Subcommittee on communications and technology. The chair recognizes himself for five minutes for Opening Statements. Good morning, welcome to the subcommittee on communications and technologies legislative hearing on legislating to secure americas wireless future. Today, the subcommittee will consider a number of legislative proposals that address challenges from spectrum management, to securing our nations infrastructure. In proposals before the subcommittee today, the studying how to harness airway resources efficiency act, or the sherr act, which i have introduced with my good friend, this legislation would require ntia, using advanced technologies such as artificial intelligence, automated frequency coordination, environmental sensing to facilitate more efficient spectrum sharing and used by the federal government. The bill would also require the fcc to report to congress, on the feasibility of using existing sharing technologies on several important spectral brand that and. As we look to the future, its important to use more efficiently, the federal government being chief among them. We need to find ways to modernize how the goverment uses and shares spectrum amongst agencies and departments, as well as with the commercial sector. The cbs band is a great example of how sharing sent can a yesterday, the fcc voted on in order to sell licenses in the cbs band, a few weeks ago the band launched official operations. It will combine licensed, unlicensed, protecting incumbents rights and ensuring the spectrum is always available for use. My hope is, the share act can act as a bridge, future innovative sharing initiatives. We have the Network Security information act, introduced by myself and my colleague, to congressmen, this legislation would established information sharing program, and the department of homeland security, to share the supply chain so this legislation would help all providers most importantly, small and royal providers that lack the resources and expertise to engage in washington, with what has largely been closed door discussions related to the threats of on trusted equipment vendors. Our hope is that by creating a program with an inclusive mandate, that these providers will be more able in the future, to avoid deploying technologies that impose an outside risk to their customers and to the nation. After that, the secure address the Communications Network act, introduced by the chairman, which would require the fcc to create a list of equipment services, that it posed risks to National Security. It would authorize a fund to enable carriers with unsafe equipment in their networks to remove it and replace it with trusted equipment and services. Telecoms services, far too essential for enter for Nations Carriers to be used in a trusted elements in our network. Subcommittee will also consider, the secure 5g and beyond act introduced by representatives. It will require the government to work with strategic allies, secure their 5g networks, and ensure that u. S. 5g networks are secured, and work with industry to work and promoting the United States leadership act, 2019, introduced by orepresentatives, we will also consider the frontier act, introduced by other representatives. Finally, we will discuss House Resolution five seven five, expressing the sense of the house that all stakeholders in the deployment of 5gs should consider and adhere to the proposals introduced by representatives. Also want to thank all the witnesses for being here today thank you very much mister chairman and for wanting to thank our witnesses for being with us today, as we discussed legislation on our supply chain and management or respective resources. There are bills on todays hearing that adjusts the challenges we faced and our the department of homeland security. She established and led the department of defense Computer Emergency Response team, i want to especially thank her for appearing before the subcommittee today. I look forward to a discussion of all of these proposals. Now the chair recognizes mr. Five minutes for his Opening Statement. Thank you mister chairman, thank you for calling todays hearing. I want to thank our witnesses for being with us today, there are bills on todays hearing that adjusts the challenges we faced and our infrastructure being secure from vulnerabilities. They have worked with our Committee Chairman on h. R. 4462 for you and. They share act and our agencies with the innovative spectrum and our airways as the executive branch is responsible for advising the president on matters ntia should consider to lead a role in the collective government approach to a federal government access to resources. This bill helps in to an jewels into the 21st century. And todays hearing will have several bills and our nations communication and such as the inclusion in providers, networks will be supplied however, its only because it has the associated risks it and will prevent these types of situations from occurring on a forwardlooking basis. We understandably these providers and will do my part to prevent National Security and may need help doing so. And will voice concern but the proposal of using controversial appointment. So as members of the fcc will reverse auction and accompanying these funds. We vipers and we work in a bipartisan way and well see how those conditions impact in order to keep the vulnerability. They will prevent the federal funded pay for that imposing National Security risk. We do not want winners of see a half to be able to meet requirements of other things that have changed. I want to thank again with them for being with us today and our testimony. Im going to yield the rest of my time to the gentleman from illinois. Thank you mister chairman for yielding. The security of american communication Information Networks is paramount to National Security. What i know fairly well for my time in the military that it cuts both ways. Ive weve seen through the years, foreign adversaries have coerced or equipment and manufacturers and bent towards or capabilities of their products which were purchased by American Companies and foreign networks. They have the ability to eavesdrop on citizens of our government wants to launch of and disruptor communication. In an effort to help the private sector of stalling the equipment ive worked with chairman doyle with 24 61 wins and i look forward to that discussion. Look the gentleman yields back. The chair recognizes mr. Age Frank Pallone 30. T ank you chairman doyle. I will consider bills of the wireless future and they manage the spectrum more efficiently cars and better serve all americans. They guarantee are Wireless Networks are from foreign adversaries and will do us harm. You see shoe they are introducing the share act for longstanding policy and the Communications Information becomes mission and me commission and a policy. The agencies can act as in the interest of spectrum stakeholders and department of defense and the administration of Public Safety and karens. We have the management which requires a antieye a and the share act as helping anti i a with the government agencies. In a long way and the fcc rooms with commercial spectrum and im pleased to share as far as the fcc to look for ways to expand the sharing techniques with its ears broadband service. When it comes to securing those networks and foreign adversaries, our thank walden and mrs. Doris matsui and she is with the network act. They will prohibit the spending a federal dollars and the Communications Equipment and services that undermine National Security. They will establish the billion dollar reimbursement to help small carriers to have equipment and replace it with secure alternatives. As weve heard, much of the global supplv chain with flows through china at one point or another. The industrial policies allows state run manufacturers like huawei to sell suspect equipment to providers cheaper than everyone else. Many of the carriers avoided these threats wit smaller and more rural carriers of using suspect clips. The networks are interconnected and one week link among the system. And they were move the good of the entire country. With them and issues will share supply and risk information and providers. So i look forward to hearing from our witnesses and want to briefly recognize dean on todays panel. Who is the mark of new jersey native and good to see you today and welcome. With that i yield back. Thank you very much. I am pleased we are considering the trust of the Communications Networks will create no fun that will have a financial f the wireless providersal to replace certain equipment with huawei and new equipment that with secure hardware with the capabilities. Mister chairman, we must consider the u. S. Innovation and the 5g race. And this will help provide the security for the top communication providers. Still more, needs to be done in the respect of policy for both unlicensed users and beyond that. We must explore opportunities and by 5g acts will provide balance with these 300 megahertz and is supported by broadway in Public Interest groups and the stakeholders. I work with chairman doyle on this issue and congressman introduced the spectrum now act which will make an additional spectrum available. The imbalanced approached of the Wireless Service as not only been necessary for expanding the span. I also continue to focus on the 20yearold five dot nine vigor hurt span. The fcc will consider to address this ban soon. So that i yield back to the chairman. Chairman yield back. Gentleman yields back. I recognize the entrance of mr. Walden. Thank you mister chairman. Its the top of the budget right here. Thank you for being here. Your insight will be an important input to the process and what hes the telecommunications represents the lifelong preserving as we all know and disrupt that infrastructure with the liberties they will deliver on congress and that commitment by the bipartisan process with peace threats will secure the sector Going Forward. Moreover i know chairman my home and the congress is speaking to these topics in congress. With both sides working together with stakeholders and a society they have done it successfully. Everyone is can agree that the Communications Networks with vulnerable equipment. In fact, theres testimony over two years ago of the probability that existed. Also the impact of providers that were disproportionately impacted and replacing existing equipment in the state of your budget. Not to mention the programs purchased into pointy most effective products. Unfortunately, our adversaries had no reservations about subsidizing out they become attractive options if. He ive seen small small broad brand providers what guns and stretching limited funds with constituents and some of the hard to reach places. Many of these providers have consultants with the necessary ways to appreciative on her belittles that a perform their purchasing decisions. Those received federal support from the networks and uncertain areas will not set them up for failure. By requiring them to spend the lowest cost and only then from what they say not the lowest cost equipment. We need to get this right. 60 hr 44 61 sharing act will facilitate the information that will provide all of the equipment in their networks. Its the centerpiece of a bipartisan discussions in the last congress and to have it contrast in this hearing. H. R. 40 war 61 act as an original cosponsor o will address this problem by setting up a Reimbursement Program to replace honorable equipment but we still have some details to work out at the program is modeled in the fcc is so far successful in the Reimbursement Program. We need to get this right and its critical for National Security and also to our competitiveness or we started rolling out new technology. We raised to another topic of the july spectrum hearing of our russia is seeking the Public Discourse on the deployment of the next generation network. And they also shared our concern about that hearing. We continue our work to close the divide of the race to 5g. We must be implementing threats of diminishing they stand in the world. Just this past week, they saw this card which was posted on a Bulletin Board by the cafeteria. The details are pretty standard of whos behind his campaign and it lists a litany of issues of responsibility and collects some new stories around the country of whats wrong with 5g and those stories about a Community Health and stopping a 5g role in australia. At the same time, knowing that the World Health Organization doesnt have any health risk from 5g. At the Cornell University research is safer than previous networks. We have to be diligent about efforts and influence are thinking in this space and hope the committee of being pursued of our internet architecture and the put forward by remembers today which was a thoughtful approach to the challenge of thanks again and i do hope the full committee of oversight or this committee will do some looking into of whats being pushed out there in the public. We need the facts and i yield back. The gentleman yelled back. Wed like to remind members that the Committee Roles and all members should be made part of the record so id like to introduce our witnesses for todays hearing and this is a Bobby Stempfley and the Software Engineering and thank you for being here today and the president of the wireless for being here and mr. Harold felt the Public Knowledge and thank you again and dean brennan the strategy and technology for incorporated and mr. Brennan thank you. We want to thank all of you for joining us today and we look forward to your testimony and at this time the chao will recognize each witness for five minutes to provide their Opening Statement and before we begin id like to explain the system in front of you which is a series of lights and the light will initially be green at the start of the Opening Statement and wil turn yellow and will have one minute remaining and please beginning to wrap up your remarks and when the light turns red were off. Mrs. Stempfley you arek recognized for five minutes. You hit your microphone button there. Good morning to Ranking Members of the committee and thank you very much for the opportunity to participate in this meeting today and speak on this teleCommunications Industry. Ive been a Public Servant working in the application of information and technology a National Security provisions nd imal security provisions serving as the managing director at the University Software institute where we focus on partnering with government academia and eighth research to improve security and the Computer Systems and networks. The sector is made of Companies Suppliers that made a possible and because of the industry is responsible for the threat of information its linked to how we work, play and live. It plays a fundamental role in operation to society and ms. Linked to families. These devices have been competing within the competinhewithin the surface and the responsibility which comes to participate in the overall protection of its efforts. Ultimately, the supply chain for the Communications Industry is vital to achieving security. Historically, checks and balances a supply chain have been procedural justice licenses, warranties and the reputatio and recently assured the service failures. Unfortunately, these controls are increasingly inaccurate of the Communications Technology in the services that had critical capabilities in this industry. An ever expanding supply chain means the external dependencies must be rigorously measured and managed for organization to remain resilient. This concludes areas in manufacturing and integration of the supply chain and Service Supply chains and the supply chains. Ramifications of an attack anywhere on the infrastructure is well beyond the plane of origin and the potential to reflect entire, nations. This is private citizens, we must address the software in services as well. The bills today include the secure Communications Network back in 2019 and the sharing act are a very good first step in the security. As the etities to get a little midsuit by change they have resilience and criteria in every stage of development in supply of information and Communications Technology. Well continue to be the forward meaning of this software and supply chain efforts within government and the industry. Attacks against our supply chains unite and suppliers in search of scalable needs for i ct risks and the negligence. Suppliers need standardize methods about common issues related to the hardware and Sof