Public Law 119-73 (01/23/2026)

10 U.S.C. § 2225

Insider threat detection

(a)

Program Required .—

The Secretary of Defense shall establish a program for information sharing protection and insider threat mitigation for the information systems of the Department of Defense to detect unauthorized access to, use of, or transmission of classified or controlled unclassified information.
(b)

Elements .—

The program established under subsection (a) shall include the following:
(1)
Technology solutions for deployment within the Department of Defense that allow for centralized monitoring and detection of unauthorized activities, including—
(A)
monitoring the use of external ports and read and write capability controls;
(B)
disabling the removable media ports of computers physically or electronically;
(C)
electronic auditing and reporting of unusual and unauthorized user activities;
(D)
using data-loss prevention and data-rights management technology to prevent the unauthorized export of information from a network or to render such information unusable in the event of the unauthorized export of such information;
(E)
a roles-based access certification system;
(F)
cross-domain guards for transfers of information between different networks; and
(G)
patch management for software and security updates.
(2)
Policies and procedures to support such program, including special consideration for policies and procedures related to international and interagency partners and activities in support of ongoing operations in areas of hostilities.
(3)
A governance structure and process that integrates information security and sharing technologies with the policies and procedures referred to in paragraph (2). Such structure and process shall include—
(A)
coordination with the existing security clearance and suitability review process;
(B)
coordination of existing anomaly detection techniques, including those used in counterintelligence investigation or personnel screening activities; and
(C)
updating and expediting of the classification review and marking process.
(4)
A continuing analysis of—
(A)
gaps in security measures under the program; and
(B)
technology, policies, and processes needed to increase the capability of the program beyond the initially established full operating capability to address such gaps.
(5)
A baseline analysis framework that includes measures of performance and effectiveness.
(6)
A plan for how to ensure related security measures are put in place for other departments or agencies with access to Department of Defense networks.
(7)
A plan for enforcement to ensure that the program is being applied and implemented on a uniform and consistent basis.

Pub. L. 119–60, div. A, title XVI, § 1623(a)139 Stat. 1183(Added , , .)

Editorial Notes

Codification

Pub. L. 119–60section 922 of Pub. L. 112–81125 Stat. 1537section 2224 of this titlePub. L. 119–60, div. A, title XVI, § 1623(b)139 Stat. 1183Text of section, as added by , is based on text of subsecs. (a) and (b) of , div. A, title IX, , , which was formerly set out in a note under , prior to repeal by , , .

Prior Provisions

Pub. L. 106–398, § 1 [[div. A]114 Stat. 1654Pub. L. 108–178, § 4(b)(2)117 Stat. 2640Pub. L. 109–364, div. A, title X, § 1071(a)(2)120 Stat. 2398Pub. L. 111–350, § 5(b)(6)124 Stat. 3842Pub. L. 114–328, div. A, title VIII, § 833(b)(2)(A)130 Stat. 2284A prior section 2225, added , title VIII, § 812(a)(1)], , , 1654A–212; amended , , ; , , ; , , , related to tracking and management of information technology purchases, prior to repeal by , , .