Securing the Information and Communications Technology and Services Supply Chain: Connected Vehicles

Published date01 March 2024
Record Number2024-04382
Citation89 FR 15066
CourtIndustry And Security Bureau
SectionProposed rules
Federal Register, Volume 89 Issue 42 (Friday, March 1, 2024)
[Federal Register Volume 89, Number 42 (Friday, March 1, 2024)]
                [Proposed Rules]
                [Pages 15066-15072]
                From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
                [FR Doc No: 2024-04382]
                =======================================================================
                -----------------------------------------------------------------------
                DEPARTMENT OF COMMERCE
                Bureau of Industry and Security
                15 CFR Part 7
                [Docket No. 240227-0060]
                RIN 0694-AJ56
                Securing the Information and Communications Technology and
                Services Supply Chain: Connected Vehicles
                AGENCY: Bureau of Industry and Security, U.S. Department of Commerce.
                ACTION: Advance notice of proposed rulemaking.
                -----------------------------------------------------------------------
                SUMMARY: In this advance notice of proposed rulemaking (ANPRM), the
                Department of Commerce's (Department) Bureau of Industry and Security
                (BIS) seeks public comment on issues and questions related to
                transactions involving information and communications technology and
                services (ICTS) that are designed, developed, manufactured, or supplied
                by persons owned by, controlled by, or subject to the jurisdiction or
                direction of foreign countries or foreign non-government persons
                identified in the Department's regulations, pursuant to the Executive
                Order (E.O.) entitled ``Securing the Information and Communications
                Technology and Services Supply Chain,'' and that are integral to
                connected vehicles (CVs), as defined herein. This ANPRM will assist BIS
                in determining the technologies and market participants that may be
                most appropriate for regulation pursuant to the E.O.
                DATES: Comments must be received on or before April 30, 2024.
                ADDRESSES: All comments must be submitted by one of the following
                methods:
                 The Federal eRulemaking Portal: https://www.regulations.gov at docket number BIS-2024-0005.
                 Email directly to: [email protected]. Include
                ``RIN 0694-AJ56'' in the subject line.
                 Instructions: Comments sent by any other method, to any
                other address or individual, or received after the end of the comment
                period, may not be considered. For those seeking to submit confidential
                business information (CBI), please clearly mark such submissions as CBI
                and submit by email, as instructed above. Each CBI submission must also
                contain a summary of the CBI, clearly marked as public, in sufficient
                detail to permit a reasonable understanding of the substance of the
                information for public consumption. Such summary information will be
                posted on regulations.gov.
                FOR FURTHER INFORMATION CONTACT: Marc Coldiron, U.S. Department of
                Commerce, telephone: 202-482-3678. For media inquiries: Jeremy Horan,
                Office of Congressional and Public Affairs, Bureau of Industry and
                Security, U.S. Department of Commerce: [email protected].
                SUPPLEMENTARY INFORMATION:
                I. Authorities
                 On May 15, 2019, the President issued E.O. 13873, ``Securing the
                Information and Communications Technology and Services Supply Chain,''
                pursuant to the President's authority under the Constitution and the
                laws of the United States, including the International Emergency
                Economic Powers Act (IEEPA), the National Emergencies Act (50 U.S.C.
                1601, et seq.), and Section 301 of Title 3, United States Code. E.O.
                13873 declares a national emergency regarding the ICTS supply chain,
                finding that ``the unrestricted acquisition or use in the United States
                of information and communications
                [[Page 15067]]
                technology or services designed, developed, manufactured, or supplied
                by persons owned by, controlled by, or subject to the jurisdiction or
                direction of foreign adversaries augments the ability of foreign
                adversaries to create and exploit vulnerabilities in information and
                communications technology or services, with potentially catastrophic
                effects, and thereby constitutes an unusual and extraordinary threat to
                the national security, foreign policy, and economy of the United
                States.'' The E.O. further notes that ``[t]his threat exists both in
                the case of individual acquisitions or uses of such technology or
                services, and when acquisitions or uses of such technologies are
                considered as a class.''
                 In accordance with the National Emergencies Act, the President has
                declared each year since E.O. 13873 was published that the national
                emergency continues in effect. Continuation of the National Emergency
                With Respect to Securing the Information and Communications Technology
                and Services Supply Chain, 85 FR 29321 (May 14, 2020); Continuation of
                the National Emergency With Respect to Securing the Information and
                Communications Technology and Services Supply Chain, 86 FR 26339 (May
                13, 2021); Continuation of the National Emergency With Respect to
                Securing the Information and Communications Technology and Services
                Supply Chain, 87 FR 29645 (May 13, 2022); Continuation of the National
                Emergency With Respect to Securing the Information and Communications
                Technology and Services Supply Chain, 88 FR 30635 (May 11, 2023).
                 To address identified risks to national security from ICTS
                transactions, E.O. 13873 grants the Secretary of Commerce (Secretary)
                (in consultation with other agency heads identified in the E.O.) the
                authority to review and, if necessary, impose mitigation measures on or
                prohibit any ICTS transaction, which includes any acquisition,
                importation, transfer, installation, dealing in, or use of any ICTS by
                any person, or with respect to any property, subject to United States
                jurisdiction, when the transaction involves any property in which a
                foreign country or national has any interest. In order to require
                mitigation for or to prohibit an ICTS transaction or class of
                transactions, the Secretary, in consultation with other agency heads,
                must first determine that the ICTS transaction or class of transactions
                at issue: (1) involves ICTS designed, developed, manufactured, or
                supplied by persons owned by, controlled by, or subject to the
                jurisdiction or direction of a foreign adversary, which the E.O.
                defines as ``any foreign government or foreign non-government person
                engaged in a long-term pattern or serious instances of conduct
                significantly adverse to the national security of the United States or
                security and safety of United States persons;'' and (2) poses:
                 A. an undue risk of sabotage to or subversion of the design,
                integrity, manufacturing, production, distribution, installation,
                operation, or maintenance of information and communications technology
                or services in the United States;
                 B. an undue risk of catastrophic effects on the security or
                resiliency of United States critical infrastructure or the digital
                economy of the United States; or
                 C. otherwise poses an unacceptable risk to the national security of
                the United States or the security and safety of United States persons.
                 These factors are collectively referred to as ``undue or
                unacceptable risks.''
                 E.O. 13873 additionally provides the Secretary with the authority
                to issue rules establishing criteria by which particular technologies
                or market participants may be categorically included in or
                categorically excluded from prohibitions established pursuant to the
                E.O. To date, the Department has not pursued or used this authority to
                regulate ICTS transactions on a category- or class-wide basis.
                Furthermore, E.O. 13873 grants the Secretary the authority to identify
                a mechanism and relevant factors for the negotiation of mitigation
                measures that would allow approval of an otherwise prohibited
                transaction.
                II. Background
                a. Purpose
                 Pursuant to the authority delegated to the Secretary under E.O.
                13873, BIS is considering proposing rules that would prohibit certain
                ICTS transactions or classes of ICTS transactions by or with persons
                who design, develop, manufacture, or supply ICTS integral to CVs and
                are owned by, controlled by, or subject to the jurisdiction or
                direction of foreign governments or foreign non-government persons
                identified at 15 CFR 7.4 (hereinafter referred to as ``15 CFR 7.4
                entities''). BIS is also considering proposing measures that would
                allow market participants to engage in otherwise prohibited
                transactions or classes of transactions if the undue or unacceptable
                risks of those ICTS transactions can be sufficiently mitigated using
                measures that are monitorable.
                 The purpose of this ANPRM is to gather information to support BIS's
                potential development of a rule regarding ICTS integral to CVs. In
                particular, BIS seeks public input on certain definitions and its
                assessment of how a class of transactions involving ICTS integral to
                CVs, when designed, developed, manufactured, or supplied by persons
                owned by, controlled by, or subject to the jurisdiction or direction of
                a 15 CFR 7.4 entity, could present undue or unacceptable risks to U.S.
                national security. These include risks related to threats from 15 CFR
                7.4 entities, capabilities of CVs that may increase the likelihood of
                vulnerabilities, and consequences to U.S. persons and critical
                infrastructure if these vulnerabilities are exploited or intentionally
                inserted by 15 CFR 7.4 entities. BIS solicits input on the ICTS most
                integral to CVs and most vulnerable to compromise, as well as input on
                mechanisms to address identified risks through potential design,
                implementation standards and protocols, manufacturing integrity
                protection systems and procedures, or prohibitions.
                 BIS recognizes the benefits of CV technologies and does not imply
                through this ANPRM that technologies such as vehicle-to-everything
                (V2X) communications are generally unsafe for use in the United States.
                Indeed, these new vehicles often provide safer, more fuel-efficient
                travel. However, E.O. 13873 is focused on risks that ICTS transactions
                might present to national security. Therefore, this ANPRM, which is
                being issued pursuant to the authorities granted under E.O. 13873,
                seeks public comment on potential means to narrowly address involvement
                by persons owned by, controlled by, or subject to the jurisdiction or
                direction of 15 CFR 7.4 entities in the design, development,
                manufacture, or supply of ICTS integral to CVs where that involvement
                may create undue or unacceptable risk to U.S. national security.
                 Additionally, BIS seeks comment on whether to create a process for
                the public to request approval to engage in an otherwise prohibited
                transaction by demonstrating that a particular transaction adequately
                addresses the risk to U.S. national security. BIS encourages public
                feedback to help inform the rulemaking process, particularly regarding
                transactions where ICTS supply chains may be impacted by any proposed
                rule.
                b. Definitions
                 As an initial matter, BIS is interested in receiving comments on
                the applicable
                [[Page 15068]]
                definition for connected vehicle or CV within the context of
                transactions involving ICTS incorporated into such vehicles. BIS could
                define a connected vehicle as an automotive vehicle that integrates
                onboard networked hardware with automotive software systems to
                communicate via dedicated short-range communication, cellular
                telecommunications connectivity, satellite communication, or other
                wireless spectrum connectivity with any other network or device. Such a
                definition would likely include automotive vehicles, whether personal
                or commercial, capable of global navigation satellite system (GNSS)
                communication for geolocation; communication with intelligent
                transportation systems; remote access or control; wireless software or
                firmware updates; or on-device roadside assistance.
                 CVs also integrate hardware that enables connectivity within the
                vehicle and/or external connectivity with devices, networks,
                applications, and services outside the vehicle. CV safety applications
                are designed to increase situational awareness and reduce traffic
                accidents through vehicle-to-vehicle (V2V), vehicle-to-infrastructure
                (V2I), and increasingly, V2X communications, as contemplated in a
                series of Department of Transportation workshops focusing on V2X
                communications titled ``Saving Lives with Connectivity.'' See Bill
                Canis, Cong. Research Serv., R46398, Motor Vehicle Safety: Issues for
                Congress 8 (2021), https://sgp.fas.org/crs/misc/R46398.pdf; U.S. Dep't
                of Transp., ITS V2X Communications Summit (2023), https://www.its.dot.gov/research_areas/emerging_tech/htm/ITS_V2X_CommunicationSummit.htm.
                 BIS arrived at this definition by reviewing existing definitions
                for connected vehicles from trade associations and leading research
                publications including the Connected Vehicle Reference Implementation
                Architecture, U.S. Department of Transportation's Intelligent
                Transportation Systems Joint Program Office, Institute of Electrical
                and Electronics Engineers research, and Society of Automotive Engineers
                standards.
                 Various terms exist across industry and the U.S. Government to
                refer to vehicles that exhibit the connected features explained above.
                In addition to input on the term connected vehicle, BIS is seeking
                comment on alternative terminology that might better correspond to the
                definition of connected vehicle discussed above. Such terminology could
                include ``networked vehicles,'' ``intelligent connected vehicles,''
                ``software-defined vehicles,'' or ``connected autonomous vehicles.''
                 This ANPRM seeks comment on the definitions to use for a rule
                regarding transactions involving ICTS integral to CVs, and
                specifically:
                 1. In what ways, if any, should BIS elaborate on or amend the
                potential definition of connected vehicle stated above? If amended, how
                will the revised definition enable BIS to better address national
                security risks arising from classes of transactions involving ICTS
                integral to CVs?
                 2. Is the term connected vehicles broad enough to include
                autonomous vehicles and related equipment, electric vehicles, or other
                alternative power sources and related technologies? Does a better term
                exist to describe the broader scope?
                 3. Are there other commonly used definitions for CVs that BIS
                should consider when defining a class of ICTS transactions, including
                definitions from industry, civil society, and foreign entities? If so,
                why would those definitions be more appropriate for the purposes of a
                rule?
                c. Risks Associated With Connected Vehicles
                 The automotive industry is constantly undergoing innovation and
                change, and as communications and broadband technology advance, so do
                the technologies used in automobiles. Particularly relevant for the
                purposes of this ANPRM, new technology has fueled a rise in
                interconnectivity and autonomous capabilities in new vehicles. An
                automobile's value is no longer determined only by the engine, steering
                system, and other traditional automotive parts. Increasingly, an
                automobile is a compilation of on-board computers; sensors; cameras;
                batteries; and various other categories of ICTS software or hardware
                tied together through automotive software systems. Over time, vehicle
                connections to the internet will evolve even further and new
                communication technology will advance vehicle capabilities. These
                technological advances will continue to rely on significant data
                collection not only about the vehicle and its myriad components, but
                also the driver, the occupants, the vehicle's surroundings, and nearby
                infrastructure. Moreover, CVs allow for information to be gathered and
                shared to address both individual and societal transportation needs.
                These technologies may expose the vehicles, and the sectors they
                support, to new cyber-enabled attack vectors and vulnerabilities, with
                the potential to create novel and potentially profound risks to
                national security and public safety. Cyber-enabled vulnerabilities can
                be exacerbated if the ICTS integral to CVs is designed, developed,
                manufactured, or supplied, by persons owned by, controlled by, or
                subject to the jurisdiction or direction of a 15 CFR 7.4 entity.
                i. Threat From 15 CFR 7.4 Entities
                 E.O. 13873 defines the term ``foreign adversary'' to mean any
                foreign government or foreign non-government person engaged in a long-
                term pattern or serious instances of conduct significantly adverse to
                the national security of the United States or security and safety of
                U.S. persons. In the rules implementing the E.O. at 15 CFR 7.4(a), the
                Secretary has identified the following as foreign adversaries: the
                People's Republic of China, including the Hong Kong Special
                Administrative Region (PRC); Republic of Cuba; Islamic Republic of
                Iran; Democratic People's Republic of Korea; Russian Federation; and
                Venezuelan politician Nicol[aacute]s Maduro (Maduro Regime).
                 The incorporation of ICTS products and services used in the United
                States from persons owned by, controlled by, or subject to the
                jurisdiction or direction of 15 CFR 7.4 entities' can offer a direct
                entry point to sensitive U.S. technology and data and bypass measures
                intended to protect U.S. persons' safety and security. This may allow
                actors with insider access to gain entry to the systems the ICTS
                connects to and ultimately engage in malicious cyber activity.
                Consequently, this exploitation may result in undue risks to ICTS and
                critical infrastructure in the United States and unacceptable risks to
                national security.
                 The PRC presents a particularly acute and persistent threat to the
                United States ICTS supply chain. According to the Office of the
                Director of National Intelligence, the PRC likely represents the
                broadest, most active, and persistent cyber espionage threat to U.S.
                Government and private-sector networks. See Off. Of the Director of
                Nat'l Intelligence, Annual Threat Assessment of the U.S. Intelligence
                Community 10 (2023), https://www.dni.gov/files/ODNI/documents/assessments/ATA-2023-Unclassified-Report.pdf. The PRC is almost
                certainly capable of launching cyber-attacks that could disrupt
                critical infrastructure services within the United States and has
                conducted cyber espionage operations that have compromised
                telecommunications firms, providers of managed services, and broadly
                used software. Id. At 10. In short, the PRC has
                [[Page 15069]]
                engaged in a pattern of hacking and cyber intrusion that demonstrates
                the PRC's intent to compromise and exploit U.S. ICTS supply chains and
                critical infrastructure, threatening U.S. national security.
                 The PRC's legal structure also gives broad authority to the state
                to co-opt private companies to pursue its objectives. A host of laws
                give the PRC government the authority to compel companies located in
                the PRC, including automakers and their suppliers, to cooperate with
                PRC intelligence and security services. The PRC's 2021 Data Security
                Law, for example, makes all private data available to the PRC state
                when it is needed for ``national security.'' See National People's
                Congress, Data Security Law of the People's Republic of China, Art. 35,
                http://www.npc.gov.cn/englishnpc/c2759/c23934/202112/t20211209_385109.html. The PRC's 2017 National Intelligence Law imposes
                affirmative obligations on entities and persons subject to the PRC's
                jurisdiction to cooperate with intelligence agencies--Article 17 allows
                PRC intelligence officials to take control of a private organization's
                facilities, including its communications equipment. See National
                People's Congress, National Intelligence Law (as amended, 2018), http://www.npc.gov.cn/npc/c2/c30834/201905/t20190521_281475.html. The PRC's
                2015 National Security Law obliges citizens and private companies to
                provide security and military agencies with all ``necessary support and
                assistance.'' See State Council of the People's Republic of China,
                National Security Law, Art. 77(5), https://www.gov.cn/zhengce/2015-07/01/content_2893902.htm. Beyond legal obligations, companies established
                in the PRC may be required to create internal Chinese Communist Party
                (CCP) committees that can exercise influence over corporate decisions.
                See National People's Congress, Company Law of the People's Republic of
                China, Art. 19, https://www.npc.gov.cn/zgrdw/npc/xinwen/2018-11/05/content_2065671.htm.
                 The combination of legal authorities and opaque CCP influence make
                private companies that are subject to the PRC's jurisdiction
                susceptible to requests from intelligence and military officials. PRC
                officials can compel PRC firms to provide the PRC government with data,
                logical access, encryption keys, and other vital technical information,
                as well as to install backdoors or bugs in equipment which create
                security flaws easily exploitable by PRC authorities. U.S. Dep't of
                Homeland Security, Data Security Business Advisory: Risks and
                Considerations for Businesses Using Data Services and Equipment from
                Firms Linked to the Peoples Republic of China 2 (2020), https://www.dhs.gov/sites/default/files/publications/20_1222_data-security-business-advisory.pdf. Original equipment manufacturers (OEMs) for
                vehicles in the PRC, due to the vast amounts of data generated by their
                products, are notable targets for government access. According to open-
                source reporting, over 200 automakers that operate in the PRC are
                legally obligated to transmit real-time vehicle data, including
                geolocation information, to government monitoring centers. See Erika
                Kinetz, In China Your Car Could Be Talking To The Government,
                Associated Press News (Nov. 29, 2018), https://apnews.com/article/4a749a4211904784826b45e812cff4ca. This pervasive data sharing, which
                provides the PRC government with detailed information on the behaviors
                and habits of individuals, is indicative of a broader approach to co-
                opting private companies--one that raises significant concerns about
                how the PRC government might exploit the growing presence of PRC OEMs
                and manufacturers of ICTS integral to CVs in foreign markets. The
                combination of these factors uniquely elevates BIS's concern regarding
                PRC participation in the ICTS supply chain for CVs in the United
                States.
                 BIS seeks to better understand the role of persons owned by,
                controlled by, or subject to the jurisdiction or direction of 15 CFR
                7.4 entities, particularly the PRC, in the ICTS supply chain for CVs,
                and the leverage these entities might exert as a result. In particular,
                the ANPRM seeks comments on the following issues:
                 4. Please describe the ICTS supply chain for CVs in the United
                States. Particularly useful responses may include information
                regarding:
                 a. categories of ICTS, such as software or hardware, that are
                integral to CVs operating in the United States;
                 b. market leaders for each distinct phase of the supply chain for
                ICTS integral to CVs (such as design, development, manufacturing, or
                supply) including, but not limited to: OEMs, tier one, tier two, and
                tier three suppliers, and service providers;
                 c. geographic locations where software (such as the vehicle
                operating system), hardware (such as light detection and ranging
                (LiDAR) sensors), or other ICTS components integral to CVs in use in
                the United States are designed, developed, manufactured, or supplied;
                 d. involvement in any sector or sub-sector of the U.S. ICTS supply
                chain for CVs by persons owned by, controlled by, or subject to the
                jurisdiction or direction of a 15 CFR 7.4 entity; and
                 e. geographic locations where data from CVs in use in the United
                States is transmitted, stored, or analyzed.
                 5. Are there ICTS integral to CVs for which persons owned by,
                controlled by, or subject to the jurisdiction or direction of a 15 CFR
                7.4 entity are sole source suppliers? To what extent do OEMs of CVs in
                use in the United States rely upon suppliers wholly or partially owned
                by a company based in or under the control of a 15 CFR 7.4 entity?
                 6. In what ICTS hardware or software for CVs do persons owned by,
                controlled by, or subject to the jurisdiction or direction of a 15 CFR
                7.4 entity maintain a technological advantage over U.S. and other
                foreign counterparts and how may this dynamic evolve in the coming
                years?
                 7. How, and to what degree, does CV automotive software connect to
                GNSS systems that are designed, developed, manufactured, or supplied by
                persons owned by, controlled by, or subject to the jurisdiction or
                direction of a 15 CFR 7.4 entity? for geolocation and other functions?
                 8. How might a disruption to the supply of ICTS components for CVs
                in use in the United States, including hardware and software, from
                persons owned by, controlled by, or subject to the jurisdiction or
                direction of a 15 CFR 7.4 entity affect OEMs of CVs in use in the
                United States and ICTS suppliers? Where possible, please specify which
                disruptions to component supply would be particularly detrimental.
                 9. To what extent can OEMs procure alternative sources of ICTS
                integral to CVs that do not constitute ICTS from persons owned by,
                controlled by, or subject to the jurisdiction or direction of 15 CFR
                7.4 entities?
                 10. Please describe the relationship between OEMs of CVs in use in
                the United States and their ICTS suppliers. Particularly useful
                responses may include the type of information that is shared between
                OEMs of CVs in use in the United States and their ICTS suppliers in the
                normal course of business, how this information is shared, what access
                or administrative privileges are typically granted, and if suppliers
                have any capability for remote access or ability to provide firmware or
                software updates.
                 11. What risks might be posed by aftermarket ICTS integrated
                onboard CVs and interfaced with vehicle systems, such as tracking
                devices, cameras, and wireless-enabled
                [[Page 15070]]
                diagnostic interfaces? Should aftermarket automotive systems or
                components be considered integral to CV operation?
                 12. To what extent are ICTS components of CVs designed, developed,
                manufactured, or supplied by persons owned by, controlled by, or
                subject to the jurisdiction or direction of a 15 CFR 7.4 entity present
                in critical infrastructure sectors? Are there instances of municipal,
                state, or federal funding for procurement of such 15 CFR 7.4 entities'
                ICTS integral to CVs for use in critical infrastructure sectors?
                 13. What other instances exist where persons owned by, controlled
                by, or subject to the jurisdiction or direction of a 15 CFR 7.4 entity,
                are integrated into the ICTS supply chain for CVs?
                ii. Capabilities of Connected Vehicles May Increase the Likelihood of
                Vulnerabilities 15 CFR 7.4 Entities Could Exploit
                 CVs and the components that enable their functionality present
                opportunities for exploitation by 15 CFR 7.4 entities via insider
                access, which could potentially result in severe consequences to U.S.
                persons and critical infrastructure. Increasing the number and scope of
                wireless connected components in a vehicle also increases the attack
                surfaces through which a malicious actor can gain initial entry. As CVs
                gain new and different connectivity capabilities, design,
                implementation, and operational protocols need to be added to address
                new attack surfaces and maintain the confidentiality, integrity, and
                availability of the data that traverse any one functional system. As
                demonstrated in controlled environments, attack vectors can be
                exploited and may provide access to other functional systems within a
                CV. Moreover, once one subsystem has been compromised, depending on the
                nature of the vulnerability and the design of the vehicle network
                architecture, the attacker might have the ability to move laterally and
                eventually gain access to other functional automotive systems. While
                integrated functionality may provide seamless communication, comfort,
                and operability for the consumer, it is possible that unauthorized
                remote access to a particular sensor system could be escalated to
                vehicle systems and operations, potentially resulting in injury, loss
                of life, and disruption to critical infrastructure networks.
                 Preliminarily, BIS has identified the following capabilities
                associated with CVs that may increase the likelihood of vulnerabilities
                that 15 CFR 7.4 entities could exploit:
                 Data Collection: CVs rely on the collection and integration of
                broad and varied data to improve the vehicle's functionality and
                safety. This data, which can encompass vehicle-level data (e.g., driver
                behavior, vehicle status, geolocation, biometrics, driver mobile phone
                data) and environmental-level data (e.g., detailed mapping data, object
                detection, traffic patterns), are extracted through various onboard
                systems and sensors. The Advanced Driver-Assistance System (ADAS) of a
                CV, for example, typically relies on a combination of sensors--radar,
                LiDAR, ultrasonic, audio, and video--that are constantly collecting and
                processing data. CVs now collect data inside the cockpit as well.
                Consumer and commercial CVs increasingly incorporate driver monitoring
                systems (DMS) to ensure the driver remains alert and fully able to take
                control of the car should autonomous systems fail, and to ensure
                commercial truck drivers remain on schedule. More sophisticated DMS
                feature driver-facing cameras--including eye tracking, facial
                recognition, and microphones--collect potentially sensitive information
                about drivers and passengers. This increases the sensitivity of the
                data that CVs collect, potentially providing 15 CFR 7.4 entities with
                access to biometric information in addition to environmental data.
                 Connectivity: CVs are connected to and can communicate with a range
                of external sources, including the OEM and third-party service
                providers, as well as in-car devices like smart phones. In an
                increasing subset of vehicles, telematics systems connect the vehicle
                with cloud-based services to provide onboard systems with external data
                streams (e.g., geolocation, streaming service, assistance service,
                emergency notification) and underlie many of a CV's core
                functionalities. V2X systems, when widely implemented, will support the
                broadcast and reception of messages that enable safety alerts and
                mobility advisories. Providing broadcast (radio) communication
                capabilities that facilitate driver assistance capabilities may open
                cybersecurity vectors that need to be addressed to ensure broadcast
                message integrity and authenticity through design, standards,
                implementation and manufacturing protocols, and to prevent possible
                message and transmission misbehavior.
                 Further, interconnectivity in the software or hardware components
                may amplify risks posed by ICTS integral to CVs that are designed,
                developed, manufactured, or supplied by persons owned by, controlled
                by, or subject to the jurisdiction or direction of a 15 CFR 7.4 entity.
                For example, OEMs enable communication with their vehicle after sale
                even when a customer does not subscribe to services, including by
                providing software updates and refinements, as well as by enabling or
                disabling subscription-based features. This access by the OEM to the CV
                provides numerous opportunities for 15 CFR 7.4 entities that own,
                control, or have the ability to exert jurisdiction or direction over
                the OEM, to insert vulnerabilities allowing for future backdoor attacks
                and other malicious behavior. Additionally, individually connected
                components and sensors are capable of transmitting data separately from
                the vehicle's broader communications suite, including receiving over
                the air (OTA) updates without the knowledge or consent of the vehicle
                owner or OEM. BIS seeks to better understand the capabilities
                associated with technical trends--both current and future--in CV design
                and the ICTS components therein. In particular, the ANPRM seeks further
                comment on the following:
                 14. What is the full scope of data collection capabilities in CVs
                and the aggregation and scale of data that CVs could collect on U.S
                persons, entities, geography, and infrastructure? Who has authorized
                access to, or control of, data collected by CVs?
                 15. What types of remote access or control do OEMs have over their
                CVs? Please describe what software or other mechanisms allow for such
                remote access or control by the OEM to occur.
                 16. What cybersecurity concerns may arise from linkages between
                sensors in CVs? To what extent can individual sensors and components
                communicate OTA independently from the CV's Operating System (OS)?
                 17. What standards, best practices, and industry norms are used to
                secure the interconnection between vehicles and charging
                infrastructure? How are battery management systems (BMS) integrated
                into a vehicle's automotive software systems, and how are they
                protected from malware?
                 18. How do manufacturers supplement existing cybersecurity
                standards and best practices such as the National Highway Traffic
                Safety Administration's Cybersecurity Best Practices for the Safety of
                Modern Vehicles at each step of the CV supply chain, including design,
                manufacturing, and operation?
                 a. Particularly useful responses will be specific about the types
                of programs and practices used such as test and verification, bug
                bounties, white hat programs, or end-to-end encryption to secure the
                link between vehicle and
                [[Page 15071]]
                server. See Nat'l Highway Traffic Safety Admin., Cybersecurity Best
                Practices for the Safety of Modern Vehicles (2022), https://www.nhtsa.gov/sites/nhtsa.gov/files/2022-09/cybersecurity-best-practices-safety-modern-vehicles-2022-tag.pdf; see also Cybersecurity
                and Infrastructure Security Agency, Autonomous Ground Vehicle Security
                Guide: Transportation Systems Sector (2021), https://www.cisa.gov/resources-tools/resources/autonomous-ground-vehicle-security-guide.
                 19. Please describe the automotive software development cycle. BIS
                is particularly interested in learning:
                 a. The degree to which OEMs license software, as opposed to
                developing it internally;
                 b. The extent to which software is developed outside the United
                States and, if so, where;
                 c. What measures are taken to ensure software security and
                integrity during the development cycle;
                 d. If OEMs partner or co-develop automotive software with any
                persons owned by, controlled by, or subject to the jurisdiction or
                direction of a 15 CFR 7.4 entity; and
                 e. The extent to which software that is embedded in hardware (e.g.,
                firmware) is subject to the development cycle described above.
                 20. Please describe the relationship between CV OEMs and cloud
                service providers (CSPs). Particularly useful responses may describe
                what access privileges, controls, and remote capabilities with respect
                to CV OEM systems are afforded to the CSP. Additionally, what are the
                common shared responsibility models between a CSP and a CV OEM and how
                are the communication and systems protected?
                 21. How do CV OEMs verify the bill of materials and software bill
                of materials as authentic for vendors and suppliers, specifically
                regarding OS, telematic systems, ADAS, Automated Driving Systems (ADS),
                satellite or cellular telecommunication systems, and BMS? If a software
                bill of materials is required, to what extent does it provide
                information regarding software vulnerabilities, and how is this
                information used, stored, and protected?
                 22. To what extent is software from vendors and suppliers tested
                and verified to comply with OEM requirements?
                 23. What vendor-vetting and supply chain security practices do OEMs
                employ when procuring ICTS integral to CVs?
                iii. Consequences
                 The ability of a 15 CFR 7.4 entity to compel private companies
                through applicable legal frameworks, combined with the exploitation of
                vulnerabilities created by the increase in capabilities of the ICTS
                integral to CVs, has the potential to create severe and, in certain
                instances, catastrophic consequences for U.S. persons and critical
                infrastructure. Through ICTS designed, developed, manufactured, or
                supplied by persons subject to the ownership, control, jurisdiction, or
                direction of a 15 CFR 7.4 entity, the intelligence agencies of that
                entity could obtain access to a wide range of information from
                companies in the CV ICTS supply chain to exfiltrate, collect, and
                aggregate sensitive data on U.S. persons. These data include location,
                traffic patterns, audio and video recordings of the inside and outside
                of the car, as well as information about the driver's identity,
                finances, contacts, and home address, which can be collected by CVs
                themselves or by a passenger's mobile device connected to a CV.
                 In addition, backdoors embedded in a CV's software could enable a
                15 CFR 7.4 entity under certain conditions to obtain control over
                various vehicle functions that could include the ability to disable the
                vehicle completely. A group of researchers were able to demonstrate a
                vulnerability in an OEM's Bluetooth software that allowed access to
                some vehicle control systems, initiating remote actions such as
                activating the brakes and turning the steering wheel. See Consumer
                Watchdog, Kill Switch: Why Connected Cars Can Be Killing Machines and
                How to Turn Them Off 37-40 (2019), https://consumerwatchdog.org/sites/default/files/2019-07/KILL%20SWITCH%20%207-29-19.pdf. A similar ability
                in the hands of a 15 CFR 7.4 entity that can control or direct an OEM
                could allow that entity to disable the controls on an individual
                vehicle while it was being driven or to sabotage entire fleets without
                having physical access to the vehicles. Finally, because of CVs'
                connectivity, they could be used to access multiple critical
                infrastructure systems with which they interact, including
                telecommunications networks, transportation systems, and the electrical
                grid. As CV technology advances, vehicles and charging infrastructure
                may increasingly communicate with these systems to manage traffic flows
                and grid load. As such, the proliferation of CVs containing vulnerable
                ICTS from persons owned by, controlled by, or subject to the
                jurisdiction or direction of a 15 CFR 7.4 entity could provide that
                entity with a platform for launching distributed denial of service
                attacks against intelligent transportation systems, satellite or
                cellular communications hardware, or other critical infrastructure. See
                Mohammad Ali Sayed, et al., Electric Vehicle Attack Impact on Power
                Grid Operation, 137 Int'l J. Electrical Power & Energy Sys. 107784
                (2022), https://www.sciencedirect.com/science/article/abs/pii/S0142061521010048; Numaan Huq, et al., Cybersecurity for Connected
                Cars: Exploring Risks in 5G, Cloud, and Other Connected Technologies,
                Trend Micro Res. (2021), https://documents.trendmicro.com/assets/white_papers/wp-cybersecurity-for-connected-cars-exploring-risks-in-5g-cloud-and-other-connected-technologies.pdf; Anastasios Giannaros, et
                al., Autonomous Vehicles: Sophisticated Attacks, Safety Issues,
                Challenges, Open Topics, Blockchain, and Future Directions, 3 J. of
                Cybersecurity and Privacy 493 (2023). Given these threats,
                vulnerabilities, and potential consequences, BIS is considering
                identifying the following automotive software systems as the ICTS
                integral to CVs most likely to present undue or unacceptable risks if
                exploited by 15 CFR 7.4 entities: (i) vehicle OS; (ii) telematics
                systems; (iii) ADAS; (iv) ADS; (v) satellite or cellular
                telecommunication systems; and (vi) BMS.
                 As BIS considers whether and how to regulate these software
                systems, it seeks additional information, including:
                 24. Are there ICTS integral to CVs other than those identified in
                this ANPRM that could present material risks if they were designed,
                developed, manufactured, or supplied by persons owned by, controlled
                by, or subject to the jurisdiction of a 15 CFR 7.4 entity? If so,
                please discuss how the ICTS could be exploited to pose such a risk.
                 25. Of the ICTS integral to CVs identified in this ANPRM, which
                present the greatest risk to safety or security if they are designed,
                developed, manufactured, or supplied by persons owned by, controlled
                by, or subject to the jurisdiction or direction of a 15 CFR 7.4 entity?
                 26. As ADS systems evolve and developers rely on cellular systems
                to communicate with ADS-enabled vehicles to support overall operational
                capability (e.g., communications to a fleet management office), what
                should the U.S. government consider in order to support the development
                of this technology securely from 15 CFR 7.4 entity malign activity?
                III. Additional Questions for Comment
                 This ANPRM seeks comment on processes and mechanisms that BIS could
                implement in a potential rule to authorize an otherwise prohibited ICTS
                [[Page 15072]]
                transaction with the adoption of mitigation measures.
                Authorizations and Mitigations
                 27. In what instances would granting a temporary authorization to
                engage in an otherwise prohibited transaction under a proposed rule be
                necessary and in the interest of the United States to avoid supply
                chain disruptions or other unintended consequences?
                 28. What review criteria should BIS implement when considering an
                application for a temporary authorization?
                 29. What specific standards, mitigation measures, or cybersecurity
                best practices should BIS consider when evaluating the appropriateness
                of a requested authorization?
                 30. Are there any U.S. government models, such as the Office of
                Foreign Assets Control's sanctions programs or the Export
                Administration Regulations, that this program should consider emulating
                in granting authorizations?
                Economic Impact
                 31. What economic impacts to U.S. businesses or the public, if any,
                might be associated with the regulation of ICTS integral to CVs
                contemplated by this ANPRM? If responding from outside the United
                States, what economic impacts to local businesses and the public, if
                any, might be associated with regulations of ICTS integral to CVs?
                 32. What, if any, anticompetitive effects may result from
                regulation of ICTS that is integral to CVs as contemplated by this
                ANPRM? And what, if anything, can be done to mitigate the
                anticompetitive effects of regulation of ICTS?
                 33. What types of U.S. businesses or firms (e.g., small businesses)
                would likely be most impacted by the program contemplated in this
                ANPRM? If responding from outside the United States, what types of
                local businesses or firms (e.g., small businesses) would likely be most
                impacted by the program contemplated in this ANPRM?
                 34. What actions can BIS take, or provisions could it add to any
                proposed regulations, to minimize potential costs borne by U.S.
                businesses or the public? If responding from outside the United States,
                what actions can BIS take, or what provisions could it add to any
                proposed regulations, to minimize potential costs borne by local
                businesses or the public?
                 35. What new due diligence, compliance, and recordkeeping controls
                will U.S. persons anticipate needing to undertake to comply with any
                proposed regulations regarding ICTS integral to CVs that are designed,
                developed, manufactured, or supplied by persons owned by, controlled
                by, or subject to the jurisdiction or direction of 15 CFR 7.4 entities?
                Elizabeth L.D. Cannon,
                Executive Director, Office of Information and Communications Technology
                and Services.
                [FR Doc. 2024-04382 Filed 2-29-24; 8:45 am]
                BILLING CODE 3510-33-P
                

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT