This week, U.S. Reps. Kat Cammack, R-Fla., and Anna Eshoo, D-Calif., brought back a proposal “that requires the National Telecommunications and Information Administration to submit to Congress a comprehensive report examining the cybersecurity of existing wireless networks (2G, 3G, and 4G) and vulnerabilities to cyberattacks and surveillance by adversaries.”
Eshoo reintroduced the “Understanding Cybersecurity of Mobile Networks Act” with Cammack co-sponsoring it.
“I’m proud to introduce the Understanding Cybersecurity of Mobile Networks Act to give policymakers a better understanding of the state of the cybersecurity in our wireless networks. Most of our calls, texts, and data traverse on 2G, 3G, and 4G networks and we lack a full picture of the vulnerabilities across those networks that Americans use every single day. This bipartisan bill takes important steps to ensure our wireless networks are safe and protect the privacy and security of the American people,” said Eshoo.
“I’m glad to join Rep. Eshoo in introducing the Understanding Cybersecurity of Mobile Networks Act. With sophisticated mobile networks and high traffic occurring every day, it’s critical that policymakers understand the landscape of these technologies and their vulnerabilities. We’re working to protect the privacy, data, and security of the American people while ensuring continued innovation for the wireless networks we rely on for our lives and businesses,” said Cammack.
The bill “would require the National Telecommunications and Information Administration to examine and report to Congress within one year on the cybersecurity of mobile service networks and the vulnerability of these networks and mobile devices to cyberattacks and surveillance conducted by adversaries” and Cammack’s office offered some of the details of what would be in the report.
“The report shall include (1) an assessment of the degree to which providers of mobile service have addressed certain cybersecurity vulnerabilities; (2) a discussion of the degree to which these providers have implemented cybersecurity best practices and risk assessment frameworks; and (3) an estimate of the prevalence and efficacy of encryption and authentication algorithms and techniques used in mobile service and communications equipment, mobile devices, and mobile operating systems and software,” Cammack’s office noted.
The bill was sent to the U.S. House Energy and Commerce Committee. So far, there is no companion measure over in the U.S. Senate.