(a)
(b)
(c)
(d)
(e)
(f)
(1) The term "clandestine military activity or operation in cyberspace" means a military activity or military operation carried out in cyberspace, or associated preparatory actions, authorized by the President or the Secretary that—
(A) is marked by, held in, or conducted with secrecy, where the intent is that the activity or operation will not be apparent or acknowledged publicly; and
(B) is to be carried out—
(i) as part of a military operation plan approved by the President or the Secretary in anticipation of hostilities or as directed by the President or the Secretary;
(ii) to deter, safeguard, or defend against attacks or malicious cyber activities against the United States or Department of Defense information, networks, systems, installations, facilities, or other assets; or
(iii) in support of information related capabilities.
(2) The term "foreign power" has the meaning given such term in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).
(3) The term "United States person" has the meaning given such term in such section.
References in Text
The War Powers Resolution, referred to in subsecs. (b) and (e), is Pub. L. 93–148, Nov. 7, 1973, 87 Stat. 555, which is classified generally to chapter 33 (§1541 et seq.) of Title 50, War and National Defense. For complete classification of this Resolution to the Code, see Short Title note set out under section 1541 of Title 50 and Tables.
The Authorization for Use of Military Force, referred to in subsec. (e), is Pub. L. 107–40, Sept. 18, 2001, 115 Stat. 224, which is set out as a note under section 1541 of Title 50, War and National Defense.
Amendments
2018—Pub. L. 115–232, §1632, designated existing provisions as subsec. (a), inserted heading, substituted "conduct, military cyber activities or operations in cyberspace, including clandestine military activities or operations in cyberspace, to defend the United States and its allies, including in response" for "conduct, a military cyber operation in response", struck out "(as such terms are defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801))" after "foreign power", and added subsecs. (b) to (f).
Pub. L. 115–232, §1631(a), renumbered section 130g of this title as this section.
Notification of Delegation of Authorities to the Secretary of Defense for Military Operations in Cyberspace
Pub. L. 116–92, div. A, title XVI, §1642, Dec. 20, 2019, 133 Stat. 1751, provided that:
"(a)
"(1) Authorities delegated to the Secretary by the President for military operations in cyberspace that are otherwise held by the National Command Authority, not later than 15 days after any such delegation. A notification under this paragraph shall include a description of the authorities delegated to the Secretary.
"(2) Concepts of operations approved by the Secretary pursuant to delegated authorities described in paragraph (1), not later than 15 days after any such approval. A notification under this paragraph shall include the following:
"(A) A description of authorized activities to be conducted or planned to be conducted pursuant to such authorities.
"(B) The defined military objectives relating to such authorities.
"(C) A list of countries in which such authorities may be exercised.
"(D) A description of relevant orders issued by the Secretary in accordance with such authorities.
"(b)
"(1)
"(2)
"(3)
Annual Military Cyberspace Operations Report
Pub. L. 116–92, div. A, title XVI, §1644, Dec. 20, 2019, 133 Stat. 1752, provided that:
"(a)
"(1) An identification of the objective and purpose.
"(2) Descriptions of the impacted countries, organizations, or forces, and nature of the impact.
"(3) A description of methodologies used for the cyber effects operation or cyber effects enabling operation.
"(4) An identification of the Cyber Mission Force teams, or other Department of Defense entity or units, that conducted such operation, and supporting teams, entities, or units.
"(5) An identification of the infrastructures on which such operations occurred.
"(6) A description of relevant legal, operational, and funding authorities.
"(7) Additional costs beyond baseline operations and maintenance and personnel costs directly associated with the conduct of the cyber effects operation or cyber effects enabling operation.
"(8) Any other matters the Secretary determines relevant.
"(b)
"(c)
Policy of the United States on Cyberspace, Cybersecurity, Cyber Warfare, and Cyber Deterrence
Pub. L. 115–232, div. A, title XVI, §1636, Aug. 13, 2018, 132 Stat. 2126, provided that:
"(a)
"(1) cause casualties among United States persons or persons of United States allies;
"(2) significantly disrupt the normal functioning of United States democratic society or government (including attacks against critical infrastructure that could damage systems used to provide key services to the public or government);
"(3) threaten the command and control of the Armed Forces, the freedom of maneuver of the Armed Forces, or the industrial base or other infrastructure on which the United States Armed Forces rely to defend United States interests and commitments; or
"(4) achieve an effect, whether individually or in aggregate, comparable to an armed attack or imperil a vital interest of the United States.
"(b)
"(c)
"(d)
"(e)
"(f)
"(1)
"(2)
"(A) An assessment of the current posture in cyberspace, including assessments of—
"(i) whether past responses to major cyber attacks have had the desired deterrent effect; and
"(ii) how adversaries have responded to past United States responses.
"(B) Updates on the Administration's efforts in the development of—
"(i) cost imposition strategies;
"(ii) varying levels of cyber incursion and steps taken to date to prepare for the imposition of the consequences referred to in clause (i); and
"(iii) the Cyber Deterrence Initiative.
"(C) Information relating to the Administration's plans, including specific planned actions, regulations, and legislative action required, for—
"(i) advancing technologies in attribution, inherently secure technology, and artificial intelligence society-wide;
"(ii) improving cybersecurity in and cooperation with the private sector;
"(iii) improving international cybersecurity cooperation; and
"(iv) implementing the policy referred to in paragraph (1), including any realignment of government or government responsibilities required, writ large.
"(f) [probably should be "(g)"]
"(g) [probably should be "(h)"]
"(1)
"(A) the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives];
"(B) the Permanent Select Committee on Intelligence of the House of Representatives;
"(C) the Select Committee on Intelligence of the Senate;
"(D) the Committee on Foreign Affairs, the Committee on Homeland Security, and the Committee on the Judiciary of the House of Representatives; and
"(E) the Committee on Foreign Relations, the Committee on Homeland Security and Governmental Affairs, and the Committee on the Judiciary of the Senate.
"(2)
Pub. L. 115–91, div. A, title XVI, §1633, Dec. 12, 2017, 131 Stat. 1738, provided that:
"(a)
"(1) develop a national policy for the United States relating to cyberspace, cybersecurity, and cyber warfare; and
"(2) submit to the appropriate congressional committees a report on the policy.
"(b)
"(1) Delineation of the instruments of national power available to deter or respond to cyber attacks or other malicious cyber activities by a foreign power or actor that targets United States interests.
"(2) Available or planned response options to address the full range of potential cyber attacks on United States interests that could be conducted by potential adversaries of the United States.
"(3) Available or planned denial options that prioritize the defensibility and resiliency against cyber attacks and malicious cyber activities that are carried out against infrastructure critical to the political integrity, economic security, and national security of the United States.
"(4) Available or planned cyber capabilities that may be used to impose costs on any foreign power targeting the United States or United States persons with a cyber attack or malicious cyber activity.
"(5) Development of multi-prong response options, such as—
"(A) boosting the cyber resilience of critical United States strike systems (including cyber, nuclear, and non-nuclear systems) in order to ensure the United States can credibly threaten to impose unacceptable costs in response to even the most sophisticated large-scale cyber attack;
"(B) developing offensive cyber capabilities and specific plans and strategies to put at risk targets most valued by adversaries of the United States and their key decision makers; and
"(C) enhancing attribution capabilities and developing intelligence and offensive cyber capabilities to detect, disrupt, and potentially expose malicious cyber activities.
"(c)
"(1)
"(2)
"(A) the White House Communication Agency; and
"(B) the White House Situation Support Staff.
"(d)
"(1) The term 'foreign power' has the meaning given that term in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).
"(2) The term 'appropriate congressional committees' means—
"(A) the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives];
"(B) the Committee on Foreign Affairs, the Committee on Homeland Security, and the Committee on the Judiciary of the House of Representatives; and
"(C) the Committee on Foreign Relations, the Committee on Homeland Security and Governmental Affairs, and the Committee on the Judiciary of the Senate."
Active Defense Against the Russian Federation, People's Republic of China, Democratic People's Republic of Korea, and Islamic Republic of Iran Attacks in Cyberspace
Pub. L. 115–232, div. A, title XVI, §1642, Aug. 13, 2018, 132 Stat. 2132, provided that:
"(a)
"(1)
"(2)
"(A)
"(B)
"(i)
"(ii)
"(b)
"(c)
"(1) the scope and intensity of the information operations and attacks through cyberspace by the countries specified in subsection (a)(1) against the government or people of the United States observed by the cyber mission forces of the United States Cyber Command and the National Security Agency; and
"(2) adjustments of the Department of Defense in the response directed or recommended by the Secretary with respect to such operations and attacks.
"(d)
"(1) limit the authority of the Secretary to conduct military activities or operations in cyberspace, including clandestine activities or operations in cyberspace; or
"(2) affect the War Powers Resolution (Public Law 93–148; 50 U.S.C. 1541 et seq.) or the Authorization for Use of Military Force (Public Law 107–40; 50 U.S.C. 1541 note)."
Pilot Program To Model Cyber Attacks on Critical Infrastructure
Pub. L. 115–232, div. A, title XVI, §1649, Aug. 13, 2018, 132 Stat. 2137, provided that:
"(a)
"(1)
"(2)
"(b)
"(1) The development and demonstration of risk analysis methodologies, and the application of commercial simulation and modeling capabilities, based on artificial intelligence and hyperscale cloud computing technologies, as applicable—
"(A) to assess defense critical infrastructure vulnerabilities and interdependencies to improve military resiliency;
"(B) to determine the likely effectiveness of attacks described in subsection (a)(1), and countermeasures, tactics, and tools supporting responsive military homeland defense operations;
"(C) to train personnel in incident response;
"(D) to conduct exercises and test scenarios;
"(E) to foster collaboration and learning between and among departments and agencies of the Federal Government, State and local governments, and private entities responsible for critical infrastructure; and
"(F) improve intra-agency and inter-agency coordination for consideration and approval of requests for defense support to civil authorities.
"(2) The development and demonstration of the foundations for establishing and maintaining a program of record for a shared high-fidelity, interactive, affordable, cloud-based modeling and simulation of critical infrastructure systems and incident response capabilities that can simulate complex cyber and physical attacks and disruptions on individual and multiple sectors on national, regional, State, and local scales.
"(c)
"(1)
"(2)
"(A) A description of the results of the pilot program as of the date of the report.
"(B) A description of the risk analysis methodologies and modeling and simulation capabilities developed and demonstrated pursuant to the pilot program, and an assessment of the potential for future growth of commercial technology in support of the homeland defense mission of the Department of Defense.
"(C) Such recommendations as the Secretary considers appropriate regarding the establishment of a program of record for the Department on further development and sustainment of risk analysis methodologies and advanced, large-scale modeling and simulation on critical infrastructure and cyber warfare.
"(D) Lessons learned from the use of novel risk analysis methodologies and large-scale modeling and simulation carried out under the pilot program regarding vulnerabilities, required capabilities, and reconfigured force structure, coordination practices, and policy.
"(E) Planned steps for implementing the lessons described in subparagraph (D).
"(F) Any other matters the Secretary determines appropriate."
Identification of Countries of Concern Regarding Cybersecurity
Pub. L. 115–232, div. A, title XVI, §1654, Aug. 13, 2018, 132 Stat. 2148, provided that:
"(a)
"(1) A foreign government's activities that pose force protection or cybersecurity risk to the personnel, financial systems, critical infrastructure, or information systems of the United States or coalition forces.
"(2) A foreign government's willingness and record of providing financing, logistics, training or intelligence to other persons, countries or entities posing a force protection or cybersecurity risk to the personnel, financial systems, critical infrastructure, or information systems of the United States or coalition forces.
"(3) A foreign government's engagement in foreign intelligence activities against the United States for the purpose of undermining United States national security.
"(4) A foreign government's knowing participation in transnational organized crime or criminal activity.
"(5) A foreign government's cyber activities and operations to affect the supply chain of the United States Government.
"(6) A foreign government's use of cyber means to unlawfully or inappropriately obtain intellectual property from the United States Government or United States persons.
"(b)
"(c)
Quadrennial Comprehensive Cyber Posture Review
Pub. L. 115–91, div. A, title XVI, §1644, Dec. 12, 2017, 131 Stat. 1748, as amended by Pub. L. 116–92, div. A, title XVI, §1635, Dec. 20, 2019, 133 Stat. 1748, provided that:
"(a)
"(b)
"(c)
"(1) The role of cyber forces in the military strategy, planning, and programming of the United States.
"(2) Review of the role of cyber operations in combatant commander operational planning, the ability of combatant commanders to respond to hostile acts by adversaries, and the ability of combatant commanders to engage and build capacity with allies.
"(3) A review of the law, policies, and authorities relating to, and necessary for the United States to maintain, a safe, reliable, and credible cyber posture for responding to cyber attacks and for deterrence in cyberspace.
"(4) A declaratory policy relating to the responses of the United States to cyber attacks of significant consequence.
"(5) Proposed norms for the conduct of offensive cyber operations for deterrence and in crisis and conflict.
"(6) Guidance for the development of a cyber deterrence strategy (which may include activities, capability efforts, and operations other than cyber activities, cyber capability efforts, and cyber operations), including—
"(A) a review and assessment of various approaches to cyber deterrence, determined in consultation with experts from Government, academia, and industry;
"(B) a comparison of the strengths and weaknesses of the approaches identified under subparagraph (A) relative to the threat and to each other; and
"(C) an explanation of how the cyber deterrence strategy will inform country-specific deterrence campaign plans focused on key leadership of Russia, China, Iran, North Korea, and any other country the Secretary considers appropriate.
"(7) Identification of the steps that should be taken to bolster stability in cyberspace and, more broadly, stability between major powers, taking into account—
"(A) the analysis and gaming of escalation dynamics in various scenarios; and
"(B) consideration of the spiral escalatory effects of countries developing increasingly potent offensive cyber capabilities.
"(8) A determination of whether sufficient personnel are trained and equipped to meet validated cyber requirements.
"(9) An assessment of the potential costs, benefits, and value, if any, of establishing a cyber force as a separate uniformed service.
"(10) Any recurrent problems or capability gaps that remain unaddressed since the previous posture review.
"(11) Such other matters as the Secretary considers appropriate.
"(d)
"(1)
"(2)
"(e)