Compliance Hub | January 24, 2026 Critical Infrastructure, Privacy & Attack Surface Analysis


Executive Summary

On January 22, 2026, the U.S. House of Representatives voted 164-268 to reject an amendment that would have defunded the federal vehicle “kill switch” mandate. The amendment, introduced by Rep. Thomas Massie (R-KY), sought to prohibit federal funding for Section 24220 of the Infrastructure Investment and Jobs Act (IIJA), which requires all new passenger vehicles manufactured after 2026 to include technology capable of detecting driver impairment and disabling the vehicle.

The vote saw 57 Republicans join 211 Democrats in opposition, highlighting significant bipartisan disagreement on the balance between highway safety and civil liberties. This analysis examines the cybersecurity implications, privacy concerns, and potential attack vectors introduced by mandating remote vehicle disabling technology in consumer automobiles.

The Vote Breakdown

Party YEA NAY NV

Republican 160 57 4

Democratic 4 211 1

TOTALS 164 268 5

Roll Call Reference: House Vote #43 - clerk.house.gov/Votes/202643


What Section 24220 Actually Requires

The 2021 Infrastructure Investment and Jobs Act contains specific language in Section 24220 mandating that:

“To ensure the prevention of alcohol-impaired driving fatalities, advanced drunk and impaired driving prevention technology must be standard equipment in all new passenger motor vehicles.”

The legislation defines this technology as a system that can:

  1. Passively monitor the performance of a driver of a motor vehicle2. Passively monitor the blood alcohol concentration of a driver3. Prevent or limit motor vehicle operation if impairment is detected

The National Highway Traffic Safety Administration (NHTSA) is tasked with developing the specific implementation standards, with an original deadline of November 2024 for final rulemaking and enforcement beginning by September 2027.

NHTSA Cybersecurity Guidelines: Ensuring Vehicle Safety in the Digital Age


Cybersecurity Attack Vectors

From a security perspective, mandating internet-connected vehicle disabling systems introduces significant attack surface considerations:

1. CAN Bus Vulnerabilities

Modern vehicles use Controller Area Network (CAN) buses dating back to the 1980s to connect critical systems including brakes, steering, and engine controls. The FBI’s Internet Crime Complaint Center (IC3) has previously warned that connecting safety-critical components to the internet through infotainment systems represents a fundamental security flaw.

Key Risk: Any system capable of disabling a vehicle must interface with the CAN bus, creating a potential bridge from external networks to safety-critical controls.

2. Fleet-Wide Attack Potential

Unlike traditional vehicle theft or individual hacks, networked kill switch systems create the potential for mass-casualty cyberattacks. Research from Georgia Tech has modeled scenarios where:

  • Simultaneously activating kill switches on millions of vehicles could shut down entire transportation networks- Supply chain disruptions from disabled commercial vehicles could affect food, fuel, and medical supply delivery- A Consumer Watchdog report estimated a fleet-wide hack could cause approximately 3,000 deaths from a single coordinated breach

3. Remote Exploitation Pathways

Security researchers have documented multiple attack vectors against connected vehicles:

Attack Vector Risk Level Example

Cellular/Telematics Critical 2015 Jeep Cherokee hack - 1.4M vehicles recalled

Mobile Apps High Kaspersky found vulnerabilities in apps with 1M+ downloads

OBD-II Ports High Direct CAN bus access through diagnostic ports

GPS/Immobilizer Systems High Default password vulnerabilities in commercial trackers

OTA Updates Medium Malicious firmware delivery via compromised update channels

Bluetooth/WiFi Medium Proximity-based exploitation

4. Third-Party Data Access

The technology required for impairment detection necessarily involves continuous monitoring systems. This creates concerns about:

  • Insurance company access to driving behavior data- Law enforcement data requests without traditional warrant processes- Manufacturer data collection for commercial purposes- Foreign adversary targeting of transportation infrastructure

Your Car Is About to Become a Surveillance Device: Congress Just Made Sure of It


The Privacy Dimension

Rep. Harriet Hageman (R-WY) characterized the mandate as “a massive and likely unconstitutional rule and an invasion of privacy on a greater scale than we are used to seeing from our government.”

Passive Monitoring Concerns

The legislation explicitly requires “passive monitoring” capabilities, meaning the system continuously observes driver behavior without active driver participation. Proposed implementation methods include:

  • In-cabin cameras monitoring eye movement and facial expressions- Steering pattern analysis detecting erratic movements- Breath/air sensors measuring alcohol content in the vehicle cabin- Touch-based BAC sensors in steering wheels or start buttons

Due Process Questions

Rep. Massie raised fundamental due process concerns: “When your car shuts down because it doesn’t approve of your driving, how will you appeal your roadside conviction?”

Unlike traditional DUI enforcement, which involves:

  • Officer observation and probable cause- Field sobriety testing- Chemical testing with chain of custody- Judicial review and legal representation

Automated vehicle disabling operates as algorithmic enforcement with no immediate appeal mechanism, no human judgment, and potential for false positives from medical conditions, fatigue, or system malfunctions.


The 57 Republicans Who Voted Against Defunding

The following Republican representatives joined Democrats in preserving the kill switch mandate funding:

Representative State Representative State

Mark Amodei NV-02 French Hill AR-02

Don Bacon NE-02 Jeff Hurd CO-03

Stephanie Bice OK-05 Brian Jack GA-03

Gus Bilirakis FL-12 John James MI-10

Mike Bost IL-12 David Joyce OH-14

Ken Calvert CA-41 Thomas H. Kean Jr. NJ-07

John Carter TX-31 Mike Kelly PA-16

Tom Cole OK-04 Jen Kiggans VA-02

Mario Diaz-Balart FL-26 Kevin Kiley CA-03

Neal Dunn FL-02 Young Kim CA-40

Chuck Edwards NC-11 Kimberlyn King-Hinds MP-AL

Jake Ellzey TX-06 Darin LaHood IL-16

Randy Feenstra IA-04 Nick LaLota NY-01

Randy Fine FL-06 Mike Lawler NY-17

Chuck Fleischmann TN-03 Frank D. Lucas OK-03

Vince Fong CA-20 Nicole Malliotakis NY-11

Brian Fitzpatrick PA-01 Celeste Maloy UT-02

Andrew Garbarino NY-02 Brian Mast FL-21

Carlos Gimenez FL-28 Dan Meuser PA-09

Max Miller OH-07 Maria Elvira Salazar FL-27

Mariannette Miller-Meeks IA-01 Mike Simpson ID-02

Blake D. Moore UT-01 Elise Stefanik NY-21

Tim Moore NC-14 Glenn “GT” Thompson PA-15

James C. Moylan GU-AL Michael R. Turner OH-10

Greg Murphy NC-03 David Valadao CA-22

Dan Newhouse WA-04 Derrick Van Orden WI-03

Zach Nunn IA-03 Rob Wittman VA-01

Harold Rogers KY-05 Steve Womack AR-03

Ryan Zinke MT-01

Note: Representatives Hunt (TX), McClintock (CA), and Radewagen (American Samoa) were recorded as “Not Voting.”


The Safety Argument

Proponents of the mandate cite significant public safety benefits:

  • 13,000+ deaths annually from alcohol-impaired driving crashes (approximately 31% of all traffic fatalities)- Rep. Debbie Wasserman Schultz (D-FL) argued passive drunk driving technology is “a key way to protect family members and others sharing the roadways”- MADD (Mothers Against Drunk Driving) has championed this technology for decades

However, critics note the legislation does not define:

  • What constitutes “impairment” beyond alcohol- How the system distinguishes medical emergencies from intoxication- What happens when the system incorrectly detects impairment at highway speeds- How autonomous systems will gradually disable vehicles safely

Compliance & Industry Implications

For Automotive Manufacturers

Vehicle manufacturers face significant compliance requirements:

  1. Integration of passive monitoring systems into all new passenger vehicles2. CAN bus security hardening to prevent exploitation of disabling capabilities3. Data retention and access policies for monitoring data4. Liability frameworks for false positives and system failures5. Over-the-air update security for safety-critical systems

For Fleet Operators

Commercial fleet operators should consider:

  • Enhanced telematics security audits- Segmentation of safety-critical vehicle networks- Incident response planning for fleet-wide disable scenarios- Insurance implications of mandated kill switch systems- Driver privacy policies for continuous monitoring data

For Cybersecurity Professionals

Security teams should prepare for:

  • New vulnerability classes in automotive systems- Expanded attack surfaces in connected vehicle infrastructure- Critical infrastructure protection considerations for transportation- Penetration testing frameworks for automotive systems- Incident response protocols for vehicle-based attacks

What Happens Next

The larger $1.2 trillion spending package (H.R. 7148) passed the House 341-88 and now moves to the Senate for consideration before the January 30 deadline. The Massie amendment’s failure means:

  1. NHTSA retains funding to develop implementation standards2. The 2026/2027 mandate timeline remains on track3. Separate legislation (the “No Kill Switches in Cars Act”) remains in committee4. State-level pushback may emerge, with Florida Gov. Ron DeSantis already criticizing the mandate

Recommendations for Organizations

Immediate Actions

  1. Inventory connected vehicle assets and assess kill switch exposure2. Review fleet telematics security configurations and access controls3. Establish monitoring for automotive CVE disclosures4. Update incident response plans to include vehicle-based scenarios

Strategic Considerations

  1. Evaluate vehicle procurement policies considering security implications2. Engage with automotive vendors on security roadmaps3. Consider air-gapped alternatives for sensitive operations4. Monitor regulatory developments at federal and state levels

Conclusion

The preservation of funding for Section 24220’s vehicle kill switch mandate represents a significant expansion of connected vehicle requirements with substantial cybersecurity implications. While the technology aims to address the genuine public safety crisis of impaired driving, the implementation introduces attack vectors, privacy concerns, and due process questions that security professionals, fleet operators, and individual consumers must carefully consider.

The 164-268 vote demonstrates this remains a contentious issue crossing traditional party lines. As implementation moves forward, the cybersecurity community should prepare for new vulnerability classes, expanded attack surfaces, and critical infrastructure protection challenges in the automotive sector.


*For more cybersecurity compliance analysis, visit *Compliance Hub

Related Resources:


© 2026 CISO Marketplace / Compliance Hub. All rights reserved.