10 USC Ch. 19: Front Matter
Result 1 of 1
   
 
10 USC Ch. 19: Front Matter
From Title 10-ARMED FORCESSubtitle A-General Military LawPART I-ORGANIZATION AND GENERAL MILITARY POWERSCHAPTER 19-CYBER AND INFORMATION OPERATIONS MATTERS

CHAPTER 19-CYBER AND INFORMATION OPERATIONS MATTERS

Sec.
391.
Reporting on cyber incidents with respect to networks and information systems of operationally critical contractors and certain other contractors.
391a.
Annual reports on support by military departments for United States Cyber Command.
391b.
Strategic cybersecurity program.
392.
Executive agents for cyber test and training ranges.
392a.
Principal Cyber Advisors.
393.
Reporting on penetrations of networks and information systems of certain contractors.
394.
Authorities concerning military cyber operations.
395.
Notification requirements for sensitive military cyber operations.
396.
Notification requirements for cyber weapons.
397.
Principal Information Operations Advisor.
398.
Military information support operations in information environment.
398a.
Pilot program for sharing cyber capabilities and related information with foreign operational partners.
399.
Notifications relating to military operations in the information environment: requirement to notify Chief of Mission.

        

Editorial Notes

Amendments

2023- Pub. L. 118–31, div. A, title XV, §§1501(1), 1502(a)(1), title XVIII, §1801(a)(6), Dec. 22, 2023, 137 Stat. 533 , 683, added item 391b and made identical amendments redesignating item 398 "Pilot program for sharing cyber capabilities and related information with foreign operational partners" as 398a. Amendments were made pursuant to operation of section 102 of this title.

2022- Pub. L. 117–263, div. A, title X, §1052(b), title XV, §§1501(b)(1), 1502(a), 1521, 1551(b), Dec. 23, 2022, 136 Stat. 2777 , 2877, 2879, 2897, 2919, added items 391a, 392a, and 399 and two items 398.

2019- Pub. L. 116–92, div. A, title XVI, §1631(a)(2)(A), Dec. 20, 2019, 133 Stat. 1742 , substituted "CYBER AND INFORMATION OPERATIONS MATTERS" for "CYBER MATTERS" in chapter heading and added item 397.

2018- Pub. L. 115–232, div. A, title XVI, §1631(c)(2), Aug. 13, 2018, 132 Stat. 2123 , added items 394 to 396.

2015- Pub. L. 114–92, div. A, title X, §1081(a)(4), title XVI, §1641(c)(2), Nov. 25, 2015, 129 Stat. 1001 , 1116, substituted "Reporting on cyber incidents with respect to networks and information systems of operationally critical contractors and certain other contractors" for "Reporting on cyber incidents with respect to networks and information systems of operationally critical contractors" in item 391 and added item 393.

2014- Pub. L. 113–291, div. A, title XVI, §1633(d), Dec. 19, 2014, 128 Stat. 3643 , added item 392.


Statutory Notes and Related Subsidiaries

Department of Defense Data Ontology Governance Working Group

Pub. L. 119–60, div. A, title XV, §1504, Dec. 18, 2025, 139 Stat. 1140 , provided that:

"(a) Establishment.-

"(1) In general.-The Secretary of Defense shall establish a working group to develop and implement a common data ontology and governance structure across the Department of Defense.

"(2) Designation.-The working group established under to [sic] paragraph (1) shall be known as the 'Department of Defense Data Ontology Governance Working Group' (in this section the 'Working Group').

"(3) Use of existing structures.-

"(A) In general.-Notwithstanding paragraph (1), the Secretary of Defense may designate an existing forum, council, or organizational body to serve as the Working Group if such entity satisfies the requirements of subsections (b) and (c).

"(B) Rule of construction.-For the purposes of this section, a forum, council, or organizational body designated under subparagraph (A) is deemed to be a working group established by the Secretary of Defense under paragraph (1).

"(b) Purpose.-The purpose of the Working Group is to inform and to progress the Department of Defense's foundational data ontology work by developing and implementing domain-specific data ontologies and governance structures across the Department of Defense to expand data interoperability, enhance information sharing, and enable more effective decision making throughout the Department.

"(c) Membership.-The Working Group shall consist of-

"(1) the Chief Digital and Artificial Intelligence Officer of the Department of Defense;

"(2) the Chief Information Officer of the Department of Defense;

"(3) the Chief Data Officers of the Department of Defense;

"(4) the Chief Information Officers of the military departments and the combatant commands;

"(5) such representatives from defense intelligence elements as the Secretary of Defense considers appropriate;

"(6) the Under Secretary of Defense for Research and Engineering and the service acquisition executive for each military department; and

"(7) such other officers or employees of the Department of Defense as the Secretary considers appropriate.

"(d) Duties.-The Working Group shall-

"(1) coordinate with and build upon any existing data ontology development efforts for foundational data ontologies within the Department of Defense and the intelligence community (as defined in section 3 of the National Security Act of 1947 (50 U.S.C. 3003)) to ensure complementary and nonduplicative efforts;

"(2) incorporate Department-wide data and data from defense intelligence elements into the development of domain-specific data ontologies Department-wide;

"(3) develop and maintain domain-specific data ontologies that address functional areas within the Department;

"(4) establish a process to identify and designate functional area leads responsible for leading the development, review, approval, and respective guidance of domain-specific data ontologies for the functional areas of such elements;

"(5) develop a structure for governing data ontologies of the Department that includes-

"(A) a centralized, accessible repository for domain-specific data ontologies of the Department;

"(B) clear ownership and role definitions for data ontology management, including authorities regarding access and modification;

"(C) standardized governance procedures for updating, reviewing, and maintaining the data ontologies;

"(D) adherence to established data ontology engineering principles that promote interoperability and reusability across domains;

"(E) infrastructure requirements that include on premises, multi-cloud and hybrid environments;

"(F) access to information networks that are on all classification levels; and

"(G) integration of domain-specific ontologies with existing Department data management practices and systems.

"(e) Functional Area Leads.-

"(1) Selection criteria.-In designating functional area leads under subsection (d)(4), the Working Group shall select individuals who possess extensive subject matter expertise in their respective functional areas and maintain substantial equities or responsibilities within the functional area.

"(2) Representation.-The Working Group shall designate functional area leads under subsection (d)(4) in a manner that ensures appropriate representation across the Department of Defense, including the military departments, combatant commands, defense agencies, and field activities.

"(3) Responsibilities.-Each functional area lead designated under subsection (d)(4) shall be responsible for-

"(A) leading the development and maintenance of domain-specific data ontologies within the functional areas for which such entity is designated as the functional area lead;

"(B) reviewing and approving domain-specific data ontology elements specific to such functional areas;

"(C) ensuring alignment between domain-specific data ontologies specific to such functional areas and the enterprise-wide foundational data ontology;

"(D) developing guidance specific to such domain-specific data ontologies for data ontology implementation; and

"(E) serving as the authoritative source for knowledge on domains in such functional areas within the data ontology governance structure.

"(f) Timeline and Deliverables.-

"(1) Establishment.-The Secretary of Defense shall ensure that the Working Group is established pursuant to subsection (a) not later than June 1, 2026, and the Working Group shall remain in effect for a period of not less than 5 years beginning on the date of the establishment of the Working Group, unless the Secretary determines that it is necessary to transition the Working Group into a permanent organization.

"(2) Functional area lead designation.-Not later than August 1, 2026, the Working Group shall identify and designate functional area leads in accordance with subsections (d)(4) and (e).

"(3) Department-level policy.-Not later than June 1, 2027, the Working Group shall develop and distribute a Department of Defense-wide policy on the data ontology governance structure, including guidelines for the development, maintenance, and integration of domain-specific ontologies.

"(4) Implementation.-Not later than June 1, 2028, the Working Group shall implement the governance structure developed under subsection (d)(5).

"(g) Briefing and Report.-

"(1) Briefing.-Not later than July 1, 2027, the Working Group shall provide to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] a briefing on progress of the Working Group in carrying out this section.

"(2) Report.-Not later than June 30, 2028, the Secretary of Defense shall submit to the congressional defense committees a report on the implementation of the data ontology governance structure, including the status of the implementation of such structure for domain-specific ontologies, and recommendations for sustainment and further development.

"(h) Definitions.-In this section:

"(1) The term 'data ontology' means a formal, structured representation and categorization of data elements, their properties, and the relationships between them within an information system or knowledge domain that enables consistent interpretation, integration, and analysis of data across different systems and users.

"(2) The term 'Defense intelligence element' has the meaning given such term in section 429 of title 10, United States Code.

"(3) The term 'domain-specific data ontology' means a data ontology that is specific to a particular functional areas [sic] within the Department of Defense.

"(4) The term 'foundational data ontology' means a top-level, domain-independent data ontology that establishes universal categories and primitives applicable across information systems and upon which domain-specific ontologies are based.

"(5) The term 'functional area' means a specialized functional, operational, or subject-matter areas within the Department.

"(6) The terms 'military department' and 'service acquisition executive' have the meanings given such terms, respectively, in title 10, United States Code."

Prohibition on Access to Department of Defense Cloud-Based Resources by Certain Individuals

Pub. L. 119–60, div. A, title XVI, §1692, Dec. 18, 2025, 139 Stat. 1206 , provided that:

"(a) Access Prohibition.-

"(1) Prohibition for individuals located in covered nations.-The Secretary of Defense shall prohibit any individual physically located in a covered nation from having any of the accesses described in paragraph (2).

"(2) Accesses described.-The accesses described in this paragraph are the following:

"(A) Physical access to any facility, hardware, or equipment that hosts or operates a Department of Defense cloud computing system.

"(B) Logical or remote access to a Department of Defense cloud computing system, including with respect to management interfaces, virtualization platforms, security controls, or monitoring systems.

"(C) Logical or remote access to Department of Defense data or workloads on a Department of Defense cloud computing system, including with respect to applications, configurations, network architecture, data schemas, security settings, access logs or other information that could compromise the confidentiality, integrity, or availability of the system, software, or data.

"(D) Indirect access to confidential and technical information not publicly available about a Department of Defense cloud computing system through observation, documentation, briefings, or other communication means (excluding administrative data normally shared to support business operations and compliance requirements applied to publicly traded companies).

"(b) Department of Defense Guidance, Directives, Procedures, Requirements, and Regulations.-The Secretary shall-

"(1) review all relevant guidance, directives, procedures, requirements, and regulations of the Department of Defense, including the Cloud Computing Security Requirements Guide, the Security Technical Implementation Guides, and related instructions of the Department; and

"(2) make such revisions as may be necessary to ensure conformity and compliance with subsection (a).

"(c) Briefings.-The Secretary shall provide to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] briefings on the implementation of this section as follows:

"(1) Not later than June 1, 2026, an initial briefing on the implementation status, including policies, procedures, and controls implemented to carry out this section.

"(2) Not later than June 1, 2027, and annually thereafter through 2028, briefings on the implementation progress, effectiveness of controls, security incidents, and recommendations for legislative or administrative action.

"(d) Rule of Construction.-Nothing in this section shall be construed to prohibit or restrict-

"(1) software development activities, including the development, modification, or contribution to open-source code and software; or

"(2) collaboration on or access to publicly available open-source software components that may be incorporated into Department of Defense cloud computing systems.

"(e) Definitions.-ln this section:

"(1) The term 'covered nation' has the meaning given that term in section 4872 of title 10, United States Code.

"(2) The term 'Department of Defense cloud computing system' means any cloud computing (as defined by section 239.7601 of the Defense Federal Acquisition Regulation Supplement) environment accredited by the Secretary of Defense for controlled unclassified information or classified information, or a cloud computing environment that is a national security system (as defined by section 3552(b)(6) of title 44)."

Establishment of the Department of Defense Hackathon Program

Pub. L. 118–159, div. A, title XV, §1503, Dec. 23, 2024, 138 Stat. 2132 , provided that:

"(a) In General.-Not later than 180 days after the date of the enactment of this Act [Dec. 23, 2024], the Chief Digital and Artificial Intelligence Officer of the Department of Defense, in coordination with the Chairman of the Joint Chiefs of Staff and the Chief Information Officer of the Department of Defense, shall establish a program (to be known as the 'Department of Defense Hackathon Program') under which the commanders of combatant commands and the Secretaries of the military departments shall carry out not fewer than four Hackathons each year.

"(b) Program Management.-The Chief Digital and Artificial Intelligence Officer of the Department of Defense shall develop and implement standards for carrying out Hackathons, provide supporting technical infrastructure to the host of each Hackathon, and determine the hosts each year under subsection (c)(1).

"(c) Hosts.-

"(1)(A) Each year, two commanders of combatant commands shall each carry out a Hackathon and two Secretaries of military departments shall each carry out a Hackathon, as determined by the Chief Digital and Artificial Intelligence Officer of the Department of Defense in accordance with this subsection.

"(B) The commanders of combatant commands and the Secretaries of military departments carrying out Hackathons pursuant to subparagraph (A) shall change each year.

"(C) Each host of a Hackathon shall-

"(i) provide to the participants invited to participate in such Hackathon a per diem allowance in accordance with section 5702 of title 5, United States Code, or section 452 of title 37, United States Code, as applicable; and

"(ii) not later than 60 days after the completion of such Hackathon, make available to the Department of Defense a report on such Hackathon.

"(2) Any commander of a combatant command or Secretary of a military department may carry out a Hackathon in addition to the Hackathons required under paragraph (1).

"(d) Hackathon Objectives.-

"(1) The host of each Hackathon shall establish objectives for the Hackathon that address a critical, technical challenge of the combatant command or military department of the host, as applicable, through the use of individuals with specialized and relevant skills, including data scientists, developers, software engineers, and other specialists as determined appropriate by the Chief Digital and Artificial Intelligence Officer of the Department of Defense or the host.

"(2) In addition to the objectives established by the host of a Hackathon under paragraph (1), the objectives for each Hackathon shall include-

"(A) fostering innovation across the Department of Defense, including in military departments and the combatant commands; and

"(B) creating repeatable processes enabling the commanders of combatant commands and the Secretaries of the military departments to more rapidly identify and develop solutions to critical, technical challenges across the Department of Defense.

"(e) Definitions.-In this section-

"(1) the term 'Hackathon' means an event carried out under the Program at which employees across the Department of Defense meet to collaboratively attempt to develop functional software or hardware solutions during the event to solve a critical, technical challenge determined by the host;

"(2) the term 'host', with respect to a Hackathon, means the commander of the combatant command or the Secretary of the military department carrying out the Hackathon;

"(3) the term 'military department' has the meaning given such term in section 101(a) of title 10, United States Code; and

"(4) the term 'Program' means the program established under subsection (a)."

Alignment of Department of Defense Cyber International Strategy With National Defense Strategy and Department of Defense Cyber Strategy

Pub. L. 117–263, div. A, title XV, §1506, Dec. 23, 2022, 136 Stat. 2882 , provided that:

"(a) Alignment Required.-Not later than 270 days after the date of the enactment of this Act [Dec. 23, 2022], the Secretary of Defense, acting through the Under Secretary of Defense for Policy and in coordination with the commanders of the combatant commands and the Director of the Joint Staff, shall undertake efforts to align the cybersecurity cooperation enterprise of the Department of Defense and the cyberspace operational partnerships of the Department with-

"(1) the national defense strategy published in 2022 pursuant to section 113(g) of title 10, United States Code;

"(2) the Cyber Strategy of the Department published during fiscal year 2023; and

"(3) the current International Cyberspace Security Cooperation Guidance of the Department, as of the date of the enactment of this Act.

"(b) Elements.-The alignment efforts under subsection (a) shall include the following efforts within the Department of Defense:

"(1) Efforts to build the internal capacity of the Department to support international strategy policy engagements with allies and partners of the United States.

"(2) Efforts to coordinate and align cyberspace operations with foreign partners of the United States, including alignment between hunt-forward missions and other cyber international strategy activities conducted by the Department, including identification of processes, working groups, and methods to facilitate coordination between geographic combatant commands and the United States Cyber Command.

"(3) Efforts to deliberately cultivate operational and intelligence-sharing partnerships with key allies and partners of the United States to advance the cyberspace operations objectives of the Department.

"(4) Efforts to identify key allied and partner networks, infrastructure, and systems that the Joint Force will rely upon for warfighting and to-

"(A) support the cybersecurity and cyber defense of those networks, infrastructure, and systems;

"(B) build partner capacity to actively defend those networks, infrastructure, and systems;

"(C) eradicate malicious cyber activity that has compromised those networks, infrastructure, and systems, such as when identified through hunt-forward operations; and

"(D) leverage the commercial and military cybersecurity technology and services of the United States to harden and defend those networks, infrastructure, and systems.

"(5) Efforts to secure the environments and networks of mission partners of the United States used to hold intelligence and information originated by the United States.

"(6) Prioritization schemas, funding requirements, and efficacy metrics to drive cyberspace security investments in the tools, technologies, and capacity-building efforts that will have the greatest positive impact on the resilience and ability of the Department to execute its operational plans and achieve integrated deterrence.

"(c) Organization.-The Under Secretary of Defense for Policy shall lead efforts to implement this section. In doing so, the Under Secretary shall consult with the Secretary of State, the National Cyber Director, the Director of the Cybersecurity and Infrastructure Security Agency, and the Director of the Federal Bureau of Investigation, to align plans and programs as appropriate.

"(d) Annual Briefings.-

"(1) Requirement.-Not later than 180 days after the date of the enactment of this Act, and not less frequently than once each fiscal year until September 30, 2025, the Under Secretary of Defense for Policy shall provide to the Committees on Armed Services of the Senate and the House of Representatives a briefing on the implementation of this section.

"(2) Contents.-Each briefing under paragraph (1) shall include the following:

"(A) An overview of efforts undertaken pursuant to this section.

"(B) An accounting of all the security cooperation activities of the Department germane to cyberspace and changes made pursuant to implementation of this section.

"(C) A detailed schedule with target milestones and required expenditures for all planned activities related to the efforts described in subsection (b).

"(D) Interim and final metrics for building the cyberspace security cooperation enterprise of the Department.

"(E) Identification of such additional funding, authorities, and policies, as the Under Secretary determines may be required.

"(F) Such recommendations as the Under Secretary may have for legislative action to improve the effectiveness of cyberspace security cooperation of the Department with foreign partners and allies.

"(e) Annual Report.-Not later than 90 days after the date of the enactment of this Act and not less frequently than once each year thereafter until January 1, 2025, the Under Secretary of Defense for Policy shall submit to the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives a report summarizing the cyber international strategy activities of the Department, including within the cybersecurity cooperation enterprise of the Department and the cyber operational partnerships of the Department."

Enhancement of Cyberspace Training and Security Cooperation

Pub. L. 117–263, div. A, title XV, §1507, Dec. 23, 2022, 136 Stat. 2883 , provided that:

"(a) Enhanced Training.-

"(1) Requirement.-The Under Secretary of Defense for Intelligence and Security and the Under Secretary of Defense for Policy, in coordination with the Commander of United States Cyber Command, the Director of the Defense Security Cooperation Agency, and the Director of the Defense Intelligence Agency, shall develop enhanced guidance for and implement training on cyberspace security cooperation at the Defense Security Cooperation University and the Joint Military Attaché School.

"(2) Timing.-The Under Secretaries shall develop the enhanced guidance and implement the training under paragraph (1)-

"(A) by not later than one year after the date of the enactment of this Act [Dec. 23, 2022] with respect to the Joint Military Attaché School; and

"(B) by not later than September 30, 2025, with respect to the Defense Security Cooperation University.

"(3) Elements.-The Under Secretaries shall ensure that the training on cyberspace security cooperation under paragraph (1)-

"(A) is tailored to the trainees' anticipated embassy role and functions; and

"(B) provides familiarity with-

"(i) the different purposes of cyberspace engagements with partners and allies of the United States, including threat awareness, cybersecurity, mission assurance, and operations;

"(ii) the types of cyberspace security cooperation programs and activities available for partners and allies of the United States, including bilateral and multilateral cyberspace engagements, information and intelligence sharing, training, and exercises;

"(iii) the United States Cyber Command cyberspace operations with partners, including an overview of the Hunt Forward mission and process;

"(iv) the roles and responsibilities of the United States Cyber Command, the geographic combatant commands, and the Defense Security Cooperation Agency for cybersecurity cooperation within the Department of Defense; and

"(v) such other matters as the Under Secretaries, in coordination with the Commander of United States Cyber Command, consider appropriate.

"(4) Requirements.-The baseline familiarization training developed under subsection (a) shall be a required element for all participants in the Defense Security Cooperation University, the Attaché Training Program, and the Attaché Staff Training Program of the Joint Military Attaché School.

"(b) Report.-Not later than 180 days after the date of the enactment of this Act, the Under Secretary of Defense for Intelligence and Security and the Under Secretary of Defense for Policy, in coordination with the Commander of the United States Cyber Command, the Director of the Defense Security Cooperation Agency, and the Director of the Defense Intelligence Agency, shall submit to the Committees on Armed Services of the Senate and the House of Representatives a report on the requirements and considerations to implement enhanced training and coordination to advance cyberspace security cooperation with foreign partners. The study may consider such areas as the following:

"(1) Sufficiency of the training provided in the Defense Security Cooperation University and the Joint Military Attaché School.

"(2) Additional training requirements, familiarization requirements, or both such requirements necessary for officers assigned to particular locations or positions.

"(3) Areas for increased cooperation.

"(4) A plan for completing the activities required by subsection (a).

"(5) Additional resources required to complete such activities.

"(c) Briefing.-Not later than 30 days after the date on which the Under Secretary of Defense for Intelligence and Security and the Under Secretary of Defense for Policy submit the report under subsection (b), the Under Secretaries, in coordination with the Commander of the United States Cyber Command, the Director of the Defense Security Cooperation Agency, and the Director of the Defense Intelligence Agency, shall provide to the Committees on Armed Services of the Senate and the House of Representatives a briefing on the findings from the report on enhancing training and coordination to advance cyberspace security cooperation described in such subsection. Such briefing shall include a discussion on the enhanced training meeting the elements under subsection (a)(3) and a plan for future updates and sustainment of such training."