This bill authorizes a coordinated national-security regime that restricts certain outbound investment flows to countries of concern and creates a sanctions pathway for designated foreign actors. It pairs a new prohibition/notification framework for covered transactions with expanded authority for the President and Treasury to bar or punish investments that materially support military, surveillance, or dual-use capabilities.
The change matters because it shifts the regulatory focus from inbound to outbound capital: private U.S. investment will face affirmative constraints and mandatory reporting in sectors the government deems sensitive. That shift will affect investment strategy, compliance programs, and multilateral economic coordination, while embedding a suite of reporting, enforcement, and interagency processes to operationalize the controls.
At a Glance
What It Does
The bill gives the President IEEPA-based sanction tools and directs the Secretary of the Treasury to promulgate rules that (1) can prohibit U.S. persons from knowingly engaging in ‘covered national security transactions’ in defined technology areas, and (2) require written notifications for other covered investments. It amends the Defense Production Act by adding a Title VIII that establishes the prohibition, notification, enforcement, and public database authorities.
Who It Affects
Affected parties include U.S. persons (individuals and entities), controlled foreign entities, venture and private-equity funds, banks providing ancillary financial services, and firms operating in semiconductor, AI, quantum, high-performance computing, and hypersonics supply chains. Regulators in Treasury and Commerce must stand up the rulemaking, review, and enforcement infrastructure.
Why It Matters
This statute would be a major expansion of U.S. outbound controls—moving beyond export controls and OFAC listings to regulate private capital flows into strategic technology nodes. It creates new compliance traps (knowledge standards, joint-venture rules, and fund-level exposures) and raises questions about extraterritorial reach and coordination with allies.
More articles like this one.
A weekly email with all the latest developments on this topic.
What This Bill Actually Does
Title structure and lead agency: The Act centers Treasury as the implementing agency and tasks the Secretary, in consultation with Commerce and State and other agencies, to write the implementing regulations. It authorizes funding and limited hiring to operationalize outreach, rulemaking, and enforcement.
The Act sunsets after seven years, making it a time-limited experiment unless reauthorized.
Definitions and covered activity: The bill establishes layered definitions that drive scope. A ’covered foreign person’ is tied to country-of-concern status, party or state control, or 50% ownership thresholds and must also have knowingly engaged in defense-related or surveillance technology activity.
A ‘covered national security transaction’ is defined broadly to capture equity acquisitions, certain debt arrangements that confer governance or profit rights, joint ventures that will engage in specified technologies, conversions of debt to equity, asset development in a country of concern intended to establish covered entities, and limited partner exposures in funds likely to invest in targeted sectors. The statute also carves out many exceptions—de minimis transactions, ordinary banking or ancillary financial services, publicly traded securities on regulated exchanges, and certain intragroup transfers subject to regulatory definition.Prohibition, notification, and regulatory mechanics: The Secretary may prohibit U.S. persons (including controlled foreign entities) from knowingly engaging in covered transactions in ‘‘prohibited technologies.’’ For transactions not prohibited but deemed note-worthy, the Secretary must promulgate a mandatory notification regime: once regulations are final, a U.S. person that knowingly completes a covered national security transaction in a prohibited or notifiable technology must submit a written notification within a 30‑day window.
The statute requires regulations to be issued within a prescribed period (450 days) and directs the implementing rules to include public notice and comment, non-binding confidential feedback channels, specific self-disclosure processes and letters, and an explicit provision that the Secretary bears the burden of proof in enforcement actions.Enforcement, transparency, and international engagement: Penalties mirror IEEPA civil fines and allow compelled divestment and referral for judicial relief. The statute contemplates a publicly accessible, non-exhaustive database of covered foreign persons with a petition process for inclusion or removal and a confidential evidence submission channel.
Regular reporting obligations to Congress are layered: annual and biennial reports across multiple titles, lists of notifications and enforcement actions, technology assessments (including recommendations on prohibited versus notifiable status), and a requirement to pursue allied coordination and a multilateral engagement strategy. Finally, the Act preserves existing presidential authorities under other federal laws and carves out intelligence activities and official U.S. government business from prohibitions.
The Five Things You Need to Know
The Secretary of the Treasury may prohibit a U.S. person (and controlled foreign entities) from knowingly engaging in a ‘covered national security transaction’ in a specified ‘prohibited technology’ and may impose IEEPA-style penalties and divestment.
Regulations implementing the prohibition and notification regimes must be issued within 450 days of enactment and must include procedures for confidential, non-binding feedback and standardized self-disclosure letters that affect enforcement outcomes.
A U.S. person that knowingly completes a covered transaction in a prohibited or notifiable technology must submit a written notification to Treasury no later than 30 days after completion (once regulations are effective), subject to statutory exceptions.
The statute authorizes a publicly accessible, non-exhaustive database of covered foreign persons, plus a mechanism for petitioning for inclusion or removal and a confidential channel for third-party submissions of evidence.
The Act requires extensive reporting: the President must report annually on whether Non‑SDN Chinese Military‑Industrial Complex Companies are ‘covered foreign persons’, and Treasury must provide periodic public and classified reports documenting notifications, enforcement actions, and technology assessments.
Section-by-Section Breakdown
Every bill we cover gets an analysis of its key sections.
General governance, funding, and sunset
This title names Treasury as the lead implementer, authorizes $150 million across the first two post-enactment fiscal years (with transfer authority to Commerce), and creates limited hiring flexibilities. It also contains severability, a seven-year statutory termination date, and a Sense of Congress clause framing the purpose. Practically, the funding and hiring authorization signal that Congress anticipates a substantial operational build-out inside Treasury and Commerce to manage outreach, rulemaking, and enforcement.
IEEPA sanctions pathway and definitions
Title II gives the President explicit authority to impose IEEPA-based sanctions against ‘‘covered foreign persons’’ and to prohibit U.S. persons from buying substantial equity or debt of those designated. It sets criminal and civil penalties by cross-reference to IEEPA, excludes intelligence and official U.S. government activities, and requires an annual classified/unclassified report on whether entities on the Non‑SDN Chinese Military‑Industrial Complex Companies List meet the covered-person standard. This title creates a complementary sanctions toolset that can be used alongside the notification/prohibition regime in Title III.
Prohibition authority and rulemaking mechanics (DPA Title VIII)
This is the operational core: the Secretary may prohibit U.S. persons and their controlled foreign entities from knowingly engaging in covered national security transactions in ‘‘prohibited technologies.’’ The section prohibits evasion, authorizes national-interest exemptions (with rapid congressional notice), and requires Treasury to write regulations via notice-and-comment. The rules must include non-binding confidential feedback, self-disclosure procedures that inform mitigation, instructions to minimize duplicative compliance burdens, and place the burden of proof for enforcement on the Secretary—an administrative law choice that shapes adjudicatory risk for regulated parties.
Mandatory notification, completeness review, and reporting
Treasury must issue mandatory notification rules (within the 450-day window) requiring written submission within 30 days of completion for specified covered transactions unless the Secretary has prohibited the activity. The regulations must provide for completeness checks and correction cycles, a process to identify non-notified but discoverable transactions, and annual reporting to Congress that catalogues notifications, enforcement actions, technology definitions, and trend analysis. The reporting obligation also mandates testimony from Treasury and Commerce officials for a multiyear period to keep Congress informed on impacts.
Multilateral coordination, public database, confidentiality, and penalties
These sections task Treasury with developing a strategy for allied coordination, establishing a public (non-exhaustive) database of covered foreign persons with petition and evidence-submission processes, and laying out confidentiality rules for filings—while allowing classified sharing with allies under strict controls. Penalties mirror IEEPA fines, permit compelled divestment, and allow DOJ civil actions on the President’s direction. The statute also clarifies that the new regime supplements, not supplants, existing presidential and statutory authorities.
Securities-related reporting and Non‑SDN list review
This title requires biennial presidential reports on whether entities listed on various U.S. agency lists (e.g., Commerce’s Entity List, Military End-User list, FCC Covered List, and the Uyghur Act list) should be placed on the Non‑SDN Chinese Military‑Industrial Complex Companies List. It demands an interagency sharing process, a risk-based prioritization framework for reviews, and inclusion of criteria used for listing—effectively tightening coordination between sanctions and export-control designations and securities-era listing policies.
This bill is one of many.
Codify tracks hundreds of bills on Foreign Affairs across all five countries.
Explore Foreign Affairs in Codify Search →Who Benefits and Who Bears the Cost
Every bill creates winners and losers. Here's who stands to gain and who bears the cost.
Who Benefits
- U.S. national security agencies — receive statutory tools, reporting, and a public database to trace foreign entities’ ties to sensitive technologies and to block capital that could accelerate adversary capabilities.
- Domestic producers of strategic technologies (semiconductor, AI, quantum, HPC, hypersonics) — gain a potential supply‑side protection if Treasury’s actions deter foreign acquisition of critical know‑how or capital that would undercut U.S. industrial leadership.
- Allied governments — receive a framework and U.S. engagement strategy to coordinate comparable outbound controls and intelligence-sharing mechanisms that could strengthen coalition resilience against technology transfer risks.
- Investors and fund managers seeking regulatory clarity — benefit from formalized feedback, self-disclosure processes, and an explicit rulemaking pathway that can reduce regulatory uncertainty once rules are published.
Who Bears the Cost
- U.S. institutional and private investors (venture, private equity, hedge funds) — face expanded compliance obligations, potential divestment mandates, and legal exposure for ‘knowledge’ standards around investee activity.
- Multinational corporations with controlled foreign entities — must redesign governance and intra‑company funding practices to avoid prohibited transactions or to document acceptable intragroup transfers under forthcoming Treasury definitions.
- Financial intermediaries and banks — will incur operational costs to provide ancillary services (payments, custody, underwriting) with heightened screening and potential breakage for transactions linked to covered activities.
- Treasury and Commerce — absorb new administrative burdens (rulemaking, feedback channels, database maintenance, enforcement), likely requiring persistent budgets beyond the initial authorization to manage caseload and partner engagement.
Key Issues
The Core Tension
The central dilemma is between national-security urgency and economic openness: the bill aims to stop capital from accelerating adversary military and surveillance capabilities, but imposing broad outbound controls risks chilling legitimate investment, imposing heavy compliance costs on U.S. firms, and pushing transactions offshore—outcomes that can weaken, not strengthen, long-term U.S. competitive position if not implemented with a narrowly tailored, well-resourced, and internationally coordinated approach.
The bill deliberately delegates broad discretionary authority to Treasury and the President while also specifying deadlines, procedural guardrails, and reporting obligations. That design creates both flexibility and legal uncertainty: flexible regulatory definitions let agencies respond to rapidly evolving technologies, but open-ended standards (for example, what constitutes ‘‘knowledge’’ or a ‘‘notifiable technology’’) will generate litigation and compliance interpretation requests.
The self-disclosure and non-binding feedback mechanisms reduce the risk of catastrophic enforcement surprises, but their practical value depends on agency capacity and predictable treatment of disclosed conduct.
The Act balances secrecy and transparency unevenly. Confidential filings are broadly protected, which shields sensitive national security analysis but also limits public accountability and investor visibility.
The public database is explicitly non-exhaustive and subject to petition, which helps avoid false positives but also may leave market participants uncertain about whom to avoid. Finally, the extraterritorial footprint—rules reaching controlled foreign entities and fund interests—raises coordination challenges with allies and risks that capital will simply reroute through jurisdictions not covered by the statute, blunting intended protections absent robust multilateral uptake.
Try it yourself.
Ask a question in plain English, or pick a topic below. Results in seconds.