[Congressional Bills 119th Congress] [From the U.S. Government Publishing Office] [S. 2593 Introduced in Senate (IS)] <DOC> 119th CONGRESS 1st Session S. 2593 To direct the Secretary of Commerce to submit a report assessing vulnerabilities to the electric grid in the United States from certain Internet-connected devices and applications, and for other purposes. _______________________________________________________________________ IN THE SENATE OF THE UNITED STATES July 31, 2025 Mr. Scott of Florida introduced the following bill; which was read twice and referred to the Committee on Banking, Housing, and Urban Affairs _______________________________________________________________________ A BILL To direct the Secretary of Commerce to submit a report assessing vulnerabilities to the electric grid in the United States from certain Internet-connected devices and applications, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ``Preventing Remote Operations by Threatening Entities on Critical Technology for the Grid Act'' or the ``PROTECT the Grid Act''. SEC. 2. FINDINGS; PURPOSES. (a) Findings.--Congress finds that-- (1) the rapid proliferation of high-wattage IoT devices, such as electric vehicle chargers, clothes dryers, smart air conditioners, water heaters, ovens, and similar appliances, has dramatically increased the number of connected devices in households in the United States; (2)(A) smart appliance applications and software platforms increasingly serve as remote control interfaces; and (B) when those applications and software platforms originate from companies operating under the jurisdiction or direction of foreign adversaries they offer a pathway for large-scale, coordinated manipulation of power demand, threatening grid stability; (3)(A) in certain foreign adversary jurisdictions, particularly the People's Republic of China, private companies are subject to formal political oversight through mechanisms such as, in the case of the People's Republic of China, embedded Chinese Communist Party committees and executive-level Chinese Communist Party leadership; and (B) those arrangements blur the lines between commercial activity and state-directed strategic interests; (4) further elevating the risk to the United States electric grid is the 2017 Cybersecurity Law of the People's Republic of China (commonly referred to as the ``Chinese Cybersecurity Law''), which mandates that Chinese companies store customer data domestically and grant Chinese state authorities broad access to those data; (5) the legal and political structures described in paragraphs (3) and (4) increase the likelihood that connected home appliances could be leveraged by foreign adversaries to target critical infrastructure in the event of a conflict with the United States; (6) companies controlled by foreign adversaries-- (A) are actively pursuing rapid deployment of high- wattage IoT devices that could be used to attack the electric grid in the United States; and (B) control more than 25 percent of the major appliance industry in the United States, which provides an established platform for quickly deploying those high-wattage IoT devices; (7) through smart applications, companies controlled by foreign adversaries-- (A) are actively collecting detailed consumer data on millions of people in the United States; and (B) have the ability to directly manipulate the demand of high-wattage devices on the electric grid; (8) as a result, foreign adversary-controlled applications for high-wattage IoT devices create significant risk of coordinated, deliberate, demand-manipulation attacks on the electric grid in the United States; (9) several academic studies from researchers at Princeton University, the Georgia Institute of Technology, and the University of California, Santa Cruz, point to significant risks of manipulation of demand via IoT (commonly referred to as ``MaDIoT'') attacks to manipulate power demand on the electric grid that could result in large-scale blackouts and potential damage to the electric grid; (10) it is therefore critical to protect energy infrastructure in the United States by ensuring that smart applications embedded in home appliances are secure and cannot serve as an entry point for foreign adversaries; and (11) failing to address the vulnerabilities presented by those smart applications could lead to grid instability, frequency imbalances, cascading system failures, and, ultimately, catastrophic disruptions that jeopardize both public safety and the broader economy of the United States. (b) Purposes.--The purposes of this Act are-- (1) to harmonize and reinforce existing national security initiatives aimed at securing the domestic information and communications technology and services (commonly referred to as ``ICTS'') supply chain against manipulation of demand, especially by the People's Republic of China; and (2) to direct the Secretary of Commerce, in consultation with other relevant Federal officials, to submit to Congress a report containing findings and recommendations to ensure that network-connected home appliances in households in the United States do not serve as a conduit for activities by foreign adversaries or jeopardize the stability of the electric grid in the United States. SEC. 3. DEFINITIONS. In this Act: (1) Consumer product.--The term ``consumer product'' has the meaning given the term in section 3(a) of the Consumer Product Safety Act (15 U.S.C. 2052(a)). (2) Covered entity.--The term ``covered entity'' means an entity that-- (A) is subject to the jurisdiction of a foreign adversary; (B) is directly or indirectly operating on behalf of a foreign adversary; or (C) is owned by, directly or indirectly controlled by, or otherwise subject to the direction or influence of, a foreign adversary. (3) Critical infrastructure.--The term ``critical infrastructure'' has the meaning given the term in subsection (e) of the Critical Infrastructures Protection Act of 2001 (42 U.S.C. 5195c). (4) Foreign adversary.--The term ``foreign adversary'' means-- (A) any covered nation (as defined in section 4872(f) of title 10, United States Code); and (B) the Bolivarian Republic of Venezuela while Nicolas Maduro Moros is in power. (5) Foreign adversary-controlled application.--The term ``foreign adversary-controlled application'' means a website, desktop application, mobile application, or augmented or immersive technology application that is operated, directly or indirectly (including through a parent, subsidiary, or affiliate (as those terms are defined in section 230.405 of title 17, Code of Federal Regulations (as in effect on the date of enactment of this Act))), by a covered entity. (6) High-wattage iot device.--The term ``high-wattage IoT device'' means any Internet-connected appliance or device that is capable of consuming or controlling electrical power at a level exceeding 500 watts, regardless of whether the device is used or designed for use in residential or commercial applications. (7) IoT.--The term ``IoT'' means Internet of Things. (8) Relevant federal official.--The term ``relevant Federal official'' means-- (A) any Federal official described in section 1(a) of Executive Order 13873 (84 Fed. Reg. 22689; relating to securing the information and communications technology and services supply chain) (as in effect on the date of enactment of this Act) (or a designee of the applicable Federal official); and (B) the head (or a designee of the head) of any other Federal department or agency that, in the determination of the Secretary of Commerce, is relevant to the purposes of this Act. SEC. 4. REPORT ON NATIONAL SECURITY RISKS POSED BY FOREIGN ADVERSARY- CONTROLLED APPLICATIONS WITH THE CAPABILITY OF CONTROLLING HIGH-WATTAGE IOT DEVICES. (a) In General.--Not later than 270 days after the date of enactment of this Act, the Secretary of Commerce, in coordination with other relevant Federal officials, shall submit to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Energy and Commerce of the House of Representatives a report assessing the national security risks associated with foreign adversary-controlled applications with the ability to attack or undermine critical infrastructure in the United States. (b) Considerations.--In preparing the report under subsection (a), the Secretary of Commerce shall consider, at a minimum-- (1) the extent of deployment of high-wattage IoT devices across the United States; (2) risks relating to foreign adversary-controlled applications, especially those incorporated into consumer products that could be used to attack or otherwise destabilize the electric grid; (3) potential impacts of those risks and any other relevant vulnerabilities on national security, including the risks of frequency imbalances, cascading failures, and other disruptions to critical infrastructure; and (4) public comments and input from industry experts, domestic producers, importers, consumer groups, and other stakeholders regarding the security of, and the extent of foreign influence over, foreign adversary-controlled applications and high-wattage IoT devices. (c) Recommendations.--The report submitted under subsection (a) shall include recommendations for mitigation measures to address any identified national security risks, which may include-- (1) an assessment of how Executive Order 13873 (84 Fed. Reg. 22689; relating to securing the information and communications technology and services supply chain) (as in effect on the date of enactment of this Act) may be applied to IoT devices, as such devices apply to the electric grid, to include restrictions or conditions on transactions directly involving foreign adversary-controlled applications in high- wattage IoT devices; (2) specifically restricting the procurement by the Federal Government of consumer products with a foreign adversary- controlled application; (3) certification or labeling requirements for high-wattage IoT devices; and (4) any other proposal, as determined necessary by the Secretary of Commerce, in consultation with other relevant Federal officials. SEC. 5. CODIFICATION OF EXECUTIVE ORDER 13873. (a) In General.--The provisions of Executive Order 13873 (84 Fed. Reg. 22689; relating to securing the information and communications technology and services supply chain) (as in effect on the date of enactment of this Act) are enacted into law. (b) Publication.--In publishing this Act in slip form and in the United States Statutes at Large pursuant to section 112 of title 1, United States Code, the Archivist of the United States shall include after the date of approval at the end an appendix setting forth the text of the Executive order referred to in subsection (a) (as in effect on the date of enactment of this Act). <all>