Want me to put this bill in plain English?
This is not an official government website.
Copyright © 2026 PLEJ LC. All rights reserved.
Directs the Commerce Department’s Assistant Secretary to deliver, within one year, a comprehensive report to two Congressional committees on the cybersecurity and vulnerabilities of mobile service networks and devices. It must assess risks from hackers and foreign adversaries and explain how providers handle weaknesses, how consumers make choices, the use of encryption and authentication, and issues related to cell‑site simulators. The report must consult relevant experts and agencies, exclude 5G from scope, and be prepared in both public and classified forms. Sensitive or exploitable details must be redacted in the public version while still giving Congress and the public useful insights to guide policy and security improvements.
Submit a report examining the cybersecurity of mobile service networks and the vulnerability of such networks and mobile devices to cyberattacks and surveillance by adversaries to the House Energy and Commerce Committee and the Senate Commerce, Science, and Transportation Committee not later than 1 year after enactment.
Include an assessment of the degree to which mobile service providers have addressed (or not addressed) cybersecurity vulnerabilities identified by academic/independent researchers, standards/technical organizations, industry experts, and Federal agencies, including NTIA, NIST, and DHS (including CISA and the Science and Technology Directorate).
Discuss to what degree customers (consumers, companies, and government agencies) consider cybersecurity when buying mobile service and devices, and discuss commercial availability of tools, frameworks, best practices, and other resources for customers to evaluate cybersecurity risk and price tradeoffs.
Discuss the degree to which providers of mobile service have implemented cybersecurity best practices and risk assessment frameworks.
Estimate and discuss the prevalence and efficacy of encryption and authentication algorithms and techniques used in: (A) mobile service; (B) mobile communications equipment or services; (C) commonly used mobile phones and other mobile devices; and (D) commonly used mobile operating systems and communications software and applications.
Introduced February 27, 2025 by Greg Landsman · Last progress July 15, 2025
Expand sections to see detailed analysis
Received in the Senate and Read twice and referred to the Committee on Commerce, Science, and Transportation.
Received in the Senate and Read twice and referred to the Committee on Commerce, Science, and Transportation.
On motion to suspend the rules and pass the bill Agreed to by the Yeas and Nays: (2/3 required): 360 - 10 (Roll no. 191). (text: CR H3209-3210: 7)
Passed/agreed to in House: On motion to suspend the rules and pass the bill Agreed to by the Yeas and Nays: (2/3 required): 360 - 10 (Roll no. 191).
Considered as unfinished business. (consideration: CR H3230-3231: 4)