Securing the Information and Communications Technology and Services Supply Chain: Unmanned Aircraft Systems, 271-279 [2024-30209]

Download as PDF Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules 271 ADAMS accession No./ web link/Federal Register Citation Document Proposed Certificate of Compliance No. 1031, Amendment No. 10, Revision 1, Appendix A: Technical Specifications and Design Features ......................................................................................................................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 10, Revision 1, Appendix B: Approved Contents ................... Proposed Certificate of Compliance No. 1031, Amendment No. 11, Revision 1 ......................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 11, Revision 1, Appendix A: Technical Specifications and Design Features ......................................................................................................................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 11, Revision 1, Appendix B: Approved Contents ................... Proposed Certificate of Compliance No. 1031, Amendment No. 12, Revision 1 ......................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 12, Revision 1, Appendix A: Technical Specifications and Design Features ......................................................................................................................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 12, Revision 1, Appendix B: Approved Contents ................... Proposed Certificate of Compliance No. 1031, Amendment No. 13, Revision 1 ......................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 13, Revision 1, Appendix A: Technical Specifications and Design Features ......................................................................................................................................................................... Proposed Certificate of Compliance No. 1031, Amendment No. 13, Revision 1, Appendix B: Approved Contents ................... Preliminary Safety Evaluation Report, Certificate of Compliance No. 1031, Amendment No. 14 and Revision to Amendment Nos. 0 through 13 ...................................................................................................................................................................... ML24211A275 ML24211A276 ML24211A277 ML24211A278 ML24211A279 ML24211A280 ML24211A281 ML24211A282 ML24211A283 ML24211A284 ML24211A285 ML24211A243 NAC International, Inc. MAGNASTOR® Storage System Amendment No. 14 and Revisions to Amendment Nos. 0 through 13 Request Documents NAC International, Inc., Submission of an Amendment Request for the MAGNASTOR® Cask System, Amendment No. 14, dated July 24, 2023 ................................................................................................................................................................... NAC International, Inc., Submission of Data Files to Support the NRC Review of MAGNASTOR® Amendment No. 14, dated July 24, 2023 .............................................................................................................................................................................. NAC International, Inc., Submission of Responses to the NRC Request for Additional Information for MAGNASTOR® Cask System, Amendment No. 14, dated June 26, 2024 .................................................................................................................. NAC International, Inc., Supplement to the Amendment Request No. 14 for the MAGNASTOR® Cask System, dated October 18, 2023 ............................................................................................................................................................................... NAC International, Inc., Supplement to the Amendment Request No. 14 for the MAGNASTOR® Cask System, dated August 6, 2024 ....................................................................................................................................................................................... NAC International, Inc., MAGNASTOR® Cask System Users Certificate of Compliance No. 1031 Amendment Nos. 0 through 9 Intent to Adopt Letters, dated August 4, 2022 .......................................................................................................... ML23205A238 ML23208A062 ML24179A071 (package) ML23291A167 ML24219A227 ML22216A110 Other Documents lotter on DSK11XQN23PROD with PROPOSALS1 Rulemaking Memorandum for Amendment No. 14 and Revision to Amendment Nos. 0 through 13 for the MAGNASTOR® Storage System, dated September 20, 2024 ............................................................................................................................ Final Rule, ‘‘Storage of Spent Fuel in NRC-Approved Storage Casks at Power Reactor Sites,’’ published July 18, 1990 ........ Final Rule, ‘‘List of Approved Spent Fuel Storage Casks: MAGNASTOR Addition,’’ published November 21, 2008 ................. Revision to Policy Statement, ‘‘Agreement State Program Policy Statement; Correction,’’ published October 18, 2017 ........... Presidential Memorandum, ‘‘Plain Language in Government Writing,’’ published June 10, 1998 ............................................... Regulatory Issue Summary 2017–05, ‘‘Administration of 10 CFR Part 72 Certificate of Compliance Corrections and Revisions’’ ......................................................................................................................................................................................... The NRC may post materials related to this document, including public comments, on the Federal rulemaking website at https://www.regulations.gov under Docket ID NRC–2024–0180. In addition, the Federal rulemaking website allows members of the public to receive alerts when changes or additions occur in a docket folder. To subscribe: (1) navigate to the docket folder (NRC– 2024–0180); (2) click the ‘‘Subscribe’’ link; and (3) enter an email address and click on the ‘‘Subscribe’’ link. Dated: December 20, 2024. For the Nuclear Regulatory Commission. Mirela Gavrilas, Executive Director for Operations. [FR Doc. 2024–31096 Filed 1–2–25; 8:45 am] BILLING CODE 7590–01–P VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 791 [Docket No. 241213–0327] RIN 0694–AJ72 Securing the Information and Communications Technology and Services Supply Chain: Unmanned Aircraft Systems Bureau of Industry and Security, U.S. Department of Commerce. ACTION: Advance notice of proposed rulemaking. AGENCY: In this advance notice of proposed rulemaking (ANPRM), the Department of Commerce’s Bureau of SUMMARY: PO 00000 Frm 00006 Fmt 4702 Sfmt 4702 ML24211A239 55 FR 29181 73 FR 70587 82 FR 48535 63 FR 31885 ML17165A183 Industry and Security (BIS) seeks public comment on issues related to transactions involving information and communications technology and services (ICTS) that are designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries, pursuant to Executive Order (E.O.) 13873, ‘‘Securing the Information and Communications Technology and Services Supply Chain,’’ and that are integral to unmanned aircraft systems (UAS). This ANPRM will assist BIS in determining the technologies and market participants that may be appropriate for regulation in order to address undue or unacceptable risks to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, or/and E:\FR\FM\03JAP1.SGM 03JAP1 272 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 to the security and safety of U.S. persons. DATES: Comments must be received on or before March 4, 2025. ADDRESSES: All comments must be submitted by one of the following methods: • The Federal eRulemaking Portal: https://www.regulations.gov at docket number BIS–2024–0058. • Email directly to: UnmannedAircraftSystems@bis.doc.gov. Include ‘‘RIN 0694–AJ72’’ in the subject line. • Instructions: Comments sent by any other method, to any other address or individual, or received after the end of the comment period, may not be considered. For those seeking to submit business confidential information (BCI), please clearly mark such submissions as BCI and submit by email, as instructed above. Each BCI submission must also contain a summary of the BCI, clearly marked as public, in sufficient detail to permit a reasonable understanding of the substance of the information for public consumption. Such summary information will be posted on regulations.gov. Comments that contain profanity, vulgarity, threats, or other inappropriate language or content will not be considered. FOR FURTHER INFORMATION CONTACT: Marc Coldiron, U.S. Department of Commerce, telephone: 202–482–3678. For media inquiries: Katherine Schneider, Office of Congressional and Public Affairs, Bureau of Industry and Security, U.S. Department of Commerce: OCPA@bis.doc.gov. SUPPLEMENTARY INFORMATION: I. Background In E.O. 13873, ‘‘Securing the Information and Communications Technology and Services Supply Chain,’’ (84 FR 22689 (May 17, 2019)) the President delegated to the Secretary of Commerce (Secretary) the authority granted under the International Emergency Economic Powers Act (IEEPA) (50 U.S.C. 1701, et seq.), to the extent necessary, ‘‘to deal with any unusual and extraordinary’’ foreign threat to the national security, foreign policy, or economy of the United States in connection with the national emergency declared by the President with respect to such threat (50 U.S.C. 1701(a)). In E.O. 13873, the President declared a national emergency with respect to the ‘‘unusual and extraordinary’’ foreign threat posed to the ICTS supply chain and has, in accordance with the National Emergencies Act (NEA), extended the declaration of this national emergency VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 each year since E.O. 13873’s publication (see 85 FR 29321 (May 14, 2020); 86 FR 26339 (May 13, 2021); 87 FR 29645 (May 13, 2022); 88 FR 30635 (May 11, 2023); and 89 FR 40353 (May 9, 2024)). Specifically, the President identified the ‘‘unrestricted acquisition or use in the United States of [ICTS] designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries’’ as ‘‘an unusual and extraordinary’’ threat to the national security, foreign policy, and economy of the United States that ‘‘exists both in the case of individual acquisitions or uses of such technology or services, and when acquisitions or uses of such technologies are considered as a class’’ (E.O. 13873; see also 50 U.S.C. 1701(a)– (b)). Once the President declares a national emergency, IEEPA empowers the President to, among other acts, investigate, regulate, prevent, or prohibit any ‘‘acquisition, holding, withholding, use, transfer, withdrawal, transportation, importation or exportation of, or dealing in, or exercising any right, power, or privilege with respect to, or transactions involving, any property in which any foreign country or a national thereof has any interest by any person, or with respect to any property, subject to the jurisdiction of the United States’’ (50 U.S.C. 1702(a)(1)(B)). To address identified risks to U.S. national security from ICTS transactions, the President in E.O. 13873 imposed a prohibition on transactions determined by the Secretary, in consultation with relevant agency heads, to involve foreign adversary ICTS and to pose certain risks to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, and to the security and safety of U.S. persons. Specifically, to fall within the scope of the prohibition, the Secretary must determine that the ICTS transaction: (1) involves ICTS designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary, defined in E.O. 13873 section 3(b) as ‘‘any foreign government or foreign non-government person engaged in a long-term pattern or serious instances of conduct significantly adverse to the national security of the United States or security and safety of United States persons’’; and (2): A. ‘‘poses an undue risk of sabotage to or subversion of the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of information and communications PO 00000 Frm 00007 Fmt 4702 Sfmt 4702 technology or services in the United States;’’ B. ‘‘poses an undue risk of catastrophic effects on the security or resiliency of United States critical infrastructure or the digital economy of the United States;’’ or C. ‘‘otherwise poses an unacceptable risk to the national security of the United States or the security and safety of United States persons’’ (E.O. 13873 1(a)). These factors are collectively referred to as ‘‘undue or unacceptable risks.’’ Further, E.O. 13873 grants the Secretary the authority to design or negotiate mitigation measures that would allow an otherwise prohibited transaction to proceed (E.O. 13873 1(b)). The President also delegated to the Secretary the ability to promulgate regulations that, among other things, establish when transactions involving particular technologies may be categorically prohibited (E.O. 13873 2(a)–(b); see also 3 U.S.C. 301–302). Specifically, the Secretary may issue rules establishing criteria, consistent with section 1 of E.O. 13873, by which particular technologies or market participants may be categorically included in or categorically excluded from prohibitions established pursuant to E.O. 13873 (see E.O. 13873 2(b)). Any regulated transactions under E.O. 13873 must have a sufficient nexus to a foreign adversary, which, according to E.O. 13873’s implementing regulations at 15 CFR 791.4, currently includes, China, People’s Republic of (China), including the Hong Kong Special Administrative Region; Republic of Cuba (Cuba); Islamic Republic of Iran (Iran); Democratic People’s Republic of Korea (North Korea); Russian Federation (Russia); and Venezuelan politician Nicolás Maduro (Maduro Regime). II. Introduction Pursuant to the authority delegated to the Secretary under E.O. 13873, BIS is considering proposing a rule to address the undue or unacceptable risks posed by certain transactions involving ICTS integral to unmanned aircraft system (UAS) when the ICTS are designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries (foreign adversary ICTS). BIS is also considering whether there are mitigation measures that, if adopted, would allow UAS market participants to engage in transactions that would otherwise pose undue or unacceptable risks. The purpose of this ANPRM is to gather information to support BIS’s potential development of a rule regarding foreign adversary ICTS E:\FR\FM\03JAP1.SGM 03JAP1 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 integral to UAS. For the purposes of this rulemaking, unless terms are otherwise defined herein, this ANPRM will apply the definitions listed in 15 CFR 791.2. III. Request for Comments BIS is concerned that the involvement of foreign adversaries, notably China and Russia, in the design, development, manufacture, or supply of ICTS integral to UAS poses undue or unacceptable risk to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, and to the security and safety of U.S. persons. As described in more detail below, these countries can leverage their political and legal frameworks to co-opt private entities for national interests, and those private entities maintain dominant market positions in the global commercial UAS sector. This dominance, particularly by China, provides ample exploitation opportunities. Further, both countries have shown a willingness to compromise U.S. infrastructure and security through cyber espionage. The potential for these countries to direct the actions of private entities for the purpose of exploiting ICTS supply chains heightens concerns about their participation in the U.S. UAS supply chain. BIS seeks public input on several topics, including, but not limited to, certain definitions and BIS’s assessment of how a class of transactions involving foreign adversary ICTS integral to UAS could present undue or unacceptable risks to U.S. national security and to the security and safety of U.S. persons. These risks relate to threats from foreign adversary-linked entities, the capabilities of UAS that may increase the likelihood of vulnerabilities, and the consequences to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, and to the security and safety of U.S. persons if these vulnerabilities are exploited or intentionally inserted by foreign adversary linked entities. BIS recognizes the benefits of UAS technologies and does not imply through this ANPRM that any particular UAS components, such as data transmission or connectivity devices, should not be used. These technologies benefit the United States by increasing efficiency in various critical infrastructure sectors such as agriculture, construction, transportation, and energy, leading to economic growth and improved public safety. However, in E.O. 13873, the President focused on addressing risks that ICTS transactions involving foreign adversaries might present to U.S. national security and to the security and safety of U.S. persons. Therefore, this VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 ANPRM, which is being issued pursuant to the authorities granted to the Secretary under E.O. 13873, seeks public comment on potential ways to address undue or unacceptable risks to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, -and to the security and safety of U.S. persons that may arise from foreign adversary ICTS integral to UAS. As part of BIS’s efforts to understand UAS and their critical ICTS components, BIS solicits comments on the -ICTS most integral to UAS’s data collection and connectivity capabilities and that are most vulnerable to compromise by an adversarial actor. Such ICTS might be included in any mitigation measures or prohibitions imposed in a potential rule, and could include, but is not limited to: (1) onboard computers responsible for processing data and controlling UAV flight; (2) communications systems including, but not limited to, flight controllers, transceiver/receiver equipment, proximity links such as Global Navigation Satellite Systems (GNSS) sensors, and flight termination equipment; (3) flight control systems responsible for takeoff, landing, and navigation, including, but not limited to, exteroceptive and proprioceptive sensors; (4) ground control stations (GCS) or systems including, but not limited to, handheld flight controllers; (5) operating software including, but not limited to, network management software; (6) mission planning software; (7) intelligent battery power systems; (8) local and external data storage devices and services; and (9) artificial intelligence (AI) software or applications. BIS also solicits input on mechanisms to mitigate the risks posed by foreign adversary ICTS integral to UAS, such as potential design requirements, machine learning controls, implementation standards and protocols, cybersecurity firmware and/ or software inputs, manufacturing integrity (i.e., the security of the manufacturing process to ensure no foreign adversary manipulation) protection systems and procedures, or prohibitions. Additionally, BIS seeks comment on whether it would be beneficial to create a process for the public to request specific authorization to engage in certain transactions involving foreign adversary ICTS integral to UAS by demonstrating that the parties to a particular transaction have implemented measures to adequately mitigate the risk to U.S. national security or to the security and safety of U.S. persons. BIS encourages public PO 00000 Frm 00008 Fmt 4702 Sfmt 4702 273 feedback to help inform the rulemaking process, particularly regarding the impact on U.S. ICTS supply chains and critical infrastructure of any prohibition or mitigation measures applicable to foreign adversary ICTS integral to UAS. BIS additionally encourages the submission of any public comments germane to the issues as described in this ANPRM. a. Definitions BIS requests comments on a definition of ‘‘unmanned aircraft systems’’ or UAS to use in a potential rule. BIS could define UAS as the International Trade Administration (ITA) does to mean ‘‘air vehicles and associated equipment that do not carry a human operator, but instead are remotely piloted or fly autonomously’’ (International Trade Administration, Unmanned Aircraft Systems Overview (accessed October 15, 2024), https:// www.trade.gov/unmanned-aircraftsystems/). UAS, more colloquially known as ‘‘drones,’’ is a generic term that can include, but is not exclusive to, remotely piloted aircraft systems or unmanned aerial vehicles. ITA’s definition also states ‘‘[a] UAS generally consists of (1) an aircraft with no pilot on board, (2) a remote pilot station, (3) a [command-and-control] link, and (4) a payload specific to the intended application [or] operation, which often includes specialized cameras or other sensors that collect data for near term analysis’’ (International Trade Administration, Unmanned Aircraft Systems Overview (accessed October 15, 2024), https://www.trade.gov/ unmanned-aircraft-systems/). BIS is also contemplating the use of other definitions of UAS from the U.S. government, including the definition used by the Federal Aviation Administration (FAA), which defines UAS as ‘‘an unmanned aircraft and associated elements (including communication links and the components that control the unmanned aircraft) that are required for the operator to operate safely and efficiently in the national airspace system’’ (49 U.S.C. 44801(12)). The FAA defines an ‘‘unmanned aircraft’’ to mean ‘‘an aircraft that is operated without the possibility of direct human intervention from within or on the aircraft’’ (49 U.S.C. 44801(11)). BIS also considered the definition of unmanned aerial vehicle (UAV) as used within BIS’s Export Administration Regulations (EAR), which defines UAV as ‘‘[a]ny ‘aircraft’ capable of initiating flight and sustaining controlled flight and navigation without any human presence on board’’ (15 CFR 772.1). The E:\FR\FM\03JAP1.SGM 03JAP1 lotter on DSK11XQN23PROD with PROPOSALS1 274 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules EAR defines ‘‘aircraft’’ as ‘‘[a] fixed wing, swivel wing, rotary wing (helicopter), tilt rotor or tilt-wing airborne vehicle’’ (15 CFR 772.1). BIS considered the use of UAV versus UAS and believes UAV is too narrowly focused for future rulemaking purposes, as it only refers to the air vehicle itself and excludes other system elements, such as the ground control stations, communication links, and other associated components necessary for operation. BIS is inclined to determine that ITA’s definition may be more appropriate for purposes of potential regulation because, unlike the FAA and EAR definitions, it identifies specific components and systems that are integral to UAS. Such a definition may include UAS and UAS subsystems, such as control stations; data communications and navigation links or, more precisely, command and control and Non-Payload Communications (CNPC) links; payloads; flight termination systems; electronic launch and recovery equipment; recording capabilities for receiving live imagery; software or AI software and applications necessary for the operation of airborne systems; and the capability of remote software or firmware updates. Additionally, ITA’s definition would incorporate some UAS known as actively tethered UAS, which use a load-rated tether that is physically attached to a ground station to provide continuous power and which may transmit data to and from the UAS, which allows the UAS to remain in the air for an extended period of time. Please note that any definition determined by BIS to be appropriate for BIS rulemaking regarding UAS would not supersede any other legal definition of UAS used in other contexts. Given the various definitions that could be utilized, this ANPRM seeks comment on the definitions to use in a potential rule regarding transactions involving ICTS integral to UAS, and specifically, but not limited to: 1. In what ways, if any, should BIS elaborate on or amend the potential definition(s) of UAS as stated above? If amended, how will the revised definition enable BIS to better address national security risks arising from classes of transactions involving ICTS integral to UAS? 2. Is the term UAS broad enough to include the aircraft systems that may combine flight controllers, global navigation satellite systems (GNSS) modules, cameras, communication devices, surveillance modules, navigation devices, sensors with control systems, and/or software with onboard VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 and offboard data storage capabilities? Does a better term exist to include such aircraft systems within the definition’s scope? 3. Are there other commonly used definitions for UAS that BIS should consider when defining a class of transactions involving ICTS integral to UAS, including definitions from industry, civil society, or international standards organizations? If so, why might those definitions be more appropriate for the purposes of a rule? 4. What is the appropriate focus of any BIS regulations in this sector, including, but not limited to, UAS platforms and subcomponent technology, UAS capabilities, or UAS end-user sectors, including entities providing services performed by UAS? 5. Are there commonly used definitions and standard capabilities for each of the following ICTS components, which BIS has preliminarily identified as integral to the UAS platform: (1) onboard computers responsible for processing data and controlling UAV flight; (2) communications systems including, but not limited to, flight controllers, transceiver/receiver equipment, proximity links such as GNSS sensors, and flight termination equipment; (3) flight control systems responsible for takeoff, landing, and navigation, including, but not limited to, exteroceptive and proprioceptive sensors; (4) GCS or systems including, but not limited to, handheld flight controllers; (5) operating software including, but not limited to, network management software; (6) mission planning software; (7) intelligent battery power systems; (8) local and external data storage devices and services; (9) AI software or applications? Are there additional components that BIS should identify as integral to the UAS platform and, if so, are there commonly used definitions and standard capabilities for each component, such as the American Security Drones Act? b. Risks Associated With UAS BIS is soliciting comment on the risks associated with foreign adversary ICTS integral to UAS, the rapidly advancing technological functionalities of UAS, and the increasing integration of UAS with U.S. critical infrastructure. Exponential advancements in UAS functionality have allowed for the rapid expansion of the UAS industry in recent years. Remote and autonomous control systems have been developed to support operational, safety, and environmental applications, minimizing physical strain and risks to operators in various fields. Advancements in this sector have reduced production and end user costs PO 00000 Frm 00009 Fmt 4702 Sfmt 4702 and increased the accessibility of UAS technology. In addition, UAS have become integral to various sectors of the economy, including: (1) agriculture, where they are used for crop monitoring and precision spraying; (2) the chemical industry, where they assist in pipeline inspections and hazardous material handling; (3) physical infrastructure and transportation, where they are employed for surveying, bridge inspections, and construction site management; (4) emergency response; (5) health care administration; (6) energy; and (7) media and entertainment. Over the last decade, UAS have evolved to more sophisticated models with improved functionalities, including enhanced connected technologies such as advanced flight controllers, multi-GNSS and GNSS modules, cameras, receivers, and AI software and applications, which have enabled greater autonomy, precision in navigation, enhanced surveillance capabilities, and seamless integration with various applications across industry. These new technologies require signal and communication software to collect vast amounts of data, and in turn may increase attack vectors for malicious actors to exploit. Commercial UAS have been increasingly adopted in critical infrastructure sectors, as defined in National Security Memorandum-22 of April 2024 (see Grand View Research, Drone Market Size, Share & Trends Analysis Report by Component (Hardware, Software, Services), By Product, By Technology, By Payload Capacity, By Power Source, By End-use, By Region, and Segment Forecasts, 2024–2030 (accessed October 15, 2024), https://www.grandviewresearch.com/ industry-analysis/drone-market-report; see also The White House, National Security Memorandum on Critical Infrastructure Security and Resilience (April 30, 2024), https:// www.whitehouse.gov/briefing-room/ presidential-actions/2024/04/30/ national-security-memorandum-oncritical-infrastructure-security-andresilience/). UAS used in these sectors often rely on the same aircraft used by recreational drone enthusiasts, but in many cases the UAS used to support critical infrastructure have longer flight times, can lift heavier and more complex payloads, can fly beyond visual line of sight, and have the durability to fly through rough weather conditions. UAS capable of lifting and carrying payloads for extended periods of time pose a specific and aggravated risk of both data collection and manipulation, as well as remote access that could be misused for destructive E:\FR\FM\03JAP1.SGM 03JAP1 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 purposes. As critical infrastructure becomes more reliant on commercial UAS, their remote incapacitation by a foreign adversary creates increased risk to U.S. national security and to the security and safety of U.S. persons. Malign remote access to UAS could be used to harm or damage physical infrastructure via intentional collisions, the delivery of kinetic payload, or could result in altered sensitive readings on critical infrastructure data. These risks can be exacerbated if the ICTS integral to UAS is designed, developed, manufactured, or supplied, by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary. Accordingly, BIS requests public comment on the undue or unacceptable risks posed by transactions involving foreign adversary ICTS integral to UAS technology. BIS seeks comments on the following topics but encourages the submission of any comments germane to the issues discussed in this ANPRM: 6. BIS identified data exfiltration and remote access control as the two primary areas of risk associated with transactions involving foreign adversary ICTS integral to UAS technology. Are there other risks or factors contributing to the risk that BIS has not considered in the above analysis? 7. Which specific sectors or elements of critical infrastructure operated by private organizations, specifically within the commercial market, are most at risk if UAS technology is compromised? c. Threat Posed by Foreign Adversaries Foreign adversaries like China and Russia have established certain legal and regulatory frameworks through which they could compel entities under their jurisdiction to comply with requests for information regarding U.S. persons or access to systems in the U.S. ICTS supply chain. China has implemented a series of laws (e.g., the National Intelligence Law of 2017, the Cybersecurity Law of 2017, the Personal Information Protection Law (PIPL) of 2021, the National Security Law of 2015) that mandate cooperation with China’s cybersecurity efforts, intelligence operations, and the protection of national security interests by individuals and entities subject to the jurisdiction of China. These laws require network operators and technology companies to assist public security agencies in safeguarding cybersecurity and providing access to data stored within China’s borders (see Department of Homeland Security, Data Security Business Advisory (July 11, 2022), https://www.dhs.gov/sites/ VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 default/files/publications/20_1222_ data-security-business-advisory.pdf). Specifically, the National Security Law of 2015 imposes obligations that require organizations and individuals to cooperate with Chinese authorities on undefined ‘matters of national security,’ potentially requiring technology companies to expose the personal information of U.S. citizens or companies (see CNA, China’s National Security Laws: Implications Beyond Borders (December 2023), https:// www.cna.org/quick-looks/2023/Chinanational-security-laws-implicationsbeyond-borders.pdf). Similarly, Russian legislation (e.g., Federal Law No. 40–FZ, ‘‘On the Federal Security Service’’; Federal Law No. 144–FZ, ‘‘Open-Investigative Activity’’; Federal Law No. 97–FZ, ‘‘On Amendments to the Law’’) grants the Russian government direct access to Russian corporations’ activities and facilities. Using this authority, the Russian government could access companies’ data and consumer information and mandate that companies cooperate with the Federal Security Services (FSB) to assist with counterintelligence actions, which can include installing government equipment on companies’ infrastructure for data collection. These laws compel Russia-based telecommunications providers, internet service companies, and other entities to assist Russian security agencies in investigations and surveillance, ensuring compliance with national security imperatives (see Federal Law No. 374–FZ, ‘‘On Amending Federal Law ‘On Combating Terrorism’ And Certain Legislative Acts of the Russian Federation Regarding the Establishment of Additional CounterTerrorism Measures and Public Security’’). Within the United States, products developed by China-based entities make up at least 75 percent of the UAS consumer market (see Lukas Schroth, Drone Market Shares in the USA After China-US Disputes, Drone Industry Insights (March 2, 2021), https:// droneii.com/drone-market-shares-usaafter-china-usa-disputes; see also David Kitron, Game of Drones: Chinese Giant DJI Hit by U.S. Tensions, Staff Defections, Reuters (March 8, 2021), https://www.reuters.com/article/us-usachina-tech-dji-insight/game-of-droneschinese-giant-dji-hit-by-u-s-tensionsstaff-defections-idUSKBN2AZ0PV/). The large market share of China-based entities allows China to exercise control over the supply chain and deny access to UAS technology. With the added element of China’s ability to exercise jurisdiction over the primary producers PO 00000 Frm 00010 Fmt 4702 Sfmt 4702 275 of UAS products and components globally, China is unmatched in its control over crucial UAS elements used for commercial needs. The preeminence of China-based entities in the U.S. market provides China, through its established legal framework and control over persons subject to its jurisdiction, a significant opportunity to collect U.S. persons’ data and potentially deny services to the United States and its allies in response to unfavorable policies or conflicts. Russia, in comparison to China, comprises a relatively small portion of the global UAS market share, but has announced its intention to heavily invest in developing Russia’s UAS domestic market over the next few years to be less reliant on external manufacturers (see, e.g., Russia plans to produce 18,000 drones annually by late 2026—first deputy premier, TASS (April 27, 2023), https://tass.com/economy/ 1610899). As of 2023, Russia reportedly produced only 6,000 UAS and aims to boost domestic drone production for various industry sectors (see Martin Forusek, Russian official: Russia aims to produce over 32,000 civilian drones annually by 2030, Kyiv Independent (January 6, 2024), https:// kyivindependent.com/russian-officialrussia-aims-to-produce-32-000-dronesannually-by-2030/). While the nascent state of Russia’s UAS market may not currently pose risks to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, and to the security and safety of U.S. persons in the commercial space, the projected growth of Russia’s domestic market suggests national security risks will emerge if left unchecked. The strategic investments being made in Russia mirror the same efforts made by China in its own markets and may position Russia as a high-volume supplier in the UAS space in the near future. Despite their different current UAS market shares, China and Russia have demonstrated that they are capable of engaging in cyber activities that seek to harm U.S. critical infrastructure and national security for strategic advantage. According to the Office of the Director of National Intelligence, China’s cyber espionage pursuits and the export of surveillance, information, and communications technologies by Chinabased industries increase the threats of aggressive cyber operations against the United States and the suppression of the free flow of information in cyberspace (see Office of the Director of National Intelligence, Annual Threat Assessment (2024), https://www.dni.gov/files/ODNI/ documents/assessments/ATA-2024Unclassified-Report.pdf). Additionally, E:\FR\FM\03JAP1.SGM 03JAP1 lotter on DSK11XQN23PROD with PROPOSALS1 276 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules Russia has long exploited vulnerabilities targeting critical infrastructure in the United States as well as in allied and partner countries (see Cybersecurity and Infrastructure Security Agency, Hunting Russian Intelligence ‘‘Snake’’ Malware (May 9, 2023), https://www.cisa.gov/ news-events/cybersecurity-advisories/ aa23-129a). Whether through prepositioning attacks or exploiting software vulnerabilities, China and Russia have exhibited their intent and capability to compromise U.S. national security, including U.S. ICTS supply chains and critical infrastructure, and the security and safety of U.S. persons. Further, foreign adversaries, such as China or Russia, could direct UAS companies subject to their jurisdiction to engineer vulnerabilities into their products, exploit existing vulnerabilities, or push malicious updates, compromising these products without the UAS owner’s knowledge. In the past, for example, China-based UAS companies have pushed firmware updates to implement no-fly restrictions that would disable their UAS in conflict zones defined by the company (see, e.g., Haye Kesteloo, Autel Robotics Implements No-Fly Zones in Conflict Areas to Prevent Drone Misuse, DroneXL (December 24, 2023), https:// dronexl.co/2023/12/24/autel-roboticsdrone-no-fly-zones-conflict/; Gareth Corfield, Drone maker DJI quietly made large chunks of Iraq, Syria no-fly zones, The Register (April 26, 2017), https:// www.theregister.com/2017/04/26/dji_ drone_geofencing_iraq_syria/). These UAS no-fly zones can also be altered through non-commercial methods by disabling UAS safety features (see, e.g., Support, No-Fly Zones (NFZ) Explained, Drone-Hacks Wiki (last edited June 18, 2024), https://wiki.drone-hacks.com/en/ nfz-explained). As of 2024, these alterations can be implemented across several China-based UAS models (see, e.g., Drone-Hacks, Available Hacks (accessed October 15, 2024), https:// drone-hacks.com/available-hacks/(an illustrative example of a website that allows users to download software to modify a drone’s operating system to operate outside of specified no fly zones)). Pushing forced updates that disable UAS in predefined zones and circumventing safety features demonstrate two vectors through which a foreign adversary could abuse its access and influence over a company intentionally to target UAS products owned by U.S. persons or operated in the United States, disrupt their operation, and in turn severely impact U.S. national security, including the U.S. ICTS supply chain and critical VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 infrastructure, and the security and safety of U.S. persons. This ANPRM seeks comments on the role of persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary in the U.S. supply chain for ICTS components integral to UAS. For clarity, this ANPRM uses the term ‘‘UAS companies’’ to refer to the manufacturers or distributors of a finished UAS product, like a drone, while the term ‘‘UAS Original Equipment Manufacturers’’ (OEMs) refers to the producers of the UAS components, including the tier 1, tier 2, and tier 3 suppliers. The term ‘‘UAS service providers’’ refers to entities responsible for desktop and mobile applications supporting UAS. A single company, depending on its products, could be a UAS company, OEM, and service provider all at once. BIS seeks comments on the below topics but encourages the submission of any comments germane to the issues discussed in this ANPRM: 8. In this section, BIS identified threats posed by transactions involving ICTS integral to UAS with a nexus to China or Russia. Has BIS fully captured and articulated the threat posed by transactions involving such ICTS? If not, what additional threats should BIS consider? 9. Do other foreign adversaries identified in 15 CFR 791.4, such as Iran, North Korea, Cuba, and the Maduro Regime of Venezuela, pose similar risks to the UAS ICTS supply chain that BIS should consider? Are there specific persons or entities with a nexus to these foreign adversaries that BIS should consider? 10. Which ICTS components integral to UAS are designed, developed, manufactured, or supplied predominantly or exclusively by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary? a. Are UAS companies capable of tracking and reporting the sources of these ICTS components? b. Are there specific ICTS components that UAS companies focus on when evaluating their supply chains for involvement with foreign adversary linked entities? 11. What are the potential tradeoffs of a rule prohibiting the resale or rental in the United States of UAS or UAS components that are designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary? 12. What are the software applications, whether freeware or requiring an account or purchase, that PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 companies within the UAS supply chain generally develop or distribute in support of UAS, and/or sell or resell within the United States or to U.S. persons? a. What is the provenance of all source code for such software applications? What do the distribution channels for such software applications look like (e.g., direct, follow components, aftermarket)? b. Please identify any significant third parties that develop source code for UAS OEM’s software product lines. 13. Please describe the ICTS supply chain for UAS that are used or sold in the United States. Particularly useful responses may include information regarding: a. Market leaders for each distinct phase of the supply chain for ICTS integral to UAS (e.g., design, development, manufacturing, or supply) including, but not limited to: (1) UAS companies; (2) OEMs, including tier one, tier two, and tier three suppliers; and (3) service providers. b. Geographic locations where software (e.g., product operating systems or waypoint software), hardware (e.g., light detection and ranging (LiDAR) sensors), or other ICTS integral to UAS in use in the United States, are designed, developed, manufactured, or supplied. c. The length of time it typically takes to conduct due diligence on UAS vendors, how long the design phase is for UAS, and how quickly UAS companies can make changes to the supply chain. 14. Which ICTS components integral to UAS, including but not limited to those identified in this ANPRM, pose the greatest risk to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, or to the security and safety of U.S. persons if they are foreign adversary ICTS? d. Capabilities of UAS That May Increase the Likelihood of Vulnerabilities That Foreign Adversary Linked Entities Could Exploit Data Collection UAS incorporate numerous ICTS components including sensors to gather environmental information, actuators to enable remote or autonomous movements, telecommunications equipment to receive signals necessary for flight, and software with intelligent algorithms to execute actions based on the gathered data. UAS for commercial or military purposes may incorporate additional equipment to collect more complex data, including multispectral sensors, thermal cameras, infrared E:\FR\FM\03JAP1.SGM 03JAP1 lotter on DSK11XQN23PROD with PROPOSALS1 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules sensors, and radar. These sensors may collect and transmit a wide variety of sensitive data (e.g., critical infrastructure facility layouts which could be used to plot potential avenues for sabotage of such facilities). In general, data collected by UAS can be stored in multiple locations depending on the specifications of the UAS and user decisions, including on an internetconnected device such as a mobile phone or a computer, on a radio control device, on a hard drive or personal server, or on a cloud platform provided by UAS companies. In some instances, UAS companies state in their privacy policies that data may be stored in data centers located outside of the user’s home country, to include where the UAS company is headquartered. BIS seeks to better understand the data collection capabilities including intelligent machine learning algorithms of UAS and the ICTS components therein. In particular, BIS seeks further comment on the following topics but encourages the submission of any comments germane to the issues discussed in this ANPRM: 15. What are the general data collection capabilities of UAS? What is the level of aggregation and scale of data that UAS can collect on U.S persons, entities, geography, and infrastructure? a. Who besides the operator of the UAS generally has authorized access to, or control of, data collected by UAS? b. How is the data collected by UAS sold or integrated into data markets? 16. What are the UAS industry standard policies or procedures, if any, governing how data generated by, owned by, or otherwise associated with U.S. persons is stored, managed, processed, gathered, or protected in or on data-related services equipment located outside of the United States? BIS defines ‘‘data-related services equipment’’ as hardware used to receive, store, process or transmit data in support of data-related services, including routers, firewalls, gateways, switches, servers, load-balancers, intrusion detection systems, domain name systems, and storage area networks. 17. Are there standards or best practices for data retention and/or data disposition policies or procedures, involving data-related services equipment located outside the United States following the termination of any UAS account services by U.S. persons? 18. What are the standard policies or procedures related to UAS companies’ and UAS OEMs’ review of or access to data generated by, owned by, or otherwise associated with U.S. persons? VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 19. Are there industry standard policies or procedures establishing how UAS companies must or should protect the privacy of data generated by, owned by, or otherwise associated with U.S. persons? 20. What cybersecurity measures, authentication, or controls do UAS service providers and other companies supporting the UAS supply chain use to mitigate risks surrounding data collection, access, storage, processing, and exfiltration? 21. Is it standard for UAS companies to have data-related services equipment located outside of the United States that, at any time, UAS companies use to store, collect, process, analyze, share, distribute, or manage data generated by, owned by, or otherwise associated with U.S. persons? 22. How are UAS integrated in critical infrastructure sectors? Which of these integrated UAS services, if any, are particularly unique or of a sensitive nature such that a disruption to the UAS supply chain would create a gap for the sector? 23. Which sensors in or on UAS that are typically used in critical industries (e.g., agricultural, chemical, construction, energy, telecommunication) are able to collect or transmit data or have connection capabilities? a. Are there official aftermarket modification or customization options available for these types of sensors? b. Are there any standard requirements for these sensors? 24. What is the standard practice for data sharing relationships between UAS companies and individuals or entities within the United States? a. Are there agreements between UAS companies and cloud computing service providers that require the exclusive or prioritized use of that cloud service’s network infrastructure? If so, please provide examples of how those agreements operate. b. In industries in the United States where UAS are used to collect data, do companies share the data they collect with other companies? For what purpose (if not for the primary purpose of data collection)? 25. Are there any standard assessments, audits, or evaluations, internal or by an external party, of UAS companies’ data privacy policies related to any data generated by, owned by, or otherwise associated with U.S. persons? 26. What role do specific remote sensing ICTS components serve for data collection by UAS? Particularly useful responses will describe the data collection role of the following components: PO 00000 Frm 00012 Fmt 4702 Sfmt 4702 277 a. Imagery (RGB and Multi-spectral), 3-Dimensional, or Acoustic Sensors; b. Particle Sensors (regardless of wavelength); c. Radio Frequency Sensors; d. Proximity and Navigation Sensors; e. Electro-Magnetic Sensors; and/or f. Other Sensors (including inertial). 27. How often are software applications related to the operation of UAS installed on a UAS user’s phone? What policies govern the application’s access to other information on the user’s phone? 28. What systems, sensors, or equipment do UAS and their affiliated UAS operators use when not navigating or storing data over mobile networks? 29. How do UAS operators secure data that is transmitted, received, or stored during the normal operation of a UAS without connecting to the internet? Remote Access and Control Connectivity features in UAS have raised significant concerns regarding illicit remote access and security vulnerabilities (see, e.g., Department of the Army, Discontinue Use of Da Jiang Innovation (DJI) Corporation Unmanned Aircraft Systems (August 2017), https:// www.suasnews.com/2017/08/us-armycalls-units-discontinue-use-djiequipment/). As UAS become increasingly sophisticated and equipped with advanced communication technologies such as Wi-Fi, Bluetooth, cellular connections, or other cellular communications technologies, the risk of unauthorized access to and control over UAS by malicious actors may grow. The integration of advanced communication technologies may allow malicious actors to intercept or hijack communication signals between a UAS and its controller, potentially leading to unauthorized access to sensitive data or control over the UAS itself. Malicious actors could gain illicit access to cloud platforms used by UAS to store data or authorize remote control access and use that access to determine the location of a UAS and pilot (see Andy Greenberg, This Hacker Tool Can Pinpoint a DJI Drone Operator’s Exact Location, Wired (March 2, 2023), https://www.wired.com/story/djidroneid-operator-location-hacker-tool/). Once malicious actors gain such access, they can obfuscate their identities to obtain U.S. persons’ sensitive information and data related to critical infrastructure. For example, researchers studying this issue have been successful in reverse engineering the radio frequency that controls a UAS and have been able to pinpoint the position of the UAS, the UAS home point, and the remote pilot’s location (see Nico E:\FR\FM\03JAP1.SGM 03JAP1 lotter on DSK11XQN23PROD with PROPOSALS1 278 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules Schiller, et al., Drone Security and the Mystery Case of DJI’s DroneID (March 2023), https://www.ndsssymposium.org/wp-content/uploads/ 2023/02/ndss2023_f217_paper.pdf). Further, unauthorized UAS access may provide avenues for malicious actors to infiltrate drone operations within critical infrastructure companies, compromising their functionality and security. The potential consequences of compromised UAS systems are significant. Malicious actors’ access to UAS could lead to the exfiltration of sensitive data, including real-time video feeds and geolocation information, which can be used to gather intelligence and conduct surveillance to threaten U.S. national security, including U.S. ICTS supply chains and critical infrastructure, or the security and safety of U.S. persons. To understand the vulnerabilities inherent in UAS, BIS requests comments regarding specific ICTS components that enable UAS connectivity, such as network connectivity chips, operating software, AI software and machine learning applications, and data transmission devices. These components, which facilitate UAS communication with external networks, are susceptible to various forms of potential UAS cyber vulnerabilities if not properly secured. Supply chain security for these components may be essential. Compromised network connectivity chips, for example, may introduce backdoors or other malicious functionalities during the manufacturing process, which may be triggered when the UAS is activated. UAS could also be compromised through the corruption and injection of artificial intelligent code during the supply chain process in order to introduce vulnerabilities or functionalities affecting data access and UAS control, for example. The supply chain may be manipulated by foreign adversaries who seek to exploit vulnerabilities at various stages of production and distribution. Understanding and mitigating these risks by implementing comprehensive security assessments and standards may be vital for ensuring the integrity and security of UAS communication capabilities. Enhanced scrutiny of the UAS supply chain, especially regarding foreign adversary ICTS components, may be necessary to safeguard against potential threats from foreign adversaries. As such, BIS seeks to understand the following topics in greater detail but welcomes any other VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 comments germane to the issues discussed in this ANPRM: 30. What is the physical range of connectivity for UAS systems for commercial use? 31. Where is data stored on the physical UAS if any? Where is data that a UAS captures during routine operations stored off the physical UAS? a. How long is data stored on and off the UAS platform? 32. What, if any, industry standard policies or procedures govern how UAS communicate, what kinds of information UAS can communicate, with what they can communicate, and which components enable, store, or analyze these communications? 33. What controls or procedures govern or should govern the use of AI in UAS? 34. What types of remote access or control do OEMs have over their UAS? Please also describe under what circumstances an OEM would require remote access or control. 35. To what extent can individual sensors and components communicate independently from the UAS Operating System (OS)? 36. What cybersecurity standards and best practices exist for the UAS supply chain? How do UAS OEMs supplement existing cybersecurity standards and best practices at each step of the UAS supply chain, including design, manufacturing, and maintenance? 37. How do UAS OEMs or UAS operators integrate payloads and related components from third parties into their software, OS, and AI software and applications? 38. Who are the third parties that commonly provide payloads and component parts (e.g., sensors, payloads, cameras) for integration into UAS production? a. Which, if any, of these third parties are owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary? Which, if any, of these third parties are owned by entities that operate under the laws of a foreign adversary? Where are these third parties incorporated and physically located? Please provide factual support where possible. 39. What ICTS components, other than payloads and related components, are made by non-U.S. third parties (i.e., not the U.S. UAS OEM) for incorporation into UAS? Where are these component parts made? Where are the UAS assembled, and what entity (e.g., OEM, third party servicer, or user/ operator) would typically incorporate or integrate these additional components into a UAS? PO 00000 Frm 00013 Fmt 4702 Sfmt 4702 40. Who provides and is responsible for cybersecurity updates to software, firmware, and AI software and applications for component parts integrated into UAS (e.g., sensors, camera, payload)? e. Consequences of Foreign Adversary Involvement in ICTS Integral to UAS The ability of a foreign adversary to direct or control private companies through applicable legal frameworks, combined with the possible exploitation of vulnerabilities in the increasingly capable ICTS components integral to UAS, poses a significant threat of data exfiltration and malicious remote access. This could lead to severe, and in some instances catastrophic, consequences for U.S. national security, including U.S. ICTS supply chains and critical infrastructure, and for the security and safety of U.S. persons. Through foreign adversary ICTS integral to UAS, the intelligence agencies of foreign adversaries could exfiltrate, collect, and aggregate a wide range of sensitive data on U.S. persons and critical infrastructure held by companies in the UAS ICTS supply chain. The data collected by UAS or by a connected device could include locations, for example, of military installations or critical infrastructure including water infrastructure or energy generation or storage facilities, flight paths, audio and video recordings, as well as information about operators’ identities, finances, contacts, operator base locations, and operating sector, including critical infrastructure, which can be collected by UAS or by a connected device. In addition, denial of service through backdoors embedded in a UAS’s software could enable a foreign adversary linked entity under certain conditions to obtain control over various UAS functions, including the ability to disable the UAS completely. To illustrate using an example noted generally above, in December 2023, a China-based UAS manufacturer rolled out a firmware update to their UAS that disabled any UAS located in ‘‘conflict zones’’ defined by the company to include Gaza, West Bank, Israel, Russia, Ukraine, and Taiwan, among others. Once the UAS entered one of the conflict zones with the downloaded update, it would cease functionality. Users would only be able to continue operation by refusing to download the update to the detriment of the long-term functionality of the UAS, as it would effectively bar the users from receiving future updates (see Haye Kesteloo, Autel Robotics Implements No-Fly Zones in Conflict Areas to Prevent Drone Misuse, E:\FR\FM\03JAP1.SGM 03JAP1 Federal Register / Vol. 90, No. 2 / Friday, January 3, 2025 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS1 DroneXL (December 24, 2023), https:// dronexl.co/2023/12/24/autel-roboticsdrone-no-fly-zones-conflict/). If abused by a malicious actor, pushed updates like this could open users up to the risk of newly defined and restricted ‘‘zones’’ that could affect the use and control of their UAS. A foreign adversary could exploit firmware updates of this type by exercising influence or control over a UAS service provider and instructing them to push a certain update. BIS seeks to better understand how UAS OEMs may impact UAS functionality through their incorporated ICTS components. In particular, the ANPRM seeks further comment on the following topics but encourages the submission of any comments that are germane to the issues discussed in this ANPRM: 41. In what instances, and how, would OEMs be able to terminate functionality of a UAS (i.e., denial of service)? a. What are the standards and best practices governing the ability of OEMs to terminate functionality of a UAS? b. Are there instances in which a third party or a subcomponent maker (e.g., a maker of sensors) could remotely deny service to and fully or partially terminate functionality of a UAS or its respective sensor or component independently of the OEM? c. Once service is denied or functionality is terminated, what are the standards and best practices for reinstating full operability? d. Are there instances in which a UAS and its subcomponents can use any inherent connectivity they possess to connect to other devices, the cloud, or connected software applications online but be insulated against denial-ofservice updates or patches by the OEM? f. Mitigations and Authorizations In addition to the topics discussed above, this ANPRM seeks comment on processes and mechanisms that BIS could implement in a potential rule to authorize otherwise prohibited ICTS transactions if the parties to such transactions adopt certain mitigation measures or otherwise mitigate the undue and unacceptable risks to U.S. national security, including U.S. ICTS supply chains and critical infrastructure, or to the safety and security of U.S. persons. In particular, the ANPRM seeks further comment on the following topics but encourages the submission of any comments that are germane to the issues discussed in this ANPRM: 42. Are there instances in which granting a temporary authorization to engage in otherwise prohibited UAS VerDate Sep<11>2014 17:38 Jan 02, 2025 Jkt 265001 ICTS transactions would be necessary to avoid supply chain disruptions or other unintended consequences and in the interest of the United States? 43. Which, if any, categories or classifications of end users should BIS consider excluding from any prohibitions on transactions involving foreign adversary ICTS integral to UAS because transactions involving such end users would not pose an undue or unacceptable risk? 44. For what categories of ICTS transactions relating to UAS should BIS require a specific authorization before the transaction is permitted in the United States? 45. Please comment on potential requirements for authorizations and certifications for industry participants (e.g., assemblers, manufacturers, dealers, sellers) filed electronically with BIS. 46. What certification or validation process should be implemented in order to validate mitigation actions taken? Should third-party testing and evaluation occur, and at what stage in the process should this testing and evaluation occur in order to validate mitigation actions? g. Economic Impact BIS is mindful that any regulation of transactions involving foreign adversary ICTS integral to UAS could have significant economic impacts on sectors that have incorporated this technology into their processes and may rely on UAS. For example, BIS recognizes regulations on these transactions could pose supply chain obstacles that could affect UAS and UAS component prices. BIS is concerned, however, about the short-term and long-term consequences of UAS and UAS supply chain abuse by foreign adversaries. Accordingly, this ANPRM seeks further comment on the following topics but encourages the submission of any comments that are germane to the issues discussed in this ANPRM: 47. What, if any, anticompetitive effects may result from regulation of transactions involving foreign adversary ICTS integral to UAS as contemplated by this ANPRM? And what, if anything, can be done to mitigate the anticompetitive effects? 48. What data privacy and protection impacts to U.S. businesses or the public, if any, might be associated with the regulation of transactions involving foreign adversary ICTS integral to UAS contemplated in this ANPRM? What are the benefits and costs, if any, of these impacts? 49. What additional economic impacts to U.S. businesses or the public, PO 00000 Frm 00014 Fmt 4702 Sfmt 4702 279 if any, might be associated with the regulation of transactions involving foreign adversary ICTS integral to UAS contemplated by this ANPRM? a. If responding from outside the United States, what economic impacts to local businesses and the public, if any, might be associated with regulations of transactions involving foreign adversary ICTS integral to UAS in the United States? 50. What actions can BIS take, or provisions could it add to any proposed regulations, to minimize potential costs borne by U.S. businesses or the public? a. If responding from outside the United States, what actions can BIS take, or what provisions could it add to any proposed regulations, to minimize potential costs borne by local businesses or the public? Elizabeth L.D. Cannon, Executive Director, Office of Information and Communications Technology and Services. [FR Doc. 2024–30209 Filed 1–2–25; 8:45 am] BILLING CODE 3510–33–P DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 17 RIN 2900–AS23 Exempting Whole Health Well-Being Services From Copayment Department of Veterans Affairs Proposed rule AGENCY: ACTION: The Department of Veterans Affairs (VA) proposes to revise its medical regulations to exempt Whole Health well-being services from the copayment requirements for inpatient hospital care and outpatient medical care. These Whole Health well-being services, which consist of Whole Health education and skill-building programs and complementary and integrative health well-being services, are provided to Veterans within the VA Whole Health System of Care to improve Veterans’ overall health and well-being. DATES: Comments must be received on or before March 4, 2025. ADDRESSES: Comments may be submitted through www.regulations.gov. Except as provided herein, comments received before the close of the comment period will be available at www.regulations.gov for public viewing, inspection, or copying, including any personally identifiable or confidential business information that is included in a comment. We post the comments received before the close of the comment period on SUMMARY: E:\FR\FM\03JAP1.SGM 03JAP1

Agencies

[Federal Register Volume 90, Number 2 (Friday, January 3, 2025)]
[Proposed Rules]
[Pages 271-279]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-30209]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

Bureau of Industry and Security

15 CFR Part 791

[Docket No. 241213-0327]
RIN 0694-AJ72


Securing the Information and Communications Technology and 
Services Supply Chain: Unmanned Aircraft Systems

AGENCY: Bureau of Industry and Security, U.S. Department of Commerce.

ACTION: Advance notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: In this advance notice of proposed rulemaking (ANPRM), the 
Department of Commerce's Bureau of Industry and Security (BIS) seeks 
public comment on issues related to transactions involving information 
and communications technology and services (ICTS) that are designed, 
developed, manufactured, or supplied by persons owned by, controlled 
by, or subject to the jurisdiction or direction of foreign adversaries, 
pursuant to Executive Order (E.O.) 13873, ``Securing the Information 
and Communications Technology and Services Supply Chain,'' and that are 
integral to unmanned aircraft systems (UAS). This ANPRM will assist BIS 
in determining the technologies and market participants that may be 
appropriate for regulation in order to address undue or unacceptable 
risks to U.S. national security, including U.S. ICTS supply chains and 
critical infrastructure, or/and

[[Page 272]]

to the security and safety of U.S. persons.

DATES: Comments must be received on or before March 4, 2025.

ADDRESSES: All comments must be submitted by one of the following 
methods:
     The Federal eRulemaking Portal: https://www.regulations.gov at docket number BIS-2024-0058.
     Email directly to: [email protected]. 
Include ``RIN 0694-AJ72'' in the subject line.
     Instructions: Comments sent by any other method, to any 
other address or individual, or received after the end of the comment 
period, may not be considered. For those seeking to submit business 
confidential information (BCI), please clearly mark such submissions as 
BCI and submit by email, as instructed above. Each BCI submission must 
also contain a summary of the BCI, clearly marked as public, in 
sufficient detail to permit a reasonable understanding of the substance 
of the information for public consumption. Such summary information 
will be posted on regulations.gov. Comments that contain profanity, 
vulgarity, threats, or other inappropriate language or content will not 
be considered.

FOR FURTHER INFORMATION CONTACT: Marc Coldiron, U.S. Department of 
Commerce, telephone: 202-482-3678. For media inquiries: Katherine 
Schneider, Office of Congressional and Public Affairs, Bureau of 
Industry and Security, U.S. Department of Commerce: [email protected].

SUPPLEMENTARY INFORMATION:

I. Background

    In E.O. 13873, ``Securing the Information and Communications 
Technology and Services Supply Chain,'' (84 FR 22689 (May 17, 2019)) 
the President delegated to the Secretary of Commerce (Secretary) the 
authority granted under the International Emergency Economic Powers Act 
(IEEPA) (50 U.S.C. 1701, et seq.), to the extent necessary, ``to deal 
with any unusual and extraordinary'' foreign threat to the national 
security, foreign policy, or economy of the United States in connection 
with the national emergency declared by the President with respect to 
such threat (50 U.S.C. 1701(a)). In E.O. 13873, the President declared 
a national emergency with respect to the ``unusual and extraordinary'' 
foreign threat posed to the ICTS supply chain and has, in accordance 
with the National Emergencies Act (NEA), extended the declaration of 
this national emergency each year since E.O. 13873's publication (see 
85 FR 29321 (May 14, 2020); 86 FR 26339 (May 13, 2021); 87 FR 29645 
(May 13, 2022); 88 FR 30635 (May 11, 2023); and 89 FR 40353 (May 9, 
2024)).
    Specifically, the President identified the ``unrestricted 
acquisition or use in the United States of [ICTS] designed, developed, 
manufactured, or supplied by persons owned by, controlled by, or 
subject to the jurisdiction or direction of foreign adversaries'' as 
``an unusual and extraordinary'' threat to the national security, 
foreign policy, and economy of the United States that ``exists both in 
the case of individual acquisitions or uses of such technology or 
services, and when acquisitions or uses of such technologies are 
considered as a class'' (E.O. 13873; see also 50 U.S.C. 1701(a)-(b)).
    Once the President declares a national emergency, IEEPA empowers 
the President to, among other acts, investigate, regulate, prevent, or 
prohibit any ``acquisition, holding, withholding, use, transfer, 
withdrawal, transportation, importation or exportation of, or dealing 
in, or exercising any right, power, or privilege with respect to, or 
transactions involving, any property in which any foreign country or a 
national thereof has any interest by any person, or with respect to any 
property, subject to the jurisdiction of the United States'' (50 U.S.C. 
1702(a)(1)(B)).
    To address identified risks to U.S. national security from ICTS 
transactions, the President in E.O. 13873 imposed a prohibition on 
transactions determined by the Secretary, in consultation with relevant 
agency heads, to involve foreign adversary ICTS and to pose certain 
risks to U.S. national security, including U.S. ICTS supply chains and 
critical infrastructure, and to the security and safety of U.S. 
persons. Specifically, to fall within the scope of the prohibition, the 
Secretary must determine that the ICTS transaction: (1) involves ICTS 
designed, developed, manufactured, or supplied by persons owned by, 
controlled by, or subject to the jurisdiction or direction of a foreign 
adversary, defined in E.O. 13873 section 3(b) as ``any foreign 
government or foreign non-government person engaged in a long-term 
pattern or serious instances of conduct significantly adverse to the 
national security of the United States or security and safety of United 
States persons''; and (2):
    A. ``poses an undue risk of sabotage to or subversion of the 
design, integrity, manufacturing, production, distribution, 
installation, operation, or maintenance of information and 
communications technology or services in the United States;''
    B. ``poses an undue risk of catastrophic effects on the security or 
resiliency of United States critical infrastructure or the digital 
economy of the United States;'' or
    C. ``otherwise poses an unacceptable risk to the national security 
of the United States or the security and safety of United States 
persons'' (E.O. 13873 1(a)).
    These factors are collectively referred to as ``undue or 
unacceptable risks.'' Further, E.O. 13873 grants the Secretary the 
authority to design or negotiate mitigation measures that would allow 
an otherwise prohibited transaction to proceed (E.O. 13873 1(b)). The 
President also delegated to the Secretary the ability to promulgate 
regulations that, among other things, establish when transactions 
involving particular technologies may be categorically prohibited (E.O. 
13873 2(a)-(b); see also 3 U.S.C. 301-302). Specifically, the Secretary 
may issue rules establishing criteria, consistent with section 1 of 
E.O. 13873, by which particular technologies or market participants may 
be categorically included in or categorically excluded from 
prohibitions established pursuant to E.O. 13873 (see E.O. 13873 2(b)). 
Any regulated transactions under E.O. 13873 must have a sufficient 
nexus to a foreign adversary, which, according to E.O. 13873's 
implementing regulations at 15 CFR 791.4, currently includes, China, 
People's Republic of (China), including the Hong Kong Special 
Administrative Region; Republic of Cuba (Cuba); Islamic Republic of 
Iran (Iran); Democratic People's Republic of Korea (North Korea); 
Russian Federation (Russia); and Venezuelan politician Nicol[aacute]s 
Maduro (Maduro Regime).

II. Introduction

    Pursuant to the authority delegated to the Secretary under E.O. 
13873, BIS is considering proposing a rule to address the undue or 
unacceptable risks posed by certain transactions involving ICTS 
integral to unmanned aircraft system (UAS) when the ICTS are designed, 
developed, manufactured, or supplied by persons owned by, controlled 
by, or subject to the jurisdiction or direction of foreign adversaries 
(foreign adversary ICTS). BIS is also considering whether there are 
mitigation measures that, if adopted, would allow UAS market 
participants to engage in transactions that would otherwise pose undue 
or unacceptable risks. The purpose of this ANPRM is to gather 
information to support BIS's potential development of a rule regarding 
foreign adversary ICTS

[[Page 273]]

integral to UAS. For the purposes of this rulemaking, unless terms are 
otherwise defined herein, this ANPRM will apply the definitions listed 
in 15 CFR 791.2.

III. Request for Comments

    BIS is concerned that the involvement of foreign adversaries, 
notably China and Russia, in the design, development, manufacture, or 
supply of ICTS integral to UAS poses undue or unacceptable risk to U.S. 
national security, including U.S. ICTS supply chains and critical 
infrastructure, and to the security and safety of U.S. persons. As 
described in more detail below, these countries can leverage their 
political and legal frameworks to co-opt private entities for national 
interests, and those private entities maintain dominant market 
positions in the global commercial UAS sector. This dominance, 
particularly by China, provides ample exploitation opportunities. 
Further, both countries have shown a willingness to compromise U.S. 
infrastructure and security through cyber espionage. The potential for 
these countries to direct the actions of private entities for the 
purpose of exploiting ICTS supply chains heightens concerns about their 
participation in the U.S. UAS supply chain.
    BIS seeks public input on several topics, including, but not 
limited to, certain definitions and BIS's assessment of how a class of 
transactions involving foreign adversary ICTS integral to UAS could 
present undue or unacceptable risks to U.S. national security and to 
the security and safety of U.S. persons. These risks relate to threats 
from foreign adversary-linked entities, the capabilities of UAS that 
may increase the likelihood of vulnerabilities, and the consequences to 
U.S. national security, including U.S. ICTS supply chains and critical 
infrastructure, and to the security and safety of U.S. persons if these 
vulnerabilities are exploited or intentionally inserted by foreign 
adversary linked entities. BIS recognizes the benefits of UAS 
technologies and does not imply through this ANPRM that any particular 
UAS components, such as data transmission or connectivity devices, 
should not be used. These technologies benefit the United States by 
increasing efficiency in various critical infrastructure sectors such 
as agriculture, construction, transportation, and energy, leading to 
economic growth and improved public safety. However, in E.O. 13873, the 
President focused on addressing risks that ICTS transactions involving 
foreign adversaries might present to U.S. national security and to the 
security and safety of U.S. persons. Therefore, this ANPRM, which is 
being issued pursuant to the authorities granted to the Secretary under 
E.O. 13873, seeks public comment on potential ways to address undue or 
unacceptable risks to U.S. national security, including U.S. ICTS 
supply chains and critical infrastructure, -and to the security and 
safety of U.S. persons that may arise from foreign adversary ICTS 
integral to UAS. As part of BIS's efforts to understand UAS and their 
critical ICTS components, BIS solicits comments on the -ICTS most 
integral to UAS's data collection and connectivity capabilities and 
that are most vulnerable to compromise by an adversarial actor. Such 
ICTS might be included in any mitigation measures or prohibitions 
imposed in a potential rule, and could include, but is not limited to: 
(1) onboard computers responsible for processing data and controlling 
UAV flight; (2) communications systems including, but not limited to, 
flight controllers, transceiver/receiver equipment, proximity links 
such as Global Navigation Satellite Systems (GNSS) sensors, and flight 
termination equipment; (3) flight control systems responsible for 
takeoff, landing, and navigation, including, but not limited to, 
exteroceptive and proprioceptive sensors; (4) ground control stations 
(GCS) or systems including, but not limited to, handheld flight 
controllers; (5) operating software including, but not limited to, 
network management software; (6) mission planning software; (7) 
intelligent battery power systems; (8) local and external data storage 
devices and services; and (9) artificial intelligence (AI) software or 
applications. BIS also solicits input on mechanisms to mitigate the 
risks posed by foreign adversary ICTS integral to UAS, such as 
potential design requirements, machine learning controls, 
implementation standards and protocols, cybersecurity firmware and/or 
software inputs, manufacturing integrity (i.e., the security of the 
manufacturing process to ensure no foreign adversary manipulation) 
protection systems and procedures, or prohibitions.
    Additionally, BIS seeks comment on whether it would be beneficial 
to create a process for the public to request specific authorization to 
engage in certain transactions involving foreign adversary ICTS 
integral to UAS by demonstrating that the parties to a particular 
transaction have implemented measures to adequately mitigate the risk 
to U.S. national security or to the security and safety of U.S. 
persons. BIS encourages public feedback to help inform the rulemaking 
process, particularly regarding the impact on U.S. ICTS supply chains 
and critical infrastructure of any prohibition or mitigation measures 
applicable to foreign adversary ICTS integral to UAS. BIS additionally 
encourages the submission of any public comments germane to the issues 
as described in this ANPRM.

a. Definitions

    BIS requests comments on a definition of ``unmanned aircraft 
systems'' or UAS to use in a potential rule. BIS could define UAS as 
the International Trade Administration (ITA) does to mean ``air 
vehicles and associated equipment that do not carry a human operator, 
but instead are remotely piloted or fly autonomously'' (International 
Trade Administration, Unmanned Aircraft Systems Overview (accessed 
October 15, 2024), https://www.trade.gov/unmanned-aircraft-systems/). 
UAS, more colloquially known as ``drones,'' is a generic term that can 
include, but is not exclusive to, remotely piloted aircraft systems or 
unmanned aerial vehicles. ITA's definition also states ``[a] UAS 
generally consists of (1) an aircraft with no pilot on board, (2) a 
remote pilot station, (3) a [command-and-control] link, and (4) a 
payload specific to the intended application [or] operation, which 
often includes specialized cameras or other sensors that collect data 
for near term analysis'' (International Trade Administration, Unmanned 
Aircraft Systems Overview (accessed October 15, 2024), https://www.trade.gov/unmanned-aircraft-systems/).
    BIS is also contemplating the use of other definitions of UAS from 
the U.S. government, including the definition used by the Federal 
Aviation Administration (FAA), which defines UAS as ``an unmanned 
aircraft and associated elements (including communication links and the 
components that control the unmanned aircraft) that are required for 
the operator to operate safely and efficiently in the national airspace 
system'' (49 U.S.C. 44801(12)). The FAA defines an ``unmanned 
aircraft'' to mean ``an aircraft that is operated without the 
possibility of direct human intervention from within or on the 
aircraft'' (49 U.S.C. 44801(11)).
    BIS also considered the definition of unmanned aerial vehicle (UAV) 
as used within BIS's Export Administration Regulations (EAR), which 
defines UAV as ``[a]ny `aircraft' capable of initiating flight and 
sustaining controlled flight and navigation without any human presence 
on board'' (15 CFR 772.1). The

[[Page 274]]

EAR defines ``aircraft'' as ``[a] fixed wing, swivel wing, rotary wing 
(helicopter), tilt rotor or tilt-wing airborne vehicle'' (15 CFR 
772.1). BIS considered the use of UAV versus UAS and believes UAV is 
too narrowly focused for future rulemaking purposes, as it only refers 
to the air vehicle itself and excludes other system elements, such as 
the ground control stations, communication links, and other associated 
components necessary for operation.
    BIS is inclined to determine that ITA's definition may be more 
appropriate for purposes of potential regulation because, unlike the 
FAA and EAR definitions, it identifies specific components and systems 
that are integral to UAS. Such a definition may include UAS and UAS 
subsystems, such as control stations; data communications and 
navigation links or, more precisely, command and control and Non-
Payload Communications (CNPC) links; payloads; flight termination 
systems; electronic launch and recovery equipment; recording 
capabilities for receiving live imagery; software or AI software and 
applications necessary for the operation of airborne systems; and the 
capability of remote software or firmware updates. Additionally, ITA's 
definition would incorporate some UAS known as actively tethered UAS, 
which use a load-rated tether that is physically attached to a ground 
station to provide continuous power and which may transmit data to and 
from the UAS, which allows the UAS to remain in the air for an extended 
period of time. Please note that any definition determined by BIS to be 
appropriate for BIS rulemaking regarding UAS would not supersede any 
other legal definition of UAS used in other contexts.
    Given the various definitions that could be utilized, this ANPRM 
seeks comment on the definitions to use in a potential rule regarding 
transactions involving ICTS integral to UAS, and specifically, but not 
limited to:
    1. In what ways, if any, should BIS elaborate on or amend the 
potential definition(s) of UAS as stated above? If amended, how will 
the revised definition enable BIS to better address national security 
risks arising from classes of transactions involving ICTS integral to 
UAS?
    2. Is the term UAS broad enough to include the aircraft systems 
that may combine flight controllers, global navigation satellite 
systems (GNSS) modules, cameras, communication devices, surveillance 
modules, navigation devices, sensors with control systems, and/or 
software with onboard and offboard data storage capabilities? Does a 
better term exist to include such aircraft systems within the 
definition's scope?
    3. Are there other commonly used definitions for UAS that BIS 
should consider when defining a class of transactions involving ICTS 
integral to UAS, including definitions from industry, civil society, or 
international standards organizations? If so, why might those 
definitions be more appropriate for the purposes of a rule?
    4. What is the appropriate focus of any BIS regulations in this 
sector, including, but not limited to, UAS platforms and subcomponent 
technology, UAS capabilities, or UAS end-user sectors, including 
entities providing services performed by UAS?
    5. Are there commonly used definitions and standard capabilities 
for each of the following ICTS components, which BIS has preliminarily 
identified as integral to the UAS platform: (1) onboard computers 
responsible for processing data and controlling UAV flight; (2) 
communications systems including, but not limited to, flight 
controllers, transceiver/receiver equipment, proximity links such as 
GNSS sensors, and flight termination equipment; (3) flight control 
systems responsible for takeoff, landing, and navigation, including, 
but not limited to, exteroceptive and proprioceptive sensors; (4) GCS 
or systems including, but not limited to, handheld flight controllers; 
(5) operating software including, but not limited to, network 
management software; (6) mission planning software; (7) intelligent 
battery power systems; (8) local and external data storage devices and 
services; (9) AI software or applications? Are there additional 
components that BIS should identify as integral to the UAS platform 
and, if so, are there commonly used definitions and standard 
capabilities for each component, such as the American Security Drones 
Act?

b. Risks Associated With UAS

    BIS is soliciting comment on the risks associated with foreign 
adversary ICTS integral to UAS, the rapidly advancing technological 
functionalities of UAS, and the increasing integration of UAS with U.S. 
critical infrastructure. Exponential advancements in UAS functionality 
have allowed for the rapid expansion of the UAS industry in recent 
years. Remote and autonomous control systems have been developed to 
support operational, safety, and environmental applications, minimizing 
physical strain and risks to operators in various fields. Advancements 
in this sector have reduced production and end user costs and increased 
the accessibility of UAS technology. In addition, UAS have become 
integral to various sectors of the economy, including: (1) agriculture, 
where they are used for crop monitoring and precision spraying; (2) the 
chemical industry, where they assist in pipeline inspections and 
hazardous material handling; (3) physical infrastructure and 
transportation, where they are employed for surveying, bridge 
inspections, and construction site management; (4) emergency response; 
(5) health care administration; (6) energy; and (7) media and 
entertainment.
    Over the last decade, UAS have evolved to more sophisticated models 
with improved functionalities, including enhanced connected 
technologies such as advanced flight controllers, multi-GNSS and GNSS 
modules, cameras, receivers, and AI software and applications, which 
have enabled greater autonomy, precision in navigation, enhanced 
surveillance capabilities, and seamless integration with various 
applications across industry. These new technologies require signal and 
communication software to collect vast amounts of data, and in turn may 
increase attack vectors for malicious actors to exploit.
    Commercial UAS have been increasingly adopted in critical 
infrastructure sectors, as defined in National Security Memorandum-22 
of April 2024 (see Grand View Research, Drone Market Size, Share & 
Trends Analysis Report by Component (Hardware, Software, Services), By 
Product, By Technology, By Payload Capacity, By Power Source, By End-
use, By Region, and Segment Forecasts, 2024-2030 (accessed October 15, 
2024), https://www.grandviewresearch.com/industry-analysis/drone-market-report; see also The White House, National Security Memorandum 
on Critical Infrastructure Security and Resilience (April 30, 2024), 
https://www.whitehouse.gov/briefing-room/presidential-actions/2024/04/30/national-security-memorandum-on-critical-infrastructure-security-and-resilience/). UAS used in these sectors often rely on the same 
aircraft used by recreational drone enthusiasts, but in many cases the 
UAS used to support critical infrastructure have longer flight times, 
can lift heavier and more complex payloads, can fly beyond visual line 
of sight, and have the durability to fly through rough weather 
conditions. UAS capable of lifting and carrying payloads for extended 
periods of time pose a specific and aggravated risk of both data 
collection and manipulation, as well as remote access that could be 
misused for destructive

[[Page 275]]

purposes. As critical infrastructure becomes more reliant on commercial 
UAS, their remote incapacitation by a foreign adversary creates 
increased risk to U.S. national security and to the security and safety 
of U.S. persons.
    Malign remote access to UAS could be used to harm or damage 
physical infrastructure via intentional collisions, the delivery of 
kinetic payload, or could result in altered sensitive readings on 
critical infrastructure data. These risks can be exacerbated if the 
ICTS integral to UAS is designed, developed, manufactured, or supplied, 
by persons owned by, controlled by, or subject to the jurisdiction or 
direction of a foreign adversary. Accordingly, BIS requests public 
comment on the undue or unacceptable risks posed by transactions 
involving foreign adversary ICTS integral to UAS technology. BIS seeks 
comments on the following topics but encourages the submission of any 
comments germane to the issues discussed in this ANPRM:
    6. BIS identified data exfiltration and remote access control as 
the two primary areas of risk associated with transactions involving 
foreign adversary ICTS integral to UAS technology. Are there other 
risks or factors contributing to the risk that BIS has not considered 
in the above analysis?
    7. Which specific sectors or elements of critical infrastructure 
operated by private organizations, specifically within the commercial 
market, are most at risk if UAS technology is compromised?

c. Threat Posed by Foreign Adversaries

    Foreign adversaries like China and Russia have established certain 
legal and regulatory frameworks through which they could compel 
entities under their jurisdiction to comply with requests for 
information regarding U.S. persons or access to systems in the U.S. 
ICTS supply chain. China has implemented a series of laws (e.g., the 
National Intelligence Law of 2017, the Cybersecurity Law of 2017, the 
Personal Information Protection Law (PIPL) of 2021, the National 
Security Law of 2015) that mandate cooperation with China's 
cybersecurity efforts, intelligence operations, and the protection of 
national security interests by individuals and entities subject to the 
jurisdiction of China. These laws require network operators and 
technology companies to assist public security agencies in safeguarding 
cybersecurity and providing access to data stored within China's 
borders (see Department of Homeland Security, Data Security Business 
Advisory (July 11, 2022), https://www.dhs.gov/sites/default/files/publications/20_1222_data-security-business-advisory.pdf). 
Specifically, the National Security Law of 2015 imposes obligations 
that require organizations and individuals to cooperate with Chinese 
authorities on undefined `matters of national security,' potentially 
requiring technology companies to expose the personal information of 
U.S. citizens or companies (see CNA, China's National Security Laws: 
Implications Beyond Borders (December 2023), https://www.cna.org/quick-looks/2023/China-national-security-laws-implications-beyond-borders.pdf).
    Similarly, Russian legislation (e.g., Federal Law No. 40-FZ, ``On 
the Federal Security Service''; Federal Law No. 144-FZ, ``Open-
Investigative Activity''; Federal Law No. 97-FZ, ``On Amendments to the 
Law'') grants the Russian government direct access to Russian 
corporations' activities and facilities. Using this authority, the 
Russian government could access companies' data and consumer 
information and mandate that companies cooperate with the Federal 
Security Services (FSB) to assist with counterintelligence actions, 
which can include installing government equipment on companies' 
infrastructure for data collection. These laws compel Russia-based 
telecommunications providers, internet service companies, and other 
entities to assist Russian security agencies in investigations and 
surveillance, ensuring compliance with national security imperatives 
(see Federal Law No. 374-FZ, ``On Amending Federal Law `On Combating 
Terrorism' And Certain Legislative Acts of the Russian Federation 
Regarding the Establishment of Additional Counter-Terrorism Measures 
and Public Security'').
    Within the United States, products developed by China-based 
entities make up at least 75 percent of the UAS consumer market (see 
Lukas Schroth, Drone Market Shares in the USA After China-US Disputes, 
Drone Industry Insights (March 2, 2021), https://droneii.com/drone-market-shares-usa-after-china-usa-disputes; see also David Kitron, Game 
of Drones: Chinese Giant DJI Hit by U.S. Tensions, Staff Defections, 
Reuters (March 8, 2021), https://www.reuters.com/article/us-usa-china-tech-dji-insight/game-of-drones-chinese-giant-dji-hit-by-u-s-tensions-staff-defections-idUSKBN2AZ0PV/). The large market share of China-based 
entities allows China to exercise control over the supply chain and 
deny access to UAS technology. With the added element of China's 
ability to exercise jurisdiction over the primary producers of UAS 
products and components globally, China is unmatched in its control 
over crucial UAS elements used for commercial needs. The preeminence of 
China-based entities in the U.S. market provides China, through its 
established legal framework and control over persons subject to its 
jurisdiction, a significant opportunity to collect U.S. persons' data 
and potentially deny services to the United States and its allies in 
response to unfavorable policies or conflicts.
    Russia, in comparison to China, comprises a relatively small 
portion of the global UAS market share, but has announced its intention 
to heavily invest in developing Russia's UAS domestic market over the 
next few years to be less reliant on external manufacturers (see, e.g., 
Russia plans to produce 18,000 drones annually by late 2026--first 
deputy premier, TASS (April 27, 2023), https://tass.com/economy/1610899). As of 2023, Russia reportedly produced only 6,000 UAS and 
aims to boost domestic drone production for various industry sectors 
(see Martin Forusek, Russian official: Russia aims to produce over 
32,000 civilian drones annually by 2030, Kyiv Independent (January 6, 
2024), https://kyivindependent.com/russian-official-russia-aims-to-produce-32-000-drones-annually-by-2030/). While the nascent state of 
Russia's UAS market may not currently pose risks to U.S. national 
security, including U.S. ICTS supply chains and critical 
infrastructure, and to the security and safety of U.S. persons in the 
commercial space, the projected growth of Russia's domestic market 
suggests national security risks will emerge if left unchecked. The 
strategic investments being made in Russia mirror the same efforts made 
by China in its own markets and may position Russia as a high-volume 
supplier in the UAS space in the near future.
    Despite their different current UAS market shares, China and Russia 
have demonstrated that they are capable of engaging in cyber activities 
that seek to harm U.S. critical infrastructure and national security 
for strategic advantage. According to the Office of the Director of 
National Intelligence, China's cyber espionage pursuits and the export 
of surveillance, information, and communications technologies by China-
based industries increase the threats of aggressive cyber operations 
against the United States and the suppression of the free flow of 
information in cyberspace (see Office of the Director of National 
Intelligence, Annual Threat Assessment (2024), https://www.dni.gov/files/ODNI/documents/assessments/ATA-2024-Unclassified-Report.pdf). 
Additionally,

[[Page 276]]

Russia has long exploited vulnerabilities targeting critical 
infrastructure in the United States as well as in allied and partner 
countries (see Cybersecurity and Infrastructure Security Agency, 
Hunting Russian Intelligence ``Snake'' Malware (May 9, 2023), https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a). Whether 
through pre-positioning attacks or exploiting software vulnerabilities, 
China and Russia have exhibited their intent and capability to 
compromise U.S. national security, including U.S. ICTS supply chains 
and critical infrastructure, and the security and safety of U.S. 
persons.
    Further, foreign adversaries, such as China or Russia, could direct 
UAS companies subject to their jurisdiction to engineer vulnerabilities 
into their products, exploit existing vulnerabilities, or push 
malicious updates, compromising these products without the UAS owner's 
knowledge. In the past, for example, China-based UAS companies have 
pushed firmware updates to implement no-fly restrictions that would 
disable their UAS in conflict zones defined by the company (see, e.g., 
Haye Kesteloo, Autel Robotics Implements No-Fly Zones in Conflict Areas 
to Prevent Drone Misuse, DroneXL (December 24, 2023), https://dronexl.co/2023/12/24/autel-robotics-drone-no-fly-zones-conflict/; 
Gareth Corfield, Drone maker DJI quietly made large chunks of Iraq, 
Syria no-fly zones, The Register (April 26, 2017), https://www.theregister.com/2017/04/26/dji_drone_geofencing_iraq_syria/). These 
UAS no-fly zones can also be altered through non-commercial methods by 
disabling UAS safety features (see, e.g., Support, No-Fly Zones (NFZ) 
Explained, Drone-Hacks Wiki (last edited June 18, 2024), https://wiki.drone-hacks.com/en/nfz-explained). As of 2024, these alterations 
can be implemented across several China-based UAS models (see, e.g., 
Drone-Hacks, Available Hacks (accessed October 15, 2024), https://drone-hacks.com/available-hacks/(an illustrative example of a website 
that allows users to download software to modify a drone's operating 
system to operate outside of specified no fly zones)). Pushing forced 
updates that disable UAS in predefined zones and circumventing safety 
features demonstrate two vectors through which a foreign adversary 
could abuse its access and influence over a company intentionally to 
target UAS products owned by U.S. persons or operated in the United 
States, disrupt their operation, and in turn severely impact U.S. 
national security, including the U.S. ICTS supply chain and critical 
infrastructure, and the security and safety of U.S. persons.
    This ANPRM seeks comments on the role of persons owned by, 
controlled by, or subject to the jurisdiction or direction of a foreign 
adversary in the U.S. supply chain for ICTS components integral to UAS. 
For clarity, this ANPRM uses the term ``UAS companies'' to refer to the 
manufacturers or distributors of a finished UAS product, like a drone, 
while the term ``UAS Original Equipment Manufacturers'' (OEMs) refers 
to the producers of the UAS components, including the tier 1, tier 2, 
and tier 3 suppliers. The term ``UAS service providers'' refers to 
entities responsible for desktop and mobile applications supporting 
UAS. A single company, depending on its products, could be a UAS 
company, OEM, and service provider all at once. BIS seeks comments on 
the below topics but encourages the submission of any comments germane 
to the issues discussed in this ANPRM:
    8. In this section, BIS identified threats posed by transactions 
involving ICTS integral to UAS with a nexus to China or Russia. Has BIS 
fully captured and articulated the threat posed by transactions 
involving such ICTS? If not, what additional threats should BIS 
consider?
    9. Do other foreign adversaries identified in 15 CFR 791.4, such as 
Iran, North Korea, Cuba, and the Maduro Regime of Venezuela, pose 
similar risks to the UAS ICTS supply chain that BIS should consider? 
Are there specific persons or entities with a nexus to these foreign 
adversaries that BIS should consider?
    10. Which ICTS components integral to UAS are designed, developed, 
manufactured, or supplied predominantly or exclusively by persons owned 
by, controlled by, or subject to the jurisdiction or direction of a 
foreign adversary?
    a. Are UAS companies capable of tracking and reporting the sources 
of these ICTS components?
    b. Are there specific ICTS components that UAS companies focus on 
when evaluating their supply chains for involvement with foreign 
adversary linked entities?
    11. What are the potential tradeoffs of a rule prohibiting the 
resale or rental in the United States of UAS or UAS components that are 
designed, developed, manufactured, or supplied by persons owned by, 
controlled by, or subject to the jurisdiction or direction of a foreign 
adversary?
    12. What are the software applications, whether freeware or 
requiring an account or purchase, that companies within the UAS supply 
chain generally develop or distribute in support of UAS, and/or sell or 
resell within the United States or to U.S. persons?
    a. What is the provenance of all source code for such software 
applications? What do the distribution channels for such software 
applications look like (e.g., direct, follow components, aftermarket)?
    b. Please identify any significant third parties that develop 
source code for UAS OEM's software product lines.
    13. Please describe the ICTS supply chain for UAS that are used or 
sold in the United States. Particularly useful responses may include 
information regarding:
    a. Market leaders for each distinct phase of the supply chain for 
ICTS integral to UAS (e.g., design, development, manufacturing, or 
supply) including, but not limited to: (1) UAS companies; (2) OEMs, 
including tier one, tier two, and tier three suppliers; and (3) service 
providers.
    b. Geographic locations where software (e.g., product operating 
systems or waypoint software), hardware (e.g., light detection and 
ranging (LiDAR) sensors), or other ICTS integral to UAS in use in the 
United States, are designed, developed, manufactured, or supplied.
    c. The length of time it typically takes to conduct due diligence 
on UAS vendors, how long the design phase is for UAS, and how quickly 
UAS companies can make changes to the supply chain.
    14. Which ICTS components integral to UAS, including but not 
limited to those identified in this ANPRM, pose the greatest risk to 
U.S. national security, including U.S. ICTS supply chains and critical 
infrastructure, or to the security and safety of U.S. persons if they 
are foreign adversary ICTS?

d. Capabilities of UAS That May Increase the Likelihood of 
Vulnerabilities That Foreign Adversary Linked Entities Could Exploit

Data Collection

    UAS incorporate numerous ICTS components including sensors to 
gather environmental information, actuators to enable remote or 
autonomous movements, telecommunications equipment to receive signals 
necessary for flight, and software with intelligent algorithms to 
execute actions based on the gathered data. UAS for commercial or 
military purposes may incorporate additional equipment to collect more 
complex data, including multispectral sensors, thermal cameras, 
infrared

[[Page 277]]

sensors, and radar. These sensors may collect and transmit a wide 
variety of sensitive data (e.g., critical infrastructure facility 
layouts which could be used to plot potential avenues for sabotage of 
such facilities). In general, data collected by UAS can be stored in 
multiple locations depending on the specifications of the UAS and user 
decisions, including on an internet-connected device such as a mobile 
phone or a computer, on a radio control device, on a hard drive or 
personal server, or on a cloud platform provided by UAS companies. In 
some instances, UAS companies state in their privacy policies that data 
may be stored in data centers located outside of the user's home 
country, to include where the UAS company is headquartered.
    BIS seeks to better understand the data collection capabilities 
including intelligent machine learning algorithms of UAS and the ICTS 
components therein. In particular, BIS seeks further comment on the 
following topics but encourages the submission of any comments germane 
to the issues discussed in this ANPRM:
    15. What are the general data collection capabilities of UAS? What 
is the level of aggregation and scale of data that UAS can collect on 
U.S persons, entities, geography, and infrastructure?
    a. Who besides the operator of the UAS generally has authorized 
access to, or control of, data collected by UAS?
    b. How is the data collected by UAS sold or integrated into data 
markets?
    16. What are the UAS industry standard policies or procedures, if 
any, governing how data generated by, owned by, or otherwise associated 
with U.S. persons is stored, managed, processed, gathered, or protected 
in or on data-related services equipment located outside of the United 
States? BIS defines ``data-related services equipment'' as hardware 
used to receive, store, process or transmit data in support of data-
related services, including routers, firewalls, gateways, switches, 
servers, load-balancers, intrusion detection systems, domain name 
systems, and storage area networks.
    17. Are there standards or best practices for data retention and/or 
data disposition policies or procedures, involving data-related 
services equipment located outside the United States following the 
termination of any UAS account services by U.S. persons?
    18. What are the standard policies or procedures related to UAS 
companies' and UAS OEMs' review of or access to data generated by, 
owned by, or otherwise associated with U.S. persons?
    19. Are there industry standard policies or procedures establishing 
how UAS companies must or should protect the privacy of data generated 
by, owned by, or otherwise associated with U.S. persons?
    20. What cybersecurity measures, authentication, or controls do UAS 
service providers and other companies supporting the UAS supply chain 
use to mitigate risks surrounding data collection, access, storage, 
processing, and exfiltration?
    21. Is it standard for UAS companies to have data-related services 
equipment located outside of the United States that, at any time, UAS 
companies use to store, collect, process, analyze, share, distribute, 
or manage data generated by, owned by, or otherwise associated with 
U.S. persons?
    22. How are UAS integrated in critical infrastructure sectors? 
Which of these integrated UAS services, if any, are particularly unique 
or of a sensitive nature such that a disruption to the UAS supply chain 
would create a gap for the sector?
    23. Which sensors in or on UAS that are typically used in critical 
industries (e.g., agricultural, chemical, construction, energy, 
telecommunication) are able to collect or transmit data or have 
connection capabilities?
    a. Are there official aftermarket modification or customization 
options available for these types of sensors?
    b. Are there any standard requirements for these sensors?
    24. What is the standard practice for data sharing relationships 
between UAS companies and individuals or entities within the United 
States?
    a. Are there agreements between UAS companies and cloud computing 
service providers that require the exclusive or prioritized use of that 
cloud service's network infrastructure? If so, please provide examples 
of how those agreements operate.
    b. In industries in the United States where UAS are used to collect 
data, do companies share the data they collect with other companies? 
For what purpose (if not for the primary purpose of data collection)?
    25. Are there any standard assessments, audits, or evaluations, 
internal or by an external party, of UAS companies' data privacy 
policies related to any data generated by, owned by, or otherwise 
associated with U.S. persons?
    26. What role do specific remote sensing ICTS components serve for 
data collection by UAS? Particularly useful responses will describe the 
data collection role of the following components:
    a. Imagery (RGB and Multi-spectral), 3-Dimensional, or Acoustic 
Sensors;
    b. Particle Sensors (regardless of wavelength);
    c. Radio Frequency Sensors;
    d. Proximity and Navigation Sensors;
    e. Electro-Magnetic Sensors; and/or
    f. Other Sensors (including inertial).
    27. How often are software applications related to the operation of 
UAS installed on a UAS user's phone? What policies govern the 
application's access to other information on the user's phone?
    28. What systems, sensors, or equipment do UAS and their affiliated 
UAS operators use when not navigating or storing data over mobile 
networks?
    29. How do UAS operators secure data that is transmitted, received, 
or stored during the normal operation of a UAS without connecting to 
the internet?

Remote Access and Control

    Connectivity features in UAS have raised significant concerns 
regarding illicit remote access and security vulnerabilities (see, 
e.g., Department of the Army, Discontinue Use of Da Jiang Innovation 
(DJI) Corporation Unmanned Aircraft Systems (August 2017), https://www.suasnews.com/2017/08/us-army-calls-units-discontinue-use-dji-equipment/). As UAS become increasingly sophisticated and equipped with 
advanced communication technologies such as Wi-Fi, Bluetooth, cellular 
connections, or other cellular communications technologies, the risk of 
unauthorized access to and control over UAS by malicious actors may 
grow. The integration of advanced communication technologies may allow 
malicious actors to intercept or hijack communication signals between a 
UAS and its controller, potentially leading to unauthorized access to 
sensitive data or control over the UAS itself.
    Malicious actors could gain illicit access to cloud platforms used 
by UAS to store data or authorize remote control access and use that 
access to determine the location of a UAS and pilot (see Andy 
Greenberg, This Hacker Tool Can Pinpoint a DJI Drone Operator's Exact 
Location, Wired (March 2, 2023), https://www.wired.com/story/dji-droneid-operator-location-hacker-tool/). Once malicious actors gain 
such access, they can obfuscate their identities to obtain U.S. 
persons' sensitive information and data related to critical 
infrastructure. For example, researchers studying this issue have been 
successful in reverse engineering the radio frequency that controls a 
UAS and have been able to pinpoint the position of the UAS, the UAS 
home point, and the remote pilot's location (see Nico

[[Page 278]]

Schiller, et al., Drone Security and the Mystery Case of DJI's DroneID 
(March 2023), https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf). Further, unauthorized UAS access may 
provide avenues for malicious actors to infiltrate drone operations 
within critical infrastructure companies, compromising their 
functionality and security. The potential consequences of compromised 
UAS systems are significant. Malicious actors' access to UAS could lead 
to the exfiltration of sensitive data, including real-time video feeds 
and geolocation information, which can be used to gather intelligence 
and conduct surveillance to threaten U.S. national security, including 
U.S. ICTS supply chains and critical infrastructure, or the security 
and safety of U.S. persons.
    To understand the vulnerabilities inherent in UAS, BIS requests 
comments regarding specific ICTS components that enable UAS 
connectivity, such as network connectivity chips, operating software, 
AI software and machine learning applications, and data transmission 
devices. These components, which facilitate UAS communication with 
external networks, are susceptible to various forms of potential UAS 
cyber vulnerabilities if not properly secured. Supply chain security 
for these components may be essential. Compromised network connectivity 
chips, for example, may introduce backdoors or other malicious 
functionalities during the manufacturing process, which may be 
triggered when the UAS is activated. UAS could also be compromised 
through the corruption and injection of artificial intelligent code 
during the supply chain process in order to introduce vulnerabilities 
or functionalities affecting data access and UAS control, for example. 
The supply chain may be manipulated by foreign adversaries who seek to 
exploit vulnerabilities at various stages of production and 
distribution. Understanding and mitigating these risks by implementing 
comprehensive security assessments and standards may be vital for 
ensuring the integrity and security of UAS communication capabilities. 
Enhanced scrutiny of the UAS supply chain, especially regarding foreign 
adversary ICTS components, may be necessary to safeguard against 
potential threats from foreign adversaries. As such, BIS seeks to 
understand the following topics in greater detail but welcomes any 
other comments germane to the issues discussed in this ANPRM:
    30. What is the physical range of connectivity for UAS systems for 
commercial use?
    31. Where is data stored on the physical UAS if any? Where is data 
that a UAS captures during routine operations stored off the physical 
UAS?
    a. How long is data stored on and off the UAS platform?
    32. What, if any, industry standard policies or procedures govern 
how UAS communicate, what kinds of information UAS can communicate, 
with what they can communicate, and which components enable, store, or 
analyze these communications?
    33. What controls or procedures govern or should govern the use of 
AI in UAS?
    34. What types of remote access or control do OEMs have over their 
UAS? Please also describe under what circumstances an OEM would require 
remote access or control.
    35. To what extent can individual sensors and components 
communicate independently from the UAS Operating System (OS)?
    36. What cybersecurity standards and best practices exist for the 
UAS supply chain? How do UAS OEMs supplement existing cybersecurity 
standards and best practices at each step of the UAS supply chain, 
including design, manufacturing, and maintenance?
    37. How do UAS OEMs or UAS operators integrate payloads and related 
components from third parties into their software, OS, and AI software 
and applications?
    38. Who are the third parties that commonly provide payloads and 
component parts (e.g., sensors, payloads, cameras) for integration into 
UAS production?
    a. Which, if any, of these third parties are owned by, controlled 
by, or subject to the jurisdiction or direction of a foreign adversary? 
Which, if any, of these third parties are owned by entities that 
operate under the laws of a foreign adversary? Where are these third 
parties incorporated and physically located? Please provide factual 
support where possible.
    39. What ICTS components, other than payloads and related 
components, are made by non-U.S. third parties (i.e., not the U.S. UAS 
OEM) for incorporation into UAS? Where are these component parts made? 
Where are the UAS assembled, and what entity (e.g., OEM, third party 
servicer, or user/operator) would typically incorporate or integrate 
these additional components into a UAS?
    40. Who provides and is responsible for cybersecurity updates to 
software, firmware, and AI software and applications for component 
parts integrated into UAS (e.g., sensors, camera, payload)?

e. Consequences of Foreign Adversary Involvement in ICTS Integral to 
UAS

    The ability of a foreign adversary to direct or control private 
companies through applicable legal frameworks, combined with the 
possible exploitation of vulnerabilities in the increasingly capable 
ICTS components integral to UAS, poses a significant threat of data 
exfiltration and malicious remote access. This could lead to severe, 
and in some instances catastrophic, consequences for U.S. national 
security, including U.S. ICTS supply chains and critical 
infrastructure, and for the security and safety of U.S. persons.
    Through foreign adversary ICTS integral to UAS, the intelligence 
agencies of foreign adversaries could exfiltrate, collect, and 
aggregate a wide range of sensitive data on U.S. persons and critical 
infrastructure held by companies in the UAS ICTS supply chain. The data 
collected by UAS or by a connected device could include locations, for 
example, of military installations or critical infrastructure including 
water infrastructure or energy generation or storage facilities, flight 
paths, audio and video recordings, as well as information about 
operators' identities, finances, contacts, operator base locations, and 
operating sector, including critical infrastructure, which can be 
collected by UAS or by a connected device.
    In addition, denial of service through backdoors embedded in a 
UAS's software could enable a foreign adversary linked entity under 
certain conditions to obtain control over various UAS functions, 
including the ability to disable the UAS completely. To illustrate 
using an example noted generally above, in December 2023, a China-based 
UAS manufacturer rolled out a firmware update to their UAS that 
disabled any UAS located in ``conflict zones'' defined by the company 
to include Gaza, West Bank, Israel, Russia, Ukraine, and Taiwan, among 
others. Once the UAS entered one of the conflict zones with the 
downloaded update, it would cease functionality. Users would only be 
able to continue operation by refusing to download the update to the 
detriment of the long-term functionality of the UAS, as it would 
effectively bar the users from receiving future updates (see Haye 
Kesteloo, Autel Robotics Implements No-Fly Zones in Conflict Areas to 
Prevent Drone Misuse,

[[Page 279]]

DroneXL (December 24, 2023), https://dronexl.co/2023/12/24/autel-robotics-drone-no-fly-zones-conflict/). If abused by a malicious actor, 
pushed updates like this could open users up to the risk of newly 
defined and restricted ``zones'' that could affect the use and control 
of their UAS. A foreign adversary could exploit firmware updates of 
this type by exercising influence or control over a UAS service 
provider and instructing them to push a certain update.
    BIS seeks to better understand how UAS OEMs may impact UAS 
functionality through their incorporated ICTS components. In 
particular, the ANPRM seeks further comment on the following topics but 
encourages the submission of any comments that are germane to the 
issues discussed in this ANPRM:
    41. In what instances, and how, would OEMs be able to terminate 
functionality of a UAS (i.e., denial of service)?
    a. What are the standards and best practices governing the ability 
of OEMs to terminate functionality of a UAS?
    b. Are there instances in which a third party or a subcomponent 
maker (e.g., a maker of sensors) could remotely deny service to and 
fully or partially terminate functionality of a UAS or its respective 
sensor or component independently of the OEM?
    c. Once service is denied or functionality is terminated, what are 
the standards and best practices for reinstating full operability?
    d. Are there instances in which a UAS and its subcomponents can use 
any inherent connectivity they possess to connect to other devices, the 
cloud, or connected software applications online but be insulated 
against denial-of-service updates or patches by the OEM?

f. Mitigations and Authorizations

    In addition to the topics discussed above, this ANPRM seeks comment 
on processes and mechanisms that BIS could implement in a potential 
rule to authorize otherwise prohibited ICTS transactions if the parties 
to such transactions adopt certain mitigation measures or otherwise 
mitigate the undue and unacceptable risks to U.S. national security, 
including U.S. ICTS supply chains and critical infrastructure, or to 
the safety and security of U.S. persons. In particular, the ANPRM seeks 
further comment on the following topics but encourages the submission 
of any comments that are germane to the issues discussed in this ANPRM:
    42. Are there instances in which granting a temporary authorization 
to engage in otherwise prohibited UAS ICTS transactions would be 
necessary to avoid supply chain disruptions or other unintended 
consequences and in the interest of the United States?
    43. Which, if any, categories or classifications of end users 
should BIS consider excluding from any prohibitions on transactions 
involving foreign adversary ICTS integral to UAS because transactions 
involving such end users would not pose an undue or unacceptable risk?
    44. For what categories of ICTS transactions relating to UAS should 
BIS require a specific authorization before the transaction is 
permitted in the United States?
    45. Please comment on potential requirements for authorizations and 
certifications for industry participants (e.g., assemblers, 
manufacturers, dealers, sellers) filed electronically with BIS.
    46. What certification or validation process should be implemented 
in order to validate mitigation actions taken? Should third-party 
testing and evaluation occur, and at what stage in the process should 
this testing and evaluation occur in order to validate mitigation 
actions?

g. Economic Impact

    BIS is mindful that any regulation of transactions involving 
foreign adversary ICTS integral to UAS could have significant economic 
impacts on sectors that have incorporated this technology into their 
processes and may rely on UAS. For example, BIS recognizes regulations 
on these transactions could pose supply chain obstacles that could 
affect UAS and UAS component prices. BIS is concerned, however, about 
the short-term and long-term consequences of UAS and UAS supply chain 
abuse by foreign adversaries. Accordingly, this ANPRM seeks further 
comment on the following topics but encourages the submission of any 
comments that are germane to the issues discussed in this ANPRM:
    47. What, if any, anticompetitive effects may result from 
regulation of transactions involving foreign adversary ICTS integral to 
UAS as contemplated by this ANPRM? And what, if anything, can be done 
to mitigate the anticompetitive effects?
    48. What data privacy and protection impacts to U.S. businesses or 
the public, if any, might be associated with the regulation of 
transactions involving foreign adversary ICTS integral to UAS 
contemplated in this ANPRM? What are the benefits and costs, if any, of 
these impacts?
    49. What additional economic impacts to U.S. businesses or the 
public, if any, might be associated with the regulation of transactions 
involving foreign adversary ICTS integral to UAS contemplated by this 
ANPRM?
    a. If responding from outside the United States, what economic 
impacts to local businesses and the public, if any, might be associated 
with regulations of transactions involving foreign adversary ICTS 
integral to UAS in the United States?
    50. What actions can BIS take, or provisions could it add to any 
proposed regulations, to minimize potential costs borne by U.S. 
businesses or the public?
    a. If responding from outside the United States, what actions can 
BIS take, or what provisions could it add to any proposed regulations, 
to minimize potential costs borne by local businesses or the public?

Elizabeth L.D. Cannon,
Executive Director, Office of Information and Communications Technology 
and Services.
[FR Doc. 2024-30209 Filed 1-2-25; 8:45 am]
BILLING CODE 3510-33-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.