Combatting Money Laundering in Cyber Crime Act of 2025
Download PDFSponsored by
Sen. Cortez Masto, Catherine [D-NV]
ID: C001113
Bill's Journey to Becoming a Law
Track this bill's progress through the legislative process
Latest Action
Invalid Date
Introduced
📍 Current Status
Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.
Committee Review
Floor Action
Passed Senate
House Review
Passed Congress
Presidential Action
Became Law
📚 How does a bill become a law?
1. Introduction: A member of Congress introduces a bill in either the House or Senate.
2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.
3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.
4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.
5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.
6. Presidential Action: The President can sign the bill into law, veto it, or take no action.
7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!
Bill Summary
Another masterpiece of legislative theater, courtesy of the esteemed members of Congress. Let's dissect this farce and reveal the underlying disease.
**Main Purpose & Objectives:** The Combatting Money Laundering in Cyber Crime Act of 2025 is a valiant effort to combat the scourge of cybercrime... or so it claims. In reality, this bill is a thinly veiled attempt to expand the authority of the United States Secret Service and further entrench the surveillance state.
**Key Provisions & Changes to Existing Law:**
1. Expansion of USSS Investigative Authorities (Section 2): Because what could possibly go wrong with giving more power to an already bloated and inefficient bureaucracy? 2. FINCEN Exchange (Section 3): A minor tweak to extend the statute of limitations for certain financial crimes, because who needs due process when you're fighting cybercrime? 3. International Financial Institutions (Section 4): A token gesture to "strengthen" international cooperation against money laundering, which will undoubtedly be used as a pretext for more invasive surveillance and data collection. 4. Report (Section 5): A mandatory report from the Government Accountability Office, because Congress loves to pretend it's holding itself accountable while actually just kicking the can down the road.
**Affected Parties & Stakeholders:**
1. The United States Secret Service: Gets more power and resources to "fight" cybercrime, which will likely be used to justify further overreach. 2. Financial Institutions: Will face increased regulatory burdens and scrutiny, because who needs a free market when you have Congress? 3. Law Enforcement: Will receive more funding and authority to "combat" money laundering, which will undoubtedly lead to more abuse of power and civil liberties erosion. 4. The American People: Will be subjected to further surveillance, data collection, and potential financial penalties for non-compliance with the ever-expanding web of regulations.
**Potential Impact & Implications:**
1. Increased Surveillance State: This bill is a Trojan horse for expanded government surveillance and control over digital transactions. 2. Regulatory Overreach: More burdensome regulations will stifle innovation, drive businesses underground, and create new opportunities for corruption. 3. Erosion of Civil Liberties: The expansion of USSS authority and increased data collection will further erode the Fourth Amendment and individual privacy rights.
In conclusion, this bill is a classic case of "legislative lupus" – a disease where politicians pretend to address a problem while actually exacerbating it. It's a cynical attempt to expand government power under the guise of fighting cybercrime, with predictable consequences for civil liberties and the economy. Bravo, Congress!
Related Topics
đź’° Campaign Finance Network
Sen. Cortez Masto, Catherine [D-NV]
Congress 119 • 2024 Election Cycle
No PAC contributions found
No committee contributions found
Donor Network - Sen. Cortez Masto, Catherine [D-NV]
Hub layout: Politicians in center, donors arranged by type in rings around them.
Showing 25 nodes and 28 connections
Total contributions: $97,654
Top Donors - Sen. Cortez Masto, Catherine [D-NV]
Showing top 24 donors by contribution amount
Project 2025 Policy Matches
This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.
Introduction
— 196 — Mandate for Leadership: The Conservative Promise Simultaneously, Russia, China, and lesser adversaries exploit the more open networks of countries like the U.S. to undermine democracy through disinformation and propaganda. They have attempted to influence U.S. elections; enabled or encouraged actors to exploit cyber vulnerabilities to commit theft of real or intellectual property; and have challenged U.S. governmental, military, and critical infrastructure networks with targeted malware. In short, the cyberspace era has gradually evolved from one of exploration, innovation, and cooperation to one that retains these features but is also marked by aggressive competition and persistent threats. To meet this reality, the State Department must move beyond its traditional model of attempting to establish non-binding, informal world standards of acceptable cyberspace behavior. The State Department should work with allies to establish a clear framework of enforceable norms for actions in cyberspace, moving beyond the voluntary norms of the United Nations Group of Governmental Experts.26 The State Department should also assist the Department of Defense to go “on offence” against adversaries. “Deterrence as a strategic approach has not stemmed the onslaught of cyber aggression below the level of armed conflict.”27 The traditional U.S. defensive approach based on deterrence followed by reaction to crossed “red lines” is no longer effective. Adversaries can evade this strategy through multiple tactical lines of action below the level of armed conflict, and such actions have a cumulative strategic effect. The State Department’s role should be to work with allies and engage with adversaries when necessary to draw clear lines of unacceptable conduct. Global financial infrastructure, nuclear controls, and public health are particularly important areas in which consensus may even be found across ideological lines. These mission-essential institutional initiatives should be joined with others to establish a presidentially directed and durable U.S. foreign policy. CONCLUSION The next conservative President has the opportunity and the duty to restructure the creation and execution of U.S. foreign policy so that it is focused on his or her vision for the nation's role in the world. The policy ideas and reform recommen- dations outlined in this chapter provide guidance about how the State Department can contribute to this objective. In the main, this chapter refocuses attention away from the special interests and social experiments that are used in some quarters to capture U.S. foreign policy.
Introduction
— 196 — Mandate for Leadership: The Conservative Promise Simultaneously, Russia, China, and lesser adversaries exploit the more open networks of countries like the U.S. to undermine democracy through disinformation and propaganda. They have attempted to influence U.S. elections; enabled or encouraged actors to exploit cyber vulnerabilities to commit theft of real or intellectual property; and have challenged U.S. governmental, military, and critical infrastructure networks with targeted malware. In short, the cyberspace era has gradually evolved from one of exploration, innovation, and cooperation to one that retains these features but is also marked by aggressive competition and persistent threats. To meet this reality, the State Department must move beyond its traditional model of attempting to establish non-binding, informal world standards of acceptable cyberspace behavior. The State Department should work with allies to establish a clear framework of enforceable norms for actions in cyberspace, moving beyond the voluntary norms of the United Nations Group of Governmental Experts.26 The State Department should also assist the Department of Defense to go “on offence” against adversaries. “Deterrence as a strategic approach has not stemmed the onslaught of cyber aggression below the level of armed conflict.”27 The traditional U.S. defensive approach based on deterrence followed by reaction to crossed “red lines” is no longer effective. Adversaries can evade this strategy through multiple tactical lines of action below the level of armed conflict, and such actions have a cumulative strategic effect. The State Department’s role should be to work with allies and engage with adversaries when necessary to draw clear lines of unacceptable conduct. Global financial infrastructure, nuclear controls, and public health are particularly important areas in which consensus may even be found across ideological lines. These mission-essential institutional initiatives should be joined with others to establish a presidentially directed and durable U.S. foreign policy. CONCLUSION The next conservative President has the opportunity and the duty to restructure the creation and execution of U.S. foreign policy so that it is focused on his or her vision for the nation's role in the world. The policy ideas and reform recommen- dations outlined in this chapter provide guidance about how the State Department can contribute to this objective. In the main, this chapter refocuses attention away from the special interests and social experiments that are used in some quarters to capture U.S. foreign policy. — 197 — Department of State The ideas and recommendations herein are premised on the belief that a rigorous adherence to the national interest is the most enduring foundation for U.S. grand strategy in the 21st century. AUTHOR’S NOTE: Thanks to the entire State Department chapter team, the leaders and staff of the 2025 Presidential Transition Project, and my colleagues at The Heritage Foundation’s Davis Center. In particular, I would like to acknowledge the following colleagues: Russell Berman, Sarah Calvis, James Carafano, Spencer Chretien, Wesley Coopersmith, Paul Dans, Steven Groves, Simon Hankinson, Joseph Humire, Michael Pillsbury, Max Primorac, Reed Rubenstein, Brett Schaefer, Jeff Smith, Hillary Tanoff, Erin Walsh, and John Zadrozny.
Introduction
— 222 — Mandate for Leadership: The Conservative Promise forward-leaning in sharing cyber threat intelligence with private-sector partners and the public, emphasizing that the protective nature of such information is of value only if put into the right hands at the right time. Since critical infrastructure and services are overwhelmingly owned, managed, and defended by the private sector in the United States, there has been an increasing emphasis on declassify- ing intelligence and sharing actionable information with private-sector partners, often through industry-specific Information Sharing and Analysis Centers (ISACs); regional meetings of government and private-sector experts called InfraGard, run by the FBI; direct public notification from the Department of Homeland Security, the FBI, and (increasingly) the NSA; and more discreet one-on-one engagements led by the collecting agencies. These programs properly recognize the private sector’s role in providing cyber- security for Americans; in practice, however, the intelligence shared by the U.S. government through these venues is too often already known or no longer relevant by the time it makes its way through the downgrade process for sharing. In addition, government-shared information often needs to take advantage of the opportunity to provide contexts, such as attribution, trends, and size of the observed cyber problem. As warranted, additional context should be provided to the private sector as a matter of routine. To continue improving the U.S. government’s ability to defend the country’s most vital networks, the IC must adopt an “obligation to share” policy process, including the capacity for “write to release” intelligence products whereby newly discovered technical indicators, targeting, and other intelligence relevant to cyber defense are automatically provided either to the public or to targeted entities within 48 hours of their collection—which is how counterterrorism intel- ligence has been managed for years when it comes to a “duty to warn.” Under this policy, agency heads should still have the flexibility to withhold intelligence for operational or counterintelligence reasons but would need to report regularly to Congress on the number of and justification for exceptions. This policy would make sharing intelligence and defending networks the default, as it already is in the rest of the cybersecurity community outside the IC, to improve the quantity, relevance, and timeliness of defensive information while ensuring accountability for top leaders when they must withhold this information. One of the most significant challenges within the IC is presented by the need to share information promptly among the 18 elements of the intelligence enterprise. The only long-term solution to the understandable tension between the need to share information and the need to protect intelligence sources and methods is a robust real-time auditing capability that electronically flags unauthorized access. Under an identity management system with real-time audit, even the most sensi- tive information acquired by America’s intelligence agencies can be shared, and the access to and use of that information are appropriately monitored. Establishing — 223 — Intelligence Community a real-time auditing capability is essential to decreasing the risk for the heads of intelligence agencies in meeting their statutory requirements to ensure that they protect sources and methods associated with the classified information their agen- cies collect. Overclassification. There is broad consensus across the U.S. government and among stakeholders that the system for classifying, declassifying, and otherwise marking and handling sensitive information is at a crossroads. Exorbitant amounts of classified data are created daily, and agency personnel often mistakenly choose classification as the default selection to ensure national security. At the same time, the effectiveness of downgraded and carefully declassified information to support foreign policy efforts has been borne out in, for example, alerting the broader world of Russia’s buildup and likely plans for its invasion of Ukraine. Two executive orders principally govern how the U.S. government handles clas- sified and sensitive information. l Executive Order 13526, “Classified National Security Information,” issued in 2009,38 prescribes the classification levels and procedures for declassification. l Executive Order 13556, “Controlled Unclassified Information,” issued in 2010,39 aimed to establish a uniform program for managing all unclassified information that requires safeguarding or dissemination controls. The current system for declassifying classified national security information (CNSI) is extraordinarily analog, requiring experts’ review of individual records. Declassification policies are based on human review of paper and need to con- template and handle the proliferation and volume of digital records created by agencies. The U.S. government will soon reach the point at which manual review is impossible. The declassification of CNSI should support key U.S. national security objectives, reflect mission priorities, and not serve solely as a necessary procedural function. Reforms should include: l Tighter definitions and greater specificity for categories of information requiring protection. l More stringent policies to effect significant reductions in the number of Original Classification Authorities (OCAs). l Stricter accountability measures at the OCA level and more detailed security classification guides.
Showing 3 of 5 policy matches
About These Correlations
Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.