H.R. 2384 (119th)Bill Overview

Financial Technology Protection Act of 2025

Finance and Financial Sector|Advanced technology and technological innovationsAdvisory bodies
Cosponsors
Support
Bipartisan
Introduced
Mar 26, 2025
Discussions
Bill Text
Current stageCommittee

Received in the Senate and Read twice and referred to the Committee on Banking, Housing, and Urban Affairs.

Introduced
Committee
Floor
President
Law
Congressional Activities
01 · The brief

The bill creates an Independent Financial Technology Working Group to Combat Terrorism and Illicit Financing, chaired by Treasury and including federal agencies, industry, blockchain intelligence, research, and civil liberties representatives.

The Working Group will research illicit uses of digital assets and emerging technologies, produce legislative and regulatory proposals, and issue annual reports for up to four years.

The President (through Treasury) must produce, within 180 days, an unclassified report (with possible classified annex) describing how digital assets and emerging technologies can enable sanctions evasion, terrorism financing, and a mitigation strategy, with a follow-up briefing within two years.

Passage55/100

Content is narrow, administrative, and contains compromise features, improving prospects; success depends on Senate procedures and potential added amendments or funding demands.

CredibilityPartially aligned

Relative to its intended legislative type, this bill is a well-defined establishment of a multi-agency working group with clear purposes, membership, reporting deadlines, and a sunset. It provides concrete deliverables (reports and strategy) and public-disclosure requirements for unclassified material.

Contention50/100

Privacy protections versus expanded AML surveillance powers

02 · What it does

Who stands to gain, and who may push back.

Who this appears to help vs burden50% / 50%
Federal agenciesFederal agencies
Likely helped
  • Federal agenciesCreates an interagency forum to improve coordination on digital asset illicit finance threats.
  • Targeted stakeholdersMay strengthen sanctions enforcement and detection of terrorist financing using digital assets.
  • Targeted stakeholdersRequires public, machine-readable reports increasing transparency for industry and researchers.
Likely burdened
  • Targeted stakeholdersMay prompt new regulatory burdens and compliance costs for fintech and digital-asset firms.
  • Targeted stakeholdersBroad illicit-use definitions could enable expansive surveillance or monitoring of transactions.
  • Federal agenciesPotential federal policy actions could conflict with state rules or impose federal preemption concerns.
03 · Why people split

Why the argument around this bill splits.

Privacy protections versus expanded AML surveillance powers
Progressive65%

Likely cautiously supportive of focused measures to prevent terrorist financing and illicit trade, appreciating civil liberties representation and public reports.

However, concerned that research and proposed rules could expand surveillance, weaken privacy, or criminalize privacy-preserving technologies without strong safeguards.

Split reaction
Centrist80%

Generally supportive as a targeted, time-limited national security and AML initiative that coordinates agencies and stakeholders.

Wants clarity on costs, overlap with existing programs, and explicit congressional oversight to avoid duplication or unfunded mandates.

Leans supportive
Conservative55%

Likely supportive of strengthened tools to counter sanctions evasion and terrorism financing, but wary of creating new federal bodies and of regulatory burdens on fintech and crypto innovation.

Prefers limited scope, protection for legitimate commerce, and safeguards against overbroad rulemaking.

Split reaction
04 · Can it pass?

The path through Congress.

Introduced

Reached or meaningfully advanced

Committee

Reached or meaningfully advanced

Floor

Still ahead

President

Still ahead

Law

Still ahead

Passage likelihood55/100

Content is narrow, administrative, and contains compromise features, improving prospects; success depends on Senate procedures and potential added amendments or funding demands.

Scope and complexity
52%
Scopemoderate
52%
Complexitymedium
Why this could stall
  • No appropriation language or cost estimate included.
  • Potential overlap with existing Treasury and law enforcement programs.
05 · Recent votes

Recent votes on the bill.

No vote history yet

The bill has not accumulated any surfaced votes yet.

06 · Go deeper

Go deeper than the headline read.

Included on this page

Privacy protections versus expanded AML surveillance powers

Content is narrow, administrative, and contains compromise features, improving prospects; success depends on Senate procedures and potentia…

Unlocked analysis

Relative to its intended legislative type, this bill is a well-defined establishment of a multi-agency working group with clear purposes, membership, reporting deadlines, and a sunset. It provides concrete deliverables…

Go beyond the headline summary with full stakeholder mapping, legislative design analysis, passage barriers, and lens-by-lens tradeoff breakdowns.

Perspective breakdownsPassage barriersLegislative design reviewStakeholder impact map
Open full analysis