2015 US Code
Title 10 - Armed Forces (Sections 101 - 18506)
Subtitle A - General Military Law (Sections 101 - 2926)
Part I - Organization and General Military Powers (Sections 101 - 498)
Chapter 7 - Boards, Councils, and Committees (Sections 171 - 189)
Sec. 189 - Communications Security Review and Advisory Board

View Metadata
Metadata
Publication TitleUnited States Code, 2012 Edition, Supplement 3, Title 10 - ARMED FORCES
CategoryBills and Statutes
CollectionUnited States Code
SuDoc Class NumberY 1.2/5:
Contained WithinTitle 10 - ARMED FORCES
Subtitle A - General Military Law
PART I - ORGANIZATION AND GENERAL MILITARY POWERS
CHAPTER 7 - BOARDS, COUNCILS, AND COMMITTEES
Sec. 189 - Communications Security Review and Advisory Board
Containssection 189
Date2015
Laws In Effect As Of DateJanuary 3, 2016
Positive LawYes
Dispositionstandard
Source CreditAdded Pub. L. 113-66, div. A, title II, §261(a), Dec. 26, 2013, 127 Stat. 724; amended Pub. L. 113-291, div. A, title X, §1071(f)(4), Dec. 19, 2014, 128 Stat. 3510.
Statutes at Large References127 Stat. 724
128 Stat. 3510
Public and Private LawsPublic Law 113-66, Public Law 113-291

Download PDF


10 U.S.C. § 189 (2015)
§189. Communications Security Review and Advisory Board

(a) Establishment.—There shall be in the Department of Defense a Communications Security Review and Advisory Board (in this section referred to as the "Board") to review and assess the communications security, cryptographic modernization, and related key management activities of the Department and provide advice to the Secretary with respect to such activities.

(b) Members.—(1) The Secretary shall determine the number of members of the Board.

(2) The Chief Information Officer of the Department of Defense shall serve as chairman of the Board.

(3) The Secretary shall appoint officers in the grade of general or admiral and civilian employees of the Department of Defense in the Senior Executive Service to serve as members of the Board.

(c) Responsibilities.—The Board shall—

(1) monitor the overall communications security, cryptographic modernization, and key management efforts of the Department, including activities under major defense acquisition programs (as defined in section 2430(a) of this title), by—

(A) requiring each Chief Information Officer of each military department to report the communications security activities of the military department to the Board;

(B) tracking compliance of each military department with respect to communications security modernization efforts;

(C) validating lifecycle communications security modernization plans for major defense acquisition programs;


(2) validate the need to replace cryptographic equipment based on the expiration dates of the equipment and evaluate the risks of continuing to use cryptographic equipment after such expiration dates;

(3) convene in-depth program reviews for specific cryptographic modernization developments with respect to validating requirements and identifying programmatic risks;

(4) develop a long-term roadmap for communications security to identify potential issues and ensure synchronization with major planning documents; and

(5) advise the Secretary on the cryptographic posture of the Department, including budgetary recommendations.


(d) Exclusion of Certain Programs.—The Board shall not include the consideration of programs funded under the National Intelligence Program (as defined in section 3(6) of the National Security Act of 1947 (50 U.S.C. 3003(6))) in carrying out this section.

(Added Pub. L. 113–66, div. A, title II, §261(a), Dec. 26, 2013, 127 Stat. 724; amended Pub. L. 113–291, div. A, title X, §1071(f)(4), Dec. 19, 2014, 128 Stat. 3510.)

AMENDMENTS

2014—Subsec. (c)(1). Pub. L. 113–291 substituted "2430(a)" for "139c" in introductory provisions.

Disclaimer: These codes may not be the most recent version. The United States Government Printing Office may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the US site. Please check official sources.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.