Page:United States Statutes at Large Volume 123.djvu/2453

This page needs to be proofread.

123STA T . 2 4 33 PUBLIC LA W 111 –8 4 —O CT. 28 , 2 0 0 9(b)ELEM E NTS.—Ther e po r t re qui re d b ys ubse c tio n ( a ) sha l l address the f ollo w in g: ( 1 ) A description of the m anagement structure and in v est - ment review process for coordinating the technology develop- ment of advanced offensive and defensive cyber operations capabilities— (A) among the military departments , the D efense Agen- cies, the combatant commands, and the intelligence commu- nity

( B ) across all levels of classification, including relevant special access programs; and ( C ) based on the identification and prioriti z ation of j oint cyber operations capabilities gaps. ( 2 ) Actions ta k en and recommendations for further improving the coordination of research and development of offensive and defensive cyber operations capabilities among private sector, interagency, non-governmental, and inter- national partners. ( 3 ) Assessment of the feasibility and utility of regular national level, joint, interagency cyber e x ercises that would include, to the extent possible, participants from industry, inter- national militaries, and non-governmental organizations to assess technologies, policies, and capabilities. (c) C O O RDI N A TION.—The report required by subsection (a) shall be developed in coordination and concurrence with the V ice Chair- man of the J oint Chiefs of S taff, the U nder Secretary of Defense for I ntelligence, the Under Secretary of Defense for P olicy, the Assistant Secretary of Defense for N etworks and Information Integration, the Director of the National Security Agency, and the commander of the United States Cyber Command. (d) F ORM.—The report required by subsection (a) shall be sub- mitted in unclassified form, but may include a classified annex. (e) C YB ER OP ERATIONS CAPABILITIES DE F INED.—The term ‘ ‘cyber operations capabilities ’ ’ means the range of capabilities needed for computer network defense, computer network attack, and computer network exploitations. Such term includes technical as well as non-materiel solutions. SEC.932 . D E F E N SE I N T E GRA TED M I L ITAR YHU MAN RES O URCES SYSTEM DE V ELO P MENT AND TRANSITION. (a) IN G ENERAL.—The Secretary of Defense shall establish a Defense Integrated M ilitary H uman R esources System development and transition Council to provide advice to the Secretary of Defense and the Secretaries of the military departments on the moderniza- tion of the integrated pay and personnel system for each military department and the collection of data generated by each such system into the enterprise information warehouse. (b) CO U N C IL.—The Council shall include the following members: (1) The Deputy Chief Management Officer of the Depart- ment of Defense. (2) The Director of the Business Transformation Agency. (3) The Under Secretary of Defense for Acquisition, Tech- nology, and L ogistics, or a designated representative. ( 4 ) The Under Secretary of Defense for Personnel and Readiness, or a designated representative. Establi s hmen t .10USC 11 3 n o te.