10 U.S. Code § 130j - Notification requirements for sensitive military cyber operations

§ 130j.
Notification requirements for sensitive military cyber operations
(a)In General.—
Except as provided in subsection (d), the Secretary of Defense shall promptly submit to the congressional defense committees notice in writing of any sensitive military cyber operation conducted under this title no later than 48 hours following such operation.
(b)Procedures.—
(1)
The Secretary of Defense shall establish and submit to the congressional defense committees procedures for complying with the requirements of subsection (a) consistent with the national security of the United States and the protection of operational integrity. The Secretary shall promptly notify the congressional defense committees in writing of any changes to such procedures at least 14 days prior to the adoption of any such changes.
(2)
The congressional defense committees shall ensure that committee procedures designed to protect from unauthorized disclosure classified information relating to national security of the United States are sufficient to protect the information that is submitted to the committees pursuant to this section.
(3)
In the event of an unauthorized disclosure of a sensitive military cyber operation covered by this section, the Secretary shall ensure, to the maximum extent practicable, that the congressional defense committees are notified immediately of the sensitive military cyber operation concerned. The notification under this paragraph may be verbal or written, but in the event of a verbal notification a written notification shall be provided by not later than 48 hours after the provision of the verbal notification.
(c)Sensitive Military Cyber Operation Defined.—
(1) In this section, the term “sensitive military cyber operation” means an action described in paragraph (2) that—
(A)
is carried out by the armed forces of the United States; and
(B) is intended to cause cyber effects outside a geographic location—
(i)
where the armed forces of the United States are involved in hostilities (as that term is used in section 1543 of title 50, United States Code); or
(ii)
with respect to which hostilities have been declared by the United States.
(2) The actions described in this paragraph are the following:
(A)
An offensive cyber operation.
(B)
A defensive cyber operation outside the Department of Defense Information Networks to defeat an ongoing or imminent threat.
(d)Exceptions.—The notification requirement under subsection (a) does not apply—
(1)
to a training exercise conducted with the consent of all nations where the intended effects of the exercise will occur; or
(2)
to a covert action (as that term is defined in section 3093 of title 50, United States Code).
(e)Rule of Construction.—
Nothing in this section shall be construed to provide any new authority or to alter or otherwise affect the War Powers Resolution (50 U.S.C. 1541 et seq.), the Authorization for Use of Military Force (Public Law 107–40; 50 U.S.C. 1541 note), or any requirement under the National Security Act of 1947 (50 U.S.C. 3001 et seq.).
(Added Pub. L. 115–91, div. A, title XVI, § 1631(a), Dec. 12, 2017, 131 Stat. 1736.)
References in Text

The War Powers Resolution, referred to in subsec. (e), is Pub. L. 93–148, Nov. 7, 1973, 87 Stat. 555, which is classified generally to chapter 33 (§ 1541 et seq.) of Title 50, War and National Defense. For complete classification of this Resolution to the Code, see Short Title note set out under section 1541 of Title 50 and Tables.

The Authorization for Use of Military Force, referred to in subsec. (e), is Pub. L. 107–40, Sept. 18, 2001, 115 Stat. 224, which is set out as a note under section 1541 of Title 50, War and National Defense.

The National Security Act of 1947, referred to in subsec. (e), is act July 26, 1947, ch. 343, 61 Stat. 495, which is classified principally to chapter 44 (§ 3001 et seq.) of Title 50, War and National Defense. For complete classification of this Act to the Code, see Tables.

 

LII has no control over and does not endorse any external Internet site that contains links to or references LII.