Lawmakers Introduce Legislation to Ban Chinese Nationals From Driving Trucks With US Military Cargo
.
Two Republican lawmakers have introduced legislation to prevent Communist China from exploiting U.S. transportation contracts for spying.
“My bill will require anyone handling military freight to be properly vetted to ensure our adversaries cannot gain access to valuable information.”
If enacted, the legislation would require the Federal Motor Carrier Safety Administration, in coordination with the Pentagon, to establish the “Secure Defense Freight Carrier Registry,” a registry for motor carriers that undergo “enhanced national security vetting” and are approved to handle the Pentagon’s freight.
Subsequently, any motor carrier, including prime contractors and subcontractors, would be barred from bidding on or performing Pentagon transportation contracts unless listed in the registry.
The vetting process would include screening for “ownership, control, or significant business relationships” with companies identified by the Pentagon’s blacklist of Chinese military companies operating directly or indirectly in the United States.
The legislation would also require that drivers and personnel with access to the Pentagon’s fleet “meet security standards comparable to those required under the Transportation Worker Identification Credential (TWIC) program.”
“This bicameral legislation closes that loophole by establishing a clear firewall between the Chinese Communist Party and Department of War contracts. American tax dollars should never benefit our greatest adversary at the expense of U.S. national security.”
Cotton and Stefanik serve on the armed services and intelligence committees in their respective chambers.
According to Stefanik’s office, the two lawmakers are working to have their legislation included in the fiscal year 2027 National Defense Authorization Act.
“A compromised video system could allow access to video and audio content which could reveal cargo contents, security processes, or company-specific logistics activity,“ the report states. ”These exposures are particularly relevant for trucking companies transporting high-value or time-sensitive goods.”
“A compromised router placed in a trucking depot, terminal, or dispatch office could be used as an access point into broader network environments, enabling attackers to move laterally into fleet management, logistics, or financial systems,” the report reads.
.


