Codify — Article

Securing Global Telecommunications Act mandates U.S. strategy to promote trusted networks

Requires the State Department to lead a 90‑day, interagency strategy and two reports to help allies, donors, and U.S. agencies counter untrusted telecom suppliers and influence at the ITU.

The Brief

The Securing Global Telecommunications Act directs the Secretary of State to produce, within 90 days of enactment, a ‘‘Strategy to Secure Global Telecommunications Infrastructure’’ to promote use of trusted telecom infrastructure outside the United States. The statute requires the State Department to consult specified agencies — including the Export‑Import Bank, DFC, USAID, TDA, the FCC, and the Commerce Department’s communications office — and to cover mobile networks (including Open RAN and rip‑and‑replace financing), data centers, 6G, and space/stratospheric connectivity.

The bill also orders two companion reports due on the same 90‑day timetable: one assessing Chinese and Russian efforts to expand the International Telecommunication Union’s remit and influence, and another identifying opportunities for allied multilateral coordination and joint financing to favor trusted vendors. For practitioners, the Act turns diplomatic tools and development finance mechanisms into explicit instruments of telecom supply‑chain competition and standard‑setting strategy — while leaving key implementation choices, funding sources, and enforcement mechanisms unspecified.

At a Glance

What It Does

The bill requires the Secretary of State to lead an interagency effort and submit a Strategy within 90 days to promote trusted telecommunications infrastructure abroad; it specifies topic areas to be addressed and mandates two additional reports on ITU influence and multilateral coordination. The Strategy must be informed by, but led by, State and use the policy and technical input of agencies with finance and telecom expertise.

Who It Affects

Federal agencies involved in export and development finance (EXIM, DFC, USAID, TDA), telecom regulatory and policy offices (FCC, NTIA/Commerce), U.S. and allied telecom vendors competing for overseas contracts, and foreign governments that procure mobile networks, data centers, or satellite connectivity. Standard‑setting bodies and ITU member states are also targeted by the language.

Why It Matters

The Act institutionalizes use of U.S. diplomatic and finance tools to shift global procurement toward ‘‘trusted’’ vendors and to push back on perceived Chinese and Russian influence in the ITU. Compliance officers, export finance teams, and international program leads will need to align projects and proposals with this strategy if implemented.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The Act creates three related deliverables, all on a tight 90‑day timetable: (1) a State‑led Strategy to promote secure telecommunications infrastructure abroad; (2) a report assessing China and Russia’s efforts to expand the ITU’s scope and influence; and (3) a report identifying ways U.S. agencies and allies can coordinate financing and diplomacy to support trusted vendors. State must convene specific agencies — EXIM, DFC, USAID, TDA, the FCC, and Commerce’s communications office — and use their policy tools and technical expertise to shape the Strategy.

Substantively, the Strategy must address four technology domains. For mobile networks it must consider Open RAN promotion while acknowledging security risks from ‘‘untrusted’’ vendors, and it must outline financing options to support rip‑and‑replace projects and incentivize trusted suppliers.

It must also cover data centers, sixth‑generation (6G) technologies and allied market leadership, and rapid‑response connectivity via low‑Earth‑orbit satellites and high‑altitude platforms. That mix ties standard‑setting efforts, procurement incentives, and development finance tools together rather than treating them as separate policy tracks.The report on the ITU asks State to catalog how China and Russia seek to expand the ITU’s remit into internet governance, use private sector actors to influence votes and standards, and place their nationals in bodies that shape outcomes.

That report must be submitted in unclassified form but may include a classified annex. The multilateral coordination report is explicitly practical: it must identify joint financing and diplomatic avenues so allied development finance and export credit tools can help trusted vendors win bids, and suggest ways to embed ICT priorities into partners’ development finance programs.Operationally, the Act makes State the lead but prescribes consultation rather than binding authorities for other agencies.

It therefore creates impetus and political cover for coordinated action but leaves funding, program design, and execution to the consulted agencies, Congress, and existing authorizations. In practice, implementation will hinge on whether EXIM, DFC, USAID and allies provide capital and design terms that make trusted bids competitive in price and risk profile versus incumbent suppliers.

The Five Things You Need to Know

1

The Secretary of State must deliver the Strategy and two reports within 90 days of enactment to specified House and Senate committees.

2

The Strategy must be developed in consultation with EXIM, the Development Finance Corporation, USAID, the Trade and Development Agency, the FCC, and the Assistant Secretary of Commerce for Communications and Information.

3

Section 3(c)(1) requires the Strategy to address Open RAN promotion, security risks from untrusted vendors, and financing tools to support ‘rip‑and‑replace’ projects.

4

Section 4 mandates an unclassified report (with an optional classified annex) cataloging Chinese and Russian efforts to expand ITU jurisdiction over internet governance and to use private actors to influence ITU outcomes.

5

Section 5 orders a report identifying concrete multilateral coordination opportunities — especially joint financing and embedding ICT in development finance — to help trusted vendors win overseas infrastructure contracts.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Gives the Act its name, the Securing Global Telecommunications Act. This is purely formal but signals congressional intent: the title frames the statutory purpose as security‑focused rather than market or trade‑focused, which matters for how agencies prioritize objectives when developing the Strategy.

Section 2

Sense of Congress on technology leadership and threats

Sets out congressional findings and political objectives, emphasizing U.S. leadership, the national‑security risk posed by vendors linked to the Chinese Communist Party, and the need for multilateral cooperation. While nonbinding, these findings constrain how agencies interpret the Strategy’s aims — they create a clear mandate to prioritize security and allied coordination over purely commercial or market‑neutral approaches.

Section 3

Strategy to Secure Global Telecommunications Infrastructure

Requires a State‑led Strategy delivered in 90 days and prescribes mandatory consultation with EXIM, DFC, USAID, TDA, the FCC, and Commerce’s communications office. It enumerates subject areas (mobile/Open RAN, data centers, 6G, LEO/balloon/aerostat connectivity) and specific policy levers such as financing mechanisms and multilateral engagement. Practically, this provision compels interagency coordination and sets the agenda, but it does not appropriate funds or grant new execution authority to any agency — implementation depends on existing budgets and authorities across the consulted entities.

2 more sections
Section 4

Report on Chinese and Russian influence at the ITU

Directs State to produce an unclassified report (classified annex allowed) describing efforts by China and Russia to expand ITU remit to internet governance, leverage private firms and market power for favorable ITU outcomes, and place nationals in influential ITU positions. Mechanically, it requires evidence collection and assessment of influence operations, which will inform diplomatic and technical countermeasures; however, the statute does not define thresholds of influence nor mandate specific counteractions, leaving agencies discretion on how to respond.

Section 5

Report on multilateral coordination and financing

Mandates a report outlining opportunities for allied collaboration to finance and promote trusted ICT infrastructure, including joint financing, incorporating ICT into development finance, and diplomatic strategies. This section foregrounds the use of export credit and development finance as competitive tools, signaling to EXIM, DFC, and partners that coordinated funding packages are a congressional priority — but it stops short of prescribing financing terms or binding commitments by those institutions.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Foreign Affairs across all five countries.

Explore Foreign Affairs in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • U.S. and allied ‘trusted’ telecom vendors — the Strategy directs U.S. diplomatic and finance tools toward making their bids more competitive, potentially increasing contract opportunities and market share abroad.
  • Allied and partner governments seeking alternatives to incumbent suppliers — they may receive access to joint financing options, diplomatic support, and technical assistance that ease procurement of secure networks.
  • U.S. national security and intelligence communities — the bill creates a formal mechanism to surface supply‑chain risks, influence standard‑setting bodies, and prioritize secure infrastructure in U.S. foreign policy.
  • Multilateral lenders and development agencies aligned with U.S. priorities — the Act creates opportunities for closer programmatic alignment and new ICT‑focused project pipelines.

Who Bears the Cost

  • Federal agencies named for consultation (EXIM, DFC, USAID, TDA, FCC, Commerce) — they must allocate staff time, technical analysis, and potentially constrained balance‑sheet capacity to implement Strategy recommendations without new appropriations.
  • U.S. taxpayers and allied treasuries — making trusted vendors price‑competitive overseas often requires subsidized financing, guarantees, or concessional terms that increase public financial exposure.
  • Recipient countries that prioritize lowest‑cost bids — they may face higher short‑term costs or stricter procurement conditions if they switch to trusted vendors, complicating development tradeoffs.
  • Existing incumbent vendors tied to Chinese and Russian supply chains — the statute seeks to reduce their market dominance abroad, which will pressure their international revenues and partnerships.

Key Issues

The Core Tension

The central dilemma is between securing global telecommunications infrastructure (protecting networks, standards, and national security) and preserving open, competitive, and affordable markets for recipient countries; advancing ‘‘trusted’’ suppliers through diplomacy and subsidized finance can reduce security risk but raises costs, politicizes technical standard‑setting, and risks alienating partners who prioritize price and neutrality.

The Act bundles diplomacy, export and development finance, regulatory expertise, and standard‑setting influence into a single strategy, but leaves the hardest choices unmade. It does not appropriate funds, amend EXIM or DFC authorities, or provide metrics for what counts as a ‘‘trusted’’ vendor, so the Strategy risks becoming a menu of recommendations with uneven follow‑through unless Congress or agencies allocate resources and set procurement criteria.

The 90‑day deadline creates political momentum, but producing actionable financing mechanisms, lender coordination, or operational rip‑and‑replace programs in that timeframe will be difficult.

Operational tensions also arise between security and market realities. Trusted vendors often charge premiums or present different supply‑chain constraints; recipient governments balancing cost, speed, and political relationships may resist conditional financing.

The bill’s emphasis on countering influence at the ITU and public calls-out of China and Russia could harden geopolitics around technical standards, making some countries wary of joining explicitly aligned financing or procurement schemes. Finally, the Act centralizes strategy at State while relying on agencies with different missions and legal constraints — aligning legal authorities, budgets, and risk tolerances across those institutions will be the key implementation challenge.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.