(a)
(b)
(c)
(1) A vulnerability and threat assessment of elements of the defense and supporting nondefense information infrastructures that are essential to the operations of the Department and the armed forces.
(2) Development of essential information assurances technologies and programs.
(3) Organization of the Department, the armed forces, and supporting activities to defend against information warfare.
(4) Joint activities of the Department with other departments and agencies of the Government, State and local agencies, and elements of the national information infrastructure.
(5) The conduct of exercises, war games, simulations, experiments, and other activities designed to prepare the Department to respond to information warfare threats.
(6) Development of proposed legislation that the Secretary considers necessary for implementing the program or for otherwise responding to the information warfare threat.
(d)
[(e) Repealed. Pub. L. 108–136, div. A, title X, §1031(a)(12), Nov. 24, 2003, 117 Stat. 1597.]
(f)
(1) an integrated organization structure to plan and facilitate the conduct of simulations, war games, exercises, experiments, and other activities to prepare and inform the Department regarding information warfare threats; and
(2) organization and planning means for the conduct by the Department of the integrated or joint exercises and experiments with elements of the national information systems infrastructure and other non-Department of Defense organizations that are responsible for the oversight and management of critical information systems and infrastructures on which the Department, the armed forces, and supporting activities depend for the conduct of daily operations and operations during crisis.
Amendments
2004—Subsec. (c). Pub. L. 108–375 substituted "subchapter II" for "subtitle II" in introductory provisions.
2003—Subsec. (e). Pub. L. 108–136 struck out subsec. (e) which directed the Secretary of Defense to annually submit to Congress a report on the Defense Information Assurance Program.
2002—Subsec. (b). Pub. L. 107–296, §1001(c)(1)(B)(i), and Pub. L. 107–347, §301(c)(1)(B)(i), amended subsec. (b) identically, substituting "Objectives of the Program" for "Objectives and Minimum Requirements" in heading and striking out par. (1) designation before "The objectives".
Subsec. (b)(2). Pub. L. 107–347, §301(c)(1)(B)(ii), struck out par. (2) which read as follows: "The program shall at a minimum meet the requirements of sections 3534 and 3535 of title 44."
Pub. L. 107–296, §1001(c)(1)(B)(ii), which directed the striking out of "(2) the program shall at a minimum meet the requirements of section 3534 and 3535 of title 44, United States Code." could not be executed. See above par.
Subsec. (c). Pub. L. 107–347, §301(c)(1)(B)(iii), inserted ", including through compliance with subchapter III of chapter 35 of title 44" after "infrastructure" in introductory provisions.
Pub. L. 107–296, §1001(c)(1)(B)(iii), inserted ", including through compliance with subtitle II of chapter 35 of title 44" after "infrastructure" in introductory provisions.
2000—Subsec. (b). Pub. L. 106–398, §1 [[div. A], title X, §1063(a)], substituted "
Subsec. (e)(7). Pub. L. 106–398, §1 [[div. A], title X, §1063(b)], added par. (7).
Effective Date of 2002 Amendment
Amendment by Pub. L. 107–296 effective 60 days after Nov. 25, 2002, see section 4 of Pub. L. 107–296, set out as an Effective Date note under section 101 of Title 6, Domestic Security.
Effective Date of 2000 Amendment
Amendment by Pub. L. 106–398 effective 30 days after Oct. 30, 2000, see section 1 [[div. A], title X, §1065] of Pub. L. 106–398, Oct. 30, 2000, 114 Stat. 1654, formerly set out as an Effective Date note under former section 3531 of Title 44, Public Printing and Documents.
Role of Chief Information Officer in Improving Enterprise-Wide Cybersecurity
Pub. L. 116–92, div. A, title XVI, §1641, Dec. 20, 2019, 133 Stat. 1750, provided that:
"(a)
"(1) fit into an enterprise-wide cybersecurity architecture;
"(2) are maximally interoperable with each other, including those programs and capabilities deployed by the components of the Department;
"(3) enhance enterprise-level visibility and responsiveness to threats; and
"(4) are developed, procured, instituted, and managed in a cost-efficient manner, exploiting economies of scale and enterprise-wide services and discouraging unnecessary customization and piecemeal acquisition.
"(b)
"(1) manage and modernize the cybersecurity architecture of the Department, including—
"(A) ensuring the cybersecurity architecture of the Department maximizes cybersecurity capability, network, and endpoint activity data sharing across Department components;
"(B) ensuring the cybersecurity architecture of the Department supports improved automaticity of cybersecurity detection and response; and
"(C) modernizing and configuring the Department's standardized deployed perimeter, network-level, and endpoint capabilities to improve interoperability, meet pressing capability needs, and negate common adversary tactics, techniques, and procedures;
"(2) establish mechanisms to enable and mandate, as necessary, cybersecurity capability and network and endpoint activity data-sharing across Department components;
"(3) make mission data, through data tagging, automatic transmission, and other means, accessible and discoverable by Department components other than owners of such mission data;
"(4) incorporate into the cybersecurity architecture of the Department emerging cybersecurity technologies from the Defense Advanced Research Projects Agency, the Strategic Capabilities Office, the Defense Innovation Unit, the laboratories of the military departments, and the commercial sector;
"(5) ensure that the Department possesses the necessary computing infrastructure, through technology refresh, installation or acquisition of bandwidth, and the use of cloud computing power, to host and enable necessary cybersecurity capabilities; and
"(6) utilize the Department's cybersecurity expertise to improve cybersecurity performance, operations, and acquisition, including—
"(A) the cybersecurity testing, architecting, and engineering expertise of the National Security Agency; and
"(B) the technology policy, workforce, and engineering expertise of the Defense Digital Service."
Control and Analysis of Department of Defense Data Stolen Through Cyberspace
Pub. L. 116–92, div. A, title XVI, §1646, Dec. 20, 2019, 133 Stat. 1753, provided that:
"(a)
"(1) is in the possession of a component of the Department, the Secretary shall—
"(A) either transfer or replicate and transfer such Department data in a prompt and secure manner to a secure repository with access by Department personnel appropriately limited on a need-to-know basis or otherwise ensure such consistent access to the relevant data by other means;
"(B) ensure the Department applies such automated analytic tools and capabilities to the repository of potentially compromised data as are necessary to rapidly understand the scope and effect of the potential compromise;
"(C) for high priority and mission critical Department systems, develop analytic products that characterize the scope of data compromised;
"(D) ensure that relevant mission-affected entities in the Department are made aware of the theft or possible theft and, as damage assessment and mitigation proceeds, are kept apprised of the extent of the data stolen; and
"(E) ensure that Department counterintelligence organizations are—
"(i) fully integrated with any damage assessment team assigned to the breach;
"(ii) fully informed of the data that have or potentially have been stolen and the effect of such theft; and
"(iii) provided resources and tasked, in conjunction with subject matter experts and responsible authorities, to immediately and appropriately respond, including through the development and execution of relevant countermeasures, to any breach involving espionage and data theft; or
"(2) is in the possession of or under controls or restrictions imposed by the Federal Bureau of Investigation, or a national counterintelligence or intelligence organization, the Secretary shall determine, jointly with the Director of the Federal Bureau of Investigation or the Director of National Intelligence, as appropriate, the most expeditious process, means, and conditions for carrying out the activities otherwise required by paragraph (1).
"(b)
Use of National Security Agency Cybersecurity Expertise To Support Evaluation of Commercial Cybersecurity Products
Pub. L. 116–92, div. A, title XVI, §1647, Dec. 20, 2019, 133 Stat. 1754, provided that:
"(a)
"(b)
"(1)
"(2)
"(A) test and evaluate commercially available cybersecurity products and services using—
"(i) generally known cyber operations techniques; and
"(ii) tools and cyber operations techniques and advanced tools and techniques available to the National Security Agency;
"(B) develop and establish standard procedures, techniques, and threat-informed metrics to perform the testing and evaluation required by subparagraph (A); and
"(C) advise the Chief Information Officer and the components of the Department of Defense on the merits and disadvantages of evaluated cybersecurity products, including with respect to—
"(i) any synergies between products;
"(ii) value;
"(iii) matters relating to operation and maintenance; and
"(iv) matters relating to customization requirements.
"(3)
"(A) by [sic] used to accredit cybersecurity products and services for use by the Department;
"(B) create approved products lists; or
"(C) be used for the procurement and fielding of cybersecurity products on behalf of the Department."
Framework To Enhance Cybersecurity of the United States Defense Industrial Base
Pub. L. 116–92, div. A, title XVI, §1648, Dec. 20, 2019, 133 Stat. 1755, provided that:
"(a)
"(b)
"(1) Identification of unified cybersecurity standards, regulations, metrics, ratings, third-party certifications, or requirements to be imposed on the defense industrial base for the purpose of assessing the cybersecurity of individual contractors.
"(2) Roles and responsibilities of the Under Secretary of Defense for Acquisition and Sustainment, the Under Secretary of Defense for Intelligence and Security, the Chief Information Officer, the Director of the Protecting Critical Technologies Task Force, and the Secretaries of the military departments relating to the following:
"(A) Establishing and ensuring compliance with cybersecurity standards, regulations, and policies.
"(B) Deconflicting existing cybersecurity standards, regulations, and policies.
"(C) Coordinating with and providing assistance to the defense industrial base for cybersecurity matters, particularly as relates to the programs and processes described in paragraphs (8) and (9).
"(D) Management and oversight of the acquisition process, including responsibility determination, solicitation, award, and contractor management, relating to cybersecurity standards, regulations, metrics, ratings, third-party certifications, or requirements.
"(3) The responsibilities of the prime contractors, and all subcontractors in the supply chain, for implementing the required cybersecurity standards, regulations, metrics, ratings, third-party certifications, and requirements identified under paragraph (1).
"(4) Definitions for 'Controlled Unclassified Information' (CUI) and 'For Official Use Only' (FOUO), as well as policies regarding protecting information designated as either of such.
"(5) Methods and programs for managing controlled unclassified information, and for limiting the presence of unnecessary sensitive information on contractor networks.
"(6) A plan to provide implementation guidance, education, manuals, and, as necessary, direct technical support or assistance, to contractors on matters relating to cybersecurity.
"(7) Quantitative metrics for assessing the effectiveness of the overall framework over time, with respect to the exfiltration of controlled unclassified information from the defense industrial base.
"(8) A comprehensive list of current and planned Department of Defense programs to assist the defense industrial base with cybersecurity compliance requirements of the Department, including those programs that provide training, expertise, and funding, and maintain approved security products lists and approved providers lists.
"(9) Processes for enhanced threat information sharing between the Department of Defense and the defense industrial base.
"(c)
"(1) Designating an official to be responsible for the cybersecurity of the defense industrial base.
"(2) Risk-based methodologies, standards, metrics, and tiered cybersecurity requirements for the defense industrial base, including third-party certifications such as the Cybersecurity Maturity Model Certification pilot program, as the basis for a mandatory Department standard.
"(3) Tailoring cybersecurity requirements for small- and medium-sized contractors based on a risk-based approach.
"(4) Ensuring a consistent approach across the Department to cybersecurity standards, regulations, metrics, ratings, third-party certifications, or requirements of the defense industrial base.
"(5) Ensuring the Department's traceability and visibility of cybersecurity compliance of suppliers to all levels of the supply chain.
"(6) Evaluating incentives and penalties for cybersecurity performance of suppliers.
"(7) Integrating cybersecurity and traditional counterintelligence measures, requirements, and programs.
"(8) Establishing a secure software development environment (DevSecOps) in a cloud environment inside the perimeter of the Department for contractors to perform their development work.
"(9) Establishing a secure cloud environment through which contractors may access the data of the Department needed for their contract work.
"(10) An evaluation of the resources and utilization of Department programs to assist the defense industrial base in complying with cybersecurity compliance requirements referred to in subsection (b)(1).
"(11) Technological means, operational concepts, reference architectures, offensive counterintelligence operation concepts, and plans for operationalization to complicate adversary espionage, including honeypotting and data obfuscation.
"(12) Implementing enhanced security vulnerability assessments for contractors working on critical acquisition programs, technologies, manufacturing capabilities, and research areas.
"(13) Identifying ways to better leverage technology and employ machine learning or artificial intelligence capabilities, such as Internet Protocol monitoring and data integrity capabilities, to be applied to contractor information systems that host, receive, or transmit controlled unclassified information.
"(14) Developing tools to easily segregate program data to only allow subcontractors access to their specific information.
"(15) Appropriate communications of threat assessments of the defense industrial base to the acquisition workforce at all classification levels.
"(16) A single Sector Coordinating Council for the defense industrial base.
"(17) Appropriate communications with the defense industrial base on the impact of cybersecurity requirements in contracting and procurement decisions.
"(d)
"(1) Industry groups representing the defense industrial base.
"(2) Contractors in the defense industrial base.
"(3) The Director of the National Institute of Standards and Technology.
"(4) The Secretary of Energy.
"(5) The Director of National Intelligence.
"(6) Relevant Federal regulatory agencies.
"(e)
"(1)
"(2)
"(A) An overview of the framework developed pursuant to subsection (a).
"(B) Identification of such pilot programs as the Secretary considers may be required to improve the cybersecurity of the defense industrial base.
"(C) Implementation timelines and identification of costs.
"(D) Such recommendations as the Secretary may have for legislative action to improve the cybersecurity of the defense industrial base.
"(f)
"(1)
"(2)
"(3)
"(A) The current status of the development and implementation of the framework developed pursuant to subsection (a).
"(B) A description of the efforts undertaken by the Secretary to evaluate the matters for consideration set forth in subsection (c).
"(C) The current status of any pilot programs the Secretary is carrying out to develop the framework."
Designation of Test Networks for Testing and Accreditation of Cybersecurity Products and Services
Pub. L. 116–92, div. A, title XVI, §1658, Dec. 20, 2019, 133 Stat. 1769, provided that:
"(a)
"(b)
"(1) be of sufficient scale to realistically test cybersecurity products and services;
"(2) feature substantially different architectures and configurations;
"(3) be live, operational networks; and
"(4) feature cybersecurity processes, tools, and technologies that are appropriate for test purposes and representative of the processes, tools, and technologies that are widely used throughout the Department.
"(c)
Procedures and Reporting Requirement on Cybersecurity Breaches and Loss of Personally Identifiable Information and Controlled Unclassified Information
Pub. L. 115–232, div. A, title XVI, §1639, Aug. 13, 2018, 132 Stat. 2129, provided that:
"(a)
"(b)
"(c)
"(1)
"(2)
Matters Pertaining to the Sharkseer Cybersecurity Program
Pub. L. 115–232, div. A, title XVI, §1641, Aug. 13, 2018, 132 Stat. 2131, provided that:
"(a)
"(b)
"(c)
"(d)
"(1)
"(2)
"(e)
"(f)
Designation of Official for Matters Relating to Integrating Cybersecurity and Industrial Control Systems Within the Department of Defense
Pub. L. 115–232, div. A, title XVI, §1643, Aug. 13, 2018, 132 Stat. 2133, provided that:
"(a)
"(b)
Assistance for Small Manufacturers in the Defense Industrial Supply Chain and Universities on Matters Relating to Cybersecurity
Pub. L. 115–232, div. A, title XVI, §1644, Aug. 13, 2018, 132 Stat. 2133, provided that:
"(a)
"(1)
"(2)
"(3)
"(4)
"(5)
"(b)
"(c)
"(1)
"(2)
"(3)
"(d)
"(e)
"(1)
"(2)
"(3)
"(f)
"(1) The Manufacturing Technology Program established under section 2521 of title 10, United States Code.
"(2) The Centers for Science, Technology, and Engineering Partnership program under section 2368 of title 10, United States Code.
"(3) The Manufacturing Engineering Education Program established under section 2196 of title 10, United States Code.
"(4) The Small Business Innovation Research program.
"(5) The mentor-protégé program.
"(6) Other legal authorities as the Secretary determines necessary to effectively and efficiently carry out this section.
"(g)
"(1)
"(2)
"(3)
"(4)
Email and Internet Website Security and Authentication
Pub. L. 115–232, div. A, title XVI, §1645, Aug. 13, 2018, 132 Stat. 2135, provided that:
"(a)
"(b)
"(c)
Risk Thresholds for Systems and Network Operations
Pub. L. 115–232, div. A, title XVI, §1647(c), Aug. 13, 2018, 132 Stat. 2136, provided that: "The Chief Information Officer of the Department of Defense, in coordination with the Principal Cyber Advisor, the Director of Operations of the Joint Staff, and the Commander of United States Cyber Command, shall establish risk thresholds for systems and network operations that, when exceeded, would trigger heightened security measures, such as enhanced monitoring and access policy changes."
Mitigation of Risks to National Security Posed by Providers of Information Technology Products and Services Who Have Obligations to Foreign Governments
Pub. L. 115–232, div. A, title XVI, §1655, Aug. 13, 2018, 132 Stat. 2149, provided that:
"(a)
"(1) Whether, and if so, when, within five years before or at any time after the date of the enactment of this Act, the person has allowed a foreign government to review the code of a non-commercial product, system, or service developed for the Department, or whether the person is under any obligation to allow a foreign person or government to review the code of a non-commercial product, system, or service developed for the Department as a condition of entering into an agreement for sale or other transaction with a foreign government or with a foreign person on behalf of such a government.
"(2) Whether, and if so, when, within five years before or at any time after the date of the enactment of this Act, the person has allowed a foreign government listed in section 1654 [of Pub. L. 115–232, 10 U.S.C. 394 note] to review the source code of a product, system, or service that the Department is using or intends to use, or is under any obligation to allow a foreign person or government to review the source code of a product, system, or service that the Department is using or intends to use as a condition of entering into an agreement for sale or other transaction with a foreign government or with a foreign person on behalf of such a government.
"(3) Whether or not the person holds or has sought a license pursuant to the Export Administration Regulations under subchapter C of chapter VII of title 15, Code of Federal Regulations, the International Traffic in Arms Regulations under subchapter M of chapter I of title 22, Code of Federal Regulations, or successor regulations, for information technology products, components, software, or services that contain code custom-developed for the non-commercial product, system, or service the Department is using or intends to use.
"(b)
"(1)
"(2)
"(c)
"(d)
"(1)
"(2)
"(e)
"(f)
"(1) establish within the operational capabilities of the Committee for National Security Systems (CNSS) or within such other agency as the Secretary considers appropriate a registry containing the information disclosed under subsection (a); and
"(2) upon request, make such information available to any agency conducting a procurement pursuant to the Federal Acquisition Regulations or the Defense Federal Acquisition Regulations.
"(g)
"(h)
"(1)
"(A) the Committee on Armed Services, the Select Committee on Intelligence, and the Committee on Homeland Security and Governmental Affairs of the Senate; and
"(B) the Committee on Armed Services, the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee on Oversight and Government Reform [now Committee on Oversight and Reform] of the House of Representatives.
"(2)
"(3)
"(4)
"(5)
"(6)
Integration of Strategic Information Operations and Cyber-Enabled Information Operations
Pub. L. 115–91, div. A, title XVI, §1637, Dec. 12, 2017, 131 Stat. 1742, provided that:
"(a)
"(1)
"(A) establish processes and procedures to integrate strategic information operations and cyber-enabled information operations across the elements of the Department of Defense responsible for such operations, including the elements of the Department responsible for military deception, public affairs, electronic warfare, and cyber operations; and
"(B) ensure that such processes and procedures provide for integrated Defense-wide strategy, planning, and budgeting with respect to the conduct of such operations by the Department, including activities conducted to counter and deter such operations by malign actors.
"(2)
"(3)
"(A) Oversight of strategic policy and guidance.
"(B) Overall resource management for the integration of information operations and cyber-enabled information operations of the Department.
"(C) Coordination with the head of the Global Engagement Center to support the purpose of the Center (as described [in] section 1287(a)(2) of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114–328; 22 U.S.C. 2656 note)) and liaison with the Center and other relevant Federal Government entities to support such purpose.
"(D) Development of a strategic framework for the conduct of information operations by the Department of Defense, including cyber-enabled information operations, coordinated across all relevant elements of the Department of Defense, including both near-term and long-term guidance for the conduct of such coordinated operations.
"(E) Development and dissemination of a common operating paradigm across the elements of the Department of Defense specified in paragraph (1) to counter the influence, deception, and propaganda activities of key malign actors, including in cyberspace.
"(F) Development of guidance for, and promotion of, the capability of the Department of Defense to liaison with the private sector, including social media, on matters relating to the influence activities of malign actors.
"(b)
"(1)
"(B) The Secretary shall require each commander of a combatant command to develop such requirements and specific plans as may be necessary for the conduct of information operations in support of the strategy required under subparagraph (A), including plans for deterring information operations, including deterrence in the cyber domain, by malign actors against the United States, allies of the United States, and interests of the United States.
"(2)
"(A)
"(i) review the strategy of the Department of Defense titled 'Department of Defense Strategy for Operations in the Information Environment' and dated June 2016; and
"(ii) submit to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] a plan for implementation of such strategy.
"(B)
"(i) An accounting of the efforts undertaken in support of the strategy described in subparagraph (A)(i) in the period since it was issued in June 2016.
"(ii) A description of any updates or changes to such strategy that have been made since it was first issued, as well as any expected updates or changes resulting from the designation of the designated senior official.
"(iii) A description of the role of the Department of Defense as part of a broader whole-of-Government strategy for strategic communications, including a description of any assumptions about the roles and contributions of other departments and agencies of the Federal Government with respect to such a strategy.
"(iv) Defined actions, performance metrics, and projected timelines for achieving each of the 15 tasks specified in the strategy described in subparagraph (A)(i).
"(v) An analysis of any personnel, resourcing, capability, authority, or other gaps that will need to be addressed to ensure effective implementation of the strategy described in subparagraph (A)(i) across all relevant elements of the Department of Defense.
"(vi) An investment framework and projected timeline for addressing any gaps identified under clause (v).
"(vii) Such other matters as the Secretary of Defense considers relevant.
"(C)
"(c)
Exercise on Assessing Cybersecurity Support to Election Systems of States
Pub. L. 115–91, div. A, title XVI, §1638, Dec. 12, 2017, 131 Stat. 1744, provided that:
"(a)
"(b)
"(1) agrees to participate in such exercise; and
"(2) agrees to allow vulnerability testing of the components of the State's election system.
"(c)
Measurement of Compliance With Cybersecurity Requirements for Industrial Control Systems
Pub. L. 115–91, div. A, title XVI, §1639, Dec. 12, 2017, 131 Stat. 1744, provided that:
"(a)
"(b)
Strategic Cybersecurity Program
Pub. L. 115–91, div. A, title XVI, §1640, Dec. 12, 2017, 131 Stat. 1745, provided that:
"(a)
"(b)
"(c)
"(1)
"(A) Offensive cyber systems.
"(B) Long-range strike systems.
"(C) Nuclear deterrent systems.
"(D) National security systems.
"(E) Critical infrastructure of the Department of Defense (as that term is defined in section 1650(f)(1) of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114–328; 10 U.S.C. 2224 note)).
"(2)
"(3)
"(d)
"(1) the evaluation of cyber vulnerabilities of major weapon systems of the Department of Defense required under section 1647 of the National Defense Authorization Act for Fiscal Year 2016 ([Public Law] 114–92; 129 Stat. 1118 [set out as a note below]);
"(2) the evaluation of cyber vulnerabilities of Department of Defense critical infrastructure required under section 1650 of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114–328; 10 U.S.C. 2224 note); and
"(3) the activities of the cyber protection teams of the Department of Defense.
"(e)
"(1) A description of any activities of the Program carried out pursuant to the plan during the time period covered by the report.
"(2) A description of particular challenges encountered in the course of the activities of the Program, if any, and of actions taken to address such challenges.
"(3) A description of any plans for additional activities under the Program."
Requirement To Enter Into Agreements Relating to Use of Cyber Opposition Forces
Pub. L. 114–328, div. A, title XVI, §1644, Dec. 23, 2016, 130 Stat. 2602, provided that:
"(a)
"(1) to support a high state of mission readiness in the command through the use of one or more cyber opposition forces in continuous exercises and other training activities as considered appropriate by the commander of the command; and
"(2) in conducting such exercises and training activities, [to] meet the standard required under subsection (b).
"(b)
"(c)
"(1) provide for applied training and exercise capabilities; and
"(2) use expertise and capabilities from other departments and agencies of the Federal Government, as appropriate.
"(d)
"(1) a list of each combatant command that has established an agreement under subsection (a);
"(2) with respect to each such agreement—
"(A) special conditions in the agreement placed on any cyber opposition force used by the command;
"(B) the process for making decisions about deconfliction and risk mitigation of cyber opposition force activities in continuous exercises and training;
"(C) identification of cyber opposition forces trained and certified to operate at the joint standard, as issued under subsection (b);
"(D) identification of the annual exercises that will include participation of the cyber opposition forces; and
"(E) identification of any shortfalls in resources that may prevent annual exercises using cyber opposition forces; and
"(3) any other matters the Secretary of Defense considers appropriate."
Cyber Protection Support for Department of Defense Personnel in Positions Highly Vulnerable to Cyber Attack
Pub. L. 114–328, div. A, title XVI, §1645, Dec. 23, 2016, 130 Stat. 2603, provided that:
"(a)
"(1)
"(2)
"(A) who the Secretary determines to be highly vulnerable to cyber attacks and hostile information collection activities because of the positions occupied by such personnel in the Department; and
"(B) whose personal technology devices are highly vulnerable to cyber attacks and hostile information collection activities.
"(b)
"(c)
"(1) to encourage personnel of the Department of Defense to use personal technology devices for official business; or
"(2) to authorize cyber protection support for senior Department personnel using personal devices and networks in an official capacity.
"(d)
"(1) a description of the methodology used to make the determination under subsection (a)(2); and
"(2) guidance for the use of cyber protection support and tracking of support requests for personnel receiving cyber protection support under subsection (a).
"(e)
Limitation on Full Deployment of Joint Regional Security Stacks
Pub. L. 114–328, div. A, title XVI, §1646, Dec. 23, 2016, 130 Stat. 2604, provided that:
"(a)
"(1) the department or Defense Agency concerned completes operational test and evaluation activities to determine the effectiveness, suitability, and survivability of the joint regional security stacks system of such department or Defense Agency; and
"(2) written certification that such testing and evaluation activities have been completed is provided to the Secretary of such department or the head of such Defense Agency by the appropriate operational test and evaluation organization of such department or Defense Agency.
"(b)
"(1)
"(A) the Secretary of the military department or the head of the Defense Agency concerned;
"(B) the Director of Operational Test and Evaluation for the Department of Defense; and
"(C) the Chief Information Officer of the Department of Defense.
"(2)
"(A) the testing and evaluation activities required under subsection (a) are unnecessary, accompanied by an explanation of the reasons such activities are unnecessary;
"(B) the effectiveness, suitability, and survivability of the joint regional security stacks system of the military department or Defense Agency concerned has been demonstrated by methods other than the testing and evaluation activities required under subsection (a), accompanied by supporting data; or
"(C) national security needs justify full deployment of the joint regional security stacks system of the military department or Defense Agency concerned before the test and evaluation activities required under subsection (a) can be completed, accompanied by an explanation of such justification and a risk management plan."
Evaluation of Cyber Vulnerabilities of Department of Defense Critical Infrastructure
Pub. L. 114–328, div. A, title XVI, §1650, Dec. 23, 2016, 130 Stat. 2607, as amended by Pub. L. 115–91, div. A, title XVI, §1643, Dec. 12, 2017, 131 Stat. 1748; Pub. L. 115–232, div. A, title XVI, §1634, Aug. 13, 2018, 132 Stat. 2125, provided that:
"(a)
"(1)
"(2)
"(A) an identification of each of the military installations to be evaluated; and
"(B) an estimate of the cost of the evaluation.
"(3)
"(A) the Armed Forces stationed at such military installations; and
"(B) threats to such military installations.
"(4)
"(b)
"(1)
"(A) to improve the defense of control systems against cyber attacks;
"(B) to increase the resilience of military installations against cybersecurity threats;
"(C) to prevent or mitigate the potential for high-consequence cyber attacks;
"(D) to inform future requirements for the development of such control systems; and
"(E) to assess the strategic benefits derived from, and the challenges associated with, isolating military infrastructure from the national electric grid and the use of microgrids.
"(2)
"(3)
"(4)
"(A) a description of the activities carried out under the pilot program at each military installation concerned;
"(B) an assessment of the value of the methodologies or tools applied during the pilot program in increasing the resilience of military installations against cybersecurity threats;
"(C) recommendations for administrative or legislative actions to improve the ability of the Department to employ methodologies and tools for reducing cyber vulnerabilities in other activities of the Department of Defense; and
"(D) recommendations for including such methodologies or tools as requirements for relevant activities, including technical requirements for systems or military construction projects.
"(5)
"(c)
"(1)
"(2)
"(d)
"(1) the pilot program under subsection (b); or
"(2) the evaluation under subsection (c).
"(e)
"(1) develop tools that improve assessments of cyber vulnerabilities of Department of Defense critical infrastructure;
"(2) conduct non-recurring engineering for the design of mitigation solutions for such vulnerabilities; and
"(3) establish Department-wide information repositories to share findings relating to such assessments and to share such mitigation solutions.
"(f)
"(1)
"(2)
"(A) a research laboratory of the Department of Defense; or
"(B) a research laboratory of the Department of Energy approved by the Secretary of Energy to carry out the pilot program under subsection (b)."
Plan for Information Security Continuous Monitoring Capability and Comply-To-Connect Policy; Limitation on Software Licensing
Pub. L. 114–328, div. A, title XVI, §1653, Dec. 23, 2016, 130 Stat. 2610, provided that:
"(a)
"(1)
"(A) a plan for a modernized, Department-wide automated information security continuous monitoring capability that includes—
"(i) a proposed information security architecture for the capability;
"(ii) a concept of operations for the capability; and
"(iii) requirements with respect to the functionality and interoperability of the tools, sensors, systems, processes, and other components of the continuous monitoring capability; and
"(B) a comply-to-connect policy that requires systems to automatically comply with the configurations of the networks of the Department as a condition of connecting to such networks.
"(2)
"(3)
"(4)
"(5)
"(6)
"(b)
"(1)
"(A) to count the number of such licenses in use; and
"(B) to determine the security status of each instance of use of the software licensed.
"(2)
"(A) beginning on January 1, 2018, with respect to any contract entered into by the Secretary of Defense on or after such date for the licensing of software; and
"(B) beginning on January 1, 2020, with respect to any contract entered into by the Secretary for the licensing of software that was in effect on December 31, 2017."
Acquisition Authority of the Commander of United States Cyber Command
Pub. L. 114–92, div. A, title VIII, §807, Nov. 25, 2015, 129 Stat. 886, as amended by Pub. L. 115–232, div. A, title XVI, §1635, Aug. 13, 2018, 132 Stat. 2125; Pub. L. 116–92, div. A, title VIII, §821, Dec. 20, 2019, 133 Stat. 1490, provided that:
"(a)
"(1)
"(A) Development and acquisition of cyber operations-peculiar equipment and capabilities.
"(B) Acquisition and sustainment of cyber capability-peculiar equipment, capabilities, and services.
"(2)
"(b)
"(1)
"(A) to negotiate memoranda of agreement with the military departments and Department of Defense components to carry out the acquisition of equipment, capabilities, and services described in subsection (a)(1) on behalf of the Command;
"(B) to supervise the acquisition of equipment, capabilities, and services described in subsection (a)(1);
"(C) to represent the Command in discussions with the military departments regarding acquisition programs for which the Command is a customer; and
"(D) to work with the military departments to ensure that the Command is appropriately represented in any joint working group or integrated product team regarding acquisition programs for which the Command is a customer.
"(2)
"(A) responsible to the Commander for rapidly delivering acquisition solutions to meet validated cyber operations-peculiar requirements;
"(B) subordinate to the defense acquisition executive in matters of acquisition;
"(C) subject to the same oversight as the service acquisition executives; and
"(D) included on the distribution list for acquisition directives and instructions of the Department of Defense.
"(c)
"(1)
"(A) program acquisition;
"(B) the Joint Capabilities Integration and Development System Process;
"(C) program management;
"(D) system engineering; and
"(E) costing.
"(2)
"(d)
"(1) development and acquisition of cyber operations-peculiar equipment; and
"(2) acquisition and sustainment of other capabilities or services that are peculiar to cyber operations activities.
"(e)
"(f)
"(g)
"(1) A Department of Defense definition of—
"(A) cyber operations-peculiar equipment and capabilities; and
"(B) cyber capability-peculiar equipment, capabilities, and services.
"(2) Summaries of the components to be negotiated in the memorandum of agreements with the military departments and other Department of Defense components to carry out the development, acquisition, and sustainment of equipment, capabilities, and services described in subparagraphs (A) and (B) of subsection (a)(1).
"(3) Memorandum of agreement negotiation and approval timelines.
"(4) Plan for oversight of the command acquisition executive established in subsection (b).
"(5) Assessment of the acquisition workforce needs of the United States Cyber Command to support the authority in subsection (a) until 2021.
"(6) Other matters as appropriate.
"(h)
"(i)
"(1)
"(2)
Evaluation of Cyber Vulnerabilities of Major Weapon Systems of the Department of Defense
Pub. L. 114–92, div. A, title XVI, §1647, Nov. 25, 2015, 129 Stat. 1118, as amended by Pub. L. 114–328, div. A, title XVI, §1649(b), Dec. 23, 2016, 130 Stat. 2606; Pub. L. 116–92, div. A, title XVI, §1633, Dec. 20, 2019, 133 Stat. 1746, provided that:
"(a)
"(1)
"(2)
"(b)
"(1)
"(2)
"(3)
"(c)
"(d)
"(1) develop tools to improve the detection and evaluation of cyber vulnerabilities;
"(2) conduct non-recurring engineering for the design of solutions to mitigate cyber vulnerabilities; and
"(3) establish Department-wide information repositories to share findings relating to the evaluation and mitigation of cyber vulnerabilities.
"(e)
"(f)
"(f) [sic]
"(1) An identification of each major weapon system for which an evaluation will not be complete by the date specified in subsection (a)(1), the anticipated date of completion of the evaluation of each such weapon system, and a description of the remaining work to be done for the evaluation of each such weapon system.
"(2) A justification for the inability to complete such an evaluation by the date specified in subsection (a)(1).
"(g)
"(1) An identification of cyber vulnerabilities of each major weapon system requiring mitigation.
"(2) An identification of current and planned efforts to address the cyber vulnerabilities of each major weapon system requiring mitigation, including efforts across the doctrine, organization, training, materiel, leadership and education, personnel, and facilities of the Department.
"(3) A description of joint and common cyber vulnerability mitigation solutions and efforts, including solutions and efforts across the doctrine, organization, training, materiel, leadership and education, personnel, and facilities of the Department.
"(4) A description of lessons learned and best practices regarding evaluations of the cyber vulnerabilities and cyber vulnerability mitigation efforts relating to major weapon systems, including an identification of useful tools and technologies for discovering and mitigating vulnerabilities, such as those specified in section 1657 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 (Public Law 115–232) [132 Stat. 2151], and steps taken to institutionalize the use of these tools and technologies.
"(5) A description of efforts to share lessons learned and best practices regarding evaluations of the cyber vulnerabilities and cyber vulnerability mitigation efforts of major weapon systems across the Department.
"(6) An identification of measures taken to institutionalize evaluations of cyber vulnerabilities of major weapon systems, including an identification of which major weapon systems evaluated under this section will be reevaluated in the future, when these evaluations will occur, and how evaluations will occur for future major weapon systems.
"(7) Information relating to guidance, processes, procedures, or other activities established to mitigate or address the likelihood of cyber vulnerabilities of major weapon systems by incorporation of lessons learned in the research, development, test, evaluation, and acquisition cycle, including promotion of cyber education of the acquisition workforce.
"(8) An identification of systems to be incorporated into or that have been incorporated into the National Security Agency's Strategic Cybersecurity Program and the status of these systems in the Program.
"(9) Any other matters the Secretary determines relevant."
Notification of Foreign Threats to Information Technology Systems Impacting National Security
Pub. L. 113–291, div. A, title X, §1078, Dec. 19, 2014, 128 Stat. 3520, provided that:
"(a)
"(1)
"(2)
"(3)
"(b)
"(c)
Authorities, Capabilities, and Oversight of the United States Cyber Command
Pub. L. 113–66, div. A, title IX, §932, Dec. 26, 2013, 127 Stat. 829, provided that:
"(a)
"(b)
"(1)
"(2)
"(A) have not been previously identified and prepared for attack; and
"(B) must be compromised or neutralized immediately without regard to whether the adversary can detect or attribute the attack.
"(c)
"(1)
"(2)
"(A) Overall supervision of cyber activities related to offensive missions, defense of the United States, and defense of Department of Defense networks, including oversight of policy and operational considerations, resources, personnel, and acquisition and technology.
"(B) Such other matters relating to offensive military cyber forces as the Secretary shall specify for purposes of this subsection.
"(3)
"(A) integrate the cyber expertise and perspectives of appropriate organizations within the Office of the Secretary of Defense, Joint Staff, military departments, Defense Agencies, and combatant commands, by establishing and maintaining a full-time cross-functional team of subject matter experts from those organizations; and
"(B) select team members, and designate a team leader, from among those personnel nominated by the heads of such organizations.
"(d)
Pub. L. 114–328, div. A, title XVI, §1643(b), Dec. 23, 2016, 130 Stat. 2602, provided that: "The Principal Cyber Advisor, acting through the cross-functional team established by section 932(c)(3) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113–66; 10 U.S.C. 2224 note) [set out above] and in consultation with the Commander of the United States Cyber Command, shall supervise—
"(1) the development of training standards for computer network operations tool developers for military, civilian, and contractor personnel supporting the cyber mission forces;
"(2) the rapid enhancement of capacity to train personnel to those standards to meet the needs of the cyber mission forces for tool development; and
"(3) actions necessary to ensure timely completion of personnel security investigations and adjudications of security clearances for tool development personnel."
Joint Federated Centers for Trusted Defense Systems for the Department of Defense
Pub. L. 113–66, div. A, title IX, §937, Dec. 26, 2013, 127 Stat. 834, as amended by Pub. L. 114–92, div. A, title II, §231, Nov. 25, 2015, 129 Stat. 778, provided that:
"(a)
"(1)
"(2)
"(b)
"(c)
"(1) be established pursuant to the trusted defense systems strategy of the Department and supporting policies related to software assurance and supply chain risk management; and
"(2) set forth—
"(A) the role of the federation in supporting program offices in implementing the trusted defense systems strategy of the Department;
"(B) the software and hardware assurance expertise and capabilities of the federation, including policies, standards, requirements, best practices, contracting, training, and testing;
"(C) the requirements for the discharge by the federation of a program of research and development to improve automated software code vulnerability analysis and testing tools;
"(D) the requirements for the federation to procure, manage, and distribute enterprise licenses for automated software vulnerability analysis tools; and
"(E) the requirements for the discharge by the federation of a program of research and development to improve hardware vulnerability, testing, and protection tools.
"(d)
Improvements in Assurance of Computer Software Procured by the Department of Defense
Pub. L. 112–239, div. A, title IX, §933, Jan. 2, 2013, 126 Stat. 1884, provided that:
"(a)
"(b)
"(1) require use of appropriate automated vulnerability analysis tools in computer software code during the entire lifecycle of a covered system, including during development, operational testing, operations and sustainment phases, and retirement;
"(2) require covered systems to identify and prioritize security vulnerabilities and, based on risk, determine appropriate remediation strategies for such security vulnerabilities;
"(3) ensure such remediation strategies are translated into contract requirements and evaluated during source selection;
"(4) promote best practices and standards to achieve software security, assurance, and quality; and
"(5) support competition and allow flexibility and compatibility with current or emerging software methodologies.
"(c)
"(1) collect data on implementation of the policy developed under subsection (a) and measure the effectiveness of such policy, including the particular elements required under subsection (b); and
"(2) identify and promote best practices, tools, and standards for developing and validating assured software for the Department of Defense.
"(d)
"(1) A research and development strategy to advance capabilities in software assurance and vulnerability detection.
"(2) The state-of-the-art of software assurance analysis and test.
"(3) How the Department might hold contractors liable for software defects or vulnerabilities.
"(e)
"(1)
"(A) a major system, as that term is defined in section 2302(5) of title 10, United States Code;
"(B) a national security system, as that term is defined in [former] section 3542(b)(2) of title 44, United States Code [see now 44 U.S.C. 3552(b)(6)]; or
"(C) a Department of Defense information system categorized as Mission Assurance Category I in Department of Defense Directive 8500.01E that is funded by the Department of Defense.
"(2)
Reports to Department of Defense on Penetrations of Networks and Information Systems of Certain Contractors
Pub. L. 112–239, div. A, title IX, §941, Jan. 2, 2013, 126 Stat. 1889, which authorized the Secretary of Defense to establish criteria and reporting procedures applicable to penetration of cleared defense contractors' networks or information systems, was transferred to chapter 19 of this title, redesignated as section 393, and amended by Pub. L. 114–92, div. A, title XVI, §1641(a), Nov. 25, 2015, 129 Stat. 1114.
Insider Threat Detection
Pub. L. 112–81, div. A, title IX, §922, Dec. 31, 2011, 125 Stat. 1537, as amended by Pub. L. 114–92, div. A, title X, §1073(e), Nov. 25, 2015, 129 Stat. 996, provided that:
"(a)
"(b)
"(1) Technology solutions for deployment within the Department of Defense that allow for centralized monitoring and detection of unauthorized activities, including—
"(A) monitoring the use of external ports and read and write capability controls;
"(B) disabling the removable media ports of computers physically or electronically;
"(C) electronic auditing and reporting of unusual and unauthorized user activities;
"(D) using data-loss prevention and data-rights management technology to prevent the unauthorized export of information from a network or to render such information unusable in the event of the unauthorized export of such information;
"(E) a roles-based access certification system;
"(F) cross-domain guards for transfers of information between different networks; and
"(G) patch management for software and security updates.
"(2) Policies and procedures to support such program, including special consideration for policies and procedures related to international and interagency partners and activities in support of ongoing operations in areas of hostilities.
"(3) A governance structure and process that integrates information security and sharing technologies with the policies and procedures referred to in paragraph (2). Such structure and process shall include—
"(A) coordination with the existing security clearance and suitability review process;
"(B) coordination of existing anomaly detection techniques, including those used in counterintelligence investigation or personnel screening activities; and
"(C) updating and expediting of the classification review and marking process.
"(4) A continuing analysis of—
"(A) gaps in security measures under the program; and
"(B) technology, policies, and processes needed to increase the capability of the program beyond the initially established full operating capability to address such gaps.
"(5) A baseline analysis framework that includes measures of performance and effectiveness.
"(6) A plan for how to ensure related security measures are put in place for other departments or agencies with access to Department of Defense networks.
"(7) A plan for enforcement to ensure that the program is being applied and implemented on a uniform and consistent basis.
"(c)
"(1) achieves initial operating capability not later than October 1, 2012; and
"(2) achieves full operating capability not later than October 1, 2013.
"(d)
"(1) the implementation plan for the program established under subsection (a);
"(2) the resources required to implement the program;
"(3) specific efforts to ensure that implementation does not negatively impact activities in support of ongoing operations in areas of hostilities;
"(4) a definition of the capabilities that will be achieved at initial operating capability and full operating capability, respectively; and
"(5) a description of any other issues related to such implementation that the Secretary considers appropriate.
"(e)
"(1) Not later than 90 days after the date of the enactment of this Act [Dec. 31, 2011], a briefing describing the governance structure referred to in subsection (b)(3).
"(2) Not later than 120 days after the date of the enactment of this Act, a briefing detailing the inventory and status of technology solutions deployment referred to in subsection (b)(1), including an identification of the total number of host platforms planned for such deployment, the current number of host platforms that provide appropriate security, and the funding and timeline for remaining deployment.
"(3) Not later than 180 days after the date of the enactment of this Act, a briefing detailing the policies and procedures referred to in subsection (b)(2), including an assessment of the effectiveness of such policies and procedures and an assessment of the potential impact of such policies and procedures on information sharing within the Department of Defense and with interagency and international partners."
Strategy To Acquire Capabilities To Detect Previously Unknown Cyber Attacks
Pub. L. 112–81, div. A, title IX, §953, Dec. 31, 2011, 125 Stat. 1550, provided that:
"(a)
"(b)
"(1)
"(A) be adequate to enable well-trained analysts to discover the sophisticated attacks conducted by nation-state adversaries that are categorized as 'advanced persistent threats';
"(B) be appropriate for—
"(i) endpoints or hosts;
"(ii) network-level gateways operated by the Defense Information Systems Agency where the Department of Defense network connects to the public Internet; and
"(iii) global networks owned and operated by private sector Tier 1 Internet Service Providers;
"(C) at the endpoints or hosts, add new discovery capabilities to the Host-Based Security System of the Department, including capabilities such as—
"(i) automatic blocking of unauthorized software programs and accepting approved and vetted programs;
"(ii) constant monitoring of all key computer attributes, settings, and operations (such as registry keys, operations running in memory, security settings, memory tables, event logs, and files); and
"(iii) automatic baselining and remediation of altered computer settings and files;
"(D) at the network-level gateways and internal network peering points, include the sustainment and enhancement of a system that is based on full-packet capture, session reconstruction, extended storage, and advanced analytic tools, by—
"(i) increasing the number and skill level of the analysts assigned to query stored data, whether by contracting for security services, hiring and training Government personnel, or both; and
"(ii) increasing the capacity of the system to handle the rates for data flow through the gateways and the storage requirements specified by the United States Cyber Command; and
"(E) include the behavior-based threat detection capabilities of Tier 1 Internet Service Providers and other companies that operate on the global Internet.
"(2)
"(c)
"(d)
"(e)
Strategy on Computer Software Assurance
Pub. L. 111–383, div. A, title IX, §932, Jan. 7, 2011, 124 Stat. 4335, provided that:
"(a)
"(b)
"(1) A major system, as that term is defined in section 2302(5) of title 10, United States Code.
"(2) A national security system, as that term is defined in [former] section 3542(b)(2) of title 44, United States Code [see now 44 U.S.C. 3552(b)(6)].
"(3) Any Department of Defense information system categorized as Mission Assurance Category I.
"(4) Any Department of Defense information system categorized as Mission Assurance Category II in accordance with Department of Defense Directive 8500.01E.
"(c)
"(1) Policy and regulations on the following:
"(A) Software assurance generally.
"(B) Contract requirements for software assurance for covered systems in development and production.
"(C) Inclusion of software assurance in milestone reviews and milestone approvals.
"(D) Rigorous test and evaluation of software assurance in development, acceptance, and operational tests.
"(E) Certification and accreditation requirements for software assurance for new systems and for updates for legacy systems, including mechanisms to monitor and enforce reciprocity of certification and accreditation processes among the military departments and Defense Agencies.
"(F) Remediation in legacy systems of critical software assurance deficiencies that are defined as critical in accordance with the Application Security Technical Implementation Guide of the Defense Information Systems Agency.
"(2) Allocation of adequate facilities and other resources for test and evaluation and certification and accreditation of software to meet applicable requirements for research and development, systems acquisition, and operations.
"(3) Mechanisms for protection against compromise of information systems through the supply chain or cyber attack by acquiring and improving automated tools for—
"(A) assuring the security of software and software applications during software development;
"(B) detecting vulnerabilities during testing of software; and
"(C) detecting intrusions during real-time monitoring of software applications.
"(4) Mechanisms providing the Department of Defense with the capabilities—
"(A) to monitor systems and applications in order to detect and defeat attempts to penetrate or disable such systems and applications; and
"(B) to ensure that such monitoring capabilities are integrated into the Department of Defense system of cyber defense-in-depth capabilities.
"(5) An update to Committee for National Security Systems Instruction No. 4009, entitled 'National Information Assurance Glossary', to include a standard definition for software security assurance.
"(6) Either—
"(A) mechanisms to ensure that vulnerable Mission Assurance Category III information systems, if penetrated, cannot be used as a foundation for penetration of protected covered systems, and means for assessing the effectiveness of such mechanisms; or
"(B) plans to address critical vulnerabilities in Mission Assurance Category III information systems to prevent their use for intrusions of Mission Assurance Category I systems and Mission Assurance Category II systems.
"(7) A funding mechanism for remediation of critical software assurance vulnerabilities in legacy systems.
"(d)
"(1) A description of the current status of the strategy required by subsection (a) and of the implementation of the strategy, including a description of the role of the strategy in the risk management by the Department regarding the supply chain and in operational planning for cyber security.
"(2) A description of the risks, if any, that the Department will accept in the strategy due to limitations on funds or other applicable constraints."
Institute for Defense Computer Security and Information Protection
Pub. L. 106–398, §1 [[div. A], title IX, §921], Oct. 30, 2000, 114 Stat. 1654, 1654A–233, provided that:
"(a)
"(b)
"(1) to conduct research and technology development that is relevant to foreseeable computer and network security requirements and information assurance requirements of the Department of Defense with a principal focus on areas not being carried out by other organizations in the private or public sector; and
"(2) to facilitate the exchange of information regarding cyberthreats, technology, tools, and other relevant issues.
"(c)
"(d)
"(e)