Us Congress 2025-2026 Regular Session

Us Congress House Bill HB2659 Latest Draft

Bill / Introduced Version Filed 04/08/2025

                            I 
119THCONGRESS 
1
STSESSION H. R. 2659 
To ensure the security and integrity of United States critical infrastructure 
by establishing an interagency task force and requiring a comprehensive 
report on the targeting of United States critical infrastructure by Peo-
ple’s Republic of China state-sponsored cyber actors, and for other pur-
poses. 
IN THE HOUSE OF REPRESENTATIVES 
APRIL7, 2025 
Mr. O
GLES(for himself, Mr. GREENof Tennessee, Ms. LEEof Florida, Mr. 
M
OOLENAAR, and Mr. GARBARINO) introduced the following bill; which 
was referred to the Committee on Homeland Security 
A BILL 
To ensure the security and integrity of United States critical 
infrastructure by establishing an interagency task force 
and requiring a comprehensive report on the targeting 
of United States critical infrastructure by People’s Re-
public of China state-sponsored cyber actors, and for 
other purposes. 
Be it enacted by the Senate and House of Representa-1
tives of the United States of America in Congress assembled, 2
SECTION 1. SHORT TITLE. 3
This Act may be cited as the ‘‘Strengthening Cyber 4
Resilience Against State-Sponsored Threats Act’’. 5
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 2 
•HR 2659 IH
SEC. 2. INTERAGENCY TASK FORCE AND REPORT ON THE 1
TARGETING OF UNITED STATES CRITICAL IN-2
FRASTRUCTURE BY PEOPLE’S REPUBLIC OF 3
CHINA STATE-SPONSORED CYBER ACTORS. 4
(a) I
NTERAGENCYTASKFORCE.—Not later than 120 5
days after the date of the enactment of this Act, the Sec-6
retary of Homeland Security, acting through the Director 7
of the Cybersecurity and Infrastructure Security Agency 8
(CISA) of the Department of Homeland Security, in con-9
sultation with the Attorney General, the Director of the 10
Federal Bureau of Investigation, and the heads of appro-11
priate Sector Risk Management Agencies as determined 12
by the Director of CISA, shall establish a joint interagency 13
task force (in this section referred to as the ‘‘task force’’) 14
to facilitate collaboration and coordination among the Sec-15
tor Risk Management Agencies assigned a Federal role or 16
responsibility in National Security Memorandum–22, 17
issued April 30, 2024 (relating to critical infrastructure 18
security and resilience), or any successor document, to de-19
tect, analyze, and respond to the cybersecurity threat 20
posed by State-sponsored cyber actors, including Volt Ty-21
phoon, of the People’s Republic of China by ensuring that 22
such agencies’ actions are aligned and mutually rein-23
forcing. 24
(b) C
HAIRS.— 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 3 
•HR 2659 IH
(1) CHAIRPERSON.—The Director of CISA (or 1
the Director of CISA’s designee) shall serve as the 2
chairperson of the task force. 3
(2) V
ICE CHAIRPERSON.—The Director of the 4
Federal Bureau of Investigation (or such Director’s 5
designee) shall serve as the vice chairperson of the 6
task force. 7
(c) C
OMPOSITION.— 8
(1) I
N GENERAL.—The task force shall consist 9
of appropriate representatives of the departments 10
and agencies specified in subsection (a). 11
(2) Q
UALIFICATIONS.—To materially assist in 12
the activities of the task force, representatives under 13
paragraph (1) should be subject matter experts who 14
have familiarity and technical expertise regarding cy-15
bersecurity, digital forensics, or threat intelligence 16
analysis, or in-depth knowledge of the tactics, tech-17
niques, and procedures (TTPs) commonly used by 18
State-sponsored cyber actors, including Volt Ty-19
phoon, of the People’s Republic of China. 20
(d) V
ACANCY.—Any vacancy occurring in the mem-21
bership of the task force shall be filled in the same manner 22
in which the original appointment was made. 23
(e) E
STABLISHMENTFLEXIBILITY.—To avoid redun-24
dancy, the task force may coordinate with any preexisting 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 4 
•HR 2659 IH
task force, working group, or cross-intelligence effort with-1
in the Homeland Security Enterprise or the intelligence 2
community that has examined or responded to the cyberse-3
curity threat posed by State-sponsored cyber actors, in-4
cluding Volt Typhoon, of the People’s Republic of China. 5
(f) T
ASKFORCEREPORTS; BRIEFING.— 6
(1) I
NITIAL REPORT.—Not later than 540 days 7
after the establishment of the task force, the task 8
force shall submit to the appropriate congressional 9
committees the first report containing the initial 10
findings, conclusions, and recommendations of the 11
task force. 12
(2) A
NNUAL REPORT.—Not later than one year 13
after the date of the submission of the initial report 14
under paragraph (1) and annually thereafter for five 15
years, the task force shall submit to the appropriate 16
congressional committees an annual report con-17
taining the findings, conclusions, and recommenda-18
tions of the task force. 19
(3) C
ONTENTS.—The reports under this sub-20
section shall include the following: 21
(A) An assessment at the lowest classifica-22
tion feasible of the sector-specific risks, trends 23
relating to incidents impacting sectors, and tac-24
tics, techniques, and procedures utilized by or 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 5 
•HR 2659 IH
relating to State-sponsored cyber actors, includ-1
ing Volt Typhoon, of the People’s Republic of 2
China. 3
(B) An assessment of additional resources 4
and authorities needed by Federal departments 5
and agencies to better counter the cybersecurity 6
threat posed by State-sponsored cyber actors, 7
including Volt Typhoon, of the People’s Repub-8
lic of China. 9
(C) A classified assessment of the extent of 10
potential destruction, compromise, or disruption 11
to United States critical infrastructure by 12
State-sponsored cyber actors, including Volt Ty-13
phoon, of the People’s Republic of China in the 14
event of a major crisis or future conflict be-15
tween the People’s Republic of China and the 16
United States. 17
(D) A classified assessment of the ability 18
of the United States to counter the cybersecu-19
rity threat posed by State-sponsored cyber ac-20
tors, including Volt Typhoon, of the People’s 21
Republic of China in the event of a major crisis 22
or future conflict between the People’s Republic 23
of China and the United States, including with 24
respect to different cybersecurity measures and 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 6 
•HR 2659 IH
recommendations that could mitigate such a 1
threat. 2
(E) A classified assessment of the ability 3
of State-sponsored cyber actors, including Volt 4
Typhoon, of the People’s Republic of China to 5
disrupt operations of the United States Armed 6
Forces by hindering mobility across critical in-7
frastructure such as rail, aviation, and ports, 8
including how such would impair the ability of 9
the United States Armed Forces to deploy and 10
maneuver forces effectively. 11
(F) A classified assessment of the eco-12
nomic and social ramifications of a disruption 13
to one or multiple United States critical infra-14
structure sectors by State-sponsored cyber ac-15
tors, including Volt Typhoon, of the People’s 16
Republic of China in the event of a major crisis 17
or future conflict between the People’s Republic 18
of China and the United States. 19
(G) Such recommendations as the task 20
force may have for the Homeland Security En-21
terprise, the intelligence community, or critical 22
infrastructure owners and operators to improve 23
the detection and mitigation of the cybersecu-24
rity threat posed by State-sponsored cyber ac-25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 7 
•HR 2659 IH
tors, including Volt Typhoon, of the People’s 1
Republic of China. 2
(H) A one-time plan for an awareness 3
campaign to familiarize critical infrastructure 4
owners and operators with security resources 5
and support offered by Federal departments 6
and agencies to mitigate the cybersecurity 7
threat posed by State-sponsored cyber actors, 8
including Volt Typhoon, of the People’s Repub-9
lic of China. 10
(4) B
RIEFING.—Not later than 30 days after 11
the date of the submission of each report under this 12
subsection, the task force shall provide to the appro-13
priate congressional committees a classified briefing 14
on the findings, conclusions, and recommendations 15
of the task force. 16
(5) F
ORM.—Each report under this subsection 17
shall be submitted in classified form, consistent with 18
the protection of intelligence sources and methods, 19
but may include an unclassified executive summary. 20
(6) P
UBLICATION.—The unclassified executive 21
summary of each report required under this sub-22
section shall be published on a publicly accessible 23
website of the Department of Homeland Security. 24
(g) A
CCESS TOINFORMATION.— 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 8 
•HR 2659 IH
(1) IN GENERAL.—The Secretary of Homeland 1
Security, the Director of CISA, the Attorney Gen-2
eral, the Director of the Federal Bureau of Inves-3
tigation, and the heads of appropriate Sector Risk 4
Management Agencies, as determined by the Direc-5
tor of CISA, shall provide to the task force such in-6
formation, documents, analysis, assessments, find-7
ings, evaluations, inspections, audits, or reviews re-8
lating to efforts to counter the cybersecurity threat 9
posed by State-sponsored cyber actors, including 10
Volt Typhoon, of the People’s Republic of China as 11
the task force considers necessary to carry out this 12
section. 13
(2) R
ECEIPT, HANDLING, STORAGE, AND DIS-14
SEMINATION.—Information, documents, analysis, as-15
sessments, findings, evaluations, inspections, audits, 16
and reviews described in this subsection shall be re-17
ceived, handled, stored, and disseminated only by 18
members of the task force consistent with all appli-19
cable statutes, regulations, and Executive orders. 20
(3) S
ECURITY CLEARANCES FOR TASK FORCE 21
MEMBERS.—No member of the task force may be 22
provided with access to classified information under 23
this section without the appropriate security clear-24
ances. 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 9 
•HR 2659 IH
(h) TERMINATION.—The task force, and all the au-1
thorities of this section, shall terminate on the date that 2
is 60 days after the final briefing required under sub-3
section (h)(4). 4
(i) E
XEMPTIONFROMFACA.—Chapter 10 of title 5
5, United States Code (commonly referred to as the ‘‘Fed-6
eral Advisory Committee Act’’), shall not apply to the task 7
force. 8
(j) E
XEMPTIONFROMPAPERWORK REDUCTION 9
A
CT.—Chapter 35 of title 44, United States Code (com-10
monly known as the ‘‘Paperwork Reduction Act’’), shall 11
not apply to the task force. 12
(k) D
EFINITIONS.—In this section: 13
(1) A
PPROPRIATE CONGRESSIONAL COMMIT -14
TEES.—The term ‘‘appropriate congressional com-15
mittees’’ means— 16
(A) the Committee on Homeland Security, 17
the Committee on Judiciary, and the Select 18
Committee on Intelligence of the House of Rep-19
resentatives; and 20
(B) the Committee on Homeland Security 21
and Governmental Affairs, the Committee on 22
Judiciary, and the Select Committee on Intel-23
ligence of the Senate. 24
VerDate Sep 11 2014 02:12 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00009 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 10 
•HR 2659 IH
(2) ASSETS.—The term ‘‘assets’’ means a per-1
son, structure, facility, information, material, equip-2
ment, network, or process, whether physical or vir-3
tual, that enables an organization’s services, func-4
tions, or capabilities. 5
(3) C
RITICAL INFRASTRUCTURE .—The term 6
‘‘critical infrastructure’’ has the meaning given such 7
term in section 1016(e) of Public Law 107–56 (42 8
U.S.C. 5195c(e)). 9
(4) C
YBERSECURITY THREAT .—The term ‘‘cy-10
bersecurity threat’’ has the meaning given such term 11
in section 2200 of the Homeland Security Act of 12
2002 (6 U.S.C. 650). 13
(5) H
OMELAND SECURITY ENTERPRISE .—The 14
term ‘‘Homeland Security Enterprise’’ has the 15
meaning given such term in section 2200 of the 16
Homeland Security Act of 2002 (6 U.S.C. 650). 17
(6) I
NCIDENT.—The term ‘‘incident’’ has the 18
meaning given such term in section 2200 of the 19
Homeland Security Act of 2002 (6 U.S.C. 650). 20
(7) I
NFORMATION SHARING .—The term ‘‘infor-21
mation sharing’’ means the bidirectional sharing of 22
timely and relevant information concerning a cyber-23
security threat posed by a State-sponsored cyber 24
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00010 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 11 
•HR 2659 IH
actor of the People’s Republic of China to United 1
States critical infrastructure. 2
(8) I
NTELLIGENCE COMMUNITY .—The term 3
‘‘intelligence community’’ has the meaning given 4
such term in section 3(4) of the National Security 5
Act of 1947 (50 U.S.C. 3003(4)). 6
(9) L
OCALITY.—The term ‘‘locality’’ means any 7
local government authority or agency or component 8
thereof within a State having jurisdiction over mat-9
ters at a county, municipal, or other local govern-10
ment level. 11
(10) S
ECTOR.—The term ‘‘sector’’ means a col-12
lection of assets, systems, networks, entities, or or-13
ganizations that provide or enable a common func-14
tion for national security (including national defense 15
and continuity of Government), national economic 16
security, national public health or safety, or any 17
combination thereof. 18
(11) S
ECTOR RISK MANAGEMENT AGENCY .— 19
The term ‘‘Sector Risk Management Agency’’ has 20
the meaning given such term in section 2200 of the 21
Homeland Security Act of 2002 (6 U.S.C. 650). 22
(12) S
TATE.—The term ‘‘State’’ means any 23
State of the United States, the District of Columbia, 24
the Commonwealth of Puerto Rico, the Northern 25
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00011 Fmt 6652 Sfmt 6201 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS 12 
•HR 2659 IH
Mariana Islands, the United States Virgin Islands, 1
Guam, American Samoa, and any other territory or 2
possession of the United States. 3
(13) S
YSTEMS.—The term ‘‘systems’’ means a 4
combination of personnel, structures, facilities, infor-5
mation, materials, equipment, networks, or proc-6
esses, whether physical or virtual, integrated or 7
interconnected for a specific purpose that enables an 8
organization’s services, functions, or capabilities. 9
(14) U
NITED STATES.—The term ‘‘United 10
States’’, when used in a geographic sense, means 11
any State of the United States. 12
(15) V
OLT TYPHOON.—The term ‘‘Volt Ty-13
phoon’’ means the People’s Republic of China State- 14
sponsored cyber actor described in the Cybersecurity 15
and Infrastructure Security Agency cybersecurity 16
advisory entitled ‘‘PRC State-Sponsored Actors 17
Compromise and Maintain Persistent Access to U.S. 18
Critical Infrastructure’’, issued on February 07, 19
2024, or any successor advisory. 20
Æ 
VerDate Sep 11 2014 01:26 Apr 08, 2025 Jkt 059200 PO 00000 Frm 00012 Fmt 6652 Sfmt 6301 E:\BILLS\H2659.IH H2659
ssavage on LAPJG3WLY3PROD with BILLS