PolicyBrief
H.R. 906
119th CongressApr 28th 2025
Foreign Adversary Communications Transparency Act
HOUSE PASSED

This bill mandates the FCC to create and maintain a public list of entities holding communications licenses that have ownership or control by foreign adversaries.

Robert Wittman
R

Robert Wittman

Representative

VA-1

LEGISLATION

FCC Must Publicly List Telecom Companies Tied to Foreign Adversaries Within 120 Days

The Foreign Adversary Communications Transparency Act is all about pulling back the curtain on who actually owns and controls the companies that hold crucial U.S. communications licenses—think broadcast, wireless, and other authorizations granted by the Federal Communications Commission (FCC). The core action is simple: The FCC must create and maintain a public list of any company holding an FCC license that is controlled by a “covered entity” linked to a designated foreign adversary. The clock starts ticking fast, requiring the FCC to post an initial list within 120 days of the law passing, based on existing reporting or national security agency findings. This isn't just a one-time thing; the FCC must also create new rules within 18 months to identify a much broader range of licensed companies with reportable foreign ownership stakes, making this a permanent transparency requirement.

The National Security Filter

This bill uses a national security lens to define who gets listed. A "Covered Entity" is essentially the government or any company organized under the laws of a "Covered Country"—which refers to specific nations already flagged in existing U.S. national security statutes (Title 10, U.S. Code). The immediate listing requirement (within 120 days) is particularly important because it allows the FCC to include companies where a national security agency has determined that a covered entity has control, even if that control isn't reflected in the typical ownership or voting stakes the FCC usually tracks. This is a big deal: it means the government can bypass standard ownership metrics to flag a company based on a security determination. For a company that relies on an FCC license to operate—say, a regional wireless provider—getting on this public list could be a serious operational headache and potentially impact business relationships.

Fast-Tracking the Paperwork

One detail that policy wonks will notice is the exemption from standard administrative oversight. Usually, when a federal agency like the FCC decides to start gathering new information from businesses, they have to go through a lengthy review process known as Chapter 35 of Title 44 (the Paperwork Reduction Act). This law is designed to prevent government agencies from drowning businesses in unnecessary forms. However, this bill explicitly exempts the FCC's information gathering for this specific purpose from that standard review. On the one hand, this means the FCC can move quickly to implement the law and get the transparency list published without bureaucratic delays. On the other hand, it reduces an important layer of outside scrutiny on the FCC's data collection methods, meaning the agency's requests might be less streamlined or more burdensome for the affected companies than they would be otherwise.

What This Means for Business and the Public

For the average person, this bill increases transparency regarding the infrastructure that delivers their cell service, internet, and broadcast media. If a major communications provider has ties to a foreign adversary, the public will now have a clear, centralized place to find that information. For companies with foreign investment, especially subsidiaries of firms originating in a "Covered Country," this means increased scrutiny and the potential for public listing, even if their operations are entirely domestic and above board. The initial phase relies heavily on the judgment of national security agencies to determine “control” without a clear ownership threshold, which gives those agencies significant power to publicly identify entities. This move signals a clear prioritization of national security concerns over standard administrative processes when dealing with foreign influence in critical communications infrastructure.