§167b. Unified combatant command for cyber operations
(a)
(2) The principal mission of the Cyber Command is to direct, synchronize, and coordinate military cyberspace planning and operations to defend and advance national interests in collaboration with domestic and international partners.
(b)
(2) Cyber forces not assigned to Cyber Command remain assigned to combatant commands or service-retained.
(c)
(d)
(2)(A) Subject to the authority, direction, and control of the Principal Cyber Advisor to the Secretary of Defense under section 392a(a) of this title, the commander of such command shall be responsible for, and shall have the authority to conduct, the following functions relating to cyber operations activities (whether or not relating to the cyber command):
(i) Developing strategy, doctrine, and tactics.
(ii) Preparing and submitting to the Secretary of Defense program recommendations and budget proposals for cyber operations forces and for other forces assigned to the cyber command.
(iii) Exercising authority, direction, and control over the expenditure of funds-
(I) for forces assigned directly to the cyber command; and
(II) for cyber operations forces assigned to unified combatant commands other than the cyber command, with respect to all matters covered by section 807 of the National Defense Authorization Act for Fiscal Year 2016 (
(iv) Training and certification of assigned joint forces.
(v) Conducting specialized courses of instruction for commissioned and noncommissioned officers.
(vi) Validating requirements.
(vii) Establishing priorities for requirements.
(viii) Ensuring the interoperability of equipment and forces.
(ix) Formulating and submitting requirements for intelligence support.
(x) Monitoring the promotion of cyber operation forces and coordinating with the military departments regarding the assignment, retention, training, professional military education, and special and incentive pays of cyber operation forces.
(B) The authority, direction, and control exercised by the Principal Cyber Advisor for purposes of this section is authority, direction, and control with respect to the administration and support of the cyber command, including readiness and organization of cyber operations forces, cyber operations-peculiar equipment and resources, and civilian personnel.
(C) Nothing in this section shall be construed as providing the Principal Cyber Advisor authority, direction, and control of operational matters that are subject to the operational chain of command of the combatant commands or the exercise of authority, direction, and control of personnel, resources, equipment, and other matters that are not cyber-operations peculiar and that are in the purview of the armed forces.
(3) The commander of the cyber command shall be responsible for-
(A) ensuring the combat readiness of forces assigned to the cyber command; and
(B) monitoring the preparedness to carry out assigned missions of cyber forces assigned to unified combatant commands other than the cyber command.
(C) The staff of the commander shall include an inspector general who shall conduct internal audits and inspections of purchasing and contracting actions through the cyber operations command and such other inspector general functions as may be assigned.
(e)
(Added
Editorial Notes
References in Text
The National Security Act of 1947, referred to in subsec. (e), is act July 26, 1947, ch. 343,
Amendments
2022-Subsec. (d)(2)(A).
2021-Subsec. (a).
Subsec. (b).
2017-Subsec. (d).
Subsec. (e).
Subsec. (e)(2)(A)(iii)(II).
Subsec. (f).
Statutory Notes and Related Subsidiaries
Development of Cyber Support Mechanisms for Geographic Combatant Commands
"(a)
"(b)
"(1) Processes to enhance the cyber capabilities of such combatant command.
"(2) Plans to develop and maintain a sufficient cyber planning capacity in such combatant command.
"(3) Processes to integrate cyber capabilities into operational support for such combatant command.
"(4) A prioritization of cyber risks and vulnerabilities within the geographic area of responsibility of such combatant command.
"(5) Specific plans to assist in the defense of friendly foreign countries."
Pilot Program and Other Measures To Enhance Readiness and Effectiveness of Cyber Mission Force
"(a)
"(1) direct and oversee the implementation of guidance, to be issued by each Secretary of a military department, that correlates critical work roles to military occupational specialties and periods of obligated service with respect to that military department;
"(2) require that, prior to the attachment or assignment of a member of the Armed Forces to a unit of the United States Cyber Command, the Secretary concerned ensure such member is fully trained and in compliance with the required standards for the work role to be assumed by the member within such unit, including with respect to critical work roles within the Cyber Mission Force;
"(3) ensure that the period of obligated service for members of the Armed Forces is-
"(A) uniform across the military departments with respect to positions of the Cyber Mission Force involving critical work roles;
"(B) commensurate with the financial and time investments made by Secretary concerned for the purpose of furnishing training pursuant to paragraph (2); and
"(C) sufficient to meet the readiness requirements established by the Commander of the United States Cyber Command;
"(4) facilitate consecutive assignments of members of the Armed Forces to the same unit of the United States Cyber Command without inhibiting the advancement or promotion potential of any such member;
"(5) provide to the Secretaries of the military departments direction for the integration of critical work roles into the personnel system of record of the respective military department, to provide for tracking cyber personnel data by work role; and
"(6) establish within at least one military department the curriculum and capacity necessary to train sufficient numbers of members of the Armed Forces from across the military departments in the performance of critical work roles within the Cyber Mission Force to achieve the readiness requirements established by the Commander of United States Cyber Command.
"(b)
"(1)
"(2)
"(A) continue carrying out such pilot program for such duration as the Commander considers appropriate;
"(B) transition such pilot program to a permanent program; or
"(C) terminate such pilot program.
"(c)
"(1) develop a plan to hire, train, and retain civilians to serve in critical work roles and other work roles within the Cyber Mission Force, for the purpose of enhancing the readiness and effectiveness of the Cyber Mission Force; and
"(2) provide to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] a briefing on such plan.
"(d)
"(1) The term 'critical work role' means a work role designated as critical by the Commander of the United States Cyber Command for purposes of this section.
"(2) The term 'Secretary concerned' has the meaning given that term in section 101 of title 10, United States Code."
Management and Oversight of Joint Cyber Warfighting Architecture
"(a)
"(1)
"(A) a program executive office; and
"(B) one or more subordinate program management offices under the program executive office.
"(2)
"(A) oversee, manage, and execute the Joint Cyber Warfighting Architecture;
"(B) oversee, manage, and execute the programs designated, or to be designated, as part of the Joint Cyber Warfighting Architecture;
"(C) conduct mission engineering, architecting, and design of the Joint Cyber Warfighting Architecture system of systems, and any successor effort;
"(D) maintain a validated Joint Cyber Warfighting Architecture system of systems mission architecture, updated regularly to inform the current and future constituent programs of the Joint Cyber Warfighting Architecture, and the continuous delivery pipelines of such programs;
"(E) ensure that the Joint Cyber Warfighting Architecture component solution architectures align with and support the Joint Cyber Warfighting Architecture system of systems mission architecture;
"(F) support integration of mission-specific capabilities, including mission-specific data, analytics, defensive tools, offensive tools, and intelligence systems, acquired through non-Joint Cyber Warfighting Architecture programs; and
"(G) carry out any other responsibilities determined appropriate by the Secretary of Defense, including the acquisition of cyber operations capabilities beyond the Joint Cyber Warfighting Architecture.
"(3)
"(4)
"(b)
"(c)
"(1)
"(A)
"(B)
"(2)
"(A) exercise central technical authority for the Joint Cyber Warfighting Architecture;
"(B) manage and provide oversight of the implementation and integration of the Architecture; and
"(C) provide direction to subordinate program offices, as determined appropriate by the Commander.
"(d)
"(1)
"(A) develop a mission-driven Joint Cyber Warfighting Architecture optimized for execution of missions of the United States Cyber Command;
"(B) ensure the office is properly and effectively staffed; and
"(C) advise the head of the office with respect to the execution of-
"(i) the central technical authority for the Joint Cyber Warfighting Architecture;
"(ii) the management of the implementation and integration of the Joint Cyber Warfighting Architecture; and
"(iii) technical direction provided to subordinates responsible for individual Joint Cyber Warfighting Architecture programs.
"(2)
"(A)
"(i) The headquarters staff of the United States Cyber Command, the Cyber National Mission Force, the Joint Force Headquarters-Cyber, and the Cyber Mission Force.
"(ii) The Capabilities Directorate of the National Security Agency.
"(iii) The military departments.
"(iv) The Cyber Capabilities Support Office of the Air Force.
"(v) The Defense Advanced Research Projects Agency.
"(vi) The Strategic Capabilities Office.
"(vii) Research laboratories of the military departments.
"(viii) The Defense Information Systems Agency.
"(B)
"(e)
"(f)
"(g)
"(1) The date on which-
"(A) the offices are appropriately staffed and resourced; and
"(B) the Commander determines that the transition is appropriate.
"(2) The date that is five years after the date of the enactment of this Act [Dec. 23, 2022].
"(h)
"(1) The extent to which capabilities of the United States Cyber Command and the National Security Agency should be joint, mutually available, integrated, or interoperable.
"(2) Whether each of the Joint Cyber Warfighting Architecture capabilities has been effectively designed and architected to enable each of the missions of the United States Cyber Command.
"(3) How the Joint Cyber Warfighting Architecture will support defense of the Department of Defense Information Network and its relation to existing datasets, sensors, tools, firewalls, and capabilities deployed at each echelon of the Department of Defense Information Network.
"(4) What data, capabilities, and technologies external to the current Joint Cyber Warfighting Architecture programs, as of the date of the review, should be acquired as part of the Joint Cyber Warfighting Architecture and under the control of the offices established pursuant to subsection (a)(1).
"(5) What mission-specific data, capabilities, and technologies external to the current Joint Cyber Warfighting Architecture programs should integrate with or be interoperable with the Joint Cyber Warfighting Architecture system of systems.
"(6) The organization and staffing of such offices, including-
"(A) whether the program executive office should be responsible for overseeing the acquisition of the cyber operations capabilities of the United States Cyber Command generally or the Joint Cyber Warfighting Architecture specifically;
"(B) what subordinate program management offices should be established under the program executive office;
"(C) whether the Joint Cyber Warfighting Architecture programs should be consolidated within a single program management office; and
"(D) which personnel should be appointed to such offices pursuant to subsection (d)(1).
"(7) The timeline for the execution of the transition under subsection (g).
"(8) The acquisition strategy of the Department for procuring the Joint Cyber Warfighting Architecture and related capabilities, including relevant enterprise strategic initiatives and contracting strategies.
"(9) The responsibilities of the United States Cyber Command J2, J3, J5, J6, J8, and J9 in acquiring, authorizing, and managing cyber capabilities.
"(10) The physical locations of the offices established pursuant to subsection (a)(1).
"(i)
"(j)
"(k)
Total Force Generation for the Cyberspace Operations Forces
"(a)
"(1)
"(2)
"(A) Which military services should man, train, equip, and organize the forces necessary to execute the functions and missions of the Cyber Mission Force and the Cyberspace Operations Forces for assignment, allocation, and apportionment to, or under the directive authority of, the United States Cyber Command.
"(B) The sufficiency of the military service accession and training model to provide forces to the Cyberspace Operations Forces and the sufficiency of the accessions and personnel resourcing of the supporting command and control staffs necessary as a component to the United States Cyber Command.
"(C) The organization of the Cyber Mission Forces and whether the total forces or elements of the forces function best as a collection of independent teams or through a different model.
"(D) How to correct chronic shortages of proficient personnel in key work roles.
"(E) The need for additional work roles or skills to enable effective infrastructure management and generate access to targets.
"(F) What unique or training-intensive expertise is required for each of the work roles identified in subparagraph (E) and whether native talents to master unique and training-intensive work roles can be identified and how personnel with those talents can be developed, retained, and employed across the active and reserve components.
"(G) The appropriate pay scales, rotation or force management policies, career paths and progression, expertise-based grading, talent management practices, and training for each of those work roles, given expected operational requirements.
"(H) Whether a single military service should be responsible for basic, intermediate, and advanced training for the Cyber Mission Force.
"(I) The level of training required before an individual should be assigned, allocated, or apportioned to the United States Cyber Command.
"(J) Whether or how the duties of the Director of the National Security Agency and the duties of the Commander of United States Cyber Command, resting with a single individual, enable each respective organization, and whether technical directors and intelligence experts of the National Security Agency should serve rotations in the Cyber Mission Force.
"(K) How nonmilitary personnel, such as civilian government employees, contracted experts, commercial partners, and domain or technology-specific experts in industry or the intelligence community can serve in, augment, or support Cyber Mission Force teams.
"(L) What work roles in the Cyberspace Operations Forces can only be filled by military personnel, which work roles can be filled by civilian employees or contractors, and which work roles should be filled partially or fully by civilians due to the need for longevity of service to achieve required skill levels or retention rates.
"(M) How specialized cyber experience, developed and maintained in the reserve component, can be more effectively leveraged to support the Cyberspace Operations Forces through innovative force generation models.
"(N) Whether the Department of Defense should create a separate service to perform the functions and missions currently performed by Cyber Mission Force units generated by multiple military services.
"(O) Whether the Department of Defense is maximizing partnerships with industry and other nontraditional sources of expertise and capacity in the areas of critical infrastructure protection and information sharing.
"(P) Whether the Defense Readiness Reporting System of the Department of Defense is sufficient to capture Cyber Mission Force readiness metrics.
"(3)
"(b)
"(1)
"(2)
"(c)
"(1)
"(2)
"(A) Whether the Navy should no longer be responsible for developing and presenting forces to the United States Cyber Command as part of the Cyber Mission Force or Cyberspace Operations Forces, including recommendations for corresponding transfer of responsibilities and associated resources and personnel for the existing and future year programmed Cyberspace Operations Forces or Cyber Mission Force resources.
"(B) Whether a single military service should be responsible for organizing, training, and equipping the Cyberspace Operations Forces, or if different services should be responsible for different components of the Cyberspace Operations Forces.
"(C) Whether modification of United States Cyber Command enhanced budget control authorities are necessary to further improve total force generation for Cyberspace Operations Forces.
"(D) Implications of low service retention rates for critical roles within the Cyber Mission Force, and the mix of actions necessary to correct them, including multiple rotations in critical work roles, length of service commitments, repeat tours within the Cyber Mission Force, retention incentives across the entire Cyberspace Operations Forces, and best practices for generating the future force.
"(d)
"(e)
"(f)
"(1) The cybersecurity service providers, local defenders, and information technology personnel who own, operate, and defend the information networks of the Department of Defense.
"(2) Equipping the Cyberspace Operations Forces to include infrastructure management.
"(3) Providing intelligence support to the Cyberspace Operations Forces.
"(4) The resources, including billets, needed to account for any recommended changes."
Correcting Cyber Mission Force Readiness Shortfalls
"(a)
"(1) develop a near-term plan to correct readiness shortfalls in the Cyber Mission Forces over the period covered by the most recent future-years defense program submitted to Congress under section 221 of title 10, United States Code;
"(2) develop recommendations for such legislative action as the Secretary of Defense, the Chairman, and the Secretaries of the military departments jointly consider appropriate to correct the readiness shortfalls described in paragraph (1); and
"(3) provide to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] a briefing on the plan under paragraph (1) and the recommendations under paragraph (2).
"(b)
"(c)
"(1) Determining the correct number of personnel necessary to fill key work roles, including the proper force mix of civilian, military, and contractor personnel, and the means necessary to meet those requirements.
"(2) Employing civilians rather than military personnel in key work roles.
"(3) Expanding training capacity.
"(4) Modifying or creating new training models.
"(5) Maximizing use of compensation and incentive authorities, including increasing bonuses and special pays, and alternative compensation mechanisms.
"(6) Modifying career paths and service policies to permit consecutive assignments in key work roles without jeopardizing promotion opportunities.
"(7) Increasing service commitments following training commensurate with the value of the key work role training.
"(8) Standardizing compensation models across the services.
"(9) Requiring multiple rotations within the Cyber Mission Forces for key work roles.
"(10) Adopting and implementing what are known as 'rank in person' policies that enable civilian personnel to be promoted on the basis of skills and abilities demonstrated in a given position.
"(11) A review of departmental guidance and processes consistent with section 167b(d)(2)(A)(x) of title 10, United States Code, with respect to the authority of the Commander of United States Cyber Command to monitor the promotions of certain cyber operations forces and coordinate with the Secretaries regarding the assignment, retention, training, professional military education, and special and incentive pays of certain cyber operations forces, including-
"(A) the recruiting, retention, professional military education, and promotion of certain cyber operations personnel;
"(B) the sharing of personnel data between the military departments and the United States Cyber Command; and
"(C) structures, departmental guidance, and processes developed between the military departments and the United States Special Operations Command with respect to the authority of the Commander of the United States Special Operations Command described in section 167(e)(2)(J) of title 10, United States Code, that could be used as a model for the United States Cyber Command.
"(d)
Review of Definitions Associated With Cyberspace Operations Forces
"(a)
"(1) review-
"(A) the memorandum of the Secretary of Defense dated December 12, 2019, concerning the definition of the term 'Department of Defense Cyberspace Operations Forces (DoD COF)'; and
"(B) the responsibilities of the Commander of the United States Cyber Command as the Cyberspace Joint Force Provider and Cyberspace Joint Force Trainer, with respect to forces included and excluded from the Cyberspace Operations Forces; and
"(2) update such memorandum and, as appropriate, update such responsibilities.
"(b)
"(1) A comprehensive assessment of units and components of the Department of Defense conducting defensive cyberspace operations which are not currently included in the definition specified in paragraph (1)(A) of such subsection.
"(2) Consideration of options for participation in the Cyberspace Operations Forces by forces without regard to whether the forces are included in such definition, including options under which-
"(A) forces currently excluded from the Cyberspace Operations Forces because of such definition may access training, resources, and expertise of the Cyberspace Operations Forces;
"(B) the Commander of the United States Cyber Command may issue advisory tasking to forces that are not Cyberspace Operations Forces pursuant to such definition; and
"(C) forces that are not Cyberspace Operations Forces pursuant to such definition are subject to training standards established by the Commander as the Cyberspace Joint Force Trainer."
Assignment of Certain Budget Control Responsibilities to Commander of United States Cyber Command
"(a)
"(1)
"(2)
"(A) on January 1, 2022, for controlling and managing budget execution; and
"(B) beginning with fiscal year 2024 and each fiscal year thereafter for directly controlling and managing the planning, programming, budgeting, and execution of resources.
"(b)
"(1)
"(A) Preparation of a program objective memorandum and budget estimate submission for the resources required to train, equip, operate, and sustain the Cyber Mission Forces.
"(B) Preparation of budget materials pertaining to United States Cyber Command for inclusion in the budget justification materials that are submitted to Congress in support of the Department of Defense budget for a fiscal year (as submitted with the budget of the President for a fiscal year under section 1105(a) of title 31, United States Code) that is separate from any other military service or component of the Department.
"(2)
"(A) Military pay and allowances.
"(B) Funding for facility support that is provided by the military services.
"(c)
"(1)
"(2)
"(A) A budgetary review to identify appropriate resources for transfer to the Commander of United States Cyber Command for carrying out responsibilities assigned pursuant to subsection (a)(1).
"(B) Definitions of appropriate roles and responsibilities.
"(C) Specification of all program elements and sub-elements, and the training, equipment, Joint Cyber Warfighting Architecture capabilities, other enabling capabilities and infrastructure, intelligence support, operations, and sustainment investments in each such program element and sub-element for which the Commander of United States Cyber Command is responsible.
"(D) Specification of all program elements and sub-elements, and the training, equipment, Joint Cyber Warfighting Architecture capabilities, other enabling capabilities and infrastructure, intelligence support, operations, and sustainment investments in each such program element and sub-element relevant to or that support the Cyber Mission Force for which the Secretaries of the military departments are responsible.
"(E) Required levels of civilian and military staffing within United States Cyber Command to carry out subsection (a)(1), and an estimate of when such levels of staffing will be achieved.
"(d)
"(1)
"(2)
Executive Documents
Elevation of U.S. Cyber Command to a Unified Combatant Command
Memorandum of President of the United States, Aug. 15, 2017, 82 F.R. 39953, provided:
Memorandum for the Secretary of Defense
Pursuant to my authority as the Commander in Chief and under sections 161 and 167b of title 10, United States Code, and in consultation with the Secretary of Defense and the Chairman of the Joint Chiefs of Staff, I direct that U.S. Cyber Command be established as a Unified Combatant Command. I also direct the Secretary of Defense to recommend an officer for my nomination and Senate confirmation as commander in order to establish U.S. Cyber Command as a Unified Combatant Command.
I assign to U.S. Cyber Command: (1) all the general responsibilities of a Unified Combatant Command; (2) the cyberspace-related responsibilities previously assigned to the Commander, U.S. Strategic Command; (3) the responsibilities of Joint Force Provider and Joint Force Trainer; and (4) all other responsibilities identified in section 167b of title 10, United States Code. The comprehensive list of authorities and responsibilities for U.S. Cyber Command will be included in the next update to the Unified Command Plan.
I further direct that the Secretary of Defense, in coordination with the Director of National Intelligence, provide a recommendation and, as appropriate, a plan to me regarding the future command relationship between the U.S. Cyber Command and the National Security Agency.
Consistent with section 161(b)(2) of title 10, United States Code, and section 301 of title 3, United States Code, you are directed to notify the Congress on my behalf.
You are authorized and directed to publish this memorandum in the Federal Register.
Donald J. Trump.