A bill to require the Secretary of Defense to conduct a study on cyberexploitation of members of the Armed Forces and their families, and for other purposes.

#1348 | S Congress #116

Last Action: Read twice and referred to the Committee on Armed Services. (5/7/2019)

Bill Text Source: Congress.gov

Summary and Impacts
Original Text
[Congressional Bills 116th Congress]
[From the U.S. Government Publishing Office]
[S. 1348 Introduced in Senate (IS)]

<DOC>






116th CONGRESS
  1st Session
                                S. 1348

       To require the Secretary of Defense to conduct a study on 
 cyberexploitation of members of the Armed Forces and their families, 
                        and for other purposes.


_______________________________________________________________________


                   IN THE SENATE OF THE UNITED STATES

                              May 7, 2019

  Mr. Sasse (for himself, Mr. King, Mr. Rounds, and Mrs. Gillibrand) 
introduced the following bill; which was read twice and referred to the 
                      Committee on Armed Services

_______________________________________________________________________

                                 A BILL


 
       To require the Secretary of Defense to conduct a study on 
 cyberexploitation of members of the Armed Forces and their families, 
                        and for other purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,

SECTION 1. STUDY ON CYBEREXPLOITATION OF MEMBERS OF THE ARMED FORCES 
              AND THEIR FAMILIES.

    (a) Study Required.--Not later than 150 days after the date of the 
enactment of this Act, the Secretary of Defense shall complete a study 
on the cyberexploitation of the personal information and accounts of 
members of the Armed Forces and their families.
    (b) Elements.--The study required by subsection (a) shall include 
the following:
            (1) An assessment of the vulnerability of members of the 
        Armed Forces and their families to inappropriate access to 
        their personal information and accounts of such members and 
        their families, including identification of particularly 
        vulnerable subpopulations.
            (2) Creation of a catalogue of past and current efforts by 
        foreign governments and non-state actors at the 
        cyberexploitation of the personal information and accounts of 
        members of the Armed Forces and their families, including an 
        assessment of the purposes of such efforts and their degrees of 
        success.
            (3) An assessment of the actions taken by the Department of 
        Defense to educate members of the Armed Forces and their 
        families, including particularly vulnerable subpopulations, 
        about any actions that can be taken to otherwise reduce these 
        threats.
            (4) Assessment of the potential for the cyberexploitation 
        of misappropriated images and videos as well as deep fakes.
            (5) Development of recommendations for policy changes to 
        reduce the vulnerability of members of the Armed Forces and 
        their families to cyberexploitation, including recommendations 
        for legislative or administrative action.
    (c) Report.--
            (1) In general.--The Secretary shall submit to the 
        congressional defense committees a report on the findings of 
        the Secretary with respect to the study required by subsection 
        (a).
            (2) Form.--The report required by paragraph (1) shall be 
        submitted in unclassified form, but may include a classified 
        annex.
    (d) Definitions.--In this section:
            (1) The term ``congressional defense committees'' has the 
        meaning given such term in section 101 of title 10, United 
        States Code.
            (2) The term ``cyberexploitation'' means the use of digital 
        means to knowingly access, or conspire to access, without 
        authorization, an individual's personal information to be 
        employed (or to be used for) with malicious intent.
            (3) The term ``deep fake'' means the digital insertion of a 
        person's likeness into or digital alteration of a person's 
        likeness in visual media, such as photographs and videos, 
        without the person's permission and with malicious intent.
                                 <all>

AI processing bill