This bill establishes a working group to combat the use of digital assets and emerging technologies for terrorism and illicit financing, and requires a report and strategy to prevent rogue actors from evading sanctions using these technologies.
Zachary (Zach) Nunn
Representative
IA-3
The Financial Technology Protection Act of 2025 establishes an Independent Financial Technology Working Group to Combat Terrorism and Illicit Financing, tasked with researching and developing proposals to counter illicit uses of digital assets and emerging technologies. It also requires a report and strategy from the President on how these technologies could be used to evade sanctions and finance terrorism, along with measures to prevent such illicit activities. The Act defines key terms related to digital assets, emerging technologies, and illicit activities to provide clarity and ensure effective implementation. The goal of the act is to protect the US financial system and national security.
The "Financial Technology Protection Act of 2025" is on the table, aiming to tighten the screws on terrorists and criminals using digital assets and new tech for illegal activities. This legislation, detailed in SEC. 2, proposes setting up a temporary body called the Independent Financial Technology Working Group. This group, with a four-year lifespan, would bring together government bigwigs, tech industry players, and privacy advocates to research the illicit use of these financial tools and cook up new legislative and regulatory fixes. Additionally, SEC. 3 mandates that within 180 days of the bill's enactment, the President must deliver a report and a strategy to Congress on how to stop states, terrorist groups, and others from using digital assets to dodge sanctions or fund their dirty work.
So, who exactly is in this working group outlined in SEC. 2? Think of it as a financial crime-fighting Avengers, but for the digital age. It’s chaired by the Treasury's Under Secretary for Terrorism and Financial Crimes and includes senior folks from nearly every major federal law enforcement and intelligence agency – the DOJ, FBI, DEA, DHS, Secret Service, State Department, and National Intelligence. But it's not just a government huddle. The bill requires at least five members from the private and non-profit sectors, representing financial technology (FinTech) companies, blockchain intelligence firms (the ones who trace crypto transactions), traditional banks, research organizations, and, importantly, groups focused on individual privacy and civil liberties. The Secretary of the Treasury can also appoint additional members. Their job description? To dive deep into how terrorists and criminals are exploiting digital assets and then to propose concrete legislative and regulatory changes. They'll be submitting annual reports for three years, followed by a final report before the group disbands after four years, though this could be extended if they need more time to wrap up.
Beyond the working group, SEC. 3 of the bill puts the executive branch on a tight deadline. Within 180 days – that's about six months – the President, working through the Treasury Secretary and consulting with the new working group, has to submit a hefty report to Congress. This report needs to detail how digital assets (like cryptocurrencies) and other emerging technologies could be exploited by countries, non-state actors, and terrorist organizations to sidestep international sanctions, bankroll terrorism, launder money, or otherwise threaten U.S. national security. It’s not just about identifying problems; the report must also lay out a U.S. strategy to prevent these illicit uses. Good news for transparency: the unclassified part of this report has to be publicly available on the Treasury's website in easy-to-download formats. Two years after the bill passes, the Treasury Secretary also has to brief Congress on how that strategy is being implemented.
SEC. 4 of the Act lays down some key definitions. A "digital asset" is broadly defined as any digital representation of value on a crypto-secured ledger. "Emerging technologies" refers to a list maintained by the National Science and Technology Council. The definition of "illicit use" is pretty comprehensive, covering fraud, darknet market transactions, money laundering, funding illegal activities, sanctions evasion, and even transactions related to child sexual abuse material. Crucially, it also includes "any other financial transaction involving the proceeds of specified unlawful activity," which ties into existing anti-money laundering laws like section 1956 of Title 18, U.S. Code. This means the bill isn't necessarily inventing new categories of crime, but rather ensuring existing laws apply robustly to these new technologies.
For everyday users of digital assets or those working in FinTech, this bill signals more focused attention from regulators and law enforcement. While the aim is to target criminals, the research and proposals from the working group could lead to new rules that affect everyone. The inclusion of privacy advocates in the working group is a nod to balancing security with civil liberties, but how that balance plays out in practice will be key. The broad definition of "illicit use," while legally grounded, means that the net cast could be wide, potentially increasing scrutiny on a range of digital transactions. The challenge will be crafting rules that are effective against bad actors without stifling innovation or making digital finance overly burdensome for legitimate users and businesses.