The Protecting Stolen Encrypted Data Act of 2026 authorizes the U.S. government to identify, recover, manipulate, or destroy sensitive data and classified information unlawfully held by foreign entities.
Margaret "Maggie" Hassan
Senator
NH
The Protecting Stolen Encrypted Data Act of 2026 authorizes the U.S. government to identify, recover, manipulate, or destroy sensitive personal and classified data that has been unlawfully obtained by foreign entities. This legislation directs the Secretary of Defense and the Director of National Intelligence to develop strategic frameworks for addressing these security threats to protect the economic and national interests of the United States.
The Protecting Stolen Encrypted Data Act of 2026 aims to tackle a nightmare scenario: a foreign entity hacks a major hospital or bank, walks away with your biometric or financial data, and sits on it while trying to crack the encryption. This bill tasks the Secretary of Defense and the Director of National Intelligence with creating a game plan to find this stolen data and, if they decide it's in the national interest, take direct action to destroy, recover, or even 'manipulate' it while it’s still in the hands of the hackers. While it sounds like a digital rescue mission, the bill grants the government significant discretion over how it handles your private information once it’s been compromised.
Digital Search and Rescue Under Section 2, the government must build a strategy to track down 'covered data'—which includes your medical records, trade secrets, and even fingerprints—that has been illegally taken by foreign groups. If the Pentagon and intelligence community agree it’s a matter of national or economic security, they can move in to wipe the data or try to get it back. For a small business owner whose proprietary software code was stolen in a ransomware attack, this could theoretically mean the government helps neutralize the threat before the code is leaked to a competitor. However, the bill is notably vague on what 'manipulating' data actually looks like. It raises the question of whether the government might alter files in a way that makes them useless to you, the original owner, just to ensure they are useless to the thief.
The 'When Practicable' Loophole The bill does include a provision to inform the lawful owners of the data when the government plans to step in. But there is a catch: Section 2 states this only needs to happen 'when practicable.' In the real world, this means if you are a patient whose sensitive health history was stolen, the government could be actively 'manipulating' your records on a foreign server without ever telling you, provided they decide a heads-up isn't feasible. This lack of a hard requirement for notification leaves a lot of room for people to be kept in the dark about what is happening to their most personal information.
High Stakes and Unanswered Questions Because the bill is light on technical safeguards, the implementation phase will be critical. There is no mention of judicial oversight or a 'double-check' system before the government decides to destroy data that belongs to a private U.S. citizen. For tech workers or researchers, the risk is that a recovery attempt could backfire, inadvertently corrupting the only existing copies of valuable work. While the bill requires a report to Congress within a year, much of that report can be kept in a 'classified annex,' meaning the public may never fully know how often the government is reaching into foreign databases to tinker with American data.