Subcommittee on communications and technology. The chair recognizes himself for five minutes for Opening Statements. Good morning, welcome to the subcommittee on communications and technologies legislative hearing on legislating to secure americas wireless future. Today, the subcommittee will consider a number of legislative proposals that address challenges from spectrum management, to securing our nations infrastructure. In proposals before the subcommittee today, the studying how to harness airway resources efficiency act, or the sherr act, which i have introduced with my good friend, this legislation would require ntia, using advanced technologies such as artificial intelligence, automated frequency coordination, environmental sensing to facilitate more efficient spectrum sharing and used by the federal government. The bill would also require the fcc to report to congress, on the feasibility of using existing sharing technologies on several important spectral brand that and. As we look to the future, its important to use more efficiently, the federal government being chief among them. We need to find ways to modernize how the goverment uses and shares spectrum amongst agencies and departments, as well as with the commercial sector. The cbs band is a great example of how sharing sent can a yesterday, the fcc voted on in order to sell licenses in the cbs band, a few weeks ago the band launched official operations. It will combine licensed, unlicensed, protecting incumbents rights and ensuring the spectrum is always available for use. My hope is, the share act can act as a bridge, future innovative sharing initiatives. We have the Network Security information act, introduced by myself and my colleague, to congressmen, this legislation would established information sharing program, and the department of homeland security, to share the supply chain so this legislation would help all providers most importantly, small and royal providers that lack the resources and expertise to engage in washington, with what has largely been closed door discussions related to the threats of on trusted equipment vendors. Our hope is that by creating a program with an inclusive mandate, that these providers will be more able in the future, to avoid deploying technologies that impose an outside risk to their customers and to the nation. After that, the secure address the Communications Network act, introduced by the chairman, which would require the fcc to create a list of equipment services, that it posed risks to National Security. It would authorize a fund to enable carriers with unsafe equipment in their networks to remove it and replace it with trusted equipment and services. Telecoms services, far too essential for enter for Nations Carriers to be used in a trusted elements in our network. Subcommittee will also consider, the secure 5g and beyond act introduced by representatives. It will require the government to work with strategic allies, secure their 5g networks, and ensure that u. S. 5g networks are secured, and work with industry to work and promoting the United States leadership act, 2019, introduced by orepresentatives, we will also consider the frontier act, introduced by other representatives. Finally, we will discuss House Resolution five seven five, expressing the sense of the house that all stakeholders in the deployment of 5gs should consider and adhere to the proposals introduced by representatives. Also want to thank all the witnesses for being here today thank you very much mister chairman and for wanting to thank our witnesses for being with us today, as we discussed legislation on our supply chain and management or respective resources. There are bills on todays hearing that adjusts the challenges we faced and our the department of homeland security. She established and led the department of defense Computer Emergency Response team, i want to especially thank her for appearing before the subcommittee today. I look forward to a discussion of all of these proposals. Now the chair recognizes mr. Five minutes for his Opening Statement. Thank you mister chairman, thank you for calling todays hearing. I want to thank our witnesses for being with us today, there are bills on todays hearing that adjusts the challenges we faced and our infrastructure being secure from vulnerabilities. They have worked with our Committee Chairman on h. R. 4462 for you and. They share act and our agencies with the innovative spectrum and our airways as the executive branch is responsible for advising the president on matters ntia should consider to lead a role in the collective government approach to a federal government access to resources. This bill helps in to an jewels into the 21st century. And todays hearing will have several bills and our nations communication and such as the inclusion in providers, networks will be supplied however, its only because it has the associated risks it and will prevent these types of situations from occurring on a forwardlooking basis. We understandably these providers and will do my part to prevent National Security and may need help doing so. And will voice concern but the proposal of using controversial appointment. So as members of the fcc will reverse auction and accompanying these funds. We vipers and we work in a bipartisan way and well see how those conditions impact in order to keep the vulnerability. They will prevent the federal funded pay for that imposing National Security risk. We do not want winners of see a half to be able to meet requirements of other things that have changed. I want to thank again with them for being with us today and our testimony. Im going to yield the rest of my time to the gentleman from illinois. Thank you mister chairman for yielding. The security of american communication Information Networks is paramount to National Security. What i know fairly well for my time in the military that it cuts both ways. Ive weve seen through the years, foreign adversaries have coerced or equipment and manufacturers and bent towards or capabilities of their products which were purchased by American Companies and foreign networks. They have the ability to eavesdrop on citizens of our government wants to launch of and disruptor communication. In an effort to help the private sector of stalling the equipment ive worked with chairman doyle with 24 61 wins and i look forward to that discussion. Look the gentleman yields back. The chair recognizes mr. Age Frank Pallone 30. T ank you chairman doyle. I will consider bills of the wireless future and they manage the spectrum more efficiently cars and better serve all americans. They guarantee are Wireless Networks are from foreign adversaries and will do us harm. You see shoe they are introducing the share act for longstanding policy and the Communications Information becomes mission and me commission and a policy. The agencies can act as in the interest of spectrum stakeholders and department of defense and the administration of Public Safety and karens. We have the management which requires a antieye a and the share act as helping anti i a with the government agencies. In a long way and the fcc rooms with commercial spectrum and im pleased to share as far as the fcc to look for ways to expand the sharing techniques with its ears broadband service. When it comes to securing those networks and foreign adversaries, our thank walden and mrs. Doris matsui and she is with the network act. They will prohibit the spending a federal dollars and the Communications Equipment and services that undermine National Security. They will establish the billion dollar reimbursement to help small carriers to have equipment and replace it with secure alternatives. As weve heard, much of the global supplv chain with flows through china at one point or another. The industrial policies allows state run manufacturers like huawei to sell suspect equipment to providers cheaper than everyone else. Many of the carriers avoided these threats wit smaller and more rural carriers of using suspect clips. The networks are interconnected and one week link among the system. And they were move the good of the entire country. With them and issues will share supply and risk information and providers. So i look forward to hearing from our witnesses and want to briefly recognize dean on todays panel. Who is the mark of new jersey native and good to see you today and welcome. With that i yield back. Thank you very much. I am pleased we are considering the trust of the Communications Networks will create no fun that will have a financial f the wireless providersal to replace certain equipment with huawei and new equipment that with secure hardware with the capabilities. Mister chairman, we must consider the u. S. Innovation and the 5g race. And this will help provide the security for the top communication providers. Still more, needs to be done in the respect of policy for both unlicensed users and beyond that. We must explore opportunities and by 5g acts will provide balance with these 300 megahertz and is supported by broadway in Public Interest groups and the stakeholders. I work with chairman doyle on this issue and congressman introduced the spectrum now act which will make an additional spectrum available. The imbalanced approached of the Wireless Service as not only been necessary for expanding the span. I also continue to focus on the 20yearold five dot nine vigor hurt span. The fcc will consider to address this ban soon. So that i yield back to the chairman. Chairman yield back. Gentleman yields back. I recognize the entrance of mr. Walden. Thank you mister chairman. Its the top of the budget right here. Thank you for being here. Your insight will be an important input to the process and what hes the telecommunications represents the lifelong preserving as we all know and disrupt that infrastructure with the liberties they will deliver on congress and that commitment by the bipartisan process with peace threats will secure the sector Going Forward. Moreover i know chairman my home and the congress is speaking to these topics in congress. With both sides working together with stakeholders and a society they have done it successfully. Everyone is can agree that the Communications Networks with vulnerable equipment. In fact, theres testimony over two years ago of the probability that existed. Also the impact of providers that were disproportionately impacted and replacing existing equipment in the state of your budget. Not to mention the programs purchased into pointy most effective products. Unfortunately, our adversaries had no reservations about subsidizing out they become attractive options if. He ive seen small small broad brand providers what guns and stretching limited funds with constituents and some of the hard to reach places. Many of these providers have consultants with the necessary ways to appreciative on her belittles that a perform their purchasing decisions. Those received federal support from the networks and uncertain areas will not set them up for failure. By requiring them to spend the lowest cost and only then from what they say not the lowest cost equipment. We need to get this right. 60 hr 44 61 sharing act will facilitate the information that will provide all of the equipment in their networks. Its the centerpiece of a bipartisan discussions in the last congress and to have it contrast in this hearing. H. R. 40 war 61 act as an original cosponsor o will address this problem by setting up a Reimbursement Program to replace honorable equipment but we still have some details to work out at the program is modeled in the fcc is so far successful in the Reimbursement Program. We need to get this right and its critical for National Security and also to our competitiveness or we started rolling out new technology. We raised to another topic of the july spectrum hearing of our russia is seeking the Public Discourse on the deployment of the next generation network. And they also shared our concern about that hearing. We continue our work to close the divide of the race to 5g. We must be implementing threats of diminishing they stand in the world. Just this past week, they saw this card which was posted on a Bulletin Board by the cafeteria. The details are pretty standard of whos behind his campaign and it lists a litany of issues of responsibility and collects some new stories around the country of whats wrong with 5g and those stories about a Community Health and stopping a 5g role in australia. At the same time, knowing that the World Health Organization doesnt have any health risk from 5g. At the Cornell University research is safer than previous networks. We have to be diligent about efforts and influence are thinking in this space and hope the committee of being pursued of our internet architecture and the put forward by remembers today which was a thoughtful approach to the challenge of thanks again and i do hope the full committee of oversight or this committee will do some looking into of whats being pushed out there in the public. We need the facts and i yield back. The gentleman yelled back. Wed like to remind members that the Committee Roles and all members should be made part of the record so id like to introduce our witnesses for todays hearing and this is a Bobby Stempfley and the Software Engineering and thank you for being here today and the president of the wireless for being here and mr. Harold felt the Public Knowledge and thank you again and dean brennan the strategy and technology for incorporated and mr. Brennan thank you. We want to thank all of you for joining us today and we look forward to your testimony and at this time the chao will recognize each witness for five minutes to provide their Opening Statement and before we begin id like to explain the system in front of you which is a series of lights and the light will initially be green at the start of the Opening Statement and wil turn yellow and will have one minute remaining and please beginning to wrap up your remarks and when the light turns red were off. Mrs. Stempfley you arek recognized for five minutes. You hit your microphone button there. Good morning to Ranking Members of the committee and thank you very much for the opportunity to participate in this meeting today and speak on this teleCommunications Industry. Ive been a Public Servant working in the application of information and technology a National Security provisions nd imal security provisions serving as the managing director at the University Software institute where we focus on partnering with government academia and eighth research to improve security and the Computer Systems and networks. The sector is made of Companies Suppliers that made a possible and because of the industry is responsible for the threat of information its linked to how we work, play and live. It plays a fundamental role in operation to society and ms. Linked to families. These devices have been competing within the competinhewithin the surface and the responsibility which comes to participate in the overall protection of its efforts. Ultimately, the supply chain for the Communications Industry is vital to achieving security. Historically, checks and balances a supply chain have been procedural justice licenses, warranties and the reputatio and recently assured the service failures. Unfortunately, these controls are increasingly inaccurate of the Communications Technology in the services that had critical capabilities in this industry. An ever expanding supply chain means the external dependencies must be rigorously measured and managed for organization to remain resilient. This concludes areas in manufacturing and integration of the supply chain and Service Supply chains and the supply chains. Ramifications of an attack anywhere on the infrastructure is well beyond the plane of origin and the potential to reflect entire, nations. This is private citizens, we must address the software in services as well. The bills today include the secure Communications Network back in 2019 and the sharing act are a very good first step in the security. As the etities to get a little midsuit by change they have resilience and criteria in every stage of development in supply of information and Communications Technology. Well continue to be the forward meaning of this software and supply chain efforts within government and the industry. Attacks against our supply chains unite and suppliers in search of scalable needs for i ct risks and the negligence. Suppliers need standardize methods about common issues related to the hardware and Software Aspects and especially regarding non conforming products that have counterfeit, tainted or defective moments and subsequent harm. Fundamentally, the outcomes and respect is were seeking to manage ours simple. Even though the methods to accomplish them are not. First, suppliers must have practices to supply chain risks. Products provided are unexpectedly secure. Third, the methods of distribution and transmission of the purchaser reansmission of the purchaser used with acceptable security. And things and things which wasting ultimately released i think each and with research and demonstrate that the practice areas are a supply Chain Management effort. The establishment and maladjustment and a key relationship engineers practices and secure Product Operations and sustain and the understanding and management of supply chain technologies overall infrastructure. As private and public functions go even more inseparable as these Technology Systems support them. The partnerships become even more necessary. To protect this infrastructure against growing Cyber Threats across the labor approach. Its to share had security while identifying the gaps of the marketplace. Information of the supply chain such as vulnerability and suppliers and security should be shared along these plans than those needed. The usual information must recognize the different capabilities and roles and all of our key successful programs. Lastly, they have this choice between security and innovation. Thank you. Thank you very much. You are now recognized for five minutes. Chairman latta, let me thank you for discussing the rule america connected. Its a family operated company with my father in the late 19 fifties and over the years since we worked hard to keep pace with technology with the family. We had our Wireless Network in 1995 with three analog sites and weve grown that to 65 sites and provide 4g ltd. Including many areas where the its the only signal present and darkest emerged upending or network but today, we provide service of the connectivity of 30,000 visitors which is passing through. I support those efforts of the Telecoms Networks and the cybersecurity in the National Security threats and while the energy as buzzing with excitement from 5g network buildup. We have many other Companies Across the country that are in a sense between the security concerns of the equipment. They modern network was built just a few days ago with the participation in a locally funded phase one process. The first option was for those who are showing the lowest cost and the greatest number of road calls. The criteria will provide as much coverage as possible and inispensably as possible. We have five different bits there which is by far the lowest. We have restrictions at the time with the guy commitment in facing several employment challenges. The choices we made enabled us to lead our mandate and requirements but also provide us with a platform which we can you have invitee. Despite the challenges and footprint, we were optimistic that this experience would allow us to have the latest services with the balance of the Current Technology and provide us for the next short and unfortuately they have grown and continue to use this equipment and they have greatly diminished. By the time we should be focused on expansion plans and are instead concerned about doing able to continue to services at all. Such faith will squander 20 years of uju rg expansion of wireless investments. We find ourselves in this particular under the fund the program and simply did our best to be part of us and bring service to our neighbors. The news of the bills being discussed today sincerely report that its is returning. Im confident bobby working with the small affected carriers of the appropriate federal agencies will be established and the policies inancialhed and the policies resources for those carriers to secure the legislative efforts and the committee will take significant steps in our path to the future and establishing the Communications Network and determining the Communications Equipment of services and the Administrative Burden of rule carriers and supporting information shared as Congress Acts on this issue and is a solution imported in a timely matter in National Security. Mattight order withsecurity. Sufficient resources words are allocated and did right. With so many underway, including the executive order to prohibit use of the equipment theres no time to find the replacement equipment. While we may have referred to the process as in place, we perhaps need to be talking replace and then surfaces will then be disrupted. As commissioner starts noted last week, this is the National Problem that deserves a national solution. We should suspect all carriers to collect in good faith and replace the equipment on their own. Its therefore critical that they ask swiftly and replace the equipment particularly of the small rural carriers without assistance. The legislation will accomplish this disease goals will be put to work to secure our wireless future. We appreciate you to share a little bit of the story and i welcome any questions you have. Thank you mister nettles you are recognized for five minutes. The, Ranking Member latta thank you for having me this morning. The committee will move forward with the bills designed for innovation and security of the 5g networks. Out of focus on the following bills and he share act of the sharing acts and secure and communications that work act no time to find the replacement equipment. While we may have referred to the process as in place, we perhaps need to be talking replace and then surfaces will then be disrupted. As commissioner starts noted last week, this is the National Problem that deserves a national solution. We should suspect all carriers to collect in good faith and replace the equipment on their own. Its therefore critical that they ask swiftly and replace the equipment particularly of the small rural carriers without assistance. The legislation will accomplish this disease goals will be put to work to secure our wireless future. We appreciate you to share a little bit of the story and i welcome any questions you have. Thank you mister nettles you are recognized for five minutes. The, Ranking Member latta thank you for having me this morning. The committee will move forward with the bills designed for innovation and security of the 5g networks. Out of focus on the following bills and he share act of the sharing acts and secure and communications that work act here and the chair act and everyone here is familiar with the problem of our crowded airwaves and our efforts of 5g deployments of cause conflict and uncertainty among users and the best thing and develop Development Technology is necessary to resolve these problems Going Forward. In addition to research and federal users they users will study of the ban will continue enormously with how to create a win for all specters and Development Process and the ballast the interest of the multiple stakeholders and early investments for the users. While protecting interests and our spectrum needs Going Forward will set aside our views and systems that can accommodate everyone and maximize spectrum use. The process tells us that they can do it and they should build on the success. Importantly, you should not think about the share act as a means of in spectral commercial use. The developed should be seen as the first step of rethinking inspector management and the current stale of the assignments to a dynamic share that u s allow the government to economies of scale and the agencies it which they need to meet their responsibilities. And as i are both good ideas in supply chain and Community Work and the network act have suggested slight modifications that will clarify that theres mechanisms and secure their supply chain that can be removed from the list. Although nothing in the statute is written in this Development Process, its always best to clarify before confusion. We also suggest that the expand and conclude purchasqahspe after august 2018. To ensure small carriers which was not listed at the time of purchase. The security is a shared responsibility and the benefits which changes will serve the Public Interest and protect National Security. We look forward to continuing to have the committee on these issues. This frontier is also repeated as the most Important Role of legislation w ich can do no harm. The language in the statute can create potential barriers for Communication Services or ways to leverage the assets in these communities to address individual divide. The proposal does not violate and delay or prevent action. For example, the federal government will try to make federal fiber available with the immediate aftermath of the disaster and would not want to introduce the uncertainty while Legal Counsel remained whether this would be a wholesale network under the act. There is no plan to build a National Network nor could any future administration do so without an appropriation from congress. Given the frontier provides no additional benefit and the risk of the consequences, we strongly recognize that this will not move forward. Thank you very much i look forward to your questions. Mr. Emmanuel brenner, youre recognized for five minutes. My name is dean brenner and im here today which was founded in a san diego living room and the largest supplier of our of systems with smartphones another irelands devices new and of new Wireless Technology and its developed in especially 5g and we design all the key inputs controlled by the government. If this committee is recognized, in a study new specter of high bend license shares and is essential for the 5g rolls act. Its at a feverish pace and will continue the stream of new spectrums. Thank you for continuing to make it a high priority. It is now launched in four continents and 35 networks in those of all for Us Operations that are expanding. For manufacturers, are 5g devices or six times as many as 4g. When it comes to 155 devices which have been launched. Including phones, hotspots and wireless devices. They support both millimeter wave and the u. S. Is the first country to launch 5g and hurts and millimeter wave. Its delivered far better broadband at a much lower cost per minute. Let me explain severpl 5g Game Changers and will further accelerate the 5g rollout. I spectrum sharing which enables an operator run aving toables an operator run empty a spectrum of 5g which can detect ten years or more dss have simultaneously for 5g and enhanced the wave which and enhahe fixed wirelessch and will develop new modules which is the fixed wireless and a way from a rural base station which is a larger area. A new version will compromise for other license and will be launched for the ultra reliable 5g. With warehouses another venues. This technology and other forms of wifi which is developing, with the play new six guyger hurts which is now under consideration by the fcc. The 5gs shall chips will defy the more people and particularly indoors using military wave. They cellular village vehicle will have the technology of with 4g and 5g and communicate with other if restructure with much greater range or liability and the sirc technology. Its to be deployed which months waiver for 5. 9 gigahurtz hurts and the deployment of dhs are see. Under the security which is a high priority which i started working on 5g even, though we dont manufacture it. While its worked on 5g security internally at any other companies which has a Global Standards group which sets 5g sanders. For many years now, its qualcomm in a participant in the communication insecurity with the council. Most recently, we appreciate the bipartisan from the chairman and the Ranking Members of the subcommittee and the fcc chairman as the exam and 5g security. One of our engineers was appointed to lead the group on managing security risks and 5g implementation. Members of this group is experts from dhs and nonprofit and government contracts and Network Operators and Tech Companies which create association. We look forward to advancing 5g security in this group. Finally, its been working on sharing for many years and work directly with d. O. T. In other agencies and the private sector which is known for sharing multiple departments at multiple and cities in those departments. Over the years, its been a coordinating role from government players working with industry and meeting privatized to call work and speaking with the single voice for the executive branch to make unified greater progress towards sharing. This process culminated most recently in the commercial deployment of the span of the development of the amount of spectrum for 4g and 5g. But the interest in sharing across the federal government and we look forward to ju au jurujui at this process to enable more sharing. Thank you very much i look forward to your questions. Thank you mister brenner. We now moved to questions. Each member has five minutes to ask questions are witnesses and will stop by recognizing myself for five minutes. Miss stempfley, what risks are being posed from equipment in our nations telecommunications that works . What kind of things can foreign actors do if they have access to it . Them thank you for the question. As i said in my testimony. A Telecommunications Infrastructure provides captivity and served as a foundation of many other elements of life. It also has cascading dependency among other infrastructure and presents a key area of focus. The supply chain concerns are equally within that are difficult to identify and could provide a great deal of access in the environment and provided the management is in which is a great concern for us to understand report. The foreign actors or access of the electrical grid and infrastructure. What other sectors can they access with the carriers network . Unfortunately, what we o here has a clear answer to that and the activity then the piece that we all understand as the telecommunication electric sector and the Financial Sector is all interdependent. I think that speaks to the potential cascading effect. Mr. Feld, whats the difference of establishing of the test beds for more spectrum sharing and what do you see in the cbs piggy the gap. They neqd more here and the need for more sharing is more obvious but the benefits of sharing go beyond the federal government and its current functions. The dynamic spectrum sharing as mr. Brenner referred to is potentially for the first time ao act as a spectrum user rather then rand demiseing the allocations in our current system. Demonstrates the importance of accommodating federal users and protected users and which has been the holy grail a spectrum policy. And to let what they need to do when and the ultimate goal and the sharing technologies with. Mister nettles, how do you see the sharing active benefiting this Going Forward and mitigating the supply chain . Thank you mister chairman, we were a pretty Small Company of about 50 employees and all lines of business and was about half of which are dedicated to our Wireless Network and its difficult to say the least and to keep up with coming out and when is not shared openly. You dont know what you dont know any crossroads unfortunately and thats where we find ourselves a few years back in our selection. Miss stempfley, do you believe the sharing act under misrepresented or will help our telecoms providers with the information and the supply chain and the security threats . What are the challenges youve seen and communicating the science of threats to companies that dont have the resources and personnel in the carrier . The focus on ensuring that the information is usable to all parties is part of the bill and any information with the program. The key thing that i read about the in building these activities is recognizing the capacity that the organization has to take action. Is it clear what they should do . As a communicating to them in a method that they can actually see. Thank you very much. Im going to yield 25 seconds back as an example to the rest of the committee. When laughs ill yield to my good friend mister latta. You very much mister chairman and thank you for meeting with us today. If i could start my questions with you please. The u. S. Wireless industry as been market placed policies that incentivize growth. It lead the way with the early 1990s and more recently with the successful as one and three options. How important are the tools given to the share act and the u. S. Wireless shares over the next few years. They are vital but i would suggest to the list of the tools which is 1 06 point to be that will include and let me explain them. We call look before talk. Today, the way the analysis channq would share the four of us on his panel would get to use it at one another time and i be quiet the other three fourths except for mr. Feld and nettles. With 5g we, have a fast new radio we are transmitting at a highly directional manner. Weve demonstrated this technology that as long as all four of us on the panel are able to detect in what direction the other is going to be using the spectrum. All four of us could use this at once. Dramatically increasing the look before talk and technical name for it and i apologize its coordinated and second tool thats vital is the synchronization. If we all synchronize are lodges while we are sharing the channel because of the time based aspect of the spectrum sharing if were in sync with one another, we would minimize the amount of time on the channel and again, all of us would be able to use the channel which would be a benefit for everyone. Thank you very much. Miss stempfley, with your Prior Experience in the office and communications with the dhs. Would you discuss how h are 44 61 its existing executive branch and facility information with the providers . Thank you very much. I truly appreciate the focus on the small rural provider and its an important part of our nations infrastructure. Within the information sharing programs that exist, sharing typically happens between a Government Entity with a consolidated group or a trade association and information is further disseminated from there. The way that this bill would work is to ensure that the complete path exists and is successful. The end provider is to receive the information