. The
Department has proposed what it
believes to be ‘‘the least restrictive
means necessary [by] tailor[ing] the
prohibition to address the undue or
unacceptable risk’’ (see 15 CFR part
791.109(c)) and believes that the
proposed rule will materially address
significant risks for the United States or
U.S. persons while balancing the overall
compliance costs of the rule and
minimizing the impact on small entities.
Below is a description of alternatives
considered by the Department; the
Department invites comment on these
alternatives.
No-action alternative: While the
alternative of taking no action would be
less costly for connected vehicle
manufacturers and VCS hardware
importers, the no-action alternative is
not preferred because the risks
presented by foreign adversary
involvement in the ICTS of the U.S.
connected vehicle market could lead to
catastrophic negative events for U.S.
national security, including the security
of U.S. critical infrastructure, and U.S.
persons.
More stringent alternatives: The
Department considered several more
stringent regulatory approaches,
including regulating additional
connected vehicle component systems
not included in this proposed rule. For
example, the Department considered the
risks posed by various connected
vehicle component systems, including
ADS, telematics, battery management
systems (BMS), automated driver
assistance systems (ADAS), vehicle
operating systems (OS), and satellite or
cellular telecommunication systems.
The Department currently believes the
PO 00000
Frm 00029
Fmt 4701
Sfmt 4702
79115
best approach to address the risks posed
by connected vehicles and connected
vehicle components from foreign
adversary nations is to focus the scope
of the NPRM on PRC- and Russiansupplied VCS hardware (which
encompasses both telematics and
satellite or cellular telecommunication
systems) and covered software. Other
systems under consideration, such as
ADAS, seem to have a low risk of data
exfiltration or, in the case of vehicle OS,
would involve regulation that is
expected to be extremely burdensome
on industry.
Preferred alternative: The proposed
rule is the preferred alternative. BIS
assesses that the regulatory approach
outlined in this proposed rule would
have the highest net benefit for
connected vehicle manufacturers, VCS
hardware importers, and consumers.
BIS currently believes the provisions in
the proposed rule are also to be, for the
reasons articulated above and in the
NPRM’s preamble, ‘‘the least restrictive
means necessary. . .to address the
undue or unacceptable risk’’ presented
by covered software and VCS hardware
in connected vehicles.
List of Subjects in 15 CFR Part 791
Business and industry,
Communications, Computer technology,
Critical infrastructure, Executive orders,
Foreign persons, Investigations,
National security, Penalties,
Technology, Telecommunications.
Elizabeth L.D. Cannon,
Executive Director, Office of Information and
Communications Technology and Services,
Bureau of Industry and Security, United
States Department of Commerce.
For the reasons set out in the
preamble, 15 CFR part 791, is proposed
to be amended as follows:
PART 791—SECURING THE
INFORMATION AND
COMMUNICATIONS TECHNOLOGY
AND SERVICES SUPPLY CHAIN
1. The authority citation for part
791continues to readas follows:
■
Authority: 50 U.S.C. 1701et seq.; 50 U.S.C.
1601et seq.; E.O. 13873, 84 FR 22689; E.O.
14034, 86 FR 31423.
2. Amend part 791 by adding subpart
D, consisting of § 791.300 through
§ 791.319, to read as follows:
■
Subpart D—ICTS Supply Chain:
Connected Vehicles
Sec.
791.300 Purpose and scope.
791.301 Definitions.
791.302 Prohibited VCS hardware
transactions.
E:\FR\FM\26SEP3.SGM
26SEP3
79116
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
791.303 Prohibited covered software
transactions.
791.304 Related prohibited transactions.
791.305 Declaration of Conformity.
791.306 General authorizations.
791.307 Specific authorizations.
791.308 Exemptions.
791.309 Appeals.
791.310 Advisory opinions.
791.311 ‘‘Is-Informed’’ notices.
791.312 Recordkeeping.
791.313 Reports to be furnished on
demand.
791.314 Penalties.
791.315 Pre-penalty notice; settlement.
791.316 Penalty imposition.
791.317 Administrative collection; referral
to United States Department of
Justice.
791.318 Finding of violation.
791.319 Severability.
Subpart D—ICTS Supply Chain:
Connected Vehicles
khammond on DSKJM1Z7X2PROD with PROPOSALS3
§ 791.300
Purpose and scope.
The inclusion in Connected Vehicles
of certain ICTS designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of certain
foreign adversaries poses undue or
unacceptable risks to U.S. national
security. To address these undue or
unacceptable risks, it is the purpose of
this subpart to:
(a) Prohibit ICTS transactions that
involve certain software and hardware
that, are designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the
People’s Republic of China (PRC) or the
Russian Federation (Russia), as defined
in § 791.4 and that enable connected
vehicle Automated Driving Systems or
Vehicle Connectivity Systems, as
defined in this subpart;
(b) Implement compliance
mechanisms such as Declarations of
Conformity to ensure that no Prohibited
Transactions, as defined in this subpart,
have occurred;
(c) Provide general authorizations and
a mechanism for specific authorizations
for certain transactions that are
otherwise prohibited by this subpart,
but where any undue or unacceptable
risks to national security can be
reasonably mitigated, based on defined
criteria and conditions; and
(d) Incentivize connected vehicle
manufacturers, VCS hardware
importers, and related suppliers to
adopt measures to help secure the U.S.
ICTS supply chain for connected
vehicles.
§ 791.301
Definitions.
The following definitions apply only
to this subpart, 15 CFR part 791 subpart
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
D. For additional definitions applicable
to all of part 791, see 15 CFR 791.2. If
a term is defined differently in this
subpart than in 15 CFR 791.2, the
definition listed in this section will
apply to this subpart.
Automated Driving System means
hardware and software that,
collectively, are capable of performing
the entire dynamic driving task for a
completed connected vehicle on a
sustained basis, regardless of whether it
is limited to a specific operational
design domain (ODD).
Completed connected vehicle means a
connected vehicle that requires no
further manufacturing operations to
perform its intended function. For the
purposes of this subpart, the integration
of an Automated Driving System into a
connected vehicle constitutes a
manufacturing operation for a
completed connected vehicle.
Connected vehicle means a vehicle
driven or drawn by mechanical power
and manufactured primarily for use on
public streets, roads, and highways, that
integrates onboard networked hardware
with automotive software systems to
communicate via dedicated short-range
communication, cellular
telecommunications connectivity,
satellite communication, or other
wireless spectrum connectivity with any
other network or device. Vehicles
operated only on a rail line are not
included in this definition.
Connected vehicle manufacturer
means a U.S. person
(1) Manufacturing or assembling
completed connected vehicles in the
United States; and/or
(2) Importing completed connected
vehicles for sale in the United States.
Covered software means the softwarebased components, in which there is a
foreign interest, executed by the primary
processing unit of the respective
systems that are part of an item that
supports the function of Vehicle
Connectivity Systems or Automated
Driving Systems at the vehicle level.
Covered software does not include
firmware, which is characterized as
software specifically programmed for a
hardware device with a primary
purpose of controlling, configuring, and
communicating with that hardware
device. Covered software also does not
include open-source software that can
be freely used, modified, and
distributed by anyone, with both access
to the source code and the ability to
contribute to the software’s
development and improvement unless
that open-source software has been
modified for proprietary purposes and
not redistributed or shared.
PO 00000
Frm 00030
Fmt 4701
Sfmt 4702
FCC ID Number means the unique
alphanumeric code identifying a
product subject to certification by the
Federal Communications Commission
composed of a:
(1) Grantee code; and
(2) Product code.
Foreign interest, for purposes of this
subpart, means any interest in property
of any nature whatsoever, whether
direct or indirect, by a non-U.S. person.
Hardware Bill of Materials (HBOM)
means a comprehensive list of parts,
assemblies, documents, drawings, and
components required to create a
physical product, including information
identifying the manufacturer, related
firmware, technical information, and
descriptive information.
Import means, in the context of this
subpart, with respect to any article, the
entry of such article into the United
States Customs Territory. It does not
include admission of an article from
outside the United States into a foreigntrade zone for storage pending further
assembly in the foreign-trade zone or
shipment to a foreign country.
Item means a component or set of
components with a specific function at
the vehicle level. A system may also be
considered an item if it implements a
function.
Knowingly means having knowledge
of a circumstance (the term may be a
variant, such as ‘‘know,’’ ‘‘reason to
know,’’ or ‘‘reason to believe’’), to
include not only positive knowledge
that the circumstance exists or is
substantially certain to occur, but also
an awareness of a high probability of its
existence or future occurrence. Such
awareness is inferred from evidence of
the conscious disregard of facts known
to a person and is also inferred from a
person’s willful avoidance of facts.
Model year means the year used to
designate a discrete vehicle model,
irrespective of the calendar year in
which the vehicle was actually
produced, provided that the production
period does not exceed 24 months.
Prohibited transactions mean,
collectively, the transactions described
in 791.302 (Prohibited VCS Hardware
Transactions), 791.303 (Prohibited
Covered Software Transactions), or
791.304 (Related Prohibited
Transactions) of this subpart.
Person owned by, controlled by, or
subject to the jurisdiction or direction of
a foreign adversary means:
(1) Any person, wherever located,
who acts as an agent, representative, or
employee, or any person who acts in
any other capacity at the order, request,
or under the direction or control, of a
foreign adversary or of a person whose
activities are directly or indirectly
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
supervised, directed, controlled,
financed, or subsidized in whole or in
majority part by a foreign adversary;
(2) Any person, wherever located,
who is a citizen or resident of a foreign
adversary or a country controlled by a
foreign adversary, and is not a United
States citizen or permanent resident of
the United States;
(3) Any corporation, partnership,
association, or other organization with a
principal place of business in,
headquartered in, incorporated in, or
otherwise organized under the laws of a
foreign adversary or a country
controlled by a foreign adversary; or
(4) Any corporation, partnership,
association, or other organization,
wherever organized or doing business,
that is owned or controlled by a foreign
adversary, to include circumstances in
which any person identified in
paragraphs (a) through (c) possesses the
power, direct or indirect, whether or not
exercised, through the ownership of a
majority or a dominant minority of the
total outstanding voting interest in an
entity, board representation, proxy
voting, a special share, contractual
arrangements, formal or informal
arrangements to act in concert, or other
means, to determine, direct, or decide
important matters affecting an entity.
Sale means, in the context of this
subpart, distributing for purchase, lease,
or other commercial operations a new
completed connected vehicle for a price,
to include the transfer of completed
connected vehicles from a connected
vehicle manufacturer to a dealer or
distributor, as those terms are defined in
49 U.S.C. 30102. This definition also
applies to the related terms such as Sell
or Selling.
Software Bill of Materials (SBOM)
means a formal and dynamic, machinereadable inventory detailing the
software supply chain relationships
between software components and
subcomponents, including software
dependencies, hierarchical
relationships, and baseline software
attributes, including author’s name,
timestamp, supplier name, component
name, version string, component hash
package URL, unique identifier, and
dependency relationships to other
software components.
Vehicle Connectivity System (VCS)
means a hardware or software item for
a completed connected vehicle that has
the function of enabling the
transmission, receipt, conversion, or
processing of radio frequency
communications at a frequency over 450
megahertz.
VCS hardware means the following
software-enabled or programmable
components and subcomponents that
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
support the function of Vehicle
Connectivity Systems or are part of an
item that supports the function of
Vehicle Connectivity Systems:
microcontroller, microcomputers or
modules, systems on a chip, networking
or telematics units, cellular modem/
modules, Wi-Fi microcontrollers or
modules, Bluetooth microcontrollers or
modules, satellite navigation systems,
satellite communication systems, other
wireless communication
microcontrollers or modules, and
external antennas. VCS hardware does
not include component parts that do not
contribute to the communication
function of VCS hardware (e.g.,
brackets, fasteners, plastics, and passive
electronics).
VCS hardware importer means a U.S.
person importing VCS hardware for
further manufacturing, integration,
resale, or distribution. A connected
vehicle manufacturer may be a VCS
hardware importer if VCS hardware has
already been installed in a connected
vehicle when imported by the
connected vehicle manufacturer.
United States means the United States
of America, the States of the United
States, the District of Columbia, and any
commonwealth, territory, dependency,
or possession of the United States, or
any subdivision thereof, and the
territorial sea of the United States.
§ 791.302 Prohibited VCS hardware
transactions.
(a) VCS hardware importers are
prohibited from knowingly importing
VCS hardware that is designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia.
(b) In the context of this subpart, VCS
hardware will not be considered to be
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia, solely based on the country of
citizenship of natural persons who are
employed, contracted, or otherwise
similarly engaged to participate in the
design, development, manufacture, or
supply of the VCS hardware.
§ 791.303 Prohibited covered software
transactions.
(a) Connected vehicle manufacturers
are prohibited from knowingly
importing into the United States
completed connected vehicles that
incorporate covered software, designed,
developed, manufactured, or supplied
by persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia.
PO 00000
Frm 00031
Fmt 4701
Sfmt 4702
79117
(b) Connected vehicle manufacturers
are prohibited from knowingly selling in
the United States completed connected
vehicles that incorporate covered
software, designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia.
(c) In the context of this subpart,
covered software will not be considered
to be designed, developed,
manufactured, or supplied by persons
owned by, controlled by, or subject to
the jurisdiction or direction of the PRC
or Russia, solely based on the country
of citizenship of natural persons who
are employed, contracted, or otherwise
similarly engaged to participate in the
design, development, manufacture, or
supply of the Covered Software.
§ 791.304
Related prohibited transactions.
Connected vehicle manufacturers who
are persons owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia, are prohibited from
knowingly selling in the United States
completed connected vehicles that
incorporate VCS hardware or covered
software.
§ 791.305
Declaration of Conformity.
(a) Requirements—(1) Import of VCS
hardware: A VCS hardware importer
may not import VCS Hardware as part
of a transaction that is not otherwise
prohibited by this subpart without first
submitting to the Bureau of Industry
and Security (BIS) a Declaration of
Conformity, unless otherwise specified
by this subpart. The Declaration of
Conformity shall include:
(i) The name and address of VCS
hardware importer;
(ii) A certification that the declarant
has not knowingly engaged in a
prohibited VCS hardware transaction;
(iii) The FCC ID Number associated
with the VCS hardware and, if
applicable, of the subcomponents
contained therein;
(iv) A list of third-party external
endpoints to which the VCS hardware
connects, including the country where
each endpoint is located and/or the
identity and location of the service
provider;
(v) If known, the make, model, and
trim of the completed connected
vehicles for which the VCS hardware is
intended;
(vi) A HBOM for the VCS hardware
that is the subject of the Declaration of
Conformity;
(vii) Documentation of the VCS
hardware importer’s due diligence
efforts, to include independent or hired
third-party research, to ensure the VCS
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79118
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
hardware listed in the HBOM is not
designed, developed, manufactured, or
supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia;
(viii) If applicable, an indication of
whether the submission is an update to
a prior Declaration of Conformity and
the date of the last submission;
(ix) Identifying information for an
individual point of contact (including
name, email address, and phone
number); and,
(x) Any additional material
information the VCS hardware importer
would like to submit.
(2) Import of completed connected
vehicles: A connected vehicle
manufacturer may not import completed
connected vehicles containing covered
software as part of a transaction that is
not otherwise prohibited by this subpart
without first submitting to BIS a
Declaration of Conformity, unless
otherwise specified by this subpart. The
Declaration of Conformity shall include:
(i) The name and address of the
connected vehicle manufacturer;
(ii) A certification that the declarant
has not knowingly engaged in a
prohibited covered software transaction;
(iii) The make, model, trim, and
Vehicle Identification Number (VIN)
series applicable to the completed
connected vehicles;
(iv) A SBOM for the covered software
that is the subject of the Declaration of
Conformity. At a minimum, the SBOM
must include author’s name, timestamp,
supplier name, component name,
version string, component hash, package
URL, unique identifier, and dependency
relationships to other software
components.
(v) Documentation of the connected
vehicle manufacturer’s due diligence
efforts, to include independent or hired
third-party research, to ensure that the
covered software listed in the SBOM is
not designed, developed, manufactured,
or supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia;
(vi) If applicable, an indication of
whether the submission is an update to
a prior Declaration of Conformity and
the date of the last submission;
(vii) Identifying information for an
individual point of contact (including
name, email address, and phone
number); and
(viii) Any additional material
information the connected vehicle
manufacturer would like to submit.
(3) Sale of completed connected
vehicles manufactured in the United
States: Connected vehicle
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
manufacturers that manufacture or
assemble completed connected vehicles
in the United States that incorporate
covered software as part of a transaction
that is not otherwise prohibited by this
subpart, may not Sell completed
connected vehicles in the United States
without first submitting to BIS a
Declaration of Conformity, unless
otherwise specified by this subpart. If
there is no Foreign Interest in the
covered software that is incorporated in
completed connected vehicles
manufactured or assembled in the
United States, the connected vehicle
manufacturer need not submit a
Declaration of Conformity. If submitting
a Declaration of Conformity, it shall
include:
(i) The name and address of the
connected vehicle manufacturer;
(ii) A certification that there is a
foreign interest in the covered software
that is incorporated in the completed
connected vehicles that will be Sold in
the United States;
(iii) A certification that the declarant
has not knowingly engaged in a
prohibited covered software
Transaction;
(iv) The make, model, trim, and VIN
series applicable to the completed
connected vehicles;
(v) A SBOM for the covered software
that is the subject of the Declaration of
Conformity. At a minimum, the SBOM
must include author’s name, timestamp,
supplier name, component name,
version string, component hash, package
URL, unique identifier, and dependency
relationships to other software
components.
(vi) Documentation of the connected
vehicle manufacturer’s due diligence
efforts, to include independent or hired
third-party research, to ensure the
covered software listed in the SBOM is
not designed, developed, manufactured,
or supplied by persons owned by,
controlled by, or subject to the
jurisdiction or direction of the PRC or
Russia;
(vii) If applicable, an indication of
whether the submission is an update to
a prior Declaration of Conformity and
the date of the last submission;
(viii) Identifying information for an
individual point of contact (including
name, email address, and phone
number); and
(ix) Any additional material
information the connected vehicle
manufacturer would like to submit.
(b) Procedures to submit Declarations
of Conformity. Connected vehicle
manufacturers and VCS Hardware
Importers shall submit Declarations of
Conformity annually as specified in this
section and any time there is a material
PO 00000
Frm 00032
Fmt 4701
Sfmt 4702
change that makes a prior Declaration of
Conformity or associated HBOM or
SBOM no longer accurate.
(1) Connected Vehicles Manufacturers
seeking to import or manufacture for
Sale in the United States a completed
connected vehicle containing covered
software shall submit a Declaration of
Conformity 60 days prior to the first
import or first sale of each model year
of completed connected vehicles,
grouped by make, model, and trim.
(2) VCS hardware importers seeking
to import any VCS hardware shall
submit a Declaration of Conformity 60
days prior to the first import of VCS
hardware for each model year for units
associated with a vehicle model year, or
calendar year for units not associated
with a vehicle model year. VCS
hardware importers may submit a single
Declaration of Conformity detailing all
VCS Hardware models that will be
imported in the Model Year or calendar
year.
(3) Entities that are both connected
vehicle manufacturers and VCS
hardware importers may, but are not
required to, submit a single compiled
Declaration of Conformity detailing all
required information specified in
791.305 of this subpart. Any compiled
Declaration of Conformity shall be
submitted 60 days prior to the first
import or first sale of the model year of
completed connected vehicles or 60
days prior to the first import of VCS
hardware, whichever occurs first.
(4) Declarants must notify BIS of any
material change in the contents of a
previously submitted Declaration of
Conformity by submitting a revised
Declaration of Conformity within 30
days following any such changes.
(c) Declarations of Conformity must
be delivered to BIS using an official
electronic reporting option as specified
by BIS on its website (https://
www.bis.gov).
(d) Connected vehicle introduced by
means of a fraudulent or false
declaration. Any person who engages in
a prohibited VCS hardware transaction
or a prohibited covered software
transaction and submits a false or
fraudulent Declaration of Conformity
made without reasonable cause to
believe the truth of the declaration, may
incur penalties as defined in § 791.314.
§ 791.306
General authorizations.
(a) VCS hardware importers and
connected vehicle manufacturers may
qualify for a general authorization if
they meet the stated requirements or
conditions to engage in otherwise
prohibited transactions. Persons
availing themselves of any general
authorization are required to maintain
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
records documenting each otherwise
prohibited transaction for a period of 10
years as specified in § 791.312.
(b) General course of procedure. VCS
hardware importers and connected
vehicle manufacturers may self-certify,
without need to notify BIS, that they
meet the requirements for one or more
of the following general authorizations:
(1) The connected vehicle
manufacturer or VCS hardware importer
and entities under common control,
including parents, engaging in an
otherwise prohibited transaction
produces a total model year production
of completed connected vehicles
containing covered software or total
model year production of VCS hardware
is less than 1,000 units;
(2) The completed connected vehicle
that incorporates covered software or
VCS hardware will be used on public
roadways on fewer than 30 calendar
days in any calendar year;
(3) The completed connected vehicle
that incorporates covered software or
the VCS hardware will be used solely
for the purpose of display, testing, or
research, and will not be used on public
roadways; or
(4) The completed connected vehicle
that incorporates covered software or
the VCS hardware is imported solely for
purposes of repair, alteration, or
competition off public roads and will be
reexported within one year from the
time of import;
(c) Change in use. In the event of any
change in the use of a completed
connected vehicle or VCS hardware
associated with a general authorization,
a VCS hardware importer or connected
vehicle manufacturer availing itself of a
general authorization must determine if
it still qualifies for the general
authorization or if it must apply for a
specific authorization.
(d) Inspection. VCS hardware
importers and connected vehicle
manufacturers availing themselves of a
general authorization are subject to
audit and inspection by BIS.
(e) Restrictions. VCS Hardware
importers and connected vehicle
manufacturers shall not avail
themselves of any general authorization
if any one or more of the following
apply:
(1) BIS has notified the VCS hardware
importer or connected vehicle
manufacturer that it is not eligible for a
general authorization.
(2) The VCS Hardware Importer or
connected vehicle manufacturer is a
person owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia.
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
§ 791.307
Specific authorizations.
(a) BIS may provide Specific
Authorizations permitting a VCS
hardware importer or connected vehicle
manufacturer to engage in otherwise
prohibited transactions. Persons
receiving a specific authorization are
required to maintain records for a
period of 10 years as required in
§ 791.312 and submit reports and
statements in accordance with the
instructions specified in each specific
authorization.
(b) General course of procedure.
Prohibited transactions subject to this
subpart, and that are not otherwise
permitted under an exemption or a
general authorization, may be permitted
under a specific authorization. It is the
policy of BIS not to grant applications
for specific authorizations for
transactions that are permitted by a
general authorization.
(c) Applications for specific
authorizations. Applications for specific
authorizations shall include, at a
minimum, a description of the nature of
the otherwise prohibited transaction(s),
including the following:
(1) The identity of the parties engaged
in the transaction, including relevant
corporate identifiers and information
sufficient to identify the ultimate
beneficial ownership of the transacting
parties;
(2) An overview of the VCS hardware
or covered software that is designed,
developed, manufactured, or supplied
by a person owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia;
(3) If known, the make, model, and
trim of the completed connected vehicle
in which the VCS hardware or covered
software will be integrated;
(4) The intended function of the VCS
hardware or covered software;
(5) Documentation to support the
information contained in the
application, including ISO/SAE 21434
Threat Analysis and Risk Assessments,
to include an assessment on the
applicant’s ability to limit PRC or
Russian government access to, or
influence over the design, development,
manufacture or supply of the VCS
hardware or covered software; security
standards used by the applicant with
respect to the VCS hardware or covered
software; other actions and proposals
such as technical controls (i.e., software
validation) or operational controls (i.e.,
physical and logical access monitoring
procedures), the applicant intends to
take to mitigate undue or unacceptable
risk; and
(6) Any other information that BIS
may request after receipt of the initial
application for a Specific Authorization.
PO 00000
Frm 00033
Fmt 4701
Sfmt 4702
79119
(d) Application submission
procedures. A VCS hardware importer
or connected vehicle manufacturer who
seeks to engage in an otherwise
prohibited transaction must submit an
application for specific authorization in
writing prior to engaging in the
transaction and await a decision from
BIS prior to engaging in the transaction.
This application must be delivered to
BIS using an official electronic reporting
option as specified by BIS on its website
(https://www.bis.gov).
(e) Additional conditions. Only one
application for a specific authorization
should be submitted to BIS for each
otherwise prohibited transaction;
multiple parties submitting an
application for a specific authorization
for the same transaction may result in
processing delays.
(f) Information to be supplied. An
applicant may be required to furnish
additional information as BIS deems
necessary to assist in making a decision.
The applicant may present additional
information concerning an application
for a specific authorization at any time
before BIS makes its decision with
respect to the application.
(g) Review and decisions.
Applications for specific authorization
will be reviewed on a case-by-case basis
and determine conditions to be applied
to each specific authorization as may be
needed to mitigate any risk that arises
as a result of the otherwise prohibited
transaction. Such review may include
an evaluation of the risks and potential
mitigation measures proposed by the
applicant for the particular transaction,
including, but not limited to, risks of
data exfiltration from, and remote
manipulation or operation of, the
connected vehicle; the extent and nature
of foreign adversary involvement in the
design, development, manufacture, or
supply of the VCS hardware or covered
software; the applicant’s ability to limit
PRC or Russian government access to, or
influence over the design, development,
manufacture or supply of the VCS
hardware or covered software; security
standards used by the applicant and if
such standards can be validated by BIS
or a third-party; other actions and
proposals the applicant intends to take
to mitigate undue or unacceptable risk.
BIS will advise each applicant of the
decision respecting the filed
application.
(h) Processing period. BIS shall
respond to any application for a specific
authorization with a status update and
a request for additional information or
documents, if any, within 90 days after
receipt of the application.
(i) Scope. (1) Unless otherwise
specified in the authorization, a specific
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79120
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
authorization permits the transaction
only:
(i) Between the parties identified in
the specific authorization;
(ii) With respect to the otherwise
prohibited transaction(s) described in
the authorization; and
(iii) If the conditions specified in the
specific authorization are satisfied. The
applicant must inform any other parties
identified in the specific authorization
of the authorization’s scope and specific
conditions.
(2) Any specific authorization
obtained based on a false or misleading
representation in the application or in
any document submitted in connection
with the application under this section
shall be deemed void as of the date of
issuance, and the applicant may incur
penalties as specified in § 791.314.
(3) As a condition for the issuance of
any specific authorization, the applicant
may be required to file reports with
respect to the otherwise prohibited
transactions authorized by the specific
authorization in such form and at such
times and places as may be prescribed
in the specific authorization or
otherwise communicated to the
applicant by BIS. Reports should be sent
in accordance with the instructions
provided in the applicable specific
authorization.
(j) Effect of denial. BIS’s denial of a
specific authorization may be appealed
as described in § 791.309 and does not
preclude parties from filing an
application for a specific authorization
for a separate otherwise prohibited
transaction. The applicant may at any
time request, by written
correspondence, reconsideration of the
denial of an application based on new
material facts or changed circumstances.
(k) Effect of specific authorization. (1)
No specific authorization issued under
this subpart, or otherwise issued by BIS,
permits or validates any prohibited
transaction effected prior to the issuance
of such specific authorization unless
specifically provided for in the specific
authorization.
(2) No regulation, ruling, instruction,
or authorization permits any prohibited
transaction under this subpart unless
the regulation, ruling, instruction or
Authorization is issued by BIS and
specifically refers to this subpart. No
regulation, ruling, instruction, or
authorization referring to this subpart
shall be deemed to permit any
prohibited transaction prohibited by any
provision of this subpart unless the
regulation, ruling, instruction, or
authorization specifically refers to such
provision. Any specific authorization
permitting any otherwise prohibited
transaction has the effect of removing
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
those prohibitions from the transaction,
but only to the extent specifically stated
by the terms of the specific
authorization. Unless the specific
authorization otherwise specifies, such
an authorization does not create any
right, duty, obligation, claim, or interest
in, or with respect to, any property that
would not otherwise exist under
ordinary principles of law.
(3) Nothing contained in this subpart
shall be construed to supersede the
requirements established under any
other provision of law or to relieve a
person from any requirement to obtain
an authorization from another
department or agency of the U.S.
Government in compliance with
applicable laws and regulations subject
to the jurisdiction of that department or
agency.
(l) Amendment, modification, or
rescission. Except as otherwise provided
by law, any Specific Authorization or
instructions issued thereunder may be
amended, modified, or rescinded by BIS
at any time.
§ 791.308
Exemptions.
(a) VCS hardware importers may
engage in prohibited transactions
described in § 791.302 without an
authorization as required under
§§ 791.306 and 791.307, and are exempt
from submitting Declarations of
Conformity with respect to all other
transactions, as described in § 791.305
provided that:
(1) For VCS Hardware units not
associated with a vehicle model year,
the import of the VCS hardware occurs
prior to January 1, 2029; or
(2) The VCS hardware is associated
with a vehicle model year prior to 2030
or the VCS hardware is imported as part
of a connected vehicle with a model
year prior to 2030.
(b) Connected vehicle manufacturers
may engage in prohibited transactions
described in § 791.303 without
authorization as required under
§§ 791.306 or 791.307 and are exempt
from submitting Declarations of
Conformity with respect to all other
transactions, as described in § 791.305,
provided that the completed connected
vehicle that incorporates covered
software described in § 791.303(a)(1)
was manufactured prior to Model Year
2027.
(c) Connected vehicle manufacturers
who are owned by, controlled by, or
subject to the jurisdiction or direction of
the PRC or Russia may engage in
prohibited transactions described in
section 791.304 without Authorization
as required under §§ 791.306 or 791.307,
and are exempt from submitting
Declarations of Conformity to all other
PO 00000
Frm 00034
Fmt 4701
Sfmt 4702
transactions, provided that the
completed connected vehicle that
incorporates VCS hardware and/or
covered software was manufactured
prior to Model Year 2027.
§ 791.309
Appeals.
(a) Scope. Any person directly and
adversely affected by any of the listed
administrative actions taken by BIS
pursuant to this subpart may appeal to
the Under Secretary for reconsideration
of that administrative action. Only the
following types of administrative
actions are subject to the appeals
procedures described in this subpart:
(1) Denial of an application for
specific authorization;
(2) Suspension or revocation of an
issued specific authorization; or
(3) Determination of ineligibility for a
general authorization.
(b) Designated appeals reviewer and
coordinator. The Under Secretary may
delegate to the Deputy Under Secretary
of Commerce for Industry and Security
or to another BIS official the authority
to review and decide the appeal, and to
exercise any other function of the Under
Secretary under this section. In
addition, the Under Secretary may
designate any employee of BIS to be an
appeals coordinator to assist in the
review and processing of an appeal
under this subpart.
(c) Appeals procedures. An appeal
under this subpart must be submitted to
the Under Secretary by email or at the
following address: Bureau of Industry
and Security, U.S. Department of
Commerce, Room 3898, 14th Street and
Pennsylvania Avenue NW, Washington,
DC 20230 not later than 45 days after
the date appearing on the written notice
of administrative action. The appeal
must include a full written statement in
support of the appellant’s position. The
appeal must include a precise statement
of the reasons that the appellant
believes that the administrative action
has a direct and adverse effect and
should be reversed or modified. The
Under Secretary or the designated
official may request additional
information that would be helpful in
resolving the appeal and may accept
additional submissions. The Under
Secretary or the designated official will
not ordinarily accept any submission
filed sua sponte more than 30 days after
the filing of the appeal.
(d) Request for informal hearing. In
addition to the written statement
submitted in support of an appeal, an
appellant may request, in writing, at the
time an appeal is filed, an opportunity
for an informal hearing. A hearing is not
required, and the Under Secretary or the
designated official may grant or deny a
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
request for an informal hearing at the
Under Secretary or the designated
official’s sole discretion. Any hearings
will be held in the District of Columbia
unless the Under Secretary or the
designated official determines, based
upon good cause shown, that another
location would be preferable.
(e) Informal hearing procedures. If a
hearing request is granted, the Under
Secretary or the designated official may
provide an opportunity for the appellant
to make an oral presentation at an
informal hearing based on the materials
previously submitted by the appellant
or made available by the Department.
The Under Secretary or the designated
official may require that any facts in
controversy be covered by an affidavit
or testimony given under oath or
affirmation. The rules of evidence
prevailing in courts of law do not apply,
and all evidentiary material deemed by
the Under Secretary or the designated
official to be relevant and material to the
proceeding, and not unduly repetitious,
will be received and considered. The
Under Secretary or the designated
official has the authority to limit the
number of people attending the hearing,
to impose any time or other limitations
deemed reasonable, and to determine all
procedural questions. A transcript of an
informal hearing shall not be made,
unless the Under Secretary or the
designated official determines that the
national interest or other good cause
warrants it, or the appellant requests a
transcript. If the appellant requests, and
the Under Secretary or the designated
official approves the taking of, a
transcript, the appellant will be
responsible for paying all expenses
related to production of the transcript.
Any person designated by the Under
Secretary to conduct an informal
hearing shall submit a written report
containing a summary of the hearing
and recommended action to the Under
Secretary.
(f) Decisions. In addition to the
documents specifically submitted in
connection with the appeal, the Under
Secretary or the designated official may
consider any recommendations, reports,
or other relevant documents available to
BIS in determining the appeal, but shall
not be bound by any such information,
nor prevented from considering any
other relevant information, or
consulting with any other person or
groups, in making a decision. The
Under Secretary or the designated
official may adopt any other procedures
deemed necessary and reasonable for
considering an appeal, including by
providing the appellant with an interim
or proposed decision and offering the
appellant an opportunity to provide
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
comments. The Under Secretary or the
designated official shall decide an
appeal within a reasonable time after
receipt of the appeal. The decision shall
be issued to the appellant in writing and
contain a statement of the reasons for
the action and address any arguments
contrary to the decision presented by
the appellant. The decision of the Under
Secretary or the designated official shall
be final.
(g) Effect of appeal. Acceptance and
consideration of an appeal shall not
affect any administrative action,
pending or in effect, unless the Under
Secretary or the designated official,
upon request by the appellant and with
opportunity for a response, grants a stay.
§ 791.310
Advisory opinions.
(a) VCS hardware importers and
connected vehicle manufacturers may
request an advisory opinion from BIS as
to whether a prospective transaction is
subject to a prohibition in this subpart.
The entire transaction that is the subject
of the advisory opinion request must be
an actual, as opposed to hypothetical,
transaction and involve disclosed, as
opposed to anonymous, parties to the
transaction.
(b) Advisory opinion requests must be
made in writing, and may be delivered
to BIS by email, through the BIS
website, or by any other means that BIS
may prescribe.
(c) Persons submitting advisory
opinion requests are encouraged to
provide as much information as possible
to assist BIS in making a determination,
to include the following information:
(1) The name, title, and telephone and
email address of the person to contact;
(2) The submitter’s complete address
comprised of street address, city, state,
country, and postal code;
(3) All available information
identifying the parties to the prospective
transaction;
(4) Complete information regarding
the VCS hardware and/or covered
software and any descriptive literature,
brochures, technical specifications, or
papers that provide sufficient technical
detail to enable BIS to verify whether
the prospective transaction would
constitute a prohibited transaction as
defined in this subpart;
(5) For connected vehicle
manufacturers: the make, model, and
trim level, or other identifying
information number of the completed
connected vehicle;
(6) For VCS hardware Importers: the
identification of the system; and, if
known, the make, model, and trim of
the group of completed connected
vehicles for which the equipment is
intended;
PO 00000
Frm 00035
Fmt 4701
Sfmt 4702
79121
(7) An SBOM and/or an HBOM; and
(8) Any other information that the
submitter believes to be material to the
prospective transaction.
(d) Each person that submits an
advisory opinion request shall provide
any additional information or
documents that BIS may thereafter
request in its review of the matter.
(e) Each advisory opinion can be
relied upon by the requesting party or
parties to the extent the disclosures
made pursuant to this subpart were
accurate and complete and to the extent
the disclosures continue accurately and
completely to reflect circumstances after
the date of the issuance of the advisory
opinion. An advisory opinion will not
restrict enforcement actions by any
agency other than BIS. It will not affect
a requesting party’s obligations to any
other agency or under any statutory or
regulatory provision other than those
specifically discussed in the Advisory
Opinion.
(f) BIS may publish on its website an
advisory opinion that may be of broad
interest to the public, with redactions
where necessary to protect confidential
business information.
§ 791.311
‘‘Is-Informed’’ notices.
(a) BIS may inform VCS hardware
importers or connected vehicle
manufacturers either individually by
specific notice or, for larger groups,
through a separate notice published in
the Federal Register, that a specific
authorization is required because an
activity could constitute a prohibited
transaction.
(b) Specific notice that a specific
authorization is required may be given
only by, or at the direction of, the Under
Secretary or a BIS official designated by
the Under Secretary.
§ 791.312
Recordkeeping.
Except as otherwise provided, VCS
hardware importers and connected
vehicle manufacturers shall keep a full
and accurate record of each transaction
engaged in for which a Declaration of
Conformity, general authorization, or
specific authorization would be
required under sections 791.305,
791.306, or 791.307, regardless of
whether these transactions are effected
pursuant to a general authorization,
specific authorization, or otherwise, and
such record shall be available for
examination for at least 10 years after
the date of such transactions.
§ 791.313
demand.
Reports to be furnished on
(a) VCS hardware importers and
connected vehicle manufacturers are
required to furnish under oath, in the
E:\FR\FM\26SEP3.SGM
26SEP3
khammond on DSKJM1Z7X2PROD with PROPOSALS3
79122
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
form of reports or as otherwise specified
by BIS, from time to time and at any
time as may be required by BIS,
complete information relative to any
transaction involving the import of VCS
hardware or the import or Sale of
completed connected vehicles
incorporating covered software,
regardless of whether such transaction
is effected pursuant to an authorization
or otherwise, subject to the provisions of
this subpart. BIS may require that such
reports include the production of any
books, contracts, letters, papers, or other
hard copy or electronic documents
relating to any transactions, in the
custody or control of the persons
required to make such reports. BIS may,
through any person or agency, conduct
investigations, hold hearings,
administer oaths, examine witnesses,
receive evidence, take depositions, and
require by subpoena the attendance and
testimony of witnesses and the
production of any books, contracts,
letters, papers, and other hard copy or
electronic documents relating to any
matter under investigation, regardless of
whether any report has been required or
filed in connection therewith.
(b) For purposes of paragraph (a) of
this section, the term ‘‘document’’
includes any written, recorded, or
graphic matter or other means of
preserving thought or expression
(including in electronic format), and all
tangible things stored in any medium
from which information can be
processed, transcribed, or obtained
directly or indirectly, including
correspondence, memoranda, notes,
messages, contemporaneous
communications such as text and
instant messages, letters, emails,
spreadsheets, metadata, contracts,
bulletins, diaries, chronological data,
minutes, books, reports, examinations,
charts, ledgers, books of account,
invoices, air waybills, bills of lading,
worksheets, receipts, printouts, papers,
schedules, affidavits, presentations,
transcripts, surveys, graphic
representations of any kind, drawings,
photographs, graphs, video or sound
recordings, and motion pictures or other
film.
(c) Persons providing documents to
BIS pursuant to this section must
submit documents electronically.
Acceptable formats include Portable
Document Format (PDF) and Microsoft
Excel. Files with embedded, encrypted,
or password protected content will not
be accepted.
§ 791.314
Penalties.
(a) Section 206 of the International
Emergency Economic Powers Act (50
U.S.C. 1705) (IEEPA) is applicable to
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
violations of the provisions of any
general authorization, Specific
authorization, regulation, order,
directive, instruction, or prohibition
issued by or pursuant to the direction or
authorization of the Secretary of
Commerce (Secretary) pursuant to this
subpart or otherwise under IEEPA.
(1) A civil penalty not to exceed the
amount set forth in section 206 of IEEPA
may be imposed on any person who
violates, attempts to violate, conspires
to violate, or causes a violation of any
exemption, general authorization,
specific authorization, regulation, order,
directive, instruction, or prohibition
issued under this subpart.
(2) A person who willfully commits,
willfully attempts to commit, willfully
conspires to commit, or aids or abets in
the commission of a violation of any
exemption, general authorization,
specific authorization, regulation, order,
directive, instruction, or prohibition
issued under this subpart is subject to
criminal penalties and may, upon
conviction, be fined not more than
$1,000,000, or if a natural person, be
imprisoned for not more than 20 years,
or both.
(b) The civil penalties provided in
IEEPA are subject to adjustment
pursuant to the Federal Civil Penalties
Inflation Adjustment Act of 1990 (Pub.
L. 101–410, as amended, 28 U.S.C. 2461
note).
(c) The criminal penalties provided in
IEEPA are subject to adjustment
pursuant to 18 U.S.C. 3571.
(d) Pursuant to 18 U.S.C. 1001,
whoever, in any matter within the
jurisdiction of the executive, legislative,
or judicial branch of the U.S.
Government, knowingly and willfully
falsifies, conceals, or covers up by any
trick, scheme, or device a material fact;
or makes any materially false, fictitious,
or fraudulent statement or
representation; or makes or uses any
false writing or document knowing the
same to contain any materially false,
fictitious, or fraudulent statement or
entry shall be fined under title 18,
United States Code, imprisoned, or
both.
(e) Violations of this subpart may also
be subject to other applicable laws.
§ 791.315
Pre-penalty notice; settlement.
(a) When required. If BIS has reason
to believe that there has occurred a
violation of any provision of this
subpart or a violation of the provisions
of any exemption, general authorization,
specific authorization, regulation, order,
directive, instruction, or prohibition
issued by or pursuant to the direction or
authorization of the Secretary pursuant
to this subpart or otherwise under
PO 00000
Frm 00036
Fmt 4701
Sfmt 4702
IEEPA and determines that a civil
monetary penalty is warranted, BIS will
issue a pre-penalty notice informing the
alleged violator of BIS’s intent to impose
a monetary penalty. A Pre-Penalty
Notice shall be in writing and issued
electronically to the alleged violator.
The pre-penalty notice may be issued
whether or not another agency has taken
any action with respect to the matter.
(b) Response—(1) Right to respond.
An alleged violator may respond to a
Pre-Penalty Notice in writing to BIS.
(2) Deadline for response. A response
to a Pre-Penalty Notice must be made
within 30 days as set forth below. The
failure to submit a response within 30
days shall be deemed to be a waiver of
the right to respond.
(i) Computation of time for response.
A response to a Pre-Penalty Notice must
be electronically transmitted on or
before the 30th day after the date of
delivery by BIS.
(ii) Extensions of time for response. If
a due date falls on a federal holiday or
weekend, that due date is extended to
include the following business day. Any
other extensions of time will be granted,
at the discretion of BIS, only upon
specific request to BIS.
(3) Form and method of response. A
response to a pre-penalty notice need
not be in any particular form, but it
must be typewritten and signed by the
alleged violator or a representative
thereof, contain information sufficient
to indicate that it is in response to the
pre-penalty notice, and include the BIS
identification number listed on the prepenalty notice. A digital signature is
acceptable.
(4) Information that should be
included in response. Any response
should set forth in detail why the
alleged violator either believes that a
violation of the provisions of this
subpart did not occur and/or why a civil
monetary penalty is otherwise
unwarranted under the circumstances.
The response should include all
documentary or other evidence
available to the alleged violator that
supports the arguments set forth in the
response. BIS will consider all relevant
materials submitted in the response.
(c) Settlement. Settlement discussions
may be initiated by BIS, the alleged
violator, or the alleged violator’s
authorized representative.
(d) Representation. A representative
of the alleged violator may act on behalf
of the alleged violator, but any oral
communication with BIS prior to a
written submission regarding the
specific allegations contained in the prepenalty notice must be preceded by a
written letter of representation, unless
the pre-penalty notice was served upon
E:\FR\FM\26SEP3.SGM
26SEP3
Federal Register / Vol. 89, No. 187 / Thursday, September 26, 2024 / Proposed Rules
the alleged violator in care of the
representative.
§ 791.316
Penalty imposition.
(a) If, after considering any written
response to the pre-penalty notice and
any relevant facts, BIS determines that
there was a violation by the alleged
violator named in the pre-penalty notice
and that a civil monetary penalty is
appropriate, BIS may issue a penalty
notice to the violator containing a
determination of the violation and the
imposition of the monetary penalty.
(b) The issuance of the penalty notice
shall constitute final agency action. The
violator may seek judicial review of that
final agency action in federal district
court.
§ 791.317 Administrative collection;
referral to United States Department of
Justice.
In the event that the violator does not
pay the penalty imposed pursuant to
this subpart or make payment
arrangements acceptable to BIS, the
matter may be referred for
administrative collection measures by
the Department of the Treasury or to the
United States Department of Justice for
appropriate action to recover the
penalty in a civil suit in a federal
district court.
§ 791.318
Finding of Violation.
khammond on DSKJM1Z7X2PROD with PROPOSALS3
(a) When issued. (1) BIS may issue an
initial finding of violation that identifies
a violation if BIS:
(i) Determines that there has occurred
a violation of any provision of this
subpart, or a violation of the provisions
of any exemption, general authorization,
specific authorization, regulation, order,
directive, instruction, or prohibition
issued by or pursuant to the direction or
authorization of the Secretary pursuant
to this subpart or otherwise under
IEEPA;
(ii) Considers it important to
document the occurrence of a violation;
and
VerDate Sep<11>2014
17:20 Sep 25, 2024
Jkt 262001
(iii) Concludes that an administrative
response is warranted but that a civil
monetary penalty is not the most
appropriate response.
(2) An initial finding of violation shall
be in writing and may be issued
whether or not another agency has taken
any action with respect to the matter.
(b) Response—(1) Right to respond.
An alleged violator may contest an
initial Finding of Violation by providing
a written response to BIS.
(2) Deadline for response; default
determination. A response to an initial
Finding of Violation must be made
within 30 days as set forth in paragraphs
(b)(2)(i) and (ii) of this section. The
failure to submit a response within 30
days shall be deemed to be a waiver of
the right to respond, and the initial
Finding of Violation will become final
and will constitute final agency action.
The violator may seek judicial review of
that final agency action in federal
district court.
(i) Computation of time for response.
A response to an initial finding of
violation must be electronically
transmitted on or before the 30th day
after the date of delivery by BIS.
(ii) Extensions of time for response. If
a due date falls on a federal holiday or
weekend, that due date is extended to
include the following business day. Any
other extensions of time will be granted,
at the discretion of BIS, only upon
specific request to BIS.
(3) Form and method of response. A
response to an initial finding of
violation need not be in any particular
form, but it must be typewritten and
signed by the alleged violator or a
representative thereof, contain
information sufficient to indicate that it
is in response to the initial finding of
violation, and include the BIS
identification number listed on the
initial finding of violation. A digital
signature is acceptable.
(4) Information that should be
included in response. Any response
PO 00000
Frm 00037
Fmt 4701
Sfmt 9990
79123
should set forth in detail why the
alleged violator either believes that a
violation of the provisions of this
subpart did not occur and/or why a
finding of violation is otherwise
unwarranted under the circumstances.
The response should include all
documentary or other evidence
available to the alleged violator that
supports the arguments set forth in the
response. BIS will consider all relevant
materials submitted in the response.
(c) Determination—(1) Determination
that a finding of violation is warranted.
If, after considering the response, BIS
determines that a final finding of
violation should be issued, BIS will
issue a final finding of violation that
will inform the violator of its decision.
Any action taken in a final finding of
violation shall constitute final agency
action. The violator has the right to seek
judicial review of that final agency
action in federal district court.
(2) Determination that a finding of
violation is not warranted. If, after
considering the response, BIS
determines a finding of violation is not
warranted, then BIS will inform the
alleged violator of its decision not to
issue a final finding of violation.
§ 791.319
Severability.
If any provision of this subpart is held
to be invalid or unenforceable by its
terms, or as applied to any person or
circumstance, or stayed pending further
agency action or judicial review, the
provision is to be construed so as to
continue to give the maximum effect to
the provision permitted by law, unless
such holding will be one of utter
invalidity or unenforceability, in which
event the provision will be severable
from this part and will not affect the
remainder thereof.
[FR Doc. 2024–21903 Filed 9–23–24; 8:45 am]
BILLING CODE 3510–33–P
E:\FR\FM\26SEP3.SGM
26SEP3
Agencies
[Federal Register Volume 89, Number 187 (Thursday, September 26, 2024)]
[Proposed Rules]
[Pages 79088-79123]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-21903]
[[Page 79087]]
Vol. 89
Thursday,
No. 187
September 26, 2024
Part IV
Department of Commerce
-----------------------------------------------------------------------
Bureau of Industry and Security
-----------------------------------------------------------------------
15 CFR Part 791
Securing the Information and Communications Technology and Services
Supply Chain: Connected Vehicles; Proposed Rule
Federal Register / Vol. 89 , No. 187 / Thursday, September 26, 2024 /
Proposed Rules
[[Page 79088]]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
Bureau of Industry and Security
15 CFR Part 791
[Docket No. 240919-0245]
RIN 0694-AJ56
Securing the Information and Communications Technology and
Services Supply Chain: Connected Vehicles
AGENCY: Bureau of Industry and Security, Department of Commerce.
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: In this notice of proposed rulemaking (NPRM), the Department
of Commerce's (Department) Bureau of Industry and Security (BIS)
proposes a rule to address undue or unacceptable risks to national
security and U.S. persons posed by classes of transactions involving
information and communications technology and services (ICTS) that are
designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of certain
foreign adversaries, and which are integral to connected vehicles, as
defined herein. BIS is soliciting comment on this proposed rule, which
builds on the advance notice of proposed rulemaking (ANPRM) issued by
BIS on March 1, 2024.
DATES: Comments to this proposed rule must be received on or before
October 28, 2024.
ADDRESSES: All comments must be submitted by one of the following
methods:
By the Federal eRulemaking Portal: https://www.regulations.gov at docket number BIS-2024-0005.
By email directly to: [email protected].
Include ``RIN 0694-AJ56'' in the subject line.
Instructions: Comments sent by any other method, to any
other address or individual, or received after the end of the comment
period, may not be considered. For those seeking to submit confidential
business information (CBI), please clearly mark such submissions as CBI
and submit by email, as instructed above. Each CBI submission must also
contain a summary of the CBI, clearly marked as public, in sufficient
detail to permit a reasonable understanding of the substance of the
information for public consumption. Such summary information will be
posted on regulations.gov. Comments that contain profanity, vulgarity,
threats, or other inappropriate language or content will not be
considered.
The Regulatory Impact Analysis is available at https://www.regulations.gov at docket number BIS-2024-0005.
FOR FURTHER INFORMATION CONTACT: Marc Coldiron, U.S. Department of
Commerce, telephone: (202) 482-3678. For media inquiries: Jessica
Stallone, Office of Congressional and Public Affairs, Bureau of
Industry and Security, U.S. Department of Commerce: [email protected].
SUPPLEMENTARY INFORMATION:
I. Background
In this notice, BIS solicits comment on a proposed rule to prohibit
transactions involving Vehicle Connectivity System (VCS) hardware and
covered software designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the People's Republic of China, including the Hong Kong
Special Administrative Region (PRC), or the Russian Federation
(Russia). It follows an advance notice of proposed rulemaking (ANPRM),
89 FR 15066 (Mar. 1, 2024), in which BIS sought public comment to
inform a rulemaking that would address the undue or unacceptable risks,
as identified in Executive Order (E.O.) 13873, ``Securing the
Information and Communications Technology and Services Supply Chain,''
84 FR 22689 (May 17, 2019), posed by a class of transactions that
involve information and communications technology and services (ICTS)
designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of a foreign
adversary and integral to Connected Vehicles.
In E.O. 13873, the President delegated to the Secretary of Commerce
(Secretary), to the extent necessary to implement the order, the
authority granted under the International Emergency Economic Powers Act
(IEEPA) (50 U.S.C. 1701, et seq.), ``to deal with any unusual and
extraordinary'' foreign threat to the United States' national security,
foreign policy, or economy, if the President declares a national
emergency with respect to such threat. 50 U.S.C. 1701(a). In E.O.
13873, the President declared a national emergency with respect to the
``unusual and extraordinary'' foreign threat posed to the ICTS supply
chain and has, in accordance with the National Emergencies Act (NEA),
extended the declaration of this national emergency in each year since
E.O. 13873's publication. See Continuation of the National Emergency
With Respect to Securing the Information and Communications Technology
and Services Supply Chain, 85 FR 29321 (May 14, 2020); Continuation of
the National Emergency With Respect to Securing the Information and
Communications Technology and Services Supply Chain, 86 FR 26339 (May
13, 2021); Continuation of the National Emergency With Respect to
Securing the Information and Communications Technology and Services
Supply Chain, 87 FR 29645 (May 13, 2022); Continuation of the National
Emergency With Respect to Securing the Information and Communications
Technology and Services Supply Chain, 88 FR 30635 (May 11, 2023);
Continuation of the National Emergency With Respect to Securing the
Information and Communications Technology and Services Supply Chain, 89
FR 40353 (May 9, 2024).
Specifically, the President identified the ``unrestricted
acquisition or use in the United States of ICTS designed, developed,
manufactured, or supplied by persons owned by, controlled by, or
subject to the jurisdiction or direction of foreign adversaries'' as
``an unusual and extraordinary'' foreign threat to the national
security, foreign policy, and economy of the United States that
``exists both in the case of individual acquisitions or uses of such
technology or services, and when acquisitions or uses of such
technologies are considered as a class.'' See E.O. 13873, and 50 U.S.C.
1701(a)-(b).
Once the President declares a national emergency, IEEPA empowers
the President to, among other acts, investigate, regulate, prevent, or
prohibit, any ``acquisition, holding, withholding, use, transfer,
withdrawal, transportation, importation or exportation of, or dealing
in, or exercising any right, power, or privilege with respect to, or
transactions involving, any property in which any foreign country or a
national thereof has any interest by any person, or with respect to any
property, subject to the jurisdiction of the United States.'' 50 U.S.C.
1702(a)(1)(B).
To address the identified risks to national security from ICTS
transactions, the President in E.O. 13873 imposed a prohibition on
transactions determined by the Secretary, in consultation with relevant
agency heads, to involve foreign adversary ICTS and to pose certain
risks to U.S. national security, technology, or critical
infrastructure. Specifically, to fall within the scope of the
prohibition, the Secretary must determine that a transaction: (1)
``involves [ICTS]
[[Page 79089]]
designed, developed, manufactured, or supplied, by persons owned by,
controlled by, or subject to the jurisdiction or direction of a foreign
adversary,'' defined in E.O. 13873 as ``any foreign government or
foreign non-government person engaged in a long-term pattern or serious
instances of conduct significantly adverse to the national security of
the United States or security and safety of United States persons;''
and (2):
A. ``Poses an undue risk of sabotage to or subversion of the
design, integrity, manufacturing, production, distribution,
installation, operation, or maintenance of information and
communications technology or services in the United States;''
B. ``Poses an undue risk of catastrophic effects on the security or
resiliency of United States critical infrastructure or the digital
economy of the United States;'' or
C. ``Otherwise poses an unacceptable risk to the national security
of the United States or the security and safety of United States
persons.''
These factors are collectively referred to as ``undue or
unacceptable risks.'' Further, E.O. 13873 grants the Secretary the
authority to design or negotiate mitigation measures that would allow
an otherwise prohibited transaction to proceed. E.O. 13873 section
1(b).
The President also delegated to the Secretary the ability to
promulgate regulations that, among other things, establish when
transactions involving particular technologies may be categorically
prohibited. E.O. 13873 section 2(a)-(b); see also 3 U.S.C. 301-02.
Specifically, the Secretary may issue rules establishing criteria,
consistent with section 1 of E.O. 13873, by which particular
technologies or market participants may be categorically included in or
categorically excluded from prohibitions established pursuant to E.O.
13873.
II. Introduction
Today's vehicles contain a myriad of connected components that
provide greater convenience for consumers and increase road safety for
both drivers and pedestrians, such as Wi-Fi, Bluetooth, cellular, and
satellite connectivity. However, the incorporation of progressively
more complex hardware and software systems that facilitate these
features has also increased the attack surfaces through which malign
actors may exploit vulnerabilities to gain access to a vehicle. As BIS
outlined in its March 1, 2024, ANPRM, certain ICTS integral to
Connected Vehicles could present an undue or unacceptable risk to U.S.
national security when those systems are designed, developed,
manufactured, or supplied by persons owned by, controlled by, or
subject to the jurisdiction or direction of a foreign adversary.
In the Securing the Information and Communications Technology and
Services Supply Chain interim final rule, 86 FR 4909 (January 19,
2021), the Secretary determined that certain foreign governments or
foreign non-government persons including the PRC, Republic of Cuba,
Islamic Republic of Iran, Democratic People's Republic of Korea,
Russia, and Venezuelan politician Nicol[aacute]s Maduro constitute
foreign adversaries for purposes of E.O. 13873 and rules promulgated
pursuant to E.O. 13873. See 15 CFR 791.4 (to the extent that the list
of foreign adversaries identified in 15 CFR 791.4 is updated to add or
remove governments or non-government persons, this proposed rule
intends to reflect the most up-to-date designations of foreign
adversaries). Additionally, E.O. 13873 provides that the Secretary may
issue rules that identify particular technologies or countries with
respect to which transactions involving ICTS warrant particular
scrutiny. E.O. 13873 2(b). For the purposes of this proposed rule
regarding transactions involving ICTS integral to Connected Vehicles,
BIS is focusing its regulatory efforts on ICTS that are designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia.
BIS has identified that, for the purposes of addressing the national
security risks posed by Connected Vehicles, these two foreign
adversaries pose particular risks to U.S. national security because of
their legal, political, and regulatory regimes, combined with their
current and anticipated growth and involvement in the automotive
sector, to include Connected Vehicles. However, BIS specifically seeks
public comment on whether the other identified foreign adversaries pose
similar risks to U.S. national security in the connected vehicle supply
chain.
The PRC and Russia are able to leverage domestic legislation and
regulatory regimes to compel companies subject to their jurisdiction,
including carmakers and their suppliers, to cooperate with security and
intelligence services. Such control over companies and their products
and services means that equipment is easily exploitable by PRC and
Russian authorities. The privileged access that the PRC and Russia may
gain to Connected Vehicles through their components, including
software, could enable those foreign adversaries to exfiltrate
sensitive data collected by connected vehicles and, potentially, allow
remote access and manipulation of connected vehicles driven by U.S.
persons. Pursuant to E.O. 13873, BIS has determined that certain
classes of transactions that facilitate the exfiltration of data and
remote manipulation of connected vehicles pose undue or unacceptable
risks to U.S. national security and the safety and security of U.S.
persons.
a. Overview of Proposed Rule
To address these identified undue or unacceptable risks, BIS is
proposing regulations that would, absent a General or Specific
Authorization, (1) prohibit VCS Hardware Importers from knowingly
importing into the United States certain hardware for VCS (``VCS
Hardware,'' as further defined below); (2) prohibit connected vehicle
manufacturers from knowingly importing into the United States completed
connected vehicles incorporating certain software that supports the
function of VCS or ADS (VCS and ADS software are collectively referred
to herein as ``covered software,'' as further defined below); (3)
prohibit connected vehicle Manufacturers from knowingly Selling within
the United States completed connected vehicles that incorporate covered
software; and (4) prohibit connected vehicle manufacturers who are
owned by, controlled by, or subject to the jurisdiction or direction of
the PRC or Russia from knowingly selling in the United States completed
connected vehicles that incorporate VCS hardware or covered software.
The prohibitions would apply when such VCS hardware or covered software
is designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia.
If, following consideration of comments received on this proposed
rule, BIS issues a final rule to adopt the proposal, that final rule
would take effect 60 days after publication in the Federal Register.
However, VCS Hardware Importers would be permitted to engage in
otherwise Prohibited Transactions involving VCS Hardware and exempt
from certain requirements so long as: (1) for VCS Hardware not
associated with a Model Year, the import of the VCS Hardware takes
place prior to January 1, 2029; or (2) the VCS Hardware unit is
associated with a vehicle Model Year prior to 2030 or the VCS Hardware
is integrated into a connected vehicle (completed or incomplete) with a
Model Year prior to 2030. connected vehicle manufacturers would be
permitted to engage in
[[Page 79090]]
otherwise prohibited transactions involving covered software and exempt
from certain requirements, so long as the completed connected vehicle
that is imported, or sold within the United States, is of a model year
prior to 2027. connected vehicle Manufacturers that are owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia would be permitted to sell completed connected vehicles with
a model year prior to 2027 that incorporate VCS hardware or covered
software.
BIS is also proposing to implement several mechanisms to facilitate
compliance with these prohibitions: (1) Declarations of Conformity
submitted to BIS by VCS hardware importers and connected vehicle
manufacturers to confirm that they are not engaging in prohibited
transactions involving VCS hardware or covered software, as defined
herein; (2) Advisory opinions to allow VCS hardware importers and
connected vehicle manufacturers to seek guidance from BIS on whether a
prospective transaction may be prohibited; (3) General authorizations
to allow certain VCS hardware importers and connected vehicle
manufacturers to engage in otherwise prohibited transactions without
the need to notify BIS prior to the prohibited activity if they qualify
under stated conditions; (4) Specific authorizations which, following
an application to and approval by BIS, grant VCS hardware importers and
connected vehicle manufacturers the ability to engage in otherwise
prohibited transactions, including because the associated undue or
unacceptable risks have been, or can be, mitigated; and (5) A process
to inform VCS hardware importers and connected vehicle manufacturers
that a specific authorization may be required because an activity could
constitute a Prohibited Transaction.
This proposed rule benefits from the responses received during the
public comment period for the ANPRM and incorporates significant
portions of that feedback. For example, BIS considered public feedback
to define the scope of connected vehicles, identify ICTS integral to
Connected Vehicles, and better understand the effects of any potential
prohibition. Determining the scope of the prohibitions outlined in this
proposed rule required balancing the need to address the undue or
unacceptable risk posed by foreign adversary involvement in the
connected vehicles supply chain with the impact on the public and
industry.
III. Comments on the Advance Notice of Proposed Rulemaking
On March 1, 2024, the Department published in the Federal Register
an ANPRM, 89 FR 15066, pursuant to the authority the President
delegated to the Secretary in E.O. 13873. The purpose of the ANPRM was
to solicit stakeholder feedback and to gather information to further
BIS's consideration of a proposed rule to address any undue or
unacceptable risks to U.S. national security posed by ICTS used in
connected vehicles, when designed, developed, manufactured, or supplied
by persons owned by, controlled by, or subject to the jurisdiction or
direction of a foreign adversary. Specifically, BIS sought public input
on certain definitions, capabilities of connected vehicles that may
increase the likelihood of vulnerabilities, and consequences to U.S.
persons and critical infrastructure if these vulnerabilities are
exploited by a foreign adversary. BIS also solicited input on the ICTS
most integral to connected vehicles and most vulnerable to compromise,
as well as input on mechanisms to address identified risks through
potential design, implementation standards and protocols, manufacturing
integrity protection systems and procedures, or prohibitions.
BIS received 57 comment submissions in response to the ANPRM, from
original equipment manufacturers (OEMs), component suppliers, two
foreign governments, nonprofit organizations, and individuals. Five
comments contained CBI, and one comment was retracted at the request of
the commenter. Each of the comments is available on the public
rulemaking docket at https://www.regulations.gov.
In general, commenters expressed agreement with BIS on the overall
risks posed by compromised ICTS in Connected Vehicles, as outlined in
the ANPRM. Commenters were also generally aligned on the need for
further clarity on what would constitute a person ``owned by,
controlled by, or subject to the jurisdiction or direction'' of a
foreign adversary, the challenge of implementing due diligence
requirements due to the complexity of the global automotive supply
chain, the need for substantial lead time to implement a regulation
given the difficulty of sourcing alternative suppliers, the breadth and
depth of data collected by ICTS integral to Connected Vehicles, and the
potential negative impact such a regulation could have on long-term
U.S. innovation, competitiveness, and health and safety. On the other
hand, commenters disagreed on a number of issues, including the ICTS
most integral to connected vehicles, the level of risk that may be
posed by transactions involving the identified connected vehicle
systems, the definition of connected vehicle, and approaches for how
the proposed rule could be most effective in risk mitigation.
Below, BIS addresses in more detail the key issues raised by the
comments received and describes how they were considered and, where
applicable, addressed in the proposed rule.
a. Definitions
In the ANPRM, BIS sought comments on the definition of the term
``connected vehicle,'' proposing to define it as ``an automotive
vehicle that integrates onboard networked hardware with automotive
software systems to communicate via dedicated short-range
communication, cellular telecommunications connectivity, satellite
communication, or other wireless spectrum connectivity with any other
network or device.'' Commenters offered differing views on BIS's
proposed definition with some, but not all, commenters agreeing that it
appropriately captured the platform BIS seeks to regulate.
Commenters that disagreed with BIS's proposed definition offered
several reasons. For example, many commenters viewed the term as overly
broad and noted that it failed to identify the specific types of
vehicles that would be captured by a regulation (e.g., commercial,
industrial, agricultural, rolling stock). Commenters also noted that
the phrase ``connected vehicle'' is an existing term of art within the
automotive industry referring to vehicles with external communication
capabilities, particularly in short-range communication. As an
alternative, some commenters suggested that BIS adopt the term
``networked vehicle'' to capture the ability of a vehicle to
communicate with networks or devices external to a vehicle while others
suggested the term ``software-defined vehicles'' which would encompass
the technologies and capabilities outlined in the ANPRM's proposed
connected vehicle definition while also capturing internal software
capabilities for functions within a vehicle beyond communication (e.g.,
starting a vehicle, malfunction checks, navigation).
After full consideration of each of the comments, BIS maintains the
use of the term ``connected vehicle'' in the proposed rule. However,
BIS proposes to narrow its definition to mean, ``[a] vehicle driven or
drawn by mechanical
[[Page 79091]]
power and manufactured primarily for use on public streets, roads, and
highways, that integrates onboard networked hardware with automotive
software systems to communicate via dedicated short-range
communication, cellular telecommunications connectivity, satellite
communication, or other wireless spectrum connectivity with any other
network or device. Vehicles operated only on a rail line are not
included in this definition.'' This definition captures the vehicles
that would be subject to the rule (e.g., passenger vehicles,
motorcycles, buses, small and medium trucks, class 8 commercial trucks,
recreational vehicles), while excluding those that pose a less acute
risk of data exfiltration, modification, or sabotage by foreign
adversaries. BIS further believes that the term connected vehicle, as
defined in this proposed rule, will capture future trends in vehicle
development, particularly as software comes to play a larger role in
vehicle operation. BIS emphasizes its belief that, with very few
exceptions, all new vehicles sold in the United States will be captured
by this definition. BIS seeks comment on this assessment. In the
interest of issuing a rule that is narrow, yet also would address the
risks posed by connected vehicles, BIS declines to extend this
definition to all ``rolling stock'' or unmanned aerial vehicles as
suggested by some comments, although BIS does not preclude the
possibility of addressing these vehicles in future regulation. BIS
believes that these sectors, to include vehicles operating on a rail
line, are materially different from the connected vehicle sector as
defined by this proposed rule, and capturing these vehicles in a
regulation primarily targeting wheeled on-road vehicles could lead to
unintended consequences and supply chain disruption.
A subset of commenters requested further clarity on what would
constitute an entity ``subject to the jurisdiction or direction'' of a
foreign adversary and expressed concerns that foreign subsidiaries of
U.S. businesses or foreign nationals working in the United States would
potentially be captured by this term. Others suggested that BIS should
ensure that the subsidiaries of companies located in foreign adversary
countries are captured by the proposed rule, even when the subsidiaries
are located in third countries outside the United States that are not
foreign adversaries, but supply entities within the United States.
After full consideration of the comments, BIS has adopted the
definition of a ``person owned by, controlled by, or subject to the
jurisdiction or direction of a foreign adversary'' to mean, (a) any
person, wherever located, who acts as an agent, representative, or
employee, or any person who acts in any other capacity at the order,
request, or under the direction or control, of a foreign adversary or
of a person whose activities are directly or indirectly supervised,
directed, controlled, financed, or subsidized in whole or in majority
part by a foreign adversary; (b) any person, wherever located, who is a
citizen or resident of a foreign adversary or a country controlled by a
foreign adversary, and is not a United States citizen or permanent
resident of the United States; (c) any corporation, partnership,
association, or other organization with a principal place of business
in, headquartered in, incorporated in, or otherwise organized under the
laws of a foreign adversary or a country controlled by a foreign
adversary; or (d) any corporation, partnership, association, or other
organization, wherever organized or doing business, that is owned or
controlled by a foreign adversary, to include circumstances in which
any person identified in paragraphs (a) through (c) possesses the
power, direct or indirect, whether or not exercised, through the
ownership of a majority or a dominant minority of the total outstanding
voting interest in an entity, board representation, proxy voting, a
special share, contractual arrangements, formal or informal
arrangements to act in concert, or other means, to determine, direct,
or decide important matters affecting an entity. BIS has also provided,
below in Section V, numerous non-exhaustive examples to explain how
this term will apply in various representative situations.
b. ICTS Supply Chain for Connected Vehicles
In the ANPRM, BIS sought comments on ``the ICTS supply chain for
Connected Vehicles in the United States,'' in order to better
understand the role played by persons owned by, controlled by, or
subject to the jurisdiction or direction of foreign adversaries within
it. Public comments broadly discussed the ICTS incorporated into
Connected Vehicles and noted the difficulty that manufacturers and
suppliers may face in conducting supply chain due diligence for the
purposes of complying with any potential final rule. Submissions
explained the complexity of ICTS systems contained within Connected
Vehicles and outlined several categories of technologies incorporated
into Connected Vehicles, including microcontrollers, applications
processors, analog products (e.g., power management integrated circuits
and transceiver physical layers), automotive software operating systems
(OS), automotive vision, light detection and ranging (LiDAR) systems,
radar, and other application software systems. Many commenters who
identified as OEMs also noted that they do not always know the source
of all inputs from hardware and software suppliers, making conducting
due diligence beyond tier one and tier two suppliers particularly
difficult. Moreover, submissions highlighted that suppliers are often
capable of updating the firmware on their components independently of
an OEM, further complicating efforts to understand which entities have
access to software and when such access occurs.
The comments received on this topic highlight the depth and
complexity of connected vehicle supply chains, indicating that it is
not always clear to OEMs which suppliers have access to connected
vehicle software and when they have access to it. As some commenters
pointed out, some of these technologies and their associated supply
chains are still in development and will grow even more complex as the
industry develops. Such existing and growing complexity, coupled with
the likelihood of ICTS that is designed, developed, manufactured, or
supplied by persons owned by, controlled by, or subject to the
jurisdiction or direction of a foreign adversary being incorporated
into connected vehicles, demonstrates the need for regulation to
protect U.S. national security. Such regulation will also incentivize
greater supply chain transparency for not only existing supply chains
but also for developing supply chains. To facilitate compliance, the
rule would include a delayed implementation timeline so that industry
can adjust their existing supply chains and plans for future supply
chains. BIS is not currently proposing specific due diligence
requirements. Instead, VCS hardware importers and connected vehicle
manufactures are given flexibility to provide evidence of compliance
efforts tailored to their unique operations. Such efforts could include
using third-party researchers or independently conducting supply chain
diligence.
Several commenters raised a variety of potential trade-related
concerns relating to this proposed rulemaking and other recent U.S.
government actions related to automotive trade involving the PRC. While
some commenters explicitly advocated for exclusionary tariffs on the
import of all
[[Page 79092]]
PRC vehicles into the United States, others cautioned BIS to avoid
creating unnecessary trade barriers when crafting a proposed rule. One
commenter specifically warned that BIS regulation of connected vehicle
software could amount to a digital trade barrier and urged BIS to avoid
certain policies such as data localization requirements, digital
service taxes, or forced code inspection. BIS underscores the U.S.
government's commitment to the trusted and secure flow of data across
borders. This proposed rule seeks to narrowly address, pursuant to E.O.
13873, the acute national security concerns posed by certain foreign
adversary ICTS in connected vehicle supply chains while minimizing any
unnecessary disruptions in manufacturing and trade. BIS has drafted
this proposed rule irrespective of any other automobile-related trade
actions taken by the U.S. government.
c. ICTS Most Integral to Connected Vehicles and Their Capabilities
In its ANPRM, BIS identified six systems (i.e., vehicle operating
systems (OS), telematics systems, Advanced Driver-Assistance System
(ADAS), Automated Driving Systems (ADS), satellite or cellular
telecommunications systems, and battery management systems (BMS)) that
it was considering identifying as the ICTS in Connected Vehicles most
likely to present undue or unacceptable risks if exploited by foreign
adversaries. BIS requested comment on the levels of risk associated
with these various ICTS as well as any additional ICTS that commenters
might consider integral to Connected Vehicles.
Commenters held differing views on which ICTS are integral to
connected vehicles and should be captured by the scope of a rule. For
example, whereas some commenters noted that ADAS present a low risk of
data exfiltration given that these systems often lack direct external
connectivity, others noted that such systems may nevertheless be
indirectly connected to external devices and systems (e.g.,
microcontrollers), thus offering indirect access to the data they
collect. As another example, while many commenters identified LiDAR
systems as a concern, there was disagreement about the nature of the
vulnerability posed by these systems. Some commenters noted that LiDAR
systems could be manipulated to cause grave harm (e.g., to ignore
pedestrians) given their instrumental role in vehicle guidance.
However, BIS's further technical analysis found that LiDAR generally
lacks the ability to transmit from the vehicle and does not, as a
standalone system, control the vehicle. Importantly, BIS notes that in
many cases, ADS exerts control over both LiDAR and the vehicle and thus
presents a higher risk. Other commenters pointed to the growing role of
mobile applications that allow drivers to access and control core
functions of the vehicle remotely (e.g., keyless driving). A number of
commenters also highlighted concerns related to aftermarket connected
devices. These devices, which often feature some forms of connectivity,
are introduced to the vehicle after manufacture and sale and may
contain vulnerabilities over which OEMs have little to no oversight.
Several submissions expressed a desire for BIS to tailor any
regulation as narrowly as possible, arguing that BIS should focus only
on those systems with direct connectivity to the connected vehicle or
the ability to transmit from the connected vehicle. Some commenters
pointed specifically to devices that connect to a vehicle's controller
area network (CAN) bus as posing a specific cybersecurity risk. Others
recommended that BIS should critically examine electric vehicle
charging infrastructure and associated technologies due to a potential
risk of exploitation by foreign adversaries. A few OEM commenters
ascribed the highest level of potential risk to ``finished'' or
``vertically integrated'' vehicles from suppliers with a foreign
adversary nexus that are operating in the United States. One commenter
pointed to ICTS components inside safety-critical systems (e.g.,
braking systems, steering systems, traction systems, battery-charging
and management systems, airbag systems) as posing greater levels of
potential risk. On the other hand, some commenters recommended that BIS
should aim to address the widest possible aperture of risk by
regulating a wide variety of the technologies enumerated in the ANPRM
along with additional technology categories (e.g., microcontrollers,
analog products).
Following consideration of these comments, BIS is proposing a rule
that aims to strike a balance between minimizing supply chain
disruptions and the need to address the national security risks posed
by Connected Vehicles. BIS proposes to achieve this balance by focusing
the rule only on those systems that most directly facilitate the
transmission of data both into and from the vehicle, rather than
focusing on all systems. Therefore, BIS is proposing to regulate
transactions involving two systems of ICTS integral to connected
vehicles, VCS and ADS. As further discussed below, in many cases, these
systems serve as controllers for subordinate systems within the
Connected Vehicle, like those highlighted in the ANPRM, making them a
target for exploitation related to data exfiltration or remote vehicle
manipulation. After reviewing comments, BIS has determined that
aftermarket telematics devices, including fleet tracking devices and
systems, that fulfill functions consistent with the definition of VCS
hardware are covered by this proposed rule.
Additionally, the proposed rule does not cover ICTS with the
function of enabling the transmission, receipt, conversion, or
processing of radio frequency communications at a frequency below 450
megahertz. Setting such a threshold enables BIS to capture those ICTS
that pose a higher risk due to their connectivity and transmission
functions, while lowering compliance burden by excluding from
regulation those ICTS with functions that pose a lower risk and offer
high utility to consumers (e.g., tire pressure monitoring systems,
electronic key fobs).
For similar reasons, BIS ultimately chose to exclude other systems
highlighted in the ANPRM--such as OS, ADAS, or BMS--from this proposed
rule unless they have VCS components and fall within the proposed
rule's definition of VCS hardware. For example, automotive software
systems like BMS and automotive OS do not have their own connectivity,
and require communication through a VCS, thereby making VCS a more
effective focus for rulemaking. BMS traditionally do not have their own
external wireless data link and instead rely on VCS for wireless
communication through a VCS. Likewise, automotive OS software, which
generally resides on an in-vehicle infotainment unit or centralized
head unit, are characterized by a wide diversity in architecture,
design, and supply chain among OEMs while also generally lacking their
own data link, instead relying on communication through a VCS. Given
how these systems are typically placed within connected vehicles and
the ways in which they achieve connectivity, BIS has chosen to focus on
the systems that ultimately facilitate the transmission of data both to
and from the vehicle as opposed to these subordinate systems.
Additionally, to reduce unnecessary economic impacts and supply
disruption, BIS is proposing to regulate ADS software rather than the
hardware components of ADAS and ADS. The hardware that enables ADAS and
ADS varies widely between different OEMs. In contrast, the hardware
that enables
[[Page 79093]]
VCS are relatively consistent across different automotive architectures
and designs. ADAS and ADS hardware encompasses a wide variety of
different sensors, distributed electronic control units (ECUs),
centralized computing units, actuators, and signaling units, among
others. These sensors and internal vehicle networking hardware rarely
have independent connectivity. Most, if not all, scalable cybersecurity
vulnerabilities to these systems are achieved by connectivity through
VCS systems. A rule that coherently and feasibly addresses these varied
supply chains would have disproportionate economic and supply chain
impacts relative to the reduction of national security risks. Further,
focusing on the ADS software supply chain appropriately mitigates the
national security risks that they present while limiting the supply
chain and economic impact. While BIS recognizes that the scope of data
captured by connected automotive systems is vast and that multiple
systems may pose national security risks, as discussed above, it has
decided to focus its current efforts on VCS hardware and covered
software. However, BIS does not foreclose the possibility of further
addressing other systems, including additional aspects of VCS and ADS,
in future regulation. BIS therefore also specifically seeks comment on
its determination that VCS and ADS are automotive ICTS integral to
Connected Vehicles and pose the greatest and most addressable national
security risk, and on its decision to focus this rule on those systems.
BIS also specifically seeks comment on whether any risks posed by other
connected vehicle ICTS should also be addressed in this rule.
d. Cybersecurity Best Practices
In the ANPRM, the Department requested comments regarding
cybersecurity concerns with the connected vehicle supply chain, as well
as standards, best practices, and norms that are relied upon and built
up by the connected vehicle industry. Commenters largely emphasized
that OEMs dedicate significant resources to bolstering the
cybersecurity of connected vehicle systems in addition to following or
conforming to relevant, established best practices and standards. Some
commenters referenced work by vehicle manufacturers to deploy advanced
encryption techniques as well as the importance of conducting thorough
testing on connected vehicle systems and components, to include
penetration testing, fuzz testing, and static code analysis. Others
identified specific techniques and best practices, including role-based
access controls. Among the best practices and standards most referenced
by commenters were the National Highway Traffic Safety Administration's
(NHTSA) Cybersecurity Best Practices for the Safety of Modern Vehicles,
International Organization for Standardization's (ISO) and SAE
International's standard ISO/SAE 21434, Institute of Electrical and
Electronics Engineers Standards Association's (IEEE) standard IEEE
1609.2, SAE J3061, and SAE J3161. At the international level,
commenters also referenced the United Nations Economic Commission for
Europe (UNECE) Regulations 155 (R155) and R156, which address whole-of-
vehicle and software update cybersecurity, respectively. One commenter
encouraged BIS to pay particular attention to R155 and R156 given the
standards' mandatory coverage in UNECE member states and their ability
to provide common best practices to vehicle manufacturers globally.
Many commenters underscored that security is a shared
responsibility between OEMs and cloud service providers (CSPs),
explaining that while CSPs manage the infrastructure layer, CSP
customers are responsible for implementing appropriate configurations
and controls in the cloud to protect their data. Commenters also
emphasized that practices for automotive cloud security and cloud data
access vary between OEMs and according to the specific contractual
terms between the OEM and CSP. Some submissions pointed to ISO's and
International Electrotechnical Commission's (IEC) standard ISO/IEC
27001 and third-party certifications and attestations, such as the
Cloud Security Alliance Cloud Controls Matrix, as models for cloud
security best practices and standards. With regard to electric vehicle
charging infrastructure, commenters pointed to ISO 15118, National
Institute of Standards and Technology's (NIST) Internal Report (IR)
8473, and German technical specification DIN 70121, but they emphasized
that specific practices vary according to OEM due to differing battery
types and configurations.
BIS acknowledges that cybersecurity standards and best practices,
particularly many of those mentioned in submissions, serve a crucial
function in promoting the safety and security of vehicles. While BIS
generally encourages the use of cyber security standards and best
practices, BIS also acknowledges that no standard BIS is aware of or
that was identified in comments--either currently in effect or under
development--would sufficiently mitigate the undue or unacceptable
risks posed by foreign adversary involvement in connected vehicle ICTS
supply chains as described in this proposed rule, even if widely
adopted by industry. The standards and guidance BIS reviewed are
primarily focused on hardening automotive systems from external access.
Standards and guidance alone are insufficient to address risks from
within the supply chain, as the systems are not, and cannot be hardened
against the OEM or tier 1 and 2 suppliers that have or maintain
privileged access to them. As a result, BIS is not proposing to adopt
cybersecurity standards and best practices as part of the rule but may
consider the scope and nature of their adoption on a case-by-case basis
as part of the Specific Authorizations process described in greater
detail below.
e. Authorizations and Mitigations
In the ANPRM, BIS sought comment on processes and mechanisms that
BIS could implement to authorize an otherwise prohibited transaction
with the adoption of mitigation measures. Commenters were generally
aligned regarding authorizations and potential mitigation schemes.
Several commenters requested that BIS adopt (1) an advisory opinion
program for connected vehicles; (2) a trusted trader program to
simplify compliance and avoid the complexity and uncertainty associated
with a licensing regime; and (3) a program allowing OEMs and suppliers
to self-certify compliance with the regulation. BIS has considered each
of the comments in full and is proposing an advisory opinion program;
procedures for VCS hardware importers and connected vehicle
manufacturers to submit Declarations of Conformity, which allow OEMs
and suppliers to self-certify their compliance with the regulation; as
well as procedures for VCS hardware importers and connected vehicle
manufacturers to determine eligibility for a General Authorization or
apply for a Specific Authorization. BIS is not proposing a trusted
trader program at this time because of the complexity, scale, and
opacity of existing connected vehicle supply chains, but may consider
establishing such a program to facilitate compliance as supply chains
evolve and welcomes comment on such a program as well as any other
alternate compliance mechanisms.
A significant portion of commenters raised and rejected data
localization requirements as a potential solution to the data
exfiltration concerns associated with connected vehicles. Instead, many
argued that data exfiltration concerns
[[Page 79094]]
could instead be mitigated by securing a demonstrated commitment to
privacy and security from OEMs and suppliers, primarily through the
adoption of industry cybersecurity best practices and standards. Some
commenters also pointed to company membership in the Automotive
Information Sharing and Analysis Center (Auto-ISAC) as another method
for entities to demonstrate commitment to cybersecurity best practices.
As discussed above, BIS has opted not to require adherence to any
specific standard or best practice as a prerequisite to securing an
authorization to engage in an otherwise prohibited transaction, but BIS
reserves the right to consider compliance with them on a case-by-case
basis in conjunction with other potential mitigations.
f. Economic Impacts
Comments generally agreed that prohibitions affecting a major
supplier of a component used in Connected Vehicles could result in
negative economic outcomes. Commenters raised several concerns,
including increased manufacturing costs for U.S. auto manufacturers
that would likely be passed onto consumers; a decline in long-term U.S.
competitiveness vis-[agrave]-vis foreign auto manufacturers;
disincentivizing further investment in connected vehicles and
autonomous vehicle research and development (R&D), potentially reducing
future employment in the U.S. auto industry; and a decline in the
safety and quality of connected vehicles available to U.S. consumers.
Several commenters also noted that regulation may have an outsized
impact on small businesses, which often lack the due diligence and
compliance resources of their larger competitors. To mitigate these
outcomes, several commenters requested substantial lead time for
manufacturers to identify and source from alternative suppliers.
Lastly, multiple submissions emphasized that not all components in
connected vehicles produced by entities owned by, controlled by, or
subject to the jurisdiction or direction of a foreign adversary
necessarily pose a cybersecurity or national security risk, especially
for components with minimal or no connectivity capability.
Following consideration of these comments, BIS proposes to allow
(1) until Model Year 2027, for connected vehicle manufacturers to come
into compliance for transactions involving covered software, (2) until
model year 2030, or January 1, 2029, for VCS hardware importers to come
into compliance for transactions involving VCS hardware; and (3) until
model year 2027 for connected vehicle manufacturers that are owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia to sell connected vehicles with VCS hardware and/or covered
software. Moreover, to address concerns about the resources small
businesses are able to devote to compliance, BIS is proposing a general
authorization that would permit certain small businesses to engage in
otherwise prohibited transactions. BIS also emphasizes that this rule
would narrowly target the specific automotive systems that pose the
greatest risk when designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of certain foreign adversaries. As such, the rule would not
broadly prohibit the import of connected vehicle technologies from
foreign adversary nations, nor would it require market participants to
alter supply chains for low-risk or unconnected components.
BIS believes that the implementation timeline strikes an
appropriate balance between minimizing significant disruptions to the
connected vehicles supply chain and mitigating the national security
risk posed by foreign adversary involvement in the connected vehicles
supply chain. Given the relatively limited amount of foreign adversary
linked hardware and software in U.S. vehicles today, the software
prohibitions proposed in this rule would address the most immediate
threats to U.S. national security while allowing industry time to come
into compliance with the prohibitions on VCS Hardware.
IV. Risks Associated With Vehicle Connectivity Systems and Automated
Driving Systems When Designed, Developed, Manufactured, or Supplied by
Persons Owned by, Controlled by, or Subject to the Jurisdiction or
Direction of the PRC and Russia
Following consideration of comments received on the ANPRM, and
further consideration of the risks and vulnerabilities associated with
various ICTS components that are critical to the operation of CVs, BIS
proposes to focus its rule on two integral ICTS systems--VCS and ADS--
when designed, developed, manufactured, or supplied by persons owned
by, controlled by, or subject to the jurisdiction or direction of two
foreign adversary entities--the PRC and Russia. Below, BIS further
explains its understanding of the undue and unacceptable risks
associated with these particular systems, and these particular foreign
adversaries, and seeks public comment on the systems and foreign
adversaries addressed in the proposed rule.
a. Vulnerabilities Associated With Vehicle Connectivity Systems and
Automated Driving Systems
1. Vehicle Connectivity Systems
The term VCS encompasses hardware and software systems--such as the
telematics control unit (TCU), cellular modems and antennas, and other
automotive components--that integrate various radio frequency
communication technologies and enable Connected Vehicles to access
external data sources, facilitate vehicle-to-vehicle communication, and
provide enhanced services to users through seamless connectivity
options. For example, as the primary automotive VCS component, a TCU
acts as the primary interface between the internal network and external
communication channels. It collects data from onboard sensors such as
GPS, accelerometers, gyroscopes, BMS, and other ECUs via wired networks
like CAN bus, LIN, FlexRay, Automotive Ethernet, K-Line, as well as
wireless protocols such as Bluetooth and Wi-Fi. Some systems use
cameras and microphones to facilitate facial recognition of drivers, or
to respond to voice commands of drivers. Once gathered, the TCU
converts this internal data into radio frequency signals suitable for
transmission over the chosen wireless protocol. In other words, as the
vast array of sensors on a connected vehicle collect information about
a driver's location, speed, voice patterns, battery state of charge, or
other vehicle diagnostic and operational information, the TCU converts
that data into a format that can be transmitted to systems outside the
vehicle and then enables that transmission.
While the increased degree of vehicle connectivity offers benefits
to both consumers and manufacturers, it also increases risks to
consumers and manufacturers due to the number of access points into the
internal vehicle network, each of which may present multiple new
software vulnerabilities for adversaries to exploit. See National
Renewable Energy Laboratory, ``Vehicle Cybersecurity Threats and
Mitigation Approaches,'' (Aug. 2019), https://www.nrel.gov/docs/fy19osti/74247.pdf. Such compromise of VCS software could occur at
various points of the software development lifecycle, including tool
development, source code repositories, open-source dependencies,
software updates, and shipment interdiction. For instance, Upstream's
2024 Global Automotive Cybersecurity Report documented a case
[[Page 79095]]
where security researchers installed malicious software on the VCS by
performing a simulated jailbreak attack of an OEM's VCS using a voltage
fault injection on the chip-maker's processor. This malicious software
unlocked vehicle manipulating features such as acceleration and heated
seats, provided access to private user data such as a user's phonebook
and calendar entries, and enabled decryption of encrypted Non-Volatile
Memory Express (NVMe) storage, manipulation of the car's identity, and
extraction of the vehicle-unique credential used for authenticating and
authorizing the OEM's internal service network. See Upstream, 2024
Global Automotive Cybersecurity Report (Feb. 2024), https://upstream.auto/reports/global-automotive-cybersecurity-report/. By
compromising software or its dependencies, malign actors may surveil,
disrupt, damage, or otherwise exploit the data or systems of those who
use the software. See National Counterintelligence and Security Center,
``Software Supply Chain Attacks,'' (Mar. 2021), https://www.dni.gov/files/NCSC/documents/supplychain/Software_Supply_Chain_Attacks.pdf.
The threat of such a cyber operation by malicious actors can grow
significantly when firmware or hardware components are intentionally
designed with vulnerabilities. Access to the hardware supply chain for
VCS provides an avenue for threat actors to manipulate or insert, with
malicious intent, hardware, or firmware modules into telematics
hardware components such as modems, Systems on Chip (SoC), Printed
Circuit Boards (PCB), central processing units, and antennae.
Manipulating or modifying hardware and associated firmware in the
supply chain could also allow foreign adversaries to insert a backdoor,
granting them control over the VCS. See Cybersecurity and
Infrastructure Security Agency, Defending Against Software Supply Chain
Attacks (April 2021), https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508.pdf,
and National Counterintelligence and Security Center, ``Software Supply
Chain Attacks,'' (Apr. 2023), https://www.dni.gov/files/NCSC/documents/supplychain/Software_Supply_Chain_Attacks.pdf">https://www.dni.gov/files/NCSC/documents/supplychain/Software_Supply_Chain_Attacks.pdf. For instance, cellular
and satellite telecommunications transceivers are pivotal connectivity
components in the VCS, utilizing radio frequency (RF) energy to
facilitate the transmission and reception of data between a vehicle and
the external world. If these transceivers are designed, developed,
manufactured, or supplied by persons owned by, controlled by, or
subject to the jurisdiction or direction of the PRC or Russia, such
actors would have the means and capability to introduce vulnerabilities
that could be exploited to intercept and/or compromise the information
exchanged between the connected vehicle and the external world.
2. Automated Driving Systems
The complexity of ADS software, the large foundation of data
sources, and the driving responsibilities inherent to ADS render it a
valuable target for exploitation. An ADS encompasses the upper end of
the spectrum of autonomy levels that dictate the vehicle's independence
and the extent of driver intervention required. As defined by the SAE
J3016, autonomy levels range from Level 0 (no automation) where the
driver controls all aspects of driving, to Level 5 (full automation)
where the vehicle can operate independently under all conditions
without human intervention. Levels 1 and 2 offer driver assistance
through systems that control either steering or acceleration and
braking, while Levels 3 through 5 (which generally comprise ADS)
progressively increase the system's responsibility for driving tasks,
with Level 4 requiring the ability to complete all driving functions
within defined operational design domains (ODDs). As the autonomy level
increases, the reliability and safety of the ADS become increasingly
reliant on the system's operational performance, safety protocols, and
cybersecurity measures. See Taxonomy and Definitions for Terms Related
to Driving Automation Systems for On-Road Motor Vehicles, SAE
International, (Apr. 2021), https://www.sae.org/standards/content/j3016_202104/.
An ADS must be able to execute Dynamic Driving Tasks (DDTs) within
specific ODDs. DDTs include critical tasks such as steering, braking,
acceleration, and Object and Event Detection, Classification and
Response (OEDR). OEDR enables an ADS to perceive and respond to
surrounding objects and events, a responsibility that shifts
progressively from the driver to the ADS itself as the degree of
vehicle autonomy increases. See Edward Griffor, David Wollman, and
Christopher Greer ``Automated Driving System Safety Measures Part 1:
Operating Envelope Specification,'' NIST Special Publication 1900-301
(2021), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1900-301.pdf.
An ADS relies on a large foundation of connected information
sources for decisions and outputs which in turn could create inherent
vulnerabilities. As a result, the complex software systems that drive
decisions for an ADS are valuable targets for malicious actors to
exploit. Software-based threats to Connected Vehicles equipped with an
ADS include manipulation of sensors to create phantom objects;
manipulation of ADS software to detect, capture, and retain information
about specific geographic areas or other sensitive data; or other
manipulation of sensor fusion processing software that could lead to
faulty and dangerous vehicle decision making, to include unauthorized
control over the Connected Vehicle. See National Counterintelligence
and Security Center, ``Autonomous Automotive Vehicle Supply Chain
Risk,'' (2022), https://www.dni.gov/files/NCSC/documents/supplychain/autonomous-vehicles-placemat-2022-D9A54B50-.pdf.
A compromised ADS creates opportunities for data exfiltration and
unauthorized vehicle manipulation due to the direct access it has to
the internal vehicle network (IVN). The IVN controls the communication
framework within a Connected Vehicle, overseeing the ECUs responsible
for engine control, traction control, door locks, climate control,
battery management, powertrain, airbags, cameras, and radar
functionalities. These ECUs also communicate via overlayed
communication networking protocols such as a CAN bus, Local
Interconnect Network (LIN), and ethernet. See Anastasios Giannaros, et
al. ``Autonomous Vehicles: Sophisticated Attacks, Safety Issues,
Challenges, Open Topics, Blockchain and Future Directions,'' Journal of
Cybersecurity and Privacy 3.3 (2023). Because ADS interacts with ECUs
through the IVN, a compromised ADS has the capability to execute
functions that affect nearly all of a Connected Vehicle's software and
hardware components. For example, an update to an ADS could alter the
outputs the ADS makes to a body control unit, enabling the ADS to
erroneously and dangerously open a vehicle's door while in motion.
Moreover, because many Connected Vehicles maintain their own networks
and actively scan their operating environment for other proximate
networks, an ADS can also potentially be used to impact the IVN of
other vehicles or transportation infrastructure networks through
vehicle-to-vehicle communication. See National
[[Page 79096]]
Counterintelligence and Security Center, Autonomous Automotive Vehicle
Supply Chain Risk, (Apr. 2022), https://www.dni.gov/files/NCSC/documents/supplychain/autonomous-vehicles-placemat-2022-D9A54B50-.pdf,
and Patrick Wagner, Nikolai Puch, and David Emeis, ``Cybersecurity risk
analysis of an automated driving system,'' Fraunhofer Institute AISEC,
(Oct. 2023), https://publica.fraunhofer.de/entities/publication/4d66e81e-3570-4c49-9f8c-8c9967a34ca6/details.
Given the significant processing power and complex decision-making
ability of an ADS, the risks arising from ADS designed, developed,
manufactured, or supplied by persons owned by, controlled by, or
subject to the jurisdiction or direction of a foreign adversary extend
beyond the IVN itself and can include risks to the fidelity and
integrity of data that flows to downstream or adjacent transportation
infrastructure. Foreign adversaries can corrupt ADS data by exploiting
existing vulnerabilities in ADS connectivity environments (see section
IV(b) below). As such, direct access to an ADS afforded to a malicious
actor through the design, development, manufacture, or supply of ADS
software has the potential to cause severe adverse consequences to U.S.
national security and U.S. persons.
b. Threats Associated With the PRC and Russia
The design, development, manufacture, or supply of certain VCS and
ADS components by persons owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia poses undue or
unacceptable risks to national security and U.S. persons. The PRC and
Russia have adopted political, legal, and regulatory regimes that
enable their governments to exercise direct and indirect ownership,
control, or influence over entities in the connected vehicle supply
chain. Unlike other foreign adversaries, the PRC and Russia also have
certain current and anticipated industrial capabilities and expertise
that uniquely position them within the global automotive market to pose
an outsized risk, particularly when paired with the vulnerabilities
present within certain connected vehicle systems.
1. PRC
The PRC's role in the U.S. connected vehicle supply chain presents
undue and unacceptable risks. The PRC has a large and growing
automotive sector with strong connections to non-PRC, including U.S.,
automakers providing it potential increased access to the U.S.
automotive market. Further, the PRC's automotive sector has historical
and ongoing links to the PRC military and is influenced by pervasive
government intervention, including through legal and regulatory
structures that increase government oversight of and control over PRC-
based companies and their foreign subsidiaries. See Du Xiaoying and
Wang Siyi, ``Dongfeng plays pivotal role in supporting China's
military,'' China Daily, (Sept. 25, 2015), https://www.chinadaily.com.cn/cndy/2015-09/25/content_21976945.htm, and Matthew
Funaiole et al., ``China Accelerates Construction of `Ro-Ro' Vessels,
with Potential Military Implications,'' Center for Strategic and
International Studies, (Oct. 2023), https://chinapower.csis.org/analysis/china-construct-ro-ro-vessels-military-implications/.
Moreover, the PRC possesses advanced cyber espionage capacities that it
exercises through both state and non-state cyber actors exacerbating
such risks.
First, the size and scale of state control in the PRC auto sector
poses outsized risks, increasing the vectors by which the national
security threats associated with Connected Vehicles can enter the
United States. The PRC automotive sector has played an important role
in its domestic industrial policy since 1986, when the sector was first
named a ``pillar industry'' in the Seventh Five-Year Plan. The
Fourteenth Five-Year Plan, the latest strategic framework for the PRC,
continues to prioritize the technology innovation and sustainable
development of the automobile market, including new energy vehicles and
connected vehicle software and hardware systems. See Ben Murphy,
``Outline of the People's Republic of China 14th Five-Year Plan for
National Economic and Social Development and Long-Range Objectives for
2035,'' Center for Security and Emerging Technology, (May 2021),
https://cset.georgetown.edu/wp-content/uploads/t0284_14th_Five_Year_Plan_EN.pdf. For many years, the state has pursued
a number of policies and practices to further its industrial policy
objectives in the automotive sector, including mandatory joint venture
requirements, foreign equity restrictions, massive subsidies and other
financial support measures, and various other preferences and
discriminatory policies and practices. The PRC automotive sector's
growth was also led in part by several prominent state-owned firms that
began as military equipment suppliers (e.g., Chang'an Automobile,
Changhe, Hunan Changfeng Motor) or have since risen to become prominent
state-owned firms (e.g., GAC Group, Chery Automobile Co.). See Mattias
Holweg, Jianxi Luo, and Nick Oliver, The past, present and future of
China's automotive industry: a value chain perspective, International
Journal of Technological Learning, Innovation and Development 2 (Feb.
2009), https://www.pure.ed.ac.uk/ws/portalfiles/portal/7765689/Oliver.pdf. In recent years, this growth and development has led to a
massive surge in domestic vehicle production, with Chinese vehicle
production increasing by 1.5 times over the 15-year span between 2008
and 2023. Indeed, in 2023, the PRC alone was responsible for nearly 33
percent of global passenger vehicle production. See VDA, Global
passenger vehicle production in 2023, by country [Graph], (Retrieved
July 23, 2024), https://www.statista.com/statistics/277055/global-market-share-of-regions-on-auto-production/, and OICA & Statista,
China's share in global vehicle production from 2008 to 2021 [Graph],
(Mar. 17, 2022), https://www.statista.com/statistics/233942/chinas-share-of-global-production-capacity-of-the-automobile-industry/. Amid
this significant growth in the PRC's domestic auto industry, Chinese
automakers, both state-owned and private firms, have leveraged their
significant state-backed support, including subsidies, to fuel a global
expansion that has seen Chinese automakers establishing foreign
operations in countries like South Africa, the Netherlands, Thailand,
Japan, and Brazil, among others, increasing the risks stemming from PRC
auto manufacturing in third countries. This expansion, combined with
recent investment announcements, has spurred concerns that Chinese
automakers may soon seek to further expand into the United States
either through exports or the establishment of additional manufacturing
facilities. Some PRC-based companies have announced plans to establish
manufacturing facilities in Mexico, which could enable them to receive
favorable trade terms contained in the U.S.-Mexico-Canada Agreement
(USMCA). Such a significant position within the global auto sector
greatly expands the number of potential nexus points between PRC
connected vehicle suppliers and U.S. automakers and U.S. consumers,
including indirectly through auto manufacturers in third countries.
[[Page 79097]]
Second, the military linkage between the PRC government and the
automotive sector continues to the current day with the PRC's military-
civil fusion strategy--which seeks to, among other goals, exploit
investment and innovation within the PRC's private sector to achieve
military modernization goals--and has prioritized specific information
and communication technologies that are integral to connected vehicle
supply chains (e.g., telecommunications, artificial intelligence). See
Ben Murphy, ``Outline of the People's Republic of China 14th Five-Year
Plan for National Economic and Social Development and Long-Range
Objectives for 2035,'' Center for Security and Emerging Technology (May
2021), https://cset.georgetown.edu/wp-content/uploads/t0284_14th_Five_Year_Plan_EN.pdf. Strategies to achieve these goals
include mandating collaboration between PRC-based companies and the
military and establishing public and private firms as vectors to
facilitate technology transfer, industrial espionage, and intellectual
property theft that would be advantageous for the PRC military. See
Office of the Dir. of Nat'l Intelligence, Annual Threat Assessment of
the U.S. Intelligence Community, (Feb. 6, 2023), https://www.odni.gov/files/ODNI/documents/assessments/ATA-2023-Unclassified-Report.pdf.
Third, even beyond military-civil fusion, the role of the PRC
government in the auto sector has only grown as government intervention
in the market increases, including through direct ownership of
prominent industry participants, the purchasing of so-called ``golden
shares'' to gain significant levels of influence within otherwise
private firms, embedding Chinese Communist Party (CCP) representatives
within corporate boards and management, and the forceful application,
or threat thereof, of the PRC's expanding security laws, including its
digital era legal structure. See Lingling Wei, ``China's New Way to
Control Its Biggest Companies: Golden Shares,'' Wall Street Journal
(Mar. 2023), https://www.wsj.com/articles/xi-jinpings-subtle-strategy-to-control-chinas-biggest-companies-ad001a63. Laws promulgated in
recent years provide the PRC government increased oversight and control
over PRC-based companies and their foreign subsidiaries, providing a
lever for influence over corporate operations that further exacerbates
the threat that the PRC poses to U.S. national security. These laws
require PRC-based companies, wherever located, to comply with certain
access and information requests upon demand from the PRC, and therefore
could be used by the PRC to obtain business or other data from PRC-
based companies involved in the connected vehicle supply chain.
Companies operating under these laws frequently highlight the lack of
transparency, consistency, clarity, and predictability of the
enforcement of these laws, publicly stating that PRC laws relating to
cybersecurity, data storage, or cryptography are not subject to the
same degree of judicial accountability as they might be in other
jurisdictions. In particular, BIS notes the PRC may utilize a suite of
national security laws (e.g., Counter-Espionage Law of the People's
Republic of China [promulgated by the Standing Committee of the
National People's Congress, Nov. 1, 2014, amended Apr. 26, 2023,
effective July 1, 2023]; National Security Law of the People's Republic
of China [promulgated by the Standing Committee of the National
People's Congress, July 1, 2015, effective July 1, 2015]; National
Intelligence Law of the People's Republic of China [promulgated by the
Standing Committee of the National People's Congress, June 27, 2017,
effective June 28, 2017, amended Apr. 27, 2018]; Anti-Terrorism Law of
the People's Republic of China [promulgated by the Standing Committee
of the National People's Congress, Dec. 27, 2015, effective Jan. 1,
2016, amended Apr. 27, 2018]) to compel companies, including those in
the connected vehicle supply chain, to support national security
efforts--which are more broadly defined in the PRC than in the United
States--or military agents upon request, including in some cases
through the creation of backdoors and security vulnerabilities in
products sold abroad, and in many cases, the PRC prohibits companies
from disclosing that such a request was made. See U.S. Department of
Homeland Security, ``Data Security Business Advisory: Risks and
Considerations for Businesses Using Data Services and Equipment from
Firms Linked to the People's Republic of China,'' (Dec. 2022), https://www.dhs.gov/sites/default/files/publications/20_1222_data-security-business-advisory.pdf. Additionally, PRC authorities have established a
regulatory system that effectively allows them to stockpile cyber
vulnerabilities. Entities subject to these regulations, including
automotive systems manufacturers, are required to report
vulnerabilities upon discovery to PRC authorities before patching them.
See Cyberspace Administration of China, ``Provisions on the Management
of Security Vulnerabilities of Network Products,'' (Jul. 2021), https://www.cac.gov.cn/2021-07/13/c_1627761607640342.htm. This requirement
drastically increases the ability of the PRC government and PRC-backed
cyber actors to take action against the United States using connected
hardware and its associated software by creating an accessible library
of known and potentially unpatched vulnerabilities. And fourth, the PRC
has demonstrated a high level of competency in cyber malfeasance. The
recent Volt Typhoon action exemplified how PRC cyber actors pre-
position themselves across U.S. critical infrastructure and military
assets in order to, at a potential future date, launch an attack and
impede U.S. decision making, induce social panic, and interfere with
the deployment of U.S. military forces. See Cybersecurity and
Infrastructure Security Agency, ``PRC State-Sponsored Actors Compromise
and Maintain Persistent Access to U.S. Critical Infrastructure,'' (Feb.
2024), https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a. A 2022 Annual Report to Congress by the U.S.-China Economic and
Security Review Commission found that the PRC's ability and willingness
to ``weaponize'' its own industries, particularly its cybersecurity
industry, grants the country an asymmetric advantage over the United
States; an argument that was further supported in reporting earlier
this year that detailed the methods by which known government-
affiliated cyber threat groups utilize private firms to carry out their
attacks. See U.S.-China Economic and Security Review Commission, ``2022
Annual Report to Congress,'' (Nov. 2022), https://www.uscc.gov/sites/default/files/2022-11/2022_Annual_Report_to_Congress.pdf; Christian
Shepherd et al., ``Leaked files from Chinese firms show vast
international hacking efforts,'' The Washington Post (Feb. 22, 2024),
https://www.washingtonpost.com/world/2024/02/21/china-hacking-leak-documents-isoon/. Additionally, a 2012 report from United States Senate
Permanent Select Committee on Intelligence examining the national
security risks posed by the PRC-based companies Huawei and ZTE
specifically argued that there are numerous opportunities for PRC-based
threat actors to insert malicious hardware or software components into
ICTS products throughout the product development stage. See Permanent
Select Committee on Intelligence, ``Investigative Report on the U.S.
[[Page 79098]]
National Security Issues Posed by Chinese Telecommunications Companies
Huawei and ZTE'' (Oct. 2012), https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/huawei-zte%20investigative%20report%20(final).pdf. This risk has not
diminished, as indicated by a study of designed vulnerabilities in
products conducted by the Georgetown Security Studies Review, which
outlines five years of persistent insertion of malicious code by PRC-
based threat actors. See Georgetown Security Studies Review, ``Flawed
by design electronics with pre-installed malware'' (May 2018), https://georgetownsecuritystudiesreview.org/2018/05/23/flawed-by-design-electronics-with-pre-installed-malware/. Given the above, the PRC's
access to the U.S. connected vehicle supply chain through its growing
automotive sector, military-civil fusion and other corporate governance
policies, and legal institutions paired with its development of mature
cyber espionage capabilities have increased the risk that the PRC could
alter the systems in, or obtain and manipulate information to or about,
market participants who use connected vehicle ICTS designed, developed,
manufactured, or supplied by persons owned by, controlled by, or
subject to the jurisdiction or direction of the PRC.
2. Russia
The Russian state has prioritized the growth of its automotive
manufacturing industry, instituted a legal and regulatory framework to
compel company data sharing with the state, and maintained a long
history of malicious cyber operations against the U.S. Under these
circumstances, there is an increasing likelihood that Russia emerges as
a supplier of connected vehicles technologies for the U.S. market,
providing the Russian government a means of exploiting U.S. connected
vehicles. Moreover, incorporating Russian hardware or software into the
U.S. connected vehicle supply chain poses undue and unacceptable risks
to U.S critical infrastructure and U.S. persons.
First, while Russia has historically been less active in the global
automotive sector than the PRC, the Russian government has recently
sought to revitalize its own domestic auto manufacturing industry
following the exodus of foreign automakers after the imposition of
significant additional sanctions in 2022. In 2024 alone, the Russian
auto market is projected to experience a 15 percent increase in
passenger vehicle sales, marking a noted uptick since the market
crashed following sanctions and some Russian auto manufacturers have
continued introducing new models even amid broader economic headwinds.
See Reuters, ``Russia's 2024 car sales forecast raised to 1.45 mln,
units, AEB says,'' (Jul. 2024), https://www.reuters.com/business/autos-transportation/russias-2024-car-sales-forecast-raised-145-mln-units-aeb-says-2024-07-03. The void left by many foreign firms has made
Russia a valuable export market for Chinese auto manufacturers seeking
to expand their presence globally with some Chinese auto brands seizing
significant market share from Russian competitors accounting for almost
56 percent of domestic auto sales in August 2023. See Gleb Stolayrov
and Alexander Marrow, ``Exclusive: Chinese car sales boom in Russia
levels off amid shaky local recovery,'' Reuters (Nov. 2023), https://www.reuters.com/business/autos-transportation/chinese-car-sales-boom-russia-levels-off-amid-shaky-local-recovery-2023-11-24/. In Russia, the
revitalization of the domestic economy, in particular the domestic auto
sector, has become a key focus of the government since the imposition
of sanctions in recent years. The Russian government has released
several plans pointing to a prioritization of the development of its
domestic automotive market with a particular focus on research and
development for new technology, including autonomous vehicles and V2X
vehicle connectivity systems. See Russian Federation, Order of the
Government of the Russian Federation of December 28, 2022 No. 4261-r On
Approval of the Strategy for the Development of the Automotive Industry
of the Russian Federation until 2035 (Jan. 4, 2023), https://www.garant.ru/products/ipo/prime/doc/405963861/#1000 and See Russian
Federation, Order of the Government of the Russian Federation of August
23, 2021 No. 2290-r On Approval of the Concept for the Development of
Electric Vehicle Production and the Transport Strategy of 2030, (2023),
https://static.government.ru/media/files/bW9wGZ2rDs3BkeZHf7ZsaxnlbJzQbJJt.pdf. The development of these
interlocking national transportation and automotive industry strategies
involved stakeholders from domestic automakers, technology sectors, and
the Russian government, illustrating a coordinated effort across the
Russian state and its domestic automotive industry. In order to extend
the reach of the state into the Russian auto industry, in February
2024, Russia established a state-owned corporation named Rosavto that
will act as liaison between government and industry and will develop
production plans for vehicles and automotive spare parts, oversee the
development of new models and technologies, and manage order
distribution, legislative initiatives, and workforce training. See
Eugene Gerden, ``New State Corporation to Oversee Russian Auto
Industry,'' Wards Auto (Feb. 2024), https://www.wardsauto.com/regulatory/new-state-corporation-to-oversee-russian-auto-industry.
Concerted efforts by the Russian government to grow the domestic
Russian automotive industry increase the likelihood that Russian-
manufactured VCS hardware or covered software will enter the U.S.
connected vehicle supply chain, which, as described below, would
present an undue or unacceptable risk to U.S. national security.
Second, like the PRC, the Russian government employs a suite of
laws that enable it to compel domestic companies with overseas
operations to provide data gleaned through foreign ventures or to
surrender similar operational assets to the Russian state. These laws
(e.g., Russian Law Federal Security Service No. 40-FZ, ``Operational-
Investigative Activity'' No. 144-FZ, 2014 Amdt. to No. 97-FZ) provide
the Russian government direct control over Russian corporations'
activities and facilities, including data or customer information, and
mandate that companies cooperate with assisting counterintelligence
actions as requested by the state, including the Federal Security
Service of the Russian Federation (FSB). The FSB can, in some cases,
mandate that companies allow the FSB to install equipment on their
infrastructure or collect data. Firms that are required to facilitate
this surveillance or intrusion activity can also be required to
actively obfuscate such requests and must provide the state with any
information essential to the decryption of any communications captured.
Together, these laws enable the Russian state to collect and exploit
sensitive data on or about U.S. persons via Russian businesses and,
should Russian companies become more prominent in the connected vehicle
supply chain, create a pathway by which the Russian government could
secure wide-ranging access to the vast amounts of data collected and
processed by Connected Vehicles in the United States. See internet
Governance, ``Report of Peter B. Maggs,'' (Dec. 2017), https://www.internetgovernance.org/wp-content/uploads/12-7-Exhibit-AR-Part-6-Maggs-report.pdf. Public reports have consistently raised concerns
about
[[Page 79099]]
Russian government laws concerning data collection, citing a lack of
appropriate safeguards to prevent misuse, to include judicial or public
oversight. More broadly, reports have repeatedly documented the uneven
application of the rule of law, lack of judicial accountability,
recurrent violations of judicial proceedings, and challenges with
judicial independence. See Justin Sherman, ``Russia is weaponizing its
data laws against foreign organizations,'' Brookings, (Sept. 2022),
https://www.brookings.edu/articles/russia-is-weaponizing-its-data-laws-against-foreign-organizations/; Evegeni Moyakine and A. Tabachnik,
``Struggling to strike the right balance between interests at stake:
The `Yarovaya', `Fake news' and `Disrespect' laws as examples of ill-
conceived legislation in the age of modern technology,'' Computer Law &
Security Review 40, (Apr. 2021), https://www.sciencedirect.com/science/article/pii/S0267364920301175.
Third, apart from the access codified in Russia's legal framework,
the country has a longstanding pattern of utilizing cyber operations to
gain illicit access to systems that advance the strategic ends of
Russian authorities. For example, in December 2020 the company
SolarWinds announced it was the target of a two-year-long cyber
operation perpetrated by Russian hackers in the Russian Foreign
Intelligence Services (SVR). See U.S. Securities and Exchange
Commission, ``SEC Charges SolarWinds and Chief Information Security
Officer with Fraud, Internal Control Failures,'' (Oct. 2023), https://www.sec.gov/newsroom/press-releases/2023-227. The perpetrators of the
SolarWinds supply chain attack used a software update to deliver its
malware to the platform's users after Russian intelligence services
obtained covert access to the computer systems on which the platform
was installed and ultimately impacted more than 18,000 users, including
more than 100 companies and nine U.S. Government agencies. This attack
credibly demonstrates how Russian actors can infiltrate global
enterprise systems via software updates and exemplifies how they could
similarly leverage software as a means to exploit connected vehicles in
the United States. Additionally, a 2023 Cyber Security Advisory
suggests that exploitation of information technology firms and their
software will continue to be a persistent tactic leveraged by the
Russian government to collect intelligence. See Joint Cyber Security
Advisory, ``Russian Foreign Intelligence Service (SVR) Exploiting
JetBrains TeamCity CVE Globally'' (Dec. 2023), https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a. BIS has further
identified Kaspersky Lab as an example of how Russia has leveraged
software companies to give it the ability to collect and weaponize the
personal information of Americans. See Bureau of Industry and Security,
``Final Determination: Case No. ICTS-2021-002, Kaspersky Lab, Inc.''
(Jun. 2024), https://www.federalregister.gov/documents/2024/06/24/2024-13532/final-determination-case-no-icts-2021-002-kaspersky-lab-inc.
These political, legal, and regulatory frameworks, combined with the
PRC's and Russia's demonstrated capability to exploit ICTS supply
chains through malicious cyber activity, exacerbate BIS's concern that
the threats posed by these foreign adversaries could be directed at the
U.S. connected vehicle supply chain, including integral systems such as
VCS and ADS. The persistent connectivity and software-driven
capabilities of VCS and ADS, combined with the vast amounts of data
that traverse these systems, make them valuable and likely targets for
the PRC and Russian governments to compromise.
c. Consequences
Taken together, VCS and ADS designed, developed, manufactured, or
supplied by persons under the ownership, control, jurisdiction, or
direction of the PRC or Russia manifest undue and unacceptable risks to
United States national security in several ways. If left unaddressed,
the interaction of threats and vulnerabilities could result in the
exfiltration of sensitive U.S. persons' data to foreign adversaries or
the remote or automated manipulation of Connected Vehicles by the PRC
and Russia, among other concerns.
First, the integration of compromised VCS or ADS into a completed
vehicle could undermine the reliability of a connected vehicle or its
underlying control systems. Compromised components in VCS or ADS could
result in increased frequency and severity of connected vehicle
malfunctions that could in turn detrimentally impact U.S. national
security, including the resiliency of U.S. critical infrastructure, or
the safety of U.S. persons.
Given the persistent connectivity of VCS and ADS and the essential
functions that they service in the operation of Connected Vehicles,
these systems, if compromised and co-opted by an adversary, could serve
as a node through which a foreign actor could probe or breach broader
ICTS systems within the United States. According to research by
Upstream, remote malicious cyber activities--which rely on network
connectivity (e.g., Wi-Fi, Bluetooth, 3/4/5G networks)--have increased
significantly in recent years and consistently outnumber malicious
cyber activities carried out through physical access to devices since
at least 2010, accounting for 95 percent of all malicious cyber
activities in 2023. See Upstream, Upstream's 2024 Global Automotive
Cybersecurity Report (2024), https://upstream.auto/reports/global-automotive-cybersecurity-report/. Considering the increasingly
sophisticated methodologies employed by foreign adversaries to gain
access to critical U.S. cyber infrastructure, compromised VCS and ADS,
with their inherent connectivity, would easily present another attack
surface for foreign adversaries to exploit. As detailed in the previous
analysis of vulnerabilities inherent in VCS, adversaries with access to
VCS, such as to telematics systems, could inject malicious code into a
vehicle's operational systems. Additionally, such malware could be
developed in such a way as to exploit vehicle connectivity to propagate
itself across multiple systems as the vehicle travels and connects to
those discrete systems. In this way, not only would the ICTS integral
to Connected Vehicles be compromised, but vehicle systems could be
exploited to spread malware with the intent of harming all ICTS systems
to which a vehicle connects. See Anastasios Giannaros, et al.
``Autonomous Vehicles: Sophisticated Attacks, Safety Issues,
Challenges, Open Topics, Blockchain and Future Directions,'' Journal of
Cybersecurity and Privacy 3.3 (2023).
Second, as discussed, both VCS and ADS have significant control
over and access to critical vehicle functions, including steering,
braking, speed control, ignition, and almost all other mechanical
functions of the vehicle. Such extensive control over vehicle
operations could enable a foreign adversary to use a compromised VCS or
ADS component to hamper vehicle functions or even to manipulate a
connected vehicle for malicious purposes. As VCS and ADS control or
link to integral vehicle functions, a foreign adversary could even
exploit compromised VCS or ADS components to impair or disable a
connected vehicle while in transit. Disabled, impaired, or otherwise
improperly functioning vehicles could result in grave damage or
impediment to critical infrastructure within the United States, or in
physical harm to U.S. persons. A disabled, impaired, or erratically
functioning
[[Page 79100]]
Connected Vehicle, or potentially multiple Connected Vehicles all
experiencing such problems simultaneously, could result not only in
traffic patterns that would effectively block critical transportation
arteries, but could cause collisions ultimately damaging transportation
features (e.g., roadways, bridges, tunnels) and energy,
telecommunications, and similar infrastructure situated near
transportation systems. The potential consequences of widespread
connected vehicle impairment could be particularly acute if the targets
were fleet vehicles operating in support of infrastructure vital to
transportation, energy, water, waste, telecommunications, and other
essential services.
The risks to the resiliency of critical U.S. infrastructure posed
by connected vehicle components designed, developed, manufactured, or
supplied by persons that are owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia are further compounded
by the potential for VCS and ADS to collect data on infrastructure.
Advances in VCS and ADS necessitate increasingly cutting-edge sensor
suites incorporating radar, LiDAR, camera, sonar, and computer vision
to gather information on the surrounding environment for both onboard
computing and remote cloud computing to process data in informing
vehicle operating decisions. This vast wealth of data, collected over
time by multiple vehicles likely contains valuable information such as
location data about critical U.S. infrastructure. For example, data
gathered from GPS/GNSS systems in a connected vehicle could be cross-
referenced and collated with a multitude of other data to produce
information about the location, function, and operational trends of
various transportation, energy, or other critical infrastructure. A
foreign adversary could extract such critical infrastructure data using
its control over designers, developers, manufacturers, or suppliers of
VCS and ADS components subject to the foreign adversary's ownership,
control, jurisdiction, or direction, thereby increasing the risk and
precision of attacks on such critical infrastructure.
Finally, given the volume of information collected by vehicles to
support VCS and ADS operation, exploitation of these systems could
enable an adversary to cull a tremendous amount of data on vehicle
movement across the United States. This information could potentially
include data generated on or from fleet vehicles used by emergency
response, law enforcement, or the military. This data, and particularly
all metadata and derived data that can be drawn from the raw data, can
provide considerable insight into fleet size, composition, and
capabilities, as well as information on organizational response times
and response procedures. Such information would prove valuable to an
adversary seeking to disrupt U.S. emergency response operations. Any
potential risks to U.S. national security arising from disrupting
emergency response activities are further compounded by the potential
for an adversary to exploit access to VCS and ADS to leverage the
persistent connectivity required for malign operations, including
exploits to trigger improper engine shutdown, brake activation, or
electrical system deactivation. Any of these actions have serious
consequences for U.S. persons' health and safety. The PRC or Russia
could use similar methods to target U.S. persons other than
institutions, thereby imperiling the safety and security of individual
U.S. citizens or residents. VCS and ADS, if corrupted by the producer
at the direction of a foreign adversary, could improperly access driver
mobile devices to collect, exfiltrate, and exploit personally
identifiable information (PII) or even protected health information
(PHI). It is also possible that a foreign adversary could use covert
access to VCS and ADS to provide false or misleading information to a
driver, causing degraded and dangerous vehicle operation conditions.
Such tactics could be used either indiscriminately to sow panic and
cause disruption, or to intentionally target specific drivers.
Additionally, and as noted by the Office of the Director of National
Intelligence in the 2024 National Counterintelligence Strategy, foreign
adversaries, like the PRC and Russia, view this kind of PII and PHI as
particularly valuable as it provides them ``not only economic and R&D
benefits, but also useful [counterintelligence] information, as hostile
intelligence services can use vulnerabilities gleaned from such data to
target and blackmail individuals.'' See The Director of Nat'l
Intelligence, 2024 National Counterintelligence Strategy (Aug. 2024),
https://www.dni.gov/files/NCSC/documents/features/NCSC_CI_Strategy-pages-20240730.pdf.
Even when such systems are not subject to compromise, companies
owned by, controlled by, or subject to the jurisdiction or direction of
a foreign adversary, if occupying certain positions within the supply
chain, may potentially legally gain access to their users' personal
data. For example, one prominent Chinese auto manufacturer with
operations in the United States publicly states in its U.S. privacy
policy that the personal data it may collect (e.g., identifiers,
customer records information, internet or other electronic network
activity information, geolocation information, professional or
employment-related information) is only stored in the United States
``in principle,'' but goes on to note that personal data ``may be
transferred to our headquarters in China'' for processing and storage.
While the incorporation in the U.S. supply chain of VCS hardware and
covered software designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia poses one type of risk, transactions
involving VCS hardware and covered software pose a separate risk when
the connected vehicle manufacturer is, itself, owned by, controlled by,
or subject to the jurisdiction or direction of the PRC or Russia, even
when the connected vehicle manufacturer is located in the United
States. connected vehicle manufacturers have privileged and direct
access to all systems in the vehicle, including the VCS hardware and
covered software. Not only are VCS hardware and covered software built
to the connected vehicle manufacturers' specifications but prior to the
sale of a completed connected vehicle, connected vehicle Manufacturers
are able to exercise significant levels of control over that VCS
hardware and covered software with little to no external oversight
prior to the sale of the completed connected vehicle. Based on the
foregoing, BIS assesses that ICTS transactions involving VCS hardware
or covered software designed, developed, manufactured, or supplied by
persons owned or controlled by, or subject to the jurisdiction or
direction of the PRC or Russia--including transactions to supply the
VCS hardware or covered software into the United States market as part
of the sale of the completed connected vehicle--present undue or
unacceptable risks to the national security of the United States within
the meaning of E.O. 13873. BIS welcomes comment on the vulnerabilities
and risks it has identified.
V. Discussion of the Proposed Rule and Request for Comments
BIS proposes a regulation that would--absent a general or specific
authorization otherwise--(1) prohibit VCS hardware importers from
knowingly importing into the United
[[Page 79101]]
States certain hardware for VCS; (2) prohibit connected vehicle
manufacturers from knowingly importing into the United States completed
connected vehicles incorporating covered software; (3) prohibit
connected vehicle manufacturers from knowingly selling within the
United States completed connected vehicles that incorporate covered
software; and (4) prohibit connected vehicle manufacturers who are
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia from knowingly Selling in the United
States completed connected vehicles that incorporate VCS hardware or
covered software (collectively, ``Prohibited Transactions''). These
prohibitions would apply to transactions when such VCS hardware or
covered software is designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia.
BIS anticipates that this rule would primarily impact market
participants who could be considered VCS Hardware Importers or
connected vehicle manufacturers, such as OEMs and importers of
completed connected vehicles, as well as Tier 1 and Tier 2 suppliers of
VCS Hardware. For these entities, three compliance mechanisms--
Declarations of Conformity, general authorizations, and specific
authorizations--are available, depending on whether the VCS hardware
importer or connected vehicle manufacturer wishes to engage in an
otherwise prohibited transaction. Importantly, because VCS hardware
importers and connected vehicle manufacturers frequently offer many
different types of products, any one of the three mechanisms may not be
available for their entire business. Rather, depending on the product,
VCS hardware importers and connected vehicle manufacturers could be
required to use a combination of these three mechanisms to meet their
obligations under the rule.
First, Declarations of Conformity would have to be submitted to BIS
by VCS hardware importers and connected vehicle manufacturers who have
not engaged in a prohibited transaction, unless otherwise specified.
Such VCS hardware importers and connected vehicle manufacturers would,
in this Declaration of Conformity, certify, once per calendar year or
model year (or whenever material changes occur) to BIS that the
submitter has not engaged in a prohibited transaction and provide
certain information on the import of VCS hardware and/or the import or
sale of completed connected vehicles.
Second, a general authorization could be available for VCS hardware
importers and/or connected vehicle manufacturers seeking to engage in
an otherwise prohibited transaction, depending on the circumstances. A
general authorization would allow the VCS hardware Importer and/or
connected vehicle manufacturer to engage in the otherwise prohibited
transaction, without the need to notify or seek approval from BIS.
General authorizations would be available only in a narrow set of
circumstances in which the conditions of the otherwise prohibited
transaction appropriately mitigate the level of risk associated with
the particular transaction. Such conditions would include, for example,
when VCS hardware is imported from the PRC or Russia solely for testing
purposes, or where the completed connected vehicle that incorporates
VCS hardware or covered software from the PRC or Russia will be driven
on public roads for fewer than 30 calendar days per year. Those
availing themselves of a general authorization would be required to
continuously monitor their use of the VCS hardware or completed
connected vehicles covered by the General Authorization to ensure the
authorization still applies. If a change would render the transaction
ineligible for a general authorization, such as a change in the
vehicle's use, the VCS hardware importer or connected vehicle
manufacturer would be required to apply for a specific authorization
and to cease engaging in such transaction unless and until a Specific
Authorization is granted. For example, if a completed connected vehicle
that incorporates covered software or VCS Hardware that is designed,
developed, manufactured, or supplied by a person owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia is
no longer used solely for display, research, or testing, the VCS
hardware importer or the connected vehicle manufacturer would be
required to seek a specific authorization. Similarly, if the VCS
Hardware Importer or connected vehicle manufacturer meets or exceeds
total model year production of 1,000 units, or if a completed connected
vehicle that incorporates covered software or VCS hardware that is
designed, developed, manufactured, or supplied by a person owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia is to be used on public roadways for 30 or more days in any
calendar year, the VCS hardware importer or connected vehicle
manufacturer would be required to seek a specific authorization from
BIS.
Lastly, for VCS hardware importers and connected vehicle
manufacturers who wish to engage in a prohibited transaction, but do
not otherwise qualify for a general authorization, a specific
authorization from BIS would be required before they could proceed with
the prohibited transaction. A specific authorization would only be
available in circumstances where BIS determines, based on the
information submitted by the applicant and other collected information,
that the otherwise prohibited transaction does not present an undue or
unacceptable risk to U.S. national security. However, as a condition of
approving the specific authorization, BIS might impose certain
requirements and mitigation measures upon the VCS hardware importers
and connected vehicles manufacturers seeking to proceed with the
prohibited transaction.
VCS hardware importers and connected vehicle manufacturers could
appeal to the Under Secretary for Industry and Security (Under
Secretary) any decision by BIS to deny an application for a Specific
Authorization, suspend or revoke a previously granted specific
authorization, or issue a written notification that a VCS hardware
importer or connected vehicle manufacturer is ineligible for a general
authorization. Further, the regulation would establish a method for VCS
hardware importers and connected vehicle Manufacturers to seek guidance
from BIS, in the form of advisory opinions, on prospective transactions
that may be prohibited. BIS also proposes to establish a process
through which BIS may inform VCS hardware importers or connected
vehicle manufacturers that certain of their activities could constitute
a prohibited transaction.
In proposing this rule, BIS recognizes that Section 203(b) of
IEEPA--i.e., the ``Berman Amendment''--limits the scope of the
authority to regulate or prohibit transactions relating to
``information'' or ``informational materials.'' In relevant part, the
Berman Amendment states that the ``authority granted to the President
by this section does not include the authority to regulate or prohibit,
directly or indirectly . . . the importation from any country, or the
exportation to any country, whether commercial or otherwise, regardless
of format or medium of transmission, of any information or
informational materials, including but not limited to, publications,
films, posters, phonograph
[[Page 79102]]
records, photographs, microfilms, microfiche, tapes, compact disks, CD
ROMs, artworks, and newswire feeds.'' 50 U.S.C. 1702(b)(3). Consistent
with the statute's text and purpose, as demonstrated by legislative
history and context, as well as judicial interpretations, BIS
understands the phrase ``information or informational materials'' to
refer to expressive materials and mediums that may be carrying such
expressive content. See, e.g., United States v. Amirnazmi, 645 F.3d
564, 586-87 (3d Cir. 2011). Accordingly, the Berman Amendment prevents
BIS from regulating, directly or indirectly, the import or export of
expressive materials. It does not, however, prevent BIS from imposing a
regulation that is aimed at the functional capabilities of technology.
The proposed rule is consistent with the Berman Amendment. Its
purpose is to regulate transactions involving certain hardware and
software based on functional capabilities that can be exploited by
foreign adversaries, not the exchange of ideas and expression that the
Berman Amendment protects. As discussed in Section IV, VCS Hardware and
covered software process and transmit data such as geolocation
information or systems diagnostics reports, which are used to monitor
and control the vehicle's safe operation, and that a foreign adversary
could also manipulate in ways that could impair or disable the
vehicle's function, leading to dangerous outcomes that pose a harm to
U.S. national security. Similarly, the functional data collected by
Covered Software--such as high-definition mapping data of
infrastructure and roadways--would pose serious risks to that critical
infrastructure if collected and exploited by a foreign adversary. As a
result, BIS has determined that the proposed prohibitions in this rule
are consistent with the Berman Amendment, which was intended to protect
materials involving the free exchange of ideas from regulation under
IEEPA. BIS is considering whether and how to address the term
``information or informational materials'' within the context of the
proposed rule and may consider further changes to the final rule to
reflect our interpretation of this term. BIS welcomes comment on this
issue.
Each section of the proposed rule is discussed below. BIS invites
comments on all aspects of this proposed rule.
a. Definitions
1. Automated Driving System (ADS)
BIS proposes to define ``Automated Driving System'' to mean
hardware and software that, collectively, are capable of performing the
entire dynamic driving task for a completed connected vehicle on a
sustained basis, regardless of whether it is limited to a specific ODD.
This definition is consistent with the terminology industry uses for
systems that operate at certain advanced levels of autonomy. It is also
consistent with definitions issued by NHTSA. Specifically, this
definition corresponds to automation levels 3, 4, and 5 as defined by
SAE International standard J3016.
2. Completed Connected Vehicle
BIS proposes to define ``completed connected vehicle'' to mean a
connected vehicle that requires no further manufacturing operations to
perform its intended function. This definition is consistent with
definitions issued by NHTSA. Additionally, for the purposes of this
proposed definition, the integration of an ADS into a connected vehicle
constitutes a manufacturing operation for a Completed Connected
Vehicle. BIS intends this caveat to clarify that a person owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia, whose sole manufacturing or assembly operation is
integrating ADS into an otherwise Completed Connected Vehicle, would be
subject to the prohibitions in the rule and would need to obtain a
Specific Authorization before importing or Selling that completed
connected vehicle in the United States.
3. Connected Vehicle
BIS proposes to define ``connected vehicle'' to mean a vehicle
driven or drawn by mechanical power and manufactured primarily for use
on public streets, roads, and highways, that integrates onboard
networked hardware with automotive software systems to communicate via
dedicated short-range communication, cellular telecommunications
connectivity, satellite communication, or other wireless spectrum
connectivity with any other network or device. Vehicles operated only
on a rail line are not included in this definition. This definition
incorporates the suggestions of commenters to the ANPRM, many of whom
requested that the definition of connected vehicle specify the types of
vehicles that would be covered.
4. Connected Vehicle Manufacturer
BIS proposes to define a ``connected vehicle manufacturer'' to mean
a U.S. person (1) manufacturing or assembling completed connected
vehicles in the United States; and/or (2) importing completed connected
vehicles for Sale in the United States.
5. Covered Software
BIS proposes to define ``covered software'' to mean the software-
based components, in which there is a foreign interest, executed by the
primary processing unit of the respective systems that are part of an
item that supports the function of VCS or ADS at the vehicle level.
covered software does not include firmware, which is characterized as
software specifically programmed for a hardware device with a primary
purpose of controlling, configuring, and communicating with that
hardware device. At a minimum, this definition of covered software
would include operating systems such as a real-time operating system
(RTOS), and general-purpose operating systems. An example of covered
software within the ADS is, if included in the system, the machine
learning software that performs the functions of object detection,
classification, and decision making.
Covered software does not include open-source software. BIS
understands open-source software as software that can be freely used,
modified, and distributed by anyone, with both access to the source
code and the ability to contribute to the software's development and
improvement. Given these qualities of open-source software, it is not
designed, developed, manufactured, or supplied by any attributable
entity. Therefore, the inclusion of open-source software as a component
of covered software is not subject to prohibition. However, if licensed
open-source software is modified to create proprietary enterprise
software for a specific use not meant for redistribution, the resulting
software could be subject to prohibition if the person modifying the
open-source software is owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia. In addition to other
aspects of this proposed rule, BIS specifically seeks comment on this
definition.
6. FCC ID Number
BIS proposes to define ``FCC ID Number'' as the unique alphanumeric
code identifying a product subject to certification by the Federal
Communications Commission (FCC) composed of a (1) grantee code and (2)
product code.
7. Foreign Interest
For the purposes of this rule, BIS is considering ``foreign
interest,'' when used with respect to property, as any
[[Page 79103]]
interest in property, of any nature whatsoever, whether direct or
indirect, by a non-U.S. person. Under this definition, a foreign
interest can include, but is not limited to, an interest through
ownership, intellectual property, contract--e.g., ongoing supply
commitments such as maintenance, any license agreement related to the
use of intellectual property--profit-sharing or fee arrangement, as
well as any other cognizable interest. This definition is consistent
with the definition of ``interest'' used in the context of Office of
Foreign Asset Control sanctions, which are, in relevant part, also
established pursuant to the statutory requirements of IEEPA. See 31 CFR
Chapter V, and, e.g., 31 CFR 510.313, 535.312.
Consistent with IEEPA, BIS proposes to regulate only transactions
involving property in which a foreign country or national thereof has
any such interest. A transaction would be subject to the prohibitions
in the proposed rule only if it involves ICTS, specifically VCS
hardware or covered software, that is designed, developed,
manufactured, or supplied by a person owned by, controlled by, or
subject to the jurisdiction or direction of the PRC or Russia. VCS
hardware importers and connected vehicle manufacturers wishing to
engage in transactions that this rule proposes to prohibit would need
to qualify for a general authorization or obtain a specific
authorization. In order to provide sufficient visibility into the
supply chains of VCS Hardware and covered software including to verify
that the transaction does not involve VCS Hardware or covered software
that is designed, developed, manufactured, or supplied by a person
owned by, controlled by, or subject to the jurisdiction or direction of
the PRC or Russia (see Section V(c) of this notice and proposed Section
791.305), BIS is proposing to require that VCS hardware importers and
connected vehicle manufacturers that import VCS hardware, or import or
sell completed connected vehicles that contain covered software in
which there is any other foreign interest, submit an annual Declaration
of Conformity containing relevant details about the import or Sale. BIS
seeks comment on this regulatory approach, including the necessity and
efficacy of requiring Declarations of Conformity with respect to VCS
hardware and covered software in which there is a foreign interest,
though not a foreign adversary interest. BIS also seeks comment on the
availability and efficacy of any alternative approach that would
require a narrower set of VCS hardware importers and completed
connected vehicle manufacturers to submit Declarations of Conformity,
while still achieving the goals of the Declaration of Conformity
requirement and addressing the declared emergency under Executive Order
13873.
With respect to VCS hardware that is designed, developed,
manufactured, or supplied by a person owned by, controlled by, or
subject to the jurisdiction or direction of the PRC or Russia, BIS
proposes to regulate the importation of VCS hardware, making VCS
hardware importers responsible for compliance.
With respect to Covered Software, based on discussions with
connected vehicle manufacturers, automotive suppliers, and other
stakeholders, BIS has come to understand that typically, ADS and VCS
software are designed or developed to a connected vehicle
manufacturer's specifications. ADS and VCS software is frequently
designed, developed, or supplied by foreign persons, and those persons
frequently retain a legally cognizable interest in the underlying
software, even after it has been integrated into the connected vehicle.
For example, foreign software developers may earn profits from use of
their software; retain data access and sharing rights to the software;
or have obligations to maintain and update the software. Such
arrangements are among the types of interests that BIS contemplates as
giving rise to an obligation to submit a Declaration of Conformity or,
if the software designer, developer, or supplier is a person owned by,
controlled by, or subject to the jurisdiction or direction of a foreign
adversary, to qualify for a General Authorization or seek a Specific
Authorization under the proposed rule. BIS therefore proposes to
regulate covered software by regulating the importation or sale of
completed connected vehicles, making connected vehicle Manufacturers
responsible for compliance. BIS seeks comment on this understanding of
foreign interests in covered software as well as other arrangements in
which foreign designers, developers, or suppliers of covered software
retain a cognizable legal interest in the software after it is
integrated into a connected vehicle.
Finally, in addition to the general regulations related to VCS
hardware and covered software described above, with respect to
connected vehicle manufacturers who are owned by, controlled by, or
subject to the jurisdiction or direction of the PRC or Russia, BIS
additionally proposes to regulate VCS hardware and covered software by
regulating the sale of completed connected vehicles that incorporate
VCS hardware or covered software. In this circumstance, BIS understands
from extensive engagement with connected vehicle manufacturers and
automotive suppliers that persons who own, control, or direct the
operations of the connected vehicle manufacturer would maintain an
interest in the vehicle transactions that the connected vehicle
manufacturer carries out. For example, this could include, but is not
limited to, profit sharing agreements between a parent company and its
U.S. subsidiary, or data sharing agreements between the same. BIS
understands this to be standard for the automotive industry and would
welcome comments on this issue. Additionally, because the PRC and
Russian legal regimes discussed in Section IV of this notice could
compel a PRC or Russia-based parent company of a connected vehicle
manufacturer to provide those governments with information on or access
to the operations of the U.S.-based connected vehicle manufacturer, BIS
understands that the foreign parent company typically retains a legal
right to access the data collected by the U.S. subsidiary, representing
a foreign interest in that U.S. subsidiary and its connected vehicle
sales.
BIS seeks comment on the nature of foreign interests in
transactions related to the connected vehicle supply chain, including
as described in the prohibitions outlined herein. BIS also seeks
comment as to its understanding of the nature and presence of a Foreign
Interest in property subject to the prohibitions described above, as
well as whether there are other types of transactions that would
involve Foreign Interests, as described above.
8. Hardware Bill of Materials
BIS proposes to define ``Hardware Bill of Materials'' or HBOM as a
comprehensive list of parts, assemblies, documents, drawings, and
components required to create a physical product. This term includes
information identifying the manufacturer, related firmware, technical
information, and descriptive information.
9. Import
BIS proposes to define ``import'' to mean, with respect to any
article, the entry of such article into the United States Customs
Territory. It does not include admission of an article from outside the
United States into a foreign-trade zone for storage pending further
assembly in the foreign-trade zone, or
[[Page 79104]]
shipment to a foreign country. This definition only applies to subpart
D of 15 CFR part 791.
10. Item
BIS proposes to define ``item'' as a component or set of components
with a specific function at the vehicle level. A system may also be
considered an item if it implements a function. This definition is
consistent with ISO/SAE Standard 21434.
11. Knowingly
BIS proposes to define ``knowingly'' to have the same meaning given
to ``knowledge'' in the Export Administration Regulations (15 CFR
772.1). Knowledge of a circumstance (the term may be a variant, such as
``know,'' ``reason to know,'' or ``reason to believe'') includes not
only positive knowledge that the circumstance exists or is
substantially certain to occur, but also an awareness of a high
probability of its existence or future occurrence. Such awareness is
inferred from evidence of the conscious disregard of facts known to a
person and is also inferred from a person's willful avoidance of facts.
12. Model Year
Consistent with the definition used by NHTSA, BIS proposes to
define ``model year'' as the year used to designate a discrete vehicle
model, irrespective of the calendar year in which the vehicle was
actually produced, provided that the production period does not exceed
24 months. Throughout this proposed rule, BIS refers to both calendar
year and model year when referring to the import of VCS Hardware,
particularly for the submission of Declarations of Conformity (791.305)
and the implementation timeline (791.308 (Exemptions)). BIS generally
understands that most VCS hardware is imported into the United States
already destined for a known, specific model year of vehicle. BIS also
understands that some VCS hardware units may be imported without being
associated with a specific vehicle model year. As such, the proposed
rule provides separate timelines for each of these cases to accommodate
business timelines for VCS hardware importers. BIS is particularly
interested in comment on this approach.
13. Person Owned by, Controlled by, or Subject to the Jurisdiction or
Direction of a Foreign Adversary
BIS proposes to define ``person owned by, controlled by, or subject
to the jurisdiction or direction of a foreign adversary'' to mean, (a)
any person, wherever located, who acts as an agent, representative, or
employee, or any person who acts in any other capacity at the order,
request, or under the direction or control, of a foreign adversary or
of a person whose activities are directly or indirectly supervised,
directed, controlled, financed, or subsidized in whole or in majority
part by a foreign adversary; (b) any person, wherever located, who is a
citizen or resident of a foreign adversary or a country controlled by a
foreign adversary, and is not a United States citizen or permanent
resident of the United States; (c) any corporation, partnership,
association, or other organization with a principal place of business
in, headquartered in, incorporated in, or otherwise organized under the
laws of a foreign adversary or a country controlled by a foreign
adversary; or (d) any corporation, partnership, association, or other
organization, wherever organized or doing business, that is owned or
controlled by a foreign adversary, to include circumstances in which
any person identified in paragraphs (a) through (c) possesses the
power, direct or indirect, whether or not exercised, through the
ownership of a majority or a dominant minority of the total outstanding
voting interest in an entity, board representation, proxy voting, a
special share, contractual arrangements, formal or informal
arrangements to act in concert, or other means, to determine, direct,
or decide important matters affecting an entity.
14. Prohibited Transactions
BIS proposes to define ``prohibited transactions'' as,
collectively, the transactions described in Sec. Sec. 791.302
(Prohibited VCS hardware transactions), 791.303 (Prohibited covered
software transactions), or 791.304 (Related prohibited transactions).
The term prohibited transactions refers to the prohibitions on the
knowing import of VCS hardware into the United States that is designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia,
as specified in section 791.302; the knowing Sale within, or import
into, the United States of a completed connected vehicle containing
covered software that is designed, developed, manufactured, or supplied
by persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia, as specified in Sec. 791.303; and the
knowing Sale of completed connected vehicles that incorporate VCS
Hardware or covered software by connected vehicle Manufacturers who are
owned by, controlled by, or subject to the jurisdiction or direction of
the PRC or Russia, as specified in Sec. 791.304.
15. Sale
BIS proposes to define ``sale,'' in the context of this subpart, as
distributing for purchase, lease, or other commercial operations a new
completed connected vehicle for a price, to include the transfer of
completed connected vehicles from a connected vehicle manufacturer to a
dealer or distributor, as those terms are defined in 49 U.S.C. 30102.
This definition also applies to the related terms such as sell or
selling. This would include direct-to-consumer sales of completed
connected vehicles from the connected vehicle manufacturer to the
ultimate purchaser.
16. Software Bill of Materials
BIS proposes to define ``Software Bill of Materials'' or SBOM as a
formal and dynamic, machine-readable inventory detailing the software
supply chain relationships between software components and
subcomponents, including software dependencies, hierarchical
relationships, and baseline software attributes, including author's
name, timestamp, supplier name, component name, version string,
component hash, package URL, unique identifier, and dependency
relationships to other software components.
BIS understands that this definition generally conforms to industry
standards. However, BIS is specifically seeking comment on the
feasibility, technical burden, cost, and effectiveness of identifying
and disclosing to BIS the listed SBOM attributes.
17. Vehicle Connectivity System
BIS proposes to define ``Vehicle Connectivity System'' or VCS as a
hardware or software item for a completed connected vehicle that has
the function of enabling the transmission, receipt, conversion, or
processing of radio frequency communications at a frequency over 450
megahertz. This definition would exempt most remote keyless entry fobs
and immobilizers and certain internal wireless sensors and relays. VCS
software is included in the definition of Covered Software.
18. VCS Hardware
BIS proposes to define ``VCS hardware'' as the following software-
enabled or programmable components and subcomponents that support the
function of Vehicle Connectivity Systems or that are part of an item
that
[[Page 79105]]
supports the function of Vehicle Connectivity Systems: microcontroller,
microcomputers or modules, systems on a chip, networking or telematics
units, cellular modem/modules, Wi-Fi microcontrollers or modules,
Bluetooth microcontrollers or modules, satellite navigation systems,
satellite communication systems, other wireless communication
microcontrollers or modules, and external antennas. VCS hardware does
not include component parts that do not contribute to the communication
function of VCS hardware (e.g., brackets, fasteners, plastics, and
passive electronics). VCS hardware would include aftermarket devices
not contained in a completed connected vehicle at sale but that could
be later integrated into or attached to the vehicle to perform VCS
functions.
BIS believes this definition appropriately identifies the various
components, contained within a TCU or other connected systems of a
connected vehicle, that facilitate off-board data transmission, and,
thus, are most likely to pose the risks identified in Section IV of
this notice. BIS specifically seeks comment on this list of components
and the appropriateness of their inclusion to address the national
security risks that BIS has identified in this notice.
19. VCS Hardware Importer
BIS proposes to define ``VCS hardware importer'' as a U.S. person
importing VCS hardware for further manufacturing, integration, resale,
or distribution. A connected vehicle manufacturer may be a VCS Hardware
Importer if VCS hardware has already been installed in a connected
vehicle when imported by the connected vehicle manufacturer.
This definition would capture OEMs, and tier 1 and tier 2 suppliers
importing VCS hardware into the United States. BIS specifically seeks
comment on the scope of this definition, particularly regarding whether
it captures the breadth of market participants dealing in VCS Hardware.
20. United States
BIS proposes to define ``United States'' to mean the United States
of America, the States of the United States, the District of Columbia,
and any commonwealth, territory, dependency, or possession of the
United States, or any subdivision thereof, and the territorial sea of
the United States.
b. Prohibitions on Certain Transactions Related to Connected Vehicles
1. Prohibited Transactions
Under the proposed rule, VCS hardware importers would be prohibited
from knowingly importing into the United States any VCS hardware that
is designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia. BIS specifically seeks comment on this approach and whether
additional components should be included in or excluded from this
prohibition.
Connected vehicle manufacturers would be prohibited from knowingly
Selling within the United States, or importing into the United States,
completed connected vehicles that incorporate covered software
designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia.
Connected vehicle manufacturers who are owned by, controlled by, or
subject to the jurisdiction or direction of the PRC or Russia would
also be prohibited from knowingly Selling in the United States
completed connected vehicles that incorporate covered software or VCS
hardware. As with other connected vehicle manufacturers, connected
vehicle manufacturers who are owned by, controlled by, or subject to
the jurisdiction or direction of the PRC or Russia participate in the
design and development of VCS hardware and covered software, which are
generally built to the manufacturers' specifications. However, this
prohibition applies even if connected vehicle manufacturers who are
owned by, controlled by, or subject to the jurisdiction or direction of
the PRC or Russia were not involved in the design or development of the
VCS Hardware and Covered Software. Their Sale of those completed
connected vehicles constitutes the supply of VCS hardware and covered
software and is thus captured by this prohibition. To be clear, BIS
anticipates that because of the role connected vehicle manufacturers
play in the design and development of the key components in connected
vehicles, in many cases, this prohibition will be duplicative of the
other prohibitions in this proposed rule. BIS seeks comments on the
efficacy of all of the proposed prohibitions detailed above.
As noted above, for the purposes of this proposed rule, BIS defines
the term ``person owned by, controlled by, or subject to the
jurisdiction or direction of a foreign adversary'' to mean (a) any
person, wherever located, who acts as an agent, representative, or
employee, or any person who acts in any other capacity at the order,
request, or under the direction or control, of a foreign adversary or
of a person whose activities are directly or indirectly supervised,
directed, controlled, financed, or subsidized in whole or in majority
part by a foreign adversary; (b) any person, wherever located, who is a
citizen or resident of a foreign adversary or a country controlled by a
foreign adversary, and is not a United States citizen or permanent
resident of the United States; (c) any corporation, partnership,
association, or other organization with a principal place of business
in, headquartered in, incorporated in, or otherwise organized under the
laws of a foreign adversary or a country controlled by a foreign
adversary; or (d) any corporation, partnership, association, or other
organization, wherever organized or doing business, that is owned or
controlled by a foreign adversary, to include circumstances in which
any person identified in paragraphs (a) through (c) possesses the
power, direct or indirect, whether or not exercised, through the
ownership of a majority or a dominant minority of the total outstanding
voting interest in an entity, board representation, proxy voting, a
special share, contractual arrangements, formal or informal
arrangements to act in concert, or other means, to determine, direct,
or decide important matters affecting an entity.
To provide further clarity regarding transactions involving VCS
hardware and covered software that would be prohibited, BIS offers the
following examples of persons owned by, controlled by, or subject to
the jurisdiction or direction of the PRC and Russia:
Example 1: Company A, incorporated in the United States, is a
wholly owned subsidiary of Company B. Company B is a state-owned
enterprise of the PRC or Russia. Because Company B is a state-owned
enterprise, Company A would be considered ``owned by'' the PRC or
Russia.
Example 2: Company A is a joint venture between Company B and
Company C where Company C owns a majority share of Company A. Company B
is a corporation incorporated in a third-party jurisdiction. Company C
is a state-owned enterprise of the PRC or Russia. Company A would be
considered ``owned by'' the PRC or Russia.
Example 3: Company A is majority owned in aggregate by multiple
state-owned enterprises and state-owned investment funds of the PRC or
Russia. Company A would be considered ``owned by'' the PRC or Russia.
Example 4: Company A, incorporated in the United States, is a
subsidiary of
[[Page 79106]]
Company B. Company B is a private company incorporated in the PRC or
Russia with its principal place of business in the PRC or Russia.
Because Company B is subject to the jurisdiction of the PRC or Russia,
Company B's subsidiary, Company A, is controlled by an entity subject
to the jurisdiction of the PRC or Russia and would be considered
``controlled by'' and ``subject to the direction of'' the PRC or
Russia.
Example 5: Company A is a multinational company where a majority of
the voting power is held by Company B, a PRC or Russian government
investment fund. Company A would be ``controlled by'' and ``subject to
the direction of'' the PRC or Russia.
Example 6: Company A is a holding company organized in a tax-
advantaged jurisdiction. Company A is publicly listed on a stock
exchange and its corporate voting structure is characterized by Class A
and Class B shares, Class B shares having ten times the voting power of
Class A shares. If the aggregate voting power of shareholders subject
to the jurisdiction of the PRC or Russia holding either Class A and
Class B shares constitutes a majority or a dominant minority of total
voting power, then Company A would be ``controlled by'' and ``subject
to the direction of'' the PRC or Russia.
Example 7: Company A, a company that is organized under the laws of
the PRC or Russia, owns a minority interest in Company B, a U.S.
business. Based on special voting powers vested in that minority
interest, Company A maintains certain veto rights that determine
important matters affecting Company B, including the right to veto the
dismissal of senior executives of Company B. Company B would be
considered ``controlled by'' and ``subject to the direction of''
Company A, and therefore owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia.
Example 8: Company A is an entity incorporated in a third country
and Company B is an entity incorporated in the PRC or Russia. Company A
and Company B create a new joint venture, Company C, to design,
develop, and manufacture a new product. Company A and Company B own
minority shares of the joint venture while Company D, a holding company
wholly owned by a PRC citizen, owns the largest minority share. If
aggregate voting power of Company B and Company D constitutes majority
or dominant minority voting share, Company C would be ``controlled by''
and ``subject to the direction of'' the PRC or Russia.
Example 9: Company A has eight members on its board of directors.
Company A is characterized by a shareholder and corporate governance
structure that requires a 75 percent supermajority for any significant
business decision. Three of the members of the board are citizens of,
and therefore subject to the jurisdiction of, the PRC or Russia.
Because these three members make up 37.5 percent of the voting power of
the board, they can block any supermajority and therefore determine,
direct, or decide important matters affecting Company A. Company A
would be ``controlled by'' or ``subject to the direction of'' the PRC
or Russia.
Example 10: The PRC or Russian government, through an investment
fund, acquires a 1% special management share in Company A. This share
grants the PRC or Russian government the right to appoint a director to
the board of Company A and veto certain key business decisions, such as
major strategic changes or mergers. This share allows the government to
influence Company A's operations and strategy. Company A would be
``controlled by'' the PRC or Russia.
Example 11: Company A maintains its principal place of business in
the PRC or Russia. Company A would be ``subject to the jurisdiction''
of the PRC or Russia.
Example 12: Company A is a publicly listed U.S. corporate entity.
Company A has a wholly owned subsidiary, Company B, that is organized
under the laws of the PRC or Russia and manufactures goods in the PRC
or Russia. Because Company B is organized under the laws of the PRC or
Russia, Company B would be subject to the jurisdiction of the PRC or
Russia. However, Company A is not subject to the jurisdiction of the
PRC or Russia by nature of its subsidiary, Company B, being ``subject
to the jurisdiction'' of the PRC or Russia.
Example 13: Company A is privately held and incorporated in the
United States. One member of Company A's board of directors, Person X,
a former chairman of the board of a large PRC corporation, has known
ties to the government of the PRC, owns a large minority share of
Company A, and has previously made significant investments in other
companies founded by Company A's chief executive officer. Person X also
facilitated a large minority investment in Company A by the large PRC
corporation where they were previously chairman of the board. Person
X's professional background indicates that they are directly or
indirectly supervised, directed, controlled, financed, or subsidized by
the PRC government. The combination of Person X's close ties to Company
A's CEO, Person's X's ownership interest and ability to direct
investment from large, highly regulated PRC corporate entities, and
Person X's close ties to the PRC government indicate that Company A
would be ``subject to the direction'' of the PRC.
BIS seeks comment on whether the definition of, and examples
provided to illuminate, who is a ``person owned by, controlled by, or
subject to the jurisdiction or direction of a foreign adversary,''
provides sufficient clarity regarding the circumstances under which the
rule's prohibitions might apply.
For additional clarity in determining whether a transaction
involving VCS hardware or covered software designed, developed,
manufactured, or supplied by entities described above would be
prohibited under the proposed rule, BIS offers the below examples. In
offering these examples, BIS emphasizes that VCS hardware and covered
software would not be considered designed, developed, manufactured, or
supplied by persons owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia, solely based on the
country of citizenship of natural persons who are employed, contracted,
or otherwise similarly engaged to participate in the design,
development, manufacture, or supply of that VCS hardware or covered
software:
Example 14: A U.S. person has a contractual relationship with a
foreign person to import a cellular module, and the cellular module
will later be integrated into a VCS for a completed connected vehicle.
The U.S. person is, under the proposed rule, a VCS hardware importer.
The U.S. person knows the cellular module was manufactured at a
facility located in the PRC or Russia and is being imported through a
third country. Since the entity manufacturing the module would, at a
minimum, be ``subject to the jurisdiction'' of the PRC or Russia, the
import of the module would be a prohibited transaction under the
proposed rule, unless it qualifies for a general authorization or a
specific authorization from BIS.
Example 15: A U.S. person imports a TCU that was assembled in a
third country, but that contains a microcontroller that is manufactured
in the PRC or Russia and is Sold to the third-country assembler of the
TCU. The U.S. person knows that the microcontroller was manufactured by
an entity located in the PRC or Russia. As the microcontroller is
included in the
[[Page 79107]]
definition of VCS hardware, the import of the TCU for a completed
connected vehiclewould be a prohibited transaction under the proposed
rule unless it qualifies for a general authorization, or a specific
authorization granted by BIS.
Example 16: A U.S. person imports a completed connected vehicle,
making the U.S. person a connected vehicle manufacturer under the
proposed rule's definition. The completed connected vehicle contains a
TCU that operates software supporting off-vehicle connectivity above
450 MHz, and that software is designed, developed, or otherwise
supplied (in whole or in part) by an entity located in the PRC or
Russia. Under the proposed rule, the import of the completed connected
vehicle would be prohibited, unless it was authorized by a general
authorization or a Specific Authorization.
Example 17: A U.S. person who is a connected vehicle manufacturer
that manufactures or assembles completed connected vehicles in the
United States Sells to a dealer within the United States a completed
connected vehicle in which the vehicle's ADS software for object
detection, classification, and decision making is proprietary software
designed, developed, or supplied by an entity in the PRC or Russia. The
Sale or transfer of the completed connected vehicle would be a
prohibited transaction under the proposed rule unless it qualifies for
a general authorization or specific authorization granted by BIS.
Example 18: A U.S. person who is a connected vehicle manufacturer
utilizes foreign VCS and ADS software development teams through various
subsidiaries, joint ventures, and contract arrangements, some of which
retain servicing obligations, contractual and licensing rights, and
other interests in the software they have developed. One of those
software development teams is located in the PRC or Russia, and as
such, that software team is subject to the jurisdiction of the PRC or
Russia. Given the role of PRC or Russian developers in the creation of
the VCS or ADS software (covered software), the sale of a completed
connected vehicle within the United States that integrates this
proprietary covered software, would be a prohibited transaction under
the proposed rule, unless it qualifies for a general authorization or
specific authorization granted by BIS.
Example 19: A U.S. person who is a connected vehicle manufacturer
utilizes VCS and ADS software development teams around the world
through various subsidiaries, joint ventures, and contract
arrangements. One of those software development teams is comprised of
individuals who are PRC or Russian citizens working in a foreign
jurisdiction other than the PRC or Russia for a company that is not
owned by, controlled by, or subject to the jurisdiction or direction of
the PRC or Russia. Although the individuals technically meet the
definition of ``person owned by, controlled by, or subject to the
direction of a foreign adversary,'' the sole fact that PRC or Russian
citizens work on the connected vehicle manufacturer's software
development would not make the Sale of a completed connected vehicle
within the United States that integrates this VCS or ADS software a
Prohibited Transaction under the proposed rule.
Example 20: Company A, which is a wholly owned subsidiary of a
foreign corporation in which a PRC or Russian entity owns a controlling
interest, imports completed connected vehicles that incorporate covered
software and VCS hardware, none of which was originally designed,
developed, manufactured, or supplied by an entity owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia.
In such rare circumstance where Company A did not participate in the
design or development of the covered software or VCS hardware, Company
A would submit (once per Model Year) a Declaration of Conformity for
the import of the completed connected vehicles containing covered
software and VCS hardware. However, any subsequent sale by Company A of
such completed connected vehicle in the United States would be
prohibited. For example, Company A subsequently Sells such completed
connected vehicles to a dealer in the United States. Because Company A
is a person controlled by the PRC or Russia and has direct privileged
access to the VCS Hardware and covered software prior to the sale, the
knowing sale by Company A of the completed connected vehicle with VCS
hardware and covered software would be a prohibited transaction under
the proposed rule, and a specific authorization from BIS would be
required before engaging in such a transaction.
Example 21: Company A, a wholly owned subsidiary of a PRC or Russia
corporation manufactures completed connected vehicles in the United
States. The completed connected vehicles that Company A manufactures
incorporate covered software and VCS hardware provided by Company B, a
company that is not owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia. Because Company A is
owned by, controlled by, or subject to the jurisdiction or direction of
the PRC or Russia, participated in the design and development of the
covered software or VCS hardware, and in any event, has direct and
privileged access to its completed connected vehicles--including the
incorporated covered software and VCS hardware--Company A's sale of the
completed connected vehicles is a prohibited transaction under the
proposed rule, and a specific authorization from BIS would be required
before engaging in such a transaction.
c. Compliance
1. Declaration of Conformity
BIS proposes to require VCS Hardware Importers and connected
vehicle manufacturers engaged in specified transactions to submit
Declarations of Conformity to BIS certifying that they have not engaged
in a prohibited transaction. Under the proposed rule, declarants would
be responsible for submitting information to BIS, including
documentation collected from suppliers of components of VCS hardware
and from suppliers of covered software, to verify compliance with the
regulations. These requirements include obtaining and analyzing the
HBOMs for VCS hardware and the SBOMs for covered software and providing
documentation of the steps the declarant took to verify that the
transactions comply with the provisions of the rule. In an effort to
facilitate compliance, BIS is not currently proposing to mandate
particular due diligence requirements but would rather allow VCS
hardware importers and connected vehicle Manufacturers to provide
evidence of their own efforts tailored to their unique operations. BIS
seeks comment on this approach.
The proposed rule generally contemplates that Declarations of
Conformity would be submitted in three instances by persons not engaged
in prohibited transactions: (1) Declarations submitted by VCS hardware
importers; (2) Declarations submitted by connected vehicle
manufacturers importing completed connected vehicles containing covered
software into the United States; and (3) Declarations submitted by
connected vehicle manufacturers selling completed connected vehicles in
the United States that they have manufactured or assembled in the
United States and which contain covered software, so long as there is a
continuing foreign interest in the covered software. Persons required
to submit a Declaration of
[[Page 79108]]
Conformity need do so once per model year for units associated with a
vehicle model year, or calendar year for units not associated with a
vehicle model year, and only for the categories of transactions they
seek to execute during that period. VCS hardware importers or connected
vehicle manufacturers engaging in multiple transactions that require
submissions of Declarations of Conformity under separate paragraphs of
Sec. 791.305 may, if they prefer, submit a single compiled Declaration
of Conformity containing all required information for all transactions.
For example, an OEM that manufactures or assembles completed connected
vehicles in the United States, imports connected vehicles into the
United States, and imports VCS hardware into the United States would be
able to submit a single Declaration of Conformity based on vehicle
make, model, and trim and VCS hardware that will be imported or
manufactured that Model Year.
BIS believes that Declarations of Conformity will be an important
tool for advancing the goals of this proposed rule, and addressing the
emergency declared in E.O. 13873. Declarations of Conformity will first
and foremost provide BIS with a means to verify VCS hardware importers'
and completed connected vehicle manufacturers' compliance with the
proposed prohibitions. Through extensive engagement with connected
vehicle manufacturers and automotive suppliers, BIS has come to
understand that connected vehicle supply chains are complex and often
opaque, with potentially hundreds of suppliers for a single connected
vehicle in a given model year. Such complexity and opacity could result
in the incorporation into connected vehicles of VCS hardware and
covered software that is designed, developed, manufactured, or supplied
by persons owned by, controlled by, or subject to the jurisdiction or
direction of foreign adversaries, without the full knowledge of the
connected vehicle manufacturer. While connected vehicle manufacturers
typically have strong relationships with their immediate suppliers, to
include the development of years-long supply contracts that span entire
vehicle generations, their understanding of the deeper supply chain (to
include who is supplying their suppliers) is substantially weaker.
Additionally, while the COVID-19 pandemic and associated supply chain
crisis forced connected vehicle manufacturers to more critically
evaluate their hardware supply chains, illumination of software supply
chains remains largely unachieved. Consequently, BIS believes that the
requirement to submit annual Declarations of Conformity will serve as
an important mechanism for ensuring that parties subject to this
proposed rule implement the due diligence and other procedures
necessary to fully understand the supply chains for their VCS hardware
and covered software and thus comply the proposed rule's prohibitions
on the incorporation of VCS Hardware or covered software that has been
designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia.
BIS also believes that the collection of annual Declarations of
Conformity from connected vehicle manufacturers and VCS hardware
importers would facilitate enforcement of the proposed rule, including
by allowing BIS to proactively identify red flags and potential
violations of the proposed prohibitions. For example, BIS may rely on
the broad perspective provided by the Declarations of Conformity from
multiple connected vehicle manufacturers and VCS hardware importers to
identify previously undetected participation by PRC or Russian
designers, developers, manufacturers, or suppliers that are subject to
the prohibitions of this proposed rule yet remain entrenched in the
U.S. connected vehicle supply chain. Additionally, these Declarations
of Conformity would allow BIS to maintain an understanding of
technological advancements and changes in the U.S. connected vehicle
industry--both in hardware and software--and consequently enable BIS to
propose updates to the rule as needed to maximize its effectiveness in
mitigating the undue and unacceptable risks posed by the PRC and Russia
while minimizing burden on industry.
The sections below explain in greater detail the types of
Declaration of Conformity that would be required under the proposed
rule. BIS seeks comment on this regulatory approach, including the
necessity and efficacy of requiring Declarations of Conformity with
respect to VCS hardware and covered software in which there is a
Foreign Interest. BIS also seeks comment on the availability and
efficacy of any alternative approach that would require a narrower set
of VCS Hardware Importers and completed connected vehicle manufacturers
to submit Declarations of Conformity, while still achieving the goals
of the Declaration of Conformity requirement and addressing the
declared emergency under E.O. 13873.
i. Import of VCS Hardware
The Declaration of Conformity described in Sec. 791.305(a)(1)
would require VCS hardware Importers to provide information on the
specific VCS hardware that the declarant plans to import into the
United States for a given model year, or, for units not associated with
a model year, a given calendar year. BIS proposes to require the
Declaration of Conformity to contain the FCC ID number(s) of the VCS
hardware, and, if applicable, any subcomponents in the VCS hardware
that also have an FCC ID number. FCC regulations at 47 CFR 2.925
require any electronic device that emits RF waves, including those
imported into the United States, to have an FCC ID number, which is
used to identify and certify that the device meets the necessary
regulatory standards for wireless communication. The proposed rule
would additionally require VCS Hardware Importers to report all third-
party information technology external endpoints to which the VCS
Hardware is programmed to connect, including the country in which said
endpoint is located and/or the identity and location of the service
provider. This would include any third-party that is not the VCS
hardware importer nor the final recipient, such as the connected
vehicle manufacturer that integrates the VCS hardware and receives data
on an episodic or ongoing basis from the VCS hardware. Additionally,
VCS hardware importers would be required to submit an HBOM as part of
the Declaration of Conformity. BIS would expect, consistent with the
proposed definition for this term, this HBOM to include a comprehensive
list of parts and technical information, including the provenance of
subcomponents contained within the VCS hardware.
ii. Import of Completed Connected Vehicles
The Declaration of Conformity described in section 791.305(a)(2)
would require connected vehicle manufacturers that import completed
connected vehicles, including U.S.-based OEMs and foreign-headquartered
OEMs with operations in the United States, to provide information to
BIS on the make, model, and trim (if known) of the imported group of
completed connected vehicles and the covered software contained within
the completed connected vehicles. BIS proposes to require declarants to
submit an SBOM for the covered software related to both VCS and ADS.
The
[[Page 79109]]
minimum requirements for the SBOM are author's name, timestamp,
supplier name, component name, version string, component hash, package
URL, unique identifier, and dependency relationships to other software
components. Declarants may submit additional SBOM information as
evidence demonstrating the covered software is not sourced from PRC or
Russian-linked entities. BIS seeks comment on all aspects of this SBOM
requirement.
iii. Manufacture or Assembly of Completed Connected Vehicles for Sale
in the United States
Similarly, this proposed rule, as described in section
791.305(a)(3), would require connected vehicle Manufacturers that
manufacture or assemble completed connected vehicles for sale in the
United States to submit a Declaration of Conformity that includes
information on the make, model, and trim of the group of completed
connected vehicles and the covered software contained within the
completed connected vehicles that the connected vehicle manufacturer
will sell for a Model Year. BIS emphasizes that this requirement would
apply only to connected vehicle manufacturers whose vehicles
incorporate covered software in which there is a foreign interest.
Connected vehicle manufacturers who manufacture or assemble completed
connected vehicles in the United States and whose vehicles contain no
covered software in which there is a foreign interest would not be
required to submit a Declaration of Conformity. However, given the
global nature of automotive software supply chains, BIS anticipates
that nearly all connected vehicle manufacturers of completed connected
vehicles for Sale in the United States would be required to submit an
annual Declaration of Conformity covering all completed connected
vehicles by make, model, and trim to be manufactured for Sale in the
United States for each Model Year. As detailed above, this requirement
would include the submission of an SBOM for covered software
incorporated into the group of completed connected vehicles.
iv. Procedures To Submit Declarations of Conformity
VCS Hardware Importers and connected vehicle manufacturers
submitting a Declaration of Conformity under this rule would be
required to submit the Declaration of Conformity to BIS annually, 60
days prior to the first sale or first import of a Vehicle
Identification Number (VIN) series of completed connected vehicles
comprised of a single model year, or 60 days prior to the import of VCS
hardware covered by the Declaration of Conformity. VCS hardware
importers and connected vehicle manufacturers may, at their discretion,
submit a combined Declaration of Conformity, or may submit separate
Declarations of Conformity (e.g., one Declaration covering import of
VCS hardware and another covering import of completed connected
vehicles). Declarations of Conformity covering both the import or
manufacture of completed connected vehicles and the import of VCS
Hardware should be submitted by the earlier of the two reporting dates.
connected vehicle manufacturers that would submit a Declaration of
Conformity for the import of a group of completed connected vehicles
into the United States should not submit a Declaration of Conformity
related to the subsequent Sale of that same group of Completed
Connected Vehicles. In the event of material changes that impact the
content of the Declaration of Conformity, VCS hardware importers or
connected vehicle manufacturers would be required to submit an updated
Declaration of Conformity and an updated HBOM or SBOM within 30 days of
such a change. Such changes may include changes in the suppliers of key
subcomponents or functional aspects of the VCS hardware or covered
software incorporated in the completed connected vehicle. BIS would
make a web portal available on its website (https://www.bis.gov)
through which VCS Hardware Importers and connected vehicle
manufacturers may submit Declarations of Conformity.
2. General Authorizations
General Authorizations would allow certain VCS Hardware Importers
and connected vehicle manufacturers to engage in otherwise prohibited
transactions without the need to notify BIS prior to engaging in the
transaction. connected vehicle manufacturers or VCS hardware importers
(and entities under common control, including parents) who produce
small quantities of completed connected vehicles or VCS hardware, which
the proposed rule defines as fewer than 1,000 units in a calendar year,
would be eligible for a general authorization. This is in line with
requirements for high-volume and low-volume manufacturers found in 49
CFR part 565. BIS specifically seeks comment on this threshold for both
completed connected vehicles and VCS Hardware. connected vehicle
manufacturers would be eligible for a general authorization if the
completed connected vehicle is otherwise subject to a prohibition but
will be used on public roadways fewer than 30 days in any calendar
year. For purposes of this general authorization, each use of a
completed connected vehicle on public roadways on a distinct calendar
day will count toward the 30-day limit, regardless of the duration of a
vehicle's use on a particular day. VCS hardware importers and connected
vehicle manufacturers would also qualify for a general authorization
for otherwise prohibited transactions involving completed connected
vehicles incorporating covered software or VCS hardware if the
completed connected vehicles are used only for testing display, or
research purposes and not on public roads in the United States. Lastly,
VCS hardware importers or connected vehicle manufacturers would qualify
for a general authorization for the importation of completed connected
vehicles incorporating covered software or the importation of VCS
Hardware solely for the purposes of repair, alteration, or competition
off public roads, and the vehicle or hardware will be reexported from
the United States within one year of the time of import.
BIS proposes to allow persons using General Authorizations to self-
certify their compliance with the applicable General Authorization. As
such, these persons would not need to submit documentation to BIS but
would be required to gather and maintain full records for a period of
10 years documenting compliance for all completed connected vehicles
and VCS hardware covered by the general authorization. Furthermore,
persons availing themselves of a general authorization would be
required to continuously monitor for any changes that render a
transaction ineligible for continued reliance on the general
authorization. A VCS hardware importer or connected vehicle
manufacturer that is no longer eligible for a general authorization
would need to apply for and receive a specific authorization before
engaging in an otherwise prohibited transaction. For example, connected
vehicle manufacturers who import a certain model or trim of completed
connected vehicles containing covered software that are originally used
for display or testing purposes must seek a specific authorization
before importing that model or trim of completed connected vehicle for
more general use in the United States.
A connected vehicle manufacturer or VCS hardware importer that is a
subsidiary, joint venture, affiliate, or other entity subject to the
ownership, control, jurisdiction, or direction of the
[[Page 79110]]
PRC or Russia would be ineligible for general authorizations and would
be required to apply for a specific authorization before engaging in an
otherwise prohibited transaction.
3. Specific Authorizations
VCS hardware importers and connected vehicle manufacturers wishing
to engage in an otherwise prohibited transaction who are ineligible for
an exemption or general authorization would have to apply for and
receive a specific authorization to engage in the otherwise prohibited
transaction. The purpose of specific authorizations is to allow BIS on
a case-by-case basis to determine the nature and scope of the undue or
unacceptable risk to U.S. national security posed by transactions
involving VCS hardware and covered software, including the extent of
foreign adversary involvement in the transactions, as well as potential
mitigations.
VCS hardware importers and connected vehicle manufacturers must not
engage in an otherwise prohibited transaction until BIS grants the
application for a specific authorization. If a party engages in a
prohibited transaction prior to receiving a specific authorization from
BIS, that transaction would constitute a violation of the regulation.
Specific authorization requests will be reviewed on a case-by-case
basis, and the time to reach a decision on an application for a
specific authorization will vary based on the complexity of the case.
However, BIS will respond to applicants with a processing update within
90 days of the initial application for a specific authorization, and
typically endeavor to provide either a request for more information or
a decision within that time period.
Applications for a specific authorization must contain complete
information on the proposed transaction, including every party
involved, an overview of the covered software and/or the VCS hardware
designed, developed, manufactured, or supplied by a person owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia, the intended use of the covered software and/or VCS
hardware, and documentation to support the information contained in the
application. Persons seeking a specific authorization would submit an
application via a web portal that would be available on the BIS
website. Applicants should take care to submit to BIS only one copy of
an application pertaining to each transaction for which they seek
specific authorization to avoid processing delays. BIS may request
additional information from an applicant about any matter related to
the specific authorization request. In rare situations, as part of its
review of an application for specific authorization, BIS may, in its
sole discretion, request an oral briefing by the applicant and any
other relevant parties. At any point between initial submission of an
application for specific authorization and a final decision issued by
BIS, an applicant may submit additional information to bolster the
application or provide clarity on any aspect thereof.
When reviewing applications for a specific authorization, BIS will
consider the factors that may pose undue or unacceptable risks,
particularly as they relate to transactions that could result in the
exfiltration of connected vehicle or U.S. persons' data, or the remote
manipulation or operation of a connected vehicle. Examples of factors
that BIS may consider include: the applicant's ability to limit PRC or
Russian government access to, or influence over the design,
development, manufacture, or supply of the VCS hardware or covered
software; security standards used by the applicant and if such
standards can be validated by BIS or a third-party; and other actions
or proposals the applicant offers to implement as a way to mitigate
undue or unacceptable risk.
BIS's decision regarding any application for specific authorization
will apply only to the specific parties and transaction outlined in the
application and described in the decision notice. Additionally, the
decision notice from BIS to the applicant(s) may contain any conditions
that must be met by the parties for a transaction to be authorized.
Such conditions, which are subject to revision by BIS, may include
technical controls (e.g., software validation) or operational controls
(e.g., physical and logical access monitoring procedures), that are
either permanent or temporary. These controls will focus on the supply
chain element that involves a link to a foreign adversary to mitigate
any undue or unacceptable risk posed by the transaction. For connected
vehicle manufacturers owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia, a specific
authorization may include a requirement that all VCS hardware and
covered software be assembled and integrated into the connected vehicle
in the United States. In the approval letter for specific
authorization, BIS will determine the effective date and duration of
the authorization on a case-by-case basis.
While applicants denied authorizations would not be precluded from
submitting new applications for specific authorizations with regard to
different transactions (involving different parties and/or different
covered software or VCS hardware), BIS will reconsider a previously
denied application for a specific authorization only if the applicant
demonstrates a material change in circumstances.
4. Exemptions
Transactions by VCS hardware importers and connected vehicle
manufacturers would be exempt from the proposed prohibitions for a
limited period. BIS proposes a shorter implementation period for
transactions involving covered software and proposes a longer
implementation period for transactions involving VCS hardware to allow
market participants adequate time to establish alternative supply
chains if necessary. This reflects BIS's understanding, and numerous
public comments underscoring, that hardware supply chains for Connected
Vehicles are complex and require multiple years to alter. VCS hardware
importers would be permitted to engage in otherwise prohibited
transactions involving VCS Hardware and would also be exempt from a
requirement to submit a Declaration of Conformity for transactions not
otherwise prohibited so long as: (1) for VCS hardware units not
associated with a vehicle model year, the import of the VCS hardware
takes place prior to January 1, 2029; or (2) the VCS hardware is
integrated into a connected vehicle (completed or incomplete) or
destined for a connected vehicle with a model year prior to 2030.
Beginning January 1, 2029, any VCS hardware importer seeking to engage
in a transaction subject to the VCS hardware prohibitions in Sec.
791.302 (other than the import of a connected vehicle with a model year
prior to 2030) would be required to obtain a specific authorization if
the transaction is not otherwise permitted by a general authorization.
Furthermore, VCS hardware importers seeking to import VCS hardware
beginning on January 1, 2029, or VCS Hardware in completed connected
vehicles or that is destined for connected vehicles starting with Model
Year 2030, would be required to submit an annual Declaration of
Conformity to BIS, unless obligated to seek a Specific Authorization.
Connected vehicle manufacturers would be permitted to engage in
otherwise Prohibited Transactions involving covered software designed,
developed, manufactured, or supplied by a person owned by, controlled
by, or subject to
[[Page 79111]]
the jurisdiction or direction of the PRC or Russia, so long as the
completed connected vehicle that is imported or sold is of a model year
prior to 2027. Beginning Model Year 2027 (as imported into or sold in
the United States), any connected vehicle manufacturer seeking to
engage in a prohibited transaction involving covered software specified
in section 791.303 would be required to obtain a specific authorization
if the transaction is not otherwise permitted by a general
authorization. Furthermore, connected vehicle manufacturers would be
required to submit an applicable Declaration of Conformity for imports
or Sales of all completed connected vehicles beginning in Model Year
2027. Connected vehicle manufacturers who are owned by, controlled by,
or subject to the jurisdiction or direction of the PRC or Russia would
be permitted to engage in otherwise prohibited transactions so long as
the completed connected vehicle that is Sold is of a Model Year prior
to 2027. Beginning Model Year 2027 (as Sold in the United States),
these particular connected vehicle manufacturers seeking to engage in a
prohibited transaction specified in Sec. 791.304 would be required to
obtain a specific authorization if the transaction is not otherwise
permitted by a general authorization.
5. Appeals
BIS proposes to create a mechanism by which any person whose
application for a specific authorization is denied, whose specific
authorization is suspended or revoked, or who has received a written
notification of ineligibility for a general authorization may appeal
that decision to the Under Secretary. Appeals must be submitted in
writing by email or mail to the Office of the Under Secretary within 45
days of the date on the notice of the adverse administrative action by
BIS. The appeal must detail how the party submitting the appeal has
been directly and adversely affected by BIS's action, and the reasons
that BIS's action should be reversed or otherwise modified. The Under
Secretary, at his or her discretion, may delegate to the Deputy Under
Secretary for Industry and Security or another BIS official the review
of appeals, including arranging, at the official's discretion, informal
hearings with relevant parties regarding the appeal.
Appellants may submit supplementary information in support of their
appeal, whether sua sponte or at the request of the Under Secretary or
the designated official, but, though the Under Secretary or designated
official generally would not consider additional information submitted
sua sponte more than 30 days after submission of the original appeal.
If the Under Secretary or designated official requests supplementary
information, appellants will have no more than 30 calendar days to
respond to the request. Appellants may also request an in-person
informal hearing in writing at the time of submission. A hearing is not
required, and the Under Secretary or designated official may, at his or
her discretion, grant or deny a request for an informal hearing.
6. Advisory Opinions
In response to public comments regarding the ANPRM, BIS proposes to
include a mechanism for BIS to issue advisory opinions, similar to the
process outlined in the Export Administration Regulations (EAR). BIS
anticipates this process will provide connected vehicle manufacturers,
VCS hardware importers, and other interested parties with greater
clarity about how to comply with the proposed rule on an as-needed
basis. As with the EAR, BIS emphasizes that advisory opinions provided
under this proposed rule would in no way serve as evidence that the
ICTS transaction addressed in the opinion is not subject to the
jurisdiction of another U.S. Government agency. BIS may publish on its
website an advisory opinion that may be of broad interest to the
public, with redactions where necessary to protect Confidential
Business Information. To solicit an advisory opinion from BIS, persons
would be required to submit a written request to BIS by email or
through a portal that will be available on the BIS website. BIS will
not accept advisory opinion requests submitted by mail. A request for
an advisory opinion must contain contact information for the submitter
as well as all current information on the prospective transaction to
assist BIS in making a determination. This would include technical
details on the involved VCS hardware or covered software, information
on the completed connected vehicle (if applicable), the SBOM and/or
HBOM for the covered software and/or VCS hardware, and any other
supporting materials that the submitter assesses will assist BIS in
determining if the transaction may be prohibited by this rule. Persons
seeking an advisory opinion are encouraged to submit as much pertinent
information as possible in the initial request for an advisory opinion,
but BIS may request more information as needed to formulate its
opinion. BIS will only consider advisory opinion requests for actual,
not hypothetical, prospective transactions in which all parties, as
opposed to anonymous parties, are identified. Additionally, parties may
only rely on an advisory opinion when engaging in a transaction if the
original Advisory Opinion request contained complete and accurate
information and only so long as such information remains accurate
following the issuance of the Advisory Opinion.
7. ``Is-Informed'' Notices
BIS could notify connected vehicle manufacturers or VCS hardware
importers, either through direct letters or through a Federal Register
notice meant to inform a broader set of persons, that a transaction
involving certain covered software, VCS hardware, or entities requires
a specific authorization because it would constitute a Prohibited
Transaction according to the terms of this proposed rule. Any person
who engages in a transaction covered by an ``Is-Informed'' notice
without first receiving a Specific Authorization from BIS would have
knowledge that such transaction is prohibited and would therefore be in
violation of the rule. Is-Informed notices may only be delivered by or
at the direction of the Under Secretary or a BIS employee designated by
the Under Secretary.
8. Recordkeeping and Reporting Requirements
BIS proposes to require connected vehicle manufacturers and VCS
hardware importers to maintain complete records related to any
transaction for which a Declaration of Conformity, general
authorization, or specific authorization would be required by this
rule, for a period of ten years. This recordkeeping requirement applies
regardless of whether the transaction is subject to a general
authorization, specific authorization, or whether the connected vehicle
manufacturer or VCS hardware importer has not yet sought an
authorization. BIS would expect said records to include all information
pertinent to a general authorization or submitted when applying for a
Specific Authorization, as well as business records related to the
execution of the transaction, such as contracts, import records, bills
of sale, relevant correspondence, and all other files specified in
sections 791.312 and 791.313 to assess compliance with the rule.
All connected vehicle manufacturers and VCS hardware importers
would be required to submit records when requested by BIS related to
any transaction for which a Declaration of
[[Page 79112]]
Conformity, general authorization, or specific authorization would be
required by this rule, whether or not said transaction was carried out
under a general authorization, specific authorization, or without an
authorization from BIS. As such, BIS would be allowed to request
business records, before, during, or after the transaction in question
has taken place.
d. Enforcement
1. Penalties
IEEPA authorizes this rulemaking. Thus, persons who violate,
attempt to violate, conspire to violate, or knowingly cause a violation
of this rule, if finalized, may be subject to civil and/or criminal
penalties under IEEPA (50 U.S.C. 1705), depending on the circumstances
of the violation. Potential violations of this proposed rule that would
be subject to penalties include engaging in a prohibited transaction
without an applicable general authorization or specific authorization,
or failure to abide by the conditions enumerated in a specific
authorization. Willfully providing false or fictitious information to
the U.S. Government may be subject to criminal fines, imprisonment, or
both. A civil penalty may be imposed on any person who violates,
attempts to violate, conspires to violate, or causes a violation of any
authorization, order, regulation, or prohibition issued under IEEPA.
Under the Federal Civil Penalties Inflation Adjustment Act
Improvements Act of 2015, the specific maximum civil penalty will be
adjusted by notice in the Federal Register effective each calendar year
by the Office of the Secretary of the Department of Commerce. At the
time of publishing of this proposed rule, the maximum civil penalty for
violations of IEEPA is $368,136 per violation and the maximum criminal
penalty is $1,000,000.
Under the proposed rule, should BIS have reason to believe that a
violation has occurred and intends to issue a civil monetary penalty,
it will inform the alleged violator through a written notice of the
intent to impose a penalty (``Pre-Penalty Notice''). BIS will generally
transmit the Pre-Penalty Notice electronically but may additionally
issue a mailed notice. The recipient of a Pre-Penalty Notice may
respond in writing to BIS to provide additional information or
otherwise contest the penalty. BIS must receive this response within 30
days of the transmission of the original pre-penalty notice. A response
to a pre-penalty notice does not constitute a formal appeal, but it
allows the recipient of the pre-penalty notice to contest facts set
forth by BIS in the pre-penalty notice, provide exculpatory evidence,
or otherwise respond to the pre-penalty notice. BIS may seek to
initiate settlement discussions in the pre-penalty notice or may
conduct separate outreach following transmission of the pre-penalty
notice. Recipients of a pre-penalty notice may additionally request to
initiate settlement discussions in their response to BIS or may conduct
separate outreach to do so.
Following the delivery of the pre-penalty notice and after
considering any responses from the alleged violator, BIS will inform
the alleged violator in writing as to whether it has found that a
violation in fact occurred. Should BIS find that a violation has indeed
taken place and no settlement has been reached, BIS will issue a final
penalty notice to the violator specifying the violation and determining
the specific civil monetary penalty to be imposed. This penalty may not
be appealed following the procedures in section 791.309, but is a final
agency action that the violator may contest in the appropriate U.S.
District Court.
Should a violator fail to pay the penalty as specified in the final
penalty notice or fail to make alternative payment arrangements
approved by BIS, BIS may refer the matter to the Department of Treasury
for administrative collection or to the Department of Justice for
collection via civil suit in U.S. District Court.
2. Finding a Violation
Under the proposed rule, there may be cases in which BIS determines
that a violation has taken place but that a civil monetary penalty is
not appropriate. In such cases, BIS would issue a finding of violation
that identifies the violation. The finding of violation could also
contain an administrative response other than a civil monetary penalty,
such as an order to cease and desist from conduct or activities that
are prohibited by the proposed rule. Consistent with the procedures
listed above regarding a pre-penalty notice, recipients of a finding of
violation may file a response within 30 days contesting the facts of
the finding of violation and/or providing information relevant to BIS's
determination of whether a violation has occurred. BIS will consider
any new information and inform the party in writing whether a violation
has or has not occurred. A recipient that does not respond within 30
days of receipt of the finding of violation will be deemed to have
waived the right to respond. Any action taken in a finding of violation
issued by BIS constitutes a final agency action that is not subject to
appeal following the procedures in section 791.309.
3. Severability
BIS intends for the provisions of this proposed rule, as finalized
to be severable from each other. If a court holds that any provision in
a final 15 CFR part 791, subpart D, is invalid or unenforceable, BIS
intends that the remaining provisions of a final 15 CFR part 791,
subpart D, as relevant, would continue in effect to the greatest extent
possible. In addition, if a court holds that any such provision is
invalid or unenforceable as to a particular person or circumstance, BIS
intends that the provision would remain in effect as to any other
person or circumstance. Depending on the circumstances and the scope of
the court's order, BIS believes that the remaining provisions of a
final rule likely could continue to function sensibly independent of
any provision or application held invalid or unenforceable. For
example, the prohibitions related to transactions involving VCS
Hardware could continue to apply as intended, even if a court finds
that the prohibitions on transactions involving ADS are invalid.
Similarly, the proposed rule could be applied with respect to relevant
hardware and software designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC, even if a court finds its application with
respect to relevant hardware and software from Russian-linked persons
is invalid.
e. Classification
1. Executive Order 12866
Executive Order 12866, as reaffirmed by Executive Order 13563 and
amended by Executive Order 14094, directs agencies to assess all costs
and benefits of available regulatory alternatives and, if regulation is
necessary, to select regulatory approaches that maximize net benefits
(including potential economic, environmental, public health and safety
effects, distributed impacts, and equity). This proposed rule has been
designated a significant regulatory action by the Office of Information
and Regulatory Affairs (OIRA) under section 3(f)(1) of Executive Order
12866, as amended by Executive Order 14094.
2. Unfunded Mandates Reform Act of 1995
This proposed rule would not produce a federal mandate (under the
regulatory provisions of title II of the
[[Page 79113]]
Unfunded Mandates Reform Act of 1995) for state, local, and tribal
governments or the private sector.
3. Executive Order 13132 (Federalism)
This proposed rule does not contain policies having federalism
implications requiring preparations of a Federalism Summary Impact
Statement.
4. Executive Order 12630 (Governmental Actions and Interference With
Constitutionally Protected Property Rights)
This proposed rule does not contain policies that have takings
implications.
5. Executive Order 13175 (Consultation and Coordination With Indian
Tribes)
The Department has analyzed this proposed rule under Executive
Order 13175 and has determined that the action would not have a
substantial direct effect on one or more Indian tribes, would not
impose substantial direct compliance costs on Indian tribal
governments, and would not preempt tribal law.
6. National Environmental Policy Act
The Department has reviewed this rulemaking action for the purposes
of the National Environmental Policy Act (42 U.S.C. 4321, et seq.). It
has been determined that this proposed rule would not have a
significant impact on the quality of the human environment.
7. Paperwork Reduction Act
The Paperwork Reduction Act of 1995 (44 U.S.C. 3501, et seq.) (PRA)
provides that an agency generally cannot conduct or sponsor a
collection of information, and no person is required to respond nor be
subject to a penalty for failure to comply with a collection of
information subject to the requirements of the PRA, unless that
collection has obtained OMB approval and displays a currently valid
Office of Management and Budget (OMB) Control Number.
This proposed rule will create new information collection
requirements, which are subject to review and approval by OMB under the
PRA. Specifically, this proposed rule would require connected vehicle
manufacturers and VCS hardware importers to submit annual Declarations
of Conformity certifying that their import of VCS hardware and/or
import or manufacture of completed connected vehicles does not involve
hardware or software subject to the prohibitions in this proposed rule.
Additional requirements for the Declarations of Conformity include
supplying technical information regarding the hardware or software in
question and providing a Bill of Materials for applicable software,
hardware, or both.
Moreover, entities seeking specific authorizations from BIS to
engage in otherwise prohibited transactions will have to file
information with the Department, submissions of which are also subject
to the PRA. Applications for a specific authorization would require,
but are not limited to, a description of the nature of the otherwise
prohibited transaction(s). For entities that are covered by a General
Authorization, a self-certification, without need to notify BIS, would
be required (see Section VI of the NPRM). BIS proposes to require
connected vehicle manufacturers and VCS hardware importers to maintain
complete records related to any transaction for which a Declaration of
Conformity, general authorization, or specific authorization would be
required by this rule for a period of ten years, consistent with
IEEPA's statute of limitations. These records would include any
transaction for which the connected vehicle manufacturer or VCS
hardware importer has not yet sought an authorization. BIS expects said
records to include all information submitted in applications, as well
as business records related to the execution of any ICTS transaction
subject to the rule, such as contracts, import records, bills of sale,
and all other files BIS may deem pertinent in assessing compliance with
this proposed rule. Lastly, entities seeking an advisory opinion from
BIS would have to file information with the Department, though this is
an optional process for parties looking for additional clarity on
proposed transactions. BIS anticipates that this collection would be
largely similar to its program in administering 15 CFR 748.3, as it
would require similar information and the process for submission is
analogous. BIS seeks comment on how many entities would request an
advisory opinion in order to better understand the associated costs.
BIS estimates that the initial burden placed on applicable entities
would be 180 to 240 hours. This estimate takes into account the one-
time initial cost (in hours) per entity to comply with the rule,
including reading and understanding the rule's provisions. Every
subsequent year, BIS anticipates that the total annual cost burden (in
hours) for applicable entities to implement the rule would be 100 to
500 hours.
BIS assesses that there are 42 to 281 entities potentially impacted
by the proposed rule and that the initial cost burden for these
entities is between $30,964 and $38,554. This estimate takes into
account the one-time initial cost per entity to comply with the rule,
including reading and understanding the rule's provisions. Every
subsequent year, BIS anticipates that the total annual cost burden for
applicable entities to implement the rule will be $16,133 to $80,667 a
year (average of operations manager, engineer, and lawyer hourly
salaries in Table 2 [$484/hour/3 = $161.33] * [100 and 500 hours]). The
annual cost burden placed on impacted entities includes (but is not
limited to) producing the necessary HBOMs and SBOMs and documenting due
diligence efforts. These hour and cost estimates are subject to
variations among responsible entities due to application type.
Declarations of Conformity will need to be submitted annually at
minimum, while Specific Authorizations will need to be updated on an
as-needed basis.
The estimated annual federal salary cost to the U.S. Government is
$1,130,000 [500 Declaration of Conformity/Specific Authorization
notifications per year * two staff at a GS-13 salary ($113/hour * 2 =
$226/hour) * average of 10 hours each to review each notification]. The
$113 per staff member per hour cost estimate for this information
collection is consistent with the GS-scale salary data for a GS-13 Step
1 (https://www.opm.gov/policy-data-oversight/pay-leave/salaries-wages/salary-tables/pdf/2024/DCB.pdf) multiplied by a factor of 2 to include
the cost of benefits and overhead.
The total estimated annual cost to the U.S. Government is
$1,437,982.00. The calculation is as follows: Federal Employee Salaries
(2 full-time employees) [$1,130,000.00] + Federal Government Overhead
@20% [$226,000.00] + Legal Support (GS-15 Step 1 salary (multiplied by
2 to include the cost of benefits and overhead) @25%) [$81,982.00] =
$1,437,982.00.
BIS requests comments on the information collection and
recordkeeping requirements associated with this proposed rule. These
comments will help BIS:
i. Evaluate whether the information collection is necessary for the
proper performance of our agency's functions, including whether the
information will have practical utility;
ii. Evaluate the accuracy of our estimate of the burden of the
information collection, including the validity of the methodology and
assumptions used;
iii. Enhance the quality, utility, and clarity of the information
to be collected; and
iv. Minimize the burden of the information collection on those who
are to respond (such as through the use of
[[Page 79114]]
appropriate automated, electronic, mechanical, or other technological
collection techniques or other forms of information technology, e.g.,
permitting electronic submission of responses).
8. Regulatory Flexibility Act
In compliance with Section 603 of the Regulatory Flexibility Act
(RFA), 5 U.S.C. 601-612, the Department has prepared an initial
regulatory flexibility analysis (IRFA) for this proposed rule. The IRFA
describes the economic impacts the proposed action may have on small
entities. The Department seeks comments on all aspects of the IRFA.
1. A description of the reasons why action by the agency is being
considered. Connected Vehicles contain a growing number of connected
components. While these components provide greater safety and
convenience through features like Wi-Fi, Bluetooth, cellular
telecommunication, and satellite connectivity, the incorporation of
progressively complex hardware and software systems enabling vehicle
connectivity has also increased the attack surfaces through which
malign actors may exploit vulnerabilities to gain access to a vehicle.
ICTS integral to Connected Vehicles present an undue or unacceptable
risk to U.S. national security when those systems are designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia.
Furthermore, the PRC and Russia are able to leverage legal and
regulatory regimes to compel private companies subject to their
jurisdiction, including carmakers and vehicle suppliers, to cooperate
with state security and intelligences services. Cooperation can include
providing data, logical access, encryption keys, and other vital
technical information, as well as by installing backdoors or bugs on
equipment or in software updates, ultimately making vehicle equipment
exploitable by foreign adversaries. Such privileged access potentially
enables the PRC and Russia to exfiltrate sensitive data collected by
Connected Vehicles through their components and allow remote
manipulation for vehicles driven by U.S. persons.
2. A succinct statement of the objectives of, and legal basis for,
the proposed rule. The Department is proposing this rule pursuant to
authority under the International Emergency Economic Powers Act (IEEPA)
(50 U.S.C. 1701, et seq.), the National Emergencies Act (NEA) (50
U.S.C. 1601, et seq.), and Section 301 of Title 3, United States Code,
and in accordance with E.O. 13873, ``Securing the Information and
Communications Technology and Services Supply Chain,'' 84 FR 22689 (May
17, 2019), which delegated to the Secretary of Commerce (Secretary)
certain authorities provided to the President by IEEPA, the NEA, and
Section 301 of Title 3 of the United States Code. In accordance with
the National Emergencies Act, the President has declared each year
since E.O. 13873 was published that the national emergency declared in
E.O. 13873 regarding the ICTS supply chain continues to remain in
effect.
To address identified risks to national security from ICTS
transactions, E.O. 13873 directs the Secretary (in consultation with
other agency heads identified in E.O. 13873) to review any ICTS
transaction, defined as any acquisition, importation, transfer,
installation, dealing in, or use of any ICTS by any person, or with
respect to any property, subject to United States jurisdiction, where
the transaction involves any property in which a foreign country or
national has any interest. When the Secretary, in consultation with the
appropriate agency heads, finds that an ICTS transaction or class of
ICTS transactions pose undue risks (including of sabotage, subversion,
or catastrophic effects on the security and resiliency of U.S. critical
infrastructure), or unacceptable risks to national security or the
security and safety of U.S. persons, the Secretary may identify the
ICTS transaction as prohibited by Section 1 of E.O. 13873 or impose
mitigation measures on the ICTS transaction or class of ICTS
transactions reviewed. E.O. 13873 additionally provides that the
Secretary issue rules establishing criteria by which particular
technologies or market participants may be categorically included in or
categorically excluded from prohibitions established pursuant to the
E.O.
3. A description of and, where feasible, an estimate of the number
of small entities to which the proposed rule will apply. BIS
anticipates that the entities primarily responsible for compliance with
this regulation will be connected vehicle manufacturers and VCS
hardware importers. BIS assesses, based on publicly available
information, that the U.S. connected vehicle market is dominated by a
small set of manufacturers, few of which would be considered ``small
entities'' under the Small Business Administration's definitions. The
Small Business Administration small business size standard for NAICS
336110: Automobile and Light Duty Motor Vehicle Manufacturing and NAICS
336120: Heavy Duty Truck Manufacturing is 1,500 employees or fewer.
However, BIS has limited data on how many of these suppliers engage in
covered software and VCS hardware transactions, and therefore cannot
estimate how many of these suppliers qualify as small entities. BIS
specifically seeks comments on the number of suppliers engaged in
covered software and VCS Hardware transactions in the United States, as
well as the percentage of those entities that might or could qualify as
small entities.
4. A description of the projected reporting, recordkeeping, and
other compliance requirements of the proposed rule, including an
estimate of the classes of small entities that will be subject to the
requirement and the type of professional skills necessary for
preparation of the report or record. As stated above, connected vehicle
manufacturers and VCS hardware importers will bear the majority of the
proposed rule's compliance costs. BIS estimates that the recordkeeping
and compliance burden placed on responsible small entities would
involve operations managers, engineers, and lawyers. On an annual
basis, these entities will need to, at minimum and if applicable,
submit a Declaration of Conformity certifying that their import of VCS
hardware and/or import or manufacture of completed connected vehicles
does not involve hardware or software subject to the prohibitions in
this proposed rule. The Declaration of Conformity would also include
technical information regarding the hardware or software in question
and a Bill of Materials for applicable software, hardware, or both.
BIS proposes to require connected vehicle manufacturers and VCS
hardware importers to maintain complete records related to any
transaction for which a Declaration of Conformity, general
authorization, or specific authorization would be required by this
rule, for a period of ten years, consistent with IEEPA's statute of
limitations. These records would be expected to assist BIS's
enforcement efforts for the prohibitions in the proposed rule. The
required records would include those related to any transaction that is
subject to a general authorization (including records of any entities
producing fewer than 1,000 connected vehicle or VCS hardware units in a
calendar year), any transaction that is subject to a specific
authorization, and any transaction involving covered software or VCS
Hardware for which the connected vehicle manufacturer or VCS hardware
importer has not yet sought an
[[Page 79115]]
authorization. BIS expects such records to include all information
submitted in applications, as well as business records related to the
execution of any ICTS transaction subject to the rule, such as
contracts, import records, bills of sale, and all other files BIS may
deem pertinent in assessing compliance with this proposed rule.
Because small entities could avail themselves of a general
authorization, the maintenance of records in support of such
authorization would be the only compliance requirement. These records
would serve as the small entities' self-certification, which does not
need to be submitted to BIS. A general authorization would allow the
VCS hardware importer and/or connected vehicle manufacturer to engage
in the otherwise prohibited transaction, without the need to notify or
seek approval from BIS. General Authorizations would be available only
in a narrow set of circumstances in which the conditions of the
otherwise prohibited transaction appropriately mitigate the level of
risk associated with the particular transaction. Such conditions would
include, for example, when VCS hardware is imported from the PRC or
Russia solely for testing purposes, or where the completed connected
vehicle that incorporates VCS hardware or covered software from the PRC
or Russia will not be driven on public roads for more than 30 calendar
days per year. Those availing themselves of a general authorization
would be required to continuously monitor their use of the VCS hardware
or completed connected vehicles covered by the general authorization to
ensure the authorization still applies. If a change would render the
transaction ineligible for a general authorization, such as a change in
the vehicle's use, the VCS hardware importer or connected vehicle
manufacturer would be required to apply for a specific authorization
and to cease engaging in such transaction unless and until a specific
authorization is granted. For example, if a completed connected vehicle
that incorporates covered software or VCS Hardware that is designed,
developed, manufactured, or supplied by a person owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia is
no longer engaged in display, research, or testing, the VCS hardware
importer or the connected vehicle manufacturer would be required to
seek a specific authorization. Similarly, if the VCS Hardware Importer
or connected vehicle manufacturer exceeds total model year production
of 1,000 units, or if a completed connected vehicle that incorporates
covered software or VCS hardware that is designed, developed,
manufactured, or supplied by a person owned by, controlled by, or
subject to the jurisdiction or direction of the PRC or Russia is to be
used on public roadways for 30 or more days in any calendar year, the
VCS hardware importer or connected vehicle manufacturer would be
required to seek a specific authorization from BIS.
5. An identification, to the extent practicable, of all relevant
Federal rules that may duplicate, overlap, or conflict with the
proposed rule. This rulemaking does not duplicate or conflict with any
Federal rules.
6. A description of any significant alternatives to the proposed
rule that accomplish the stated objectives of Executive Order 13984 and
Executive Order 14110 and applicable statutes and that would minimize
any significant economic impact of the proposed rule on small entities.
The Department has proposed what it believes to be ``the least
restrictive means necessary [by] tailor[ing] the prohibition to address
the undue or unacceptable risk'' (see 15 CFR part 791.109(c)) and
believes that the proposed rule will materially address significant
risks for the United States or U.S. persons while balancing the overall
compliance costs of the rule and minimizing the impact on small
entities. Below is a description of alternatives considered by the
Department; the Department invites comment on these alternatives.
No-action alternative: While the alternative of taking no action
would be less costly for connected vehicle manufacturers and VCS
hardware importers, the no-action alternative is not preferred because
the risks presented by foreign adversary involvement in the ICTS of the
U.S. connected vehicle market could lead to catastrophic negative
events for U.S. national security, including the security of U.S.
critical infrastructure, and U.S. persons.
More stringent alternatives: The Department considered several more
stringent regulatory approaches, including regulating additional
connected vehicle component systems not included in this proposed rule.
For example, the Department considered the risks posed by various
connected vehicle component systems, including ADS, telematics, battery
management systems (BMS), automated driver assistance systems (ADAS),
vehicle operating systems (OS), and satellite or cellular
telecommunication systems. The Department currently believes the best
approach to address the risks posed by connected vehicles and connected
vehicle components from foreign adversary nations is to focus the scope
of the NPRM on PRC- and Russian-supplied VCS hardware (which
encompasses both telematics and satellite or cellular telecommunication
systems) and covered software. Other systems under consideration, such
as ADAS, seem to have a low risk of data exfiltration or, in the case
of vehicle OS, would involve regulation that is expected to be
extremely burdensome on industry.
Preferred alternative: The proposed rule is the preferred
alternative. BIS assesses that the regulatory approach outlined in this
proposed rule would have the highest net benefit for connected vehicle
manufacturers, VCS hardware importers, and consumers. BIS currently
believes the provisions in the proposed rule are also to be, for the
reasons articulated above and in the NPRM's preamble, ``the least
restrictive means necessary. . .to address the undue or unacceptable
risk'' presented by covered software and VCS hardware in connected
vehicles.
List of Subjects in 15 CFR Part 791
Business and industry, Communications, Computer technology,
Critical infrastructure, Executive orders, Foreign persons,
Investigations, National security, Penalties, Technology,
Telecommunications.
Elizabeth L.D. Cannon,
Executive Director, Office of Information and Communications Technology
and Services, Bureau of Industry and Security, United States Department
of Commerce.
For the reasons set out in the preamble, 15 CFR part 791, is
proposed to be amended as follows:
PART 791--SECURING THE INFORMATION AND COMMUNICATIONS TECHNOLOGY
AND SERVICES SUPPLY CHAIN
0
1. The authority citation for part 791continues to readas follows:
Authority: 50 U.S.C. 1701et seq.; 50 U.S.C. 1601et seq.; E.O.
13873, 84 FR 22689; E.O. 14034, 86 FR 31423.
0
2. Amend part 791 by adding subpart D, consisting of Sec. 791.300
through Sec. 791.319, to read as follows:
Subpart D--ICTS Supply Chain: Connected Vehicles
Sec.
791.300 Purpose and scope.
791.301 Definitions.
791.302 Prohibited VCS hardware transactions.
[[Page 79116]]
791.303 Prohibited covered software transactions.
791.304 Related prohibited transactions.
791.305 Declaration of Conformity.
791.306 General authorizations.
791.307 Specific authorizations.
791.308 Exemptions.
791.309 Appeals.
791.310 Advisory opinions.
791.311 ``Is-Informed'' notices.
791.312 Recordkeeping.
791.313 Reports to be furnished on demand.
791.314 Penalties.
791.315 Pre-penalty notice; settlement.
791.316 Penalty imposition.
791.317 Administrative collection; referral to United States
Department of Justice.
791.318 Finding of violation.
791.319 Severability.
Subpart D--ICTS Supply Chain: Connected Vehicles
Sec. 791.300 Purpose and scope.
The inclusion in Connected Vehicles of certain ICTS designed,
developed, manufactured, or supplied by persons owned by, controlled
by, or subject to the jurisdiction or direction of certain foreign
adversaries poses undue or unacceptable risks to U.S. national
security. To address these undue or unacceptable risks, it is the
purpose of this subpart to:
(a) Prohibit ICTS transactions that involve certain software and
hardware that, are designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the People's Republic of China (PRC) or the Russian
Federation (Russia), as defined in Sec. 791.4 and that enable
connected vehicle Automated Driving Systems or Vehicle Connectivity
Systems, as defined in this subpart;
(b) Implement compliance mechanisms such as Declarations of
Conformity to ensure that no Prohibited Transactions, as defined in
this subpart, have occurred;
(c) Provide general authorizations and a mechanism for specific
authorizations for certain transactions that are otherwise prohibited
by this subpart, but where any undue or unacceptable risks to national
security can be reasonably mitigated, based on defined criteria and
conditions; and
(d) Incentivize connected vehicle manufacturers, VCS hardware
importers, and related suppliers to adopt measures to help secure the
U.S. ICTS supply chain for connected vehicles.
Sec. 791.301 Definitions.
The following definitions apply only to this subpart, 15 CFR part
791 subpart D. For additional definitions applicable to all of part
791, see 15 CFR 791.2. If a term is defined differently in this subpart
than in 15 CFR 791.2, the definition listed in this section will apply
to this subpart.
Automated Driving System means hardware and software that,
collectively, are capable of performing the entire dynamic driving task
for a completed connected vehicle on a sustained basis, regardless of
whether it is limited to a specific operational design domain (ODD).
Completed connected vehicle means a connected vehicle that requires
no further manufacturing operations to perform its intended function.
For the purposes of this subpart, the integration of an Automated
Driving System into a connected vehicle constitutes a manufacturing
operation for a completed connected vehicle.
Connected vehicle means a vehicle driven or drawn by mechanical
power and manufactured primarily for use on public streets, roads, and
highways, that integrates onboard networked hardware with automotive
software systems to communicate via dedicated short-range
communication, cellular telecommunications connectivity, satellite
communication, or other wireless spectrum connectivity with any other
network or device. Vehicles operated only on a rail line are not
included in this definition.
Connected vehicle manufacturer means a U.S. person
(1) Manufacturing or assembling completed connected vehicles in the
United States; and/or
(2) Importing completed connected vehicles for sale in the United
States.
Covered software means the software-based components, in which
there is a foreign interest, executed by the primary processing unit of
the respective systems that are part of an item that supports the
function of Vehicle Connectivity Systems or Automated Driving Systems
at the vehicle level. Covered software does not include firmware, which
is characterized as software specifically programmed for a hardware
device with a primary purpose of controlling, configuring, and
communicating with that hardware device. Covered software also does not
include open-source software that can be freely used, modified, and
distributed by anyone, with both access to the source code and the
ability to contribute to the software's development and improvement
unless that open-source software has been modified for proprietary
purposes and not redistributed or shared.
FCC ID Number means the unique alphanumeric code identifying a
product subject to certification by the Federal Communications
Commission composed of a:
(1) Grantee code; and
(2) Product code.
Foreign interest, for purposes of this subpart, means any interest
in property of any nature whatsoever, whether direct or indirect, by a
non-U.S. person.
Hardware Bill of Materials (HBOM) means a comprehensive list of
parts, assemblies, documents, drawings, and components required to
create a physical product, including information identifying the
manufacturer, related firmware, technical information, and descriptive
information.
Import means, in the context of this subpart, with respect to any
article, the entry of such article into the United States Customs
Territory. It does not include admission of an article from outside the
United States into a foreign-trade zone for storage pending further
assembly in the foreign-trade zone or shipment to a foreign country.
Item means a component or set of components with a specific
function at the vehicle level. A system may also be considered an item
if it implements a function.
Knowingly means having knowledge of a circumstance (the term may be
a variant, such as ``know,'' ``reason to know,'' or ``reason to
believe''), to include not only positive knowledge that the
circumstance exists or is substantially certain to occur, but also an
awareness of a high probability of its existence or future occurrence.
Such awareness is inferred from evidence of the conscious disregard of
facts known to a person and is also inferred from a person's willful
avoidance of facts.
Model year means the year used to designate a discrete vehicle
model, irrespective of the calendar year in which the vehicle was
actually produced, provided that the production period does not exceed
24 months.
Prohibited transactions mean, collectively, the transactions
described in 791.302 (Prohibited VCS Hardware Transactions), 791.303
(Prohibited Covered Software Transactions), or 791.304 (Related
Prohibited Transactions) of this subpart.
Person owned by, controlled by, or subject to the jurisdiction or
direction of a foreign adversary means:
(1) Any person, wherever located, who acts as an agent,
representative, or employee, or any person who acts in any other
capacity at the order, request, or under the direction or control, of a
foreign adversary or of a person whose activities are directly or
indirectly
[[Page 79117]]
supervised, directed, controlled, financed, or subsidized in whole or
in majority part by a foreign adversary;
(2) Any person, wherever located, who is a citizen or resident of a
foreign adversary or a country controlled by a foreign adversary, and
is not a United States citizen or permanent resident of the United
States;
(3) Any corporation, partnership, association, or other
organization with a principal place of business in, headquartered in,
incorporated in, or otherwise organized under the laws of a foreign
adversary or a country controlled by a foreign adversary; or
(4) Any corporation, partnership, association, or other
organization, wherever organized or doing business, that is owned or
controlled by a foreign adversary, to include circumstances in which
any person identified in paragraphs (a) through (c) possesses the
power, direct or indirect, whether or not exercised, through the
ownership of a majority or a dominant minority of the total outstanding
voting interest in an entity, board representation, proxy voting, a
special share, contractual arrangements, formal or informal
arrangements to act in concert, or other means, to determine, direct,
or decide important matters affecting an entity.
Sale means, in the context of this subpart, distributing for
purchase, lease, or other commercial operations a new completed
connected vehicle for a price, to include the transfer of completed
connected vehicles from a connected vehicle manufacturer to a dealer or
distributor, as those terms are defined in 49 U.S.C. 30102. This
definition also applies to the related terms such as Sell or Selling.
Software Bill of Materials (SBOM) means a formal and dynamic,
machine-readable inventory detailing the software supply chain
relationships between software components and subcomponents, including
software dependencies, hierarchical relationships, and baseline
software attributes, including author's name, timestamp, supplier name,
component name, version string, component hash package URL, unique
identifier, and dependency relationships to other software components.
Vehicle Connectivity System (VCS) means a hardware or software item
for a completed connected vehicle that has the function of enabling the
transmission, receipt, conversion, or processing of radio frequency
communications at a frequency over 450 megahertz.
VCS hardware means the following software-enabled or programmable
components and subcomponents that support the function of Vehicle
Connectivity Systems or are part of an item that supports the function
of Vehicle Connectivity Systems: microcontroller, microcomputers or
modules, systems on a chip, networking or telematics units, cellular
modem/modules, Wi-Fi microcontrollers or modules, Bluetooth
microcontrollers or modules, satellite navigation systems, satellite
communication systems, other wireless communication microcontrollers or
modules, and external antennas. VCS hardware does not include component
parts that do not contribute to the communication function of VCS
hardware (e.g., brackets, fasteners, plastics, and passive
electronics).
VCS hardware importer means a U.S. person importing VCS hardware
for further manufacturing, integration, resale, or distribution. A
connected vehicle manufacturer may be a VCS hardware importer if VCS
hardware has already been installed in a connected vehicle when
imported by the connected vehicle manufacturer.
United States means the United States of America, the States of the
United States, the District of Columbia, and any commonwealth,
territory, dependency, or possession of the United States, or any
subdivision thereof, and the territorial sea of the United States.
Sec. 791.302 Prohibited VCS hardware transactions.
(a) VCS hardware importers are prohibited from knowingly importing
VCS hardware that is designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia.
(b) In the context of this subpart, VCS hardware will not be
considered to be designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia, solely based on the country of
citizenship of natural persons who are employed, contracted, or
otherwise similarly engaged to participate in the design, development,
manufacture, or supply of the VCS hardware.
Sec. 791.303 Prohibited covered software transactions.
(a) Connected vehicle manufacturers are prohibited from knowingly
importing into the United States completed connected vehicles that
incorporate covered software, designed, developed, manufactured, or
supplied by persons owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia.
(b) Connected vehicle manufacturers are prohibited from knowingly
selling in the United States completed connected vehicles that
incorporate covered software, designed, developed, manufactured, or
supplied by persons owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia.
(c) In the context of this subpart, covered software will not be
considered to be designed, developed, manufactured, or supplied by
persons owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia, solely based on the country of
citizenship of natural persons who are employed, contracted, or
otherwise similarly engaged to participate in the design, development,
manufacture, or supply of the Covered Software.
Sec. 791.304 Related prohibited transactions.
Connected vehicle manufacturers who are persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia, are prohibited from knowingly selling in the United States
completed connected vehicles that incorporate VCS hardware or covered
software.
Sec. 791.305 Declaration of Conformity.
(a) Requirements--(1) Import of VCS hardware: A VCS hardware
importer may not import VCS Hardware as part of a transaction that is
not otherwise prohibited by this subpart without first submitting to
the Bureau of Industry and Security (BIS) a Declaration of Conformity,
unless otherwise specified by this subpart. The Declaration of
Conformity shall include:
(i) The name and address of VCS hardware importer;
(ii) A certification that the declarant has not knowingly engaged
in a prohibited VCS hardware transaction;
(iii) The FCC ID Number associated with the VCS hardware and, if
applicable, of the subcomponents contained therein;
(iv) A list of third-party external endpoints to which the VCS
hardware connects, including the country where each endpoint is located
and/or the identity and location of the service provider;
(v) If known, the make, model, and trim of the completed connected
vehicles for which the VCS hardware is intended;
(vi) A HBOM for the VCS hardware that is the subject of the
Declaration of Conformity;
(vii) Documentation of the VCS hardware importer's due diligence
efforts, to include independent or hired third-party research, to
ensure the VCS
[[Page 79118]]
hardware listed in the HBOM is not designed, developed, manufactured,
or supplied by persons owned by, controlled by, or subject to the
jurisdiction or direction of the PRC or Russia;
(viii) If applicable, an indication of whether the submission is an
update to a prior Declaration of Conformity and the date of the last
submission;
(ix) Identifying information for an individual point of contact
(including name, email address, and phone number); and,
(x) Any additional material information the VCS hardware importer
would like to submit.
(2) Import of completed connected vehicles: A connected vehicle
manufacturer may not import completed connected vehicles containing
covered software as part of a transaction that is not otherwise
prohibited by this subpart without first submitting to BIS a
Declaration of Conformity, unless otherwise specified by this subpart.
The Declaration of Conformity shall include:
(i) The name and address of the connected vehicle manufacturer;
(ii) A certification that the declarant has not knowingly engaged
in a prohibited covered software transaction;
(iii) The make, model, trim, and Vehicle Identification Number
(VIN) series applicable to the completed connected vehicles;
(iv) A SBOM for the covered software that is the subject of the
Declaration of Conformity. At a minimum, the SBOM must include author's
name, timestamp, supplier name, component name, version string,
component hash, package URL, unique identifier, and dependency
relationships to other software components.
(v) Documentation of the connected vehicle manufacturer's due
diligence efforts, to include independent or hired third-party
research, to ensure that the covered software listed in the SBOM is not
designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia;
(vi) If applicable, an indication of whether the submission is an
update to a prior Declaration of Conformity and the date of the last
submission;
(vii) Identifying information for an individual point of contact
(including name, email address, and phone number); and
(viii) Any additional material information the connected vehicle
manufacturer would like to submit.
(3) Sale of completed connected vehicles manufactured in the United
States: Connected vehicle manufacturers that manufacture or assemble
completed connected vehicles in the United States that incorporate
covered software as part of a transaction that is not otherwise
prohibited by this subpart, may not Sell completed connected vehicles
in the United States without first submitting to BIS a Declaration of
Conformity, unless otherwise specified by this subpart. If there is no
Foreign Interest in the covered software that is incorporated in
completed connected vehicles manufactured or assembled in the United
States, the connected vehicle manufacturer need not submit a
Declaration of Conformity. If submitting a Declaration of Conformity,
it shall include:
(i) The name and address of the connected vehicle manufacturer;
(ii) A certification that there is a foreign interest in the
covered software that is incorporated in the completed connected
vehicles that will be Sold in the United States;
(iii) A certification that the declarant has not knowingly engaged
in a prohibited covered software Transaction;
(iv) The make, model, trim, and VIN series applicable to the
completed connected vehicles;
(v) A SBOM for the covered software that is the subject of the
Declaration of Conformity. At a minimum, the SBOM must include author's
name, timestamp, supplier name, component name, version string,
component hash, package URL, unique identifier, and dependency
relationships to other software components.
(vi) Documentation of the connected vehicle manufacturer's due
diligence efforts, to include independent or hired third-party
research, to ensure the covered software listed in the SBOM is not
designed, developed, manufactured, or supplied by persons owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia;
(vii) If applicable, an indication of whether the submission is an
update to a prior Declaration of Conformity and the date of the last
submission;
(viii) Identifying information for an individual point of contact
(including name, email address, and phone number); and
(ix) Any additional material information the connected vehicle
manufacturer would like to submit.
(b) Procedures to submit Declarations of Conformity. Connected
vehicle manufacturers and VCS Hardware Importers shall submit
Declarations of Conformity annually as specified in this section and
any time there is a material change that makes a prior Declaration of
Conformity or associated HBOM or SBOM no longer accurate.
(1) Connected Vehicles Manufacturers seeking to import or
manufacture for Sale in the United States a completed connected vehicle
containing covered software shall submit a Declaration of Conformity 60
days prior to the first import or first sale of each model year of
completed connected vehicles, grouped by make, model, and trim.
(2) VCS hardware importers seeking to import any VCS hardware shall
submit a Declaration of Conformity 60 days prior to the first import of
VCS hardware for each model year for units associated with a vehicle
model year, or calendar year for units not associated with a vehicle
model year. VCS hardware importers may submit a single Declaration of
Conformity detailing all VCS Hardware models that will be imported in
the Model Year or calendar year.
(3) Entities that are both connected vehicle manufacturers and VCS
hardware importers may, but are not required to, submit a single
compiled Declaration of Conformity detailing all required information
specified in 791.305 of this subpart. Any compiled Declaration of
Conformity shall be submitted 60 days prior to the first import or
first sale of the model year of completed connected vehicles or 60 days
prior to the first import of VCS hardware, whichever occurs first.
(4) Declarants must notify BIS of any material change in the
contents of a previously submitted Declaration of Conformity by
submitting a revised Declaration of Conformity within 30 days following
any such changes.
(c) Declarations of Conformity must be delivered to BIS using an
official electronic reporting option as specified by BIS on its website
(https://www.bis.gov).
(d) Connected vehicle introduced by means of a fraudulent or false
declaration. Any person who engages in a prohibited VCS hardware
transaction or a prohibited covered software transaction and submits a
false or fraudulent Declaration of Conformity made without reasonable
cause to believe the truth of the declaration, may incur penalties as
defined in Sec. 791.314.
Sec. 791.306 General authorizations.
(a) VCS hardware importers and connected vehicle manufacturers may
qualify for a general authorization if they meet the stated
requirements or conditions to engage in otherwise prohibited
transactions. Persons availing themselves of any general authorization
are required to maintain
[[Page 79119]]
records documenting each otherwise prohibited transaction for a period
of 10 years as specified in Sec. 791.312.
(b) General course of procedure. VCS hardware importers and
connected vehicle manufacturers may self-certify, without need to
notify BIS, that they meet the requirements for one or more of the
following general authorizations:
(1) The connected vehicle manufacturer or VCS hardware importer and
entities under common control, including parents, engaging in an
otherwise prohibited transaction produces a total model year production
of completed connected vehicles containing covered software or total
model year production of VCS hardware is less than 1,000 units;
(2) The completed connected vehicle that incorporates covered
software or VCS hardware will be used on public roadways on fewer than
30 calendar days in any calendar year;
(3) The completed connected vehicle that incorporates covered
software or the VCS hardware will be used solely for the purpose of
display, testing, or research, and will not be used on public roadways;
or
(4) The completed connected vehicle that incorporates covered
software or the VCS hardware is imported solely for purposes of repair,
alteration, or competition off public roads and will be reexported
within one year from the time of import;
(c) Change in use. In the event of any change in the use of a
completed connected vehicle or VCS hardware associated with a general
authorization, a VCS hardware importer or connected vehicle
manufacturer availing itself of a general authorization must determine
if it still qualifies for the general authorization or if it must apply
for a specific authorization.
(d) Inspection. VCS hardware importers and connected vehicle
manufacturers availing themselves of a general authorization are
subject to audit and inspection by BIS.
(e) Restrictions. VCS Hardware importers and connected vehicle
manufacturers shall not avail themselves of any general authorization
if any one or more of the following apply:
(1) BIS has notified the VCS hardware importer or connected vehicle
manufacturer that it is not eligible for a general authorization.
(2) The VCS Hardware Importer or connected vehicle manufacturer is
a person owned by, controlled by, or subject to the jurisdiction or
direction of the PRC or Russia.
Sec. 791.307 Specific authorizations.
(a) BIS may provide Specific Authorizations permitting a VCS
hardware importer or connected vehicle manufacturer to engage in
otherwise prohibited transactions. Persons receiving a specific
authorization are required to maintain records for a period of 10 years
as required in Sec. 791.312 and submit reports and statements in
accordance with the instructions specified in each specific
authorization.
(b) General course of procedure. Prohibited transactions subject to
this subpart, and that are not otherwise permitted under an exemption
or a general authorization, may be permitted under a specific
authorization. It is the policy of BIS not to grant applications for
specific authorizations for transactions that are permitted by a
general authorization.
(c) Applications for specific authorizations. Applications for
specific authorizations shall include, at a minimum, a description of
the nature of the otherwise prohibited transaction(s), including the
following:
(1) The identity of the parties engaged in the transaction,
including relevant corporate identifiers and information sufficient to
identify the ultimate beneficial ownership of the transacting parties;
(2) An overview of the VCS hardware or covered software that is
designed, developed, manufactured, or supplied by a person owned by,
controlled by, or subject to the jurisdiction or direction of the PRC
or Russia;
(3) If known, the make, model, and trim of the completed connected
vehicle in which the VCS hardware or covered software will be
integrated;
(4) The intended function of the VCS hardware or covered software;
(5) Documentation to support the information contained in the
application, including ISO/SAE 21434 Threat Analysis and Risk
Assessments, to include an assessment on the applicant's ability to
limit PRC or Russian government access to, or influence over the
design, development, manufacture or supply of the VCS hardware or
covered software; security standards used by the applicant with respect
to the VCS hardware or covered software; other actions and proposals
such as technical controls (i.e., software validation) or operational
controls (i.e., physical and logical access monitoring procedures), the
applicant intends to take to mitigate undue or unacceptable risk; and
(6) Any other information that BIS may request after receipt of the
initial application for a Specific Authorization.
(d) Application submission procedures. A VCS hardware importer or
connected vehicle manufacturer who seeks to engage in an otherwise
prohibited transaction must submit an application for specific
authorization in writing prior to engaging in the transaction and await
a decision from BIS prior to engaging in the transaction. This
application must be delivered to BIS using an official electronic
reporting option as specified by BIS on its website (https://www.bis.gov).
(e) Additional conditions. Only one application for a specific
authorization should be submitted to BIS for each otherwise prohibited
transaction; multiple parties submitting an application for a specific
authorization for the same transaction may result in processing delays.
(f) Information to be supplied. An applicant may be required to
furnish additional information as BIS deems necessary to assist in
making a decision. The applicant may present additional information
concerning an application for a specific authorization at any time
before BIS makes its decision with respect to the application.
(g) Review and decisions. Applications for specific authorization
will be reviewed on a case-by-case basis and determine conditions to be
applied to each specific authorization as may be needed to mitigate any
risk that arises as a result of the otherwise prohibited transaction.
Such review may include an evaluation of the risks and potential
mitigation measures proposed by the applicant for the particular
transaction, including, but not limited to, risks of data exfiltration
from, and remote manipulation or operation of, the connected vehicle;
the extent and nature of foreign adversary involvement in the design,
development, manufacture, or supply of the VCS hardware or covered
software; the applicant's ability to limit PRC or Russian government
access to, or influence over the design, development, manufacture or
supply of the VCS hardware or covered software; security standards used
by the applicant and if such standards can be validated by BIS or a
third-party; other actions and proposals the applicant intends to take
to mitigate undue or unacceptable risk. BIS will advise each applicant
of the decision respecting the filed application.
(h) Processing period. BIS shall respond to any application for a
specific authorization with a status update and a request for
additional information or documents, if any, within 90 days after
receipt of the application.
(i) Scope. (1) Unless otherwise specified in the authorization, a
specific
[[Page 79120]]
authorization permits the transaction only:
(i) Between the parties identified in the specific authorization;
(ii) With respect to the otherwise prohibited transaction(s)
described in the authorization; and
(iii) If the conditions specified in the specific authorization are
satisfied. The applicant must inform any other parties identified in
the specific authorization of the authorization's scope and specific
conditions.
(2) Any specific authorization obtained based on a false or
misleading representation in the application or in any document
submitted in connection with the application under this section shall
be deemed void as of the date of issuance, and the applicant may incur
penalties as specified in Sec. 791.314.
(3) As a condition for the issuance of any specific authorization,
the applicant may be required to file reports with respect to the
otherwise prohibited transactions authorized by the specific
authorization in such form and at such times and places as may be
prescribed in the specific authorization or otherwise communicated to
the applicant by BIS. Reports should be sent in accordance with the
instructions provided in the applicable specific authorization.
(j) Effect of denial. BIS's denial of a specific authorization may
be appealed as described in Sec. 791.309 and does not preclude parties
from filing an application for a specific authorization for a separate
otherwise prohibited transaction. The applicant may at any time
request, by written correspondence, reconsideration of the denial of an
application based on new material facts or changed circumstances.
(k) Effect of specific authorization. (1) No specific authorization
issued under this subpart, or otherwise issued by BIS, permits or
validates any prohibited transaction effected prior to the issuance of
such specific authorization unless specifically provided for in the
specific authorization.
(2) No regulation, ruling, instruction, or authorization permits
any prohibited transaction under this subpart unless the regulation,
ruling, instruction or Authorization is issued by BIS and specifically
refers to this subpart. No regulation, ruling, instruction, or
authorization referring to this subpart shall be deemed to permit any
prohibited transaction prohibited by any provision of this subpart
unless the regulation, ruling, instruction, or authorization
specifically refers to such provision. Any specific authorization
permitting any otherwise prohibited transaction has the effect of
removing those prohibitions from the transaction, but only to the
extent specifically stated by the terms of the specific authorization.
Unless the specific authorization otherwise specifies, such an
authorization does not create any right, duty, obligation, claim, or
interest in, or with respect to, any property that would not otherwise
exist under ordinary principles of law.
(3) Nothing contained in this subpart shall be construed to
supersede the requirements established under any other provision of law
or to relieve a person from any requirement to obtain an authorization
from another department or agency of the U.S. Government in compliance
with applicable laws and regulations subject to the jurisdiction of
that department or agency.
(l) Amendment, modification, or rescission. Except as otherwise
provided by law, any Specific Authorization or instructions issued
thereunder may be amended, modified, or rescinded by BIS at any time.
Sec. 791.308 Exemptions.
(a) VCS hardware importers may engage in prohibited transactions
described in Sec. 791.302 without an authorization as required under
Sec. Sec. 791.306 and 791.307, and are exempt from submitting
Declarations of Conformity with respect to all other transactions, as
described in Sec. 791.305 provided that:
(1) For VCS Hardware units not associated with a vehicle model
year, the import of the VCS hardware occurs prior to January 1, 2029;
or
(2) The VCS hardware is associated with a vehicle model year prior
to 2030 or the VCS hardware is imported as part of a connected vehicle
with a model year prior to 2030.
(b) Connected vehicle manufacturers may engage in prohibited
transactions described in Sec. 791.303 without authorization as
required under Sec. Sec. 791.306 or 791.307 and are exempt from
submitting Declarations of Conformity with respect to all other
transactions, as described in Sec. 791.305, provided that the
completed connected vehicle that incorporates covered software
described in Sec. 791.303(a)(1) was manufactured prior to Model Year
2027.
(c) Connected vehicle manufacturers who are owned by, controlled
by, or subject to the jurisdiction or direction of the PRC or Russia
may engage in prohibited transactions described in section 791.304
without Authorization as required under Sec. Sec. 791.306 or 791.307,
and are exempt from submitting Declarations of Conformity to all other
transactions, provided that the completed connected vehicle that
incorporates VCS hardware and/or covered software was manufactured
prior to Model Year 2027.
Sec. 791.309 Appeals.
(a) Scope. Any person directly and adversely affected by any of the
listed administrative actions taken by BIS pursuant to this subpart may
appeal to the Under Secretary for reconsideration of that
administrative action. Only the following types of administrative
actions are subject to the appeals procedures described in this
subpart:
(1) Denial of an application for specific authorization;
(2) Suspension or revocation of an issued specific authorization;
or
(3) Determination of ineligibility for a general authorization.
(b) Designated appeals reviewer and coordinator. The Under
Secretary may delegate to the Deputy Under Secretary of Commerce for
Industry and Security or to another BIS official the authority to
review and decide the appeal, and to exercise any other function of the
Under Secretary under this section. In addition, the Under Secretary
may designate any employee of BIS to be an appeals coordinator to
assist in the review and processing of an appeal under this subpart.
(c) Appeals procedures. An appeal under this subpart must be
submitted to the Under Secretary by email or at the following address:
Bureau of Industry and Security, U.S. Department of Commerce, Room
3898, 14th Street and Pennsylvania Avenue NW, Washington, DC 20230 not
later than 45 days after the date appearing on the written notice of
administrative action. The appeal must include a full written statement
in support of the appellant's position. The appeal must include a
precise statement of the reasons that the appellant believes that the
administrative action has a direct and adverse effect and should be
reversed or modified. The Under Secretary or the designated official
may request additional information that would be helpful in resolving
the appeal and may accept additional submissions. The Under Secretary
or the designated official will not ordinarily accept any submission
filed sua sponte more than 30 days after the filing of the appeal.
(d) Request for informal hearing. In addition to the written
statement submitted in support of an appeal, an appellant may request,
in writing, at the time an appeal is filed, an opportunity for an
informal hearing. A hearing is not required, and the Under Secretary or
the designated official may grant or deny a
[[Page 79121]]
request for an informal hearing at the Under Secretary or the
designated official's sole discretion. Any hearings will be held in the
District of Columbia unless the Under Secretary or the designated
official determines, based upon good cause shown, that another location
would be preferable.
(e) Informal hearing procedures. If a hearing request is granted,
the Under Secretary or the designated official may provide an
opportunity for the appellant to make an oral presentation at an
informal hearing based on the materials previously submitted by the
appellant or made available by the Department. The Under Secretary or
the designated official may require that any facts in controversy be
covered by an affidavit or testimony given under oath or affirmation.
The rules of evidence prevailing in courts of law do not apply, and all
evidentiary material deemed by the Under Secretary or the designated
official to be relevant and material to the proceeding, and not unduly
repetitious, will be received and considered. The Under Secretary or
the designated official has the authority to limit the number of people
attending the hearing, to impose any time or other limitations deemed
reasonable, and to determine all procedural questions. A transcript of
an informal hearing shall not be made, unless the Under Secretary or
the designated official determines that the national interest or other
good cause warrants it, or the appellant requests a transcript. If the
appellant requests, and the Under Secretary or the designated official
approves the taking of, a transcript, the appellant will be responsible
for paying all expenses related to production of the transcript. Any
person designated by the Under Secretary to conduct an informal hearing
shall submit a written report containing a summary of the hearing and
recommended action to the Under Secretary.
(f) Decisions. In addition to the documents specifically submitted
in connection with the appeal, the Under Secretary or the designated
official may consider any recommendations, reports, or other relevant
documents available to BIS in determining the appeal, but shall not be
bound by any such information, nor prevented from considering any other
relevant information, or consulting with any other person or groups, in
making a decision. The Under Secretary or the designated official may
adopt any other procedures deemed necessary and reasonable for
considering an appeal, including by providing the appellant with an
interim or proposed decision and offering the appellant an opportunity
to provide comments. The Under Secretary or the designated official
shall decide an appeal within a reasonable time after receipt of the
appeal. The decision shall be issued to the appellant in writing and
contain a statement of the reasons for the action and address any
arguments contrary to the decision presented by the appellant. The
decision of the Under Secretary or the designated official shall be
final.
(g) Effect of appeal. Acceptance and consideration of an appeal
shall not affect any administrative action, pending or in effect,
unless the Under Secretary or the designated official, upon request by
the appellant and with opportunity for a response, grants a stay.
Sec. 791.310 Advisory opinions.
(a) VCS hardware importers and connected vehicle manufacturers may
request an advisory opinion from BIS as to whether a prospective
transaction is subject to a prohibition in this subpart. The entire
transaction that is the subject of the advisory opinion request must be
an actual, as opposed to hypothetical, transaction and involve
disclosed, as opposed to anonymous, parties to the transaction.
(b) Advisory opinion requests must be made in writing, and may be
delivered to BIS by email, through the BIS website, or by any other
means that BIS may prescribe.
(c) Persons submitting advisory opinion requests are encouraged to
provide as much information as possible to assist BIS in making a
determination, to include the following information:
(1) The name, title, and telephone and email address of the person
to contact;
(2) The submitter's complete address comprised of street address,
city, state, country, and postal code;
(3) All available information identifying the parties to the
prospective transaction;
(4) Complete information regarding the VCS hardware and/or covered
software and any descriptive literature, brochures, technical
specifications, or papers that provide sufficient technical detail to
enable BIS to verify whether the prospective transaction would
constitute a prohibited transaction as defined in this subpart;
(5) For connected vehicle manufacturers: the make, model, and trim
level, or other identifying information number of the completed
connected vehicle;
(6) For VCS hardware Importers: the identification of the system;
and, if known, the make, model, and trim of the group of completed
connected vehicles for which the equipment is intended;
(7) An SBOM and/or an HBOM; and
(8) Any other information that the submitter believes to be
material to the prospective transaction.
(d) Each person that submits an advisory opinion request shall
provide any additional information or documents that BIS may thereafter
request in its review of the matter.
(e) Each advisory opinion can be relied upon by the requesting
party or parties to the extent the disclosures made pursuant to this
subpart were accurate and complete and to the extent the disclosures
continue accurately and completely to reflect circumstances after the
date of the issuance of the advisory opinion. An advisory opinion will
not restrict enforcement actions by any agency other than BIS. It will
not affect a requesting party's obligations to any other agency or
under any statutory or regulatory provision other than those
specifically discussed in the Advisory Opinion.
(f) BIS may publish on its website an advisory opinion that may be
of broad interest to the public, with redactions where necessary to
protect confidential business information.
Sec. 791.311 ``Is-Informed'' notices.
(a) BIS may inform VCS hardware importers or connected vehicle
manufacturers either individually by specific notice or, for larger
groups, through a separate notice published in the Federal Register,
that a specific authorization is required because an activity could
constitute a prohibited transaction.
(b) Specific notice that a specific authorization is required may
be given only by, or at the direction of, the Under Secretary or a BIS
official designated by the Under Secretary.
Sec. 791.312 Recordkeeping.
Except as otherwise provided, VCS hardware importers and connected
vehicle manufacturers shall keep a full and accurate record of each
transaction engaged in for which a Declaration of Conformity, general
authorization, or specific authorization would be required under
sections 791.305, 791.306, or 791.307, regardless of whether these
transactions are effected pursuant to a general authorization, specific
authorization, or otherwise, and such record shall be available for
examination for at least 10 years after the date of such transactions.
Sec. 791.313 Reports to be furnished on demand.
(a) VCS hardware importers and connected vehicle manufacturers are
required to furnish under oath, in the
[[Page 79122]]
form of reports or as otherwise specified by BIS, from time to time and
at any time as may be required by BIS, complete information relative to
any transaction involving the import of VCS hardware or the import or
Sale of completed connected vehicles incorporating covered software,
regardless of whether such transaction is effected pursuant to an
authorization or otherwise, subject to the provisions of this subpart.
BIS may require that such reports include the production of any books,
contracts, letters, papers, or other hard copy or electronic documents
relating to any transactions, in the custody or control of the persons
required to make such reports. BIS may, through any person or agency,
conduct investigations, hold hearings, administer oaths, examine
witnesses, receive evidence, take depositions, and require by subpoena
the attendance and testimony of witnesses and the production of any
books, contracts, letters, papers, and other hard copy or electronic
documents relating to any matter under investigation, regardless of
whether any report has been required or filed in connection therewith.
(b) For purposes of paragraph (a) of this section, the term
``document'' includes any written, recorded, or graphic matter or other
means of preserving thought or expression (including in electronic
format), and all tangible things stored in any medium from which
information can be processed, transcribed, or obtained directly or
indirectly, including correspondence, memoranda, notes, messages,
contemporaneous communications such as text and instant messages,
letters, emails, spreadsheets, metadata, contracts, bulletins, diaries,
chronological data, minutes, books, reports, examinations, charts,
ledgers, books of account, invoices, air waybills, bills of lading,
worksheets, receipts, printouts, papers, schedules, affidavits,
presentations, transcripts, surveys, graphic representations of any
kind, drawings, photographs, graphs, video or sound recordings, and
motion pictures or other film.
(c) Persons providing documents to BIS pursuant to this section
must submit documents electronically. Acceptable formats include
Portable Document Format (PDF) and Microsoft Excel. Files with
embedded, encrypted, or password protected content will not be
accepted.
Sec. 791.314 Penalties.
(a) Section 206 of the International Emergency Economic Powers Act
(50 U.S.C. 1705) (IEEPA) is applicable to violations of the provisions
of any general authorization, Specific authorization, regulation,
order, directive, instruction, or prohibition issued by or pursuant to
the direction or authorization of the Secretary of Commerce (Secretary)
pursuant to this subpart or otherwise under IEEPA.
(1) A civil penalty not to exceed the amount set forth in section
206 of IEEPA may be imposed on any person who violates, attempts to
violate, conspires to violate, or causes a violation of any exemption,
general authorization, specific authorization, regulation, order,
directive, instruction, or prohibition issued under this subpart.
(2) A person who willfully commits, willfully attempts to commit,
willfully conspires to commit, or aids or abets in the commission of a
violation of any exemption, general authorization, specific
authorization, regulation, order, directive, instruction, or
prohibition issued under this subpart is subject to criminal penalties
and may, upon conviction, be fined not more than $1,000,000, or if a
natural person, be imprisoned for not more than 20 years, or both.
(b) The civil penalties provided in IEEPA are subject to adjustment
pursuant to the Federal Civil Penalties Inflation Adjustment Act of
1990 (Pub. L. 101-410, as amended, 28 U.S.C. 2461 note).
(c) The criminal penalties provided in IEEPA are subject to
adjustment pursuant to 18 U.S.C. 3571.
(d) Pursuant to 18 U.S.C. 1001, whoever, in any matter within the
jurisdiction of the executive, legislative, or judicial branch of the
U.S. Government, knowingly and willfully falsifies, conceals, or covers
up by any trick, scheme, or device a material fact; or makes any
materially false, fictitious, or fraudulent statement or
representation; or makes or uses any false writing or document knowing
the same to contain any materially false, fictitious, or fraudulent
statement or entry shall be fined under title 18, United States Code,
imprisoned, or both.
(e) Violations of this subpart may also be subject to other
applicable laws.
Sec. 791.315 Pre-penalty notice; settlement.
(a) When required. If BIS has reason to believe that there has
occurred a violation of any provision of this subpart or a violation of
the provisions of any exemption, general authorization, specific
authorization, regulation, order, directive, instruction, or
prohibition issued by or pursuant to the direction or authorization of
the Secretary pursuant to this subpart or otherwise under IEEPA and
determines that a civil monetary penalty is warranted, BIS will issue a
pre-penalty notice informing the alleged violator of BIS's intent to
impose a monetary penalty. A Pre-Penalty Notice shall be in writing and
issued electronically to the alleged violator. The pre-penalty notice
may be issued whether or not another agency has taken any action with
respect to the matter.
(b) Response--(1) Right to respond. An alleged violator may respond
to a Pre-Penalty Notice in writing to BIS.
(2) Deadline for response. A response to a Pre-Penalty Notice must
be made within 30 days as set forth below. The failure to submit a
response within 30 days shall be deemed to be a waiver of the right to
respond.
(i) Computation of time for response. A response to a Pre-Penalty
Notice must be electronically transmitted on or before the 30th day
after the date of delivery by BIS.
(ii) Extensions of time for response. If a due date falls on a
federal holiday or weekend, that due date is extended to include the
following business day. Any other extensions of time will be granted,
at the discretion of BIS, only upon specific request to BIS.
(3) Form and method of response. A response to a pre-penalty notice
need not be in any particular form, but it must be typewritten and
signed by the alleged violator or a representative thereof, contain
information sufficient to indicate that it is in response to the pre-
penalty notice, and include the BIS identification number listed on the
pre-penalty notice. A digital signature is acceptable.
(4) Information that should be included in response. Any response
should set forth in detail why the alleged violator either believes
that a violation of the provisions of this subpart did not occur and/or
why a civil monetary penalty is otherwise unwarranted under the
circumstances. The response should include all documentary or other
evidence available to the alleged violator that supports the arguments
set forth in the response. BIS will consider all relevant materials
submitted in the response.
(c) Settlement. Settlement discussions may be initiated by BIS, the
alleged violator, or the alleged violator's authorized representative.
(d) Representation. A representative of the alleged violator may
act on behalf of the alleged violator, but any oral communication with
BIS prior to a written submission regarding the specific allegations
contained in the pre-penalty notice must be preceded by a written
letter of representation, unless the pre-penalty notice was served upon
[[Page 79123]]
the alleged violator in care of the representative.
Sec. 791.316 Penalty imposition.
(a) If, after considering any written response to the pre-penalty
notice and any relevant facts, BIS determines that there was a
violation by the alleged violator named in the pre-penalty notice and
that a civil monetary penalty is appropriate, BIS may issue a penalty
notice to the violator containing a determination of the violation and
the imposition of the monetary penalty.
(b) The issuance of the penalty notice shall constitute final
agency action. The violator may seek judicial review of that final
agency action in federal district court.
Sec. 791.317 Administrative collection; referral to United States
Department of Justice.
In the event that the violator does not pay the penalty imposed
pursuant to this subpart or make payment arrangements acceptable to
BIS, the matter may be referred for administrative collection measures
by the Department of the Treasury or to the United States Department of
Justice for appropriate action to recover the penalty in a civil suit
in a federal district court.
Sec. 791.318 Finding of Violation.
(a) When issued. (1) BIS may issue an initial finding of violation
that identifies a violation if BIS:
(i) Determines that there has occurred a violation of any provision
of this subpart, or a violation of the provisions of any exemption,
general authorization, specific authorization, regulation, order,
directive, instruction, or prohibition issued by or pursuant to the
direction or authorization of the Secretary pursuant to this subpart or
otherwise under IEEPA;
(ii) Considers it important to document the occurrence of a
violation; and
(iii) Concludes that an administrative response is warranted but
that a civil monetary penalty is not the most appropriate response.
(2) An initial finding of violation shall be in writing and may be
issued whether or not another agency has taken any action with respect
to the matter.
(b) Response--(1) Right to respond. An alleged violator may contest
an initial Finding of Violation by providing a written response to BIS.
(2) Deadline for response; default determination. A response to an
initial Finding of Violation must be made within 30 days as set forth
in paragraphs (b)(2)(i) and (ii) of this section. The failure to submit
a response within 30 days shall be deemed to be a waiver of the right
to respond, and the initial Finding of Violation will become final and
will constitute final agency action. The violator may seek judicial
review of that final agency action in federal district court.
(i) Computation of time for response. A response to an initial
finding of violation must be electronically transmitted on or before
the 30th day after the date of delivery by BIS.
(ii) Extensions of time for response. If a due date falls on a
federal holiday or weekend, that due date is extended to include the
following business day. Any other extensions of time will be granted,
at the discretion of BIS, only upon specific request to BIS.
(3) Form and method of response. A response to an initial finding
of violation need not be in any particular form, but it must be
typewritten and signed by the alleged violator or a representative
thereof, contain information sufficient to indicate that it is in
response to the initial finding of violation, and include the BIS
identification number listed on the initial finding of violation. A
digital signature is acceptable.
(4) Information that should be included in response. Any response
should set forth in detail why the alleged violator either believes
that a violation of the provisions of this subpart did not occur and/or
why a finding of violation is otherwise unwarranted under the
circumstances. The response should include all documentary or other
evidence available to the alleged violator that supports the arguments
set forth in the response. BIS will consider all relevant materials
submitted in the response.
(c) Determination--(1) Determination that a finding of violation is
warranted. If, after considering the response, BIS determines that a
final finding of violation should be issued, BIS will issue a final
finding of violation that will inform the violator of its decision. Any
action taken in a final finding of violation shall constitute final
agency action. The violator has the right to seek judicial review of
that final agency action in federal district court.
(2) Determination that a finding of violation is not warranted. If,
after considering the response, BIS determines a finding of violation
is not warranted, then BIS will inform the alleged violator of its
decision not to issue a final finding of violation.
Sec. 791.319 Severability.
If any provision of this subpart is held to be invalid or
unenforceable by its terms, or as applied to any person or
circumstance, or stayed pending further agency action or judicial
review, the provision is to be construed so as to continue to give the
maximum effect to the provision permitted by law, unless such holding
will be one of utter invalidity or unenforceability, in which event the
provision will be severable from this part and will not affect the
remainder thereof.
[FR Doc. 2024-21903 Filed 9-23-24; 8:45 am]
BILLING CODE 3510-33-P