Advanced search Help
Searching for terms: EXACT: "United States. Department of Defense" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Directive-Type Memorandum (DTM) 17-001: Cybersecurity in the Defense Acquisition System, January 11, 2017
"Cybersecurity is a requirement for all DoD programs. DoD program offices, systems, and networks, and supporting contractor facilities and activities, are at risk of cyber-attacks by state and non-state threat actors. [...] Responsibility for cybersecurity extends beyond network operators, software developers, and chief information officers, to every member of the acquisition workforce. Attention must be paid to cybersecurity at all acquisition category levels and all classification levels, including unclassified, throughout the entire life cycle. This includes systems that reside on networks and stand alone systems that are not persistently connected to networks during tactical and strategic operations."
United States. Department of Defense
2017-01-11
-
DoD Instruction 5132.14: Assessment, Monitoring, and Evaluation Policy for the Security Cooperation Enterprise, January 13, 2017
"Purpose: In accordance with the authority in DoD Directive 5111.1 and the November 30, 2006, Deputy Secretary of Defense memorandum, this issuance establishes policy and assigns responsibilities for conducting assessment, monitoring, and evaluation (AM&E) of security cooperation plans, programs, and activities consistent with the Deputy Secretary of Defense Guidance of August 29, 2016, DoD Directive 5132.03, Section 1202 of Public Law 114-92, Public Law 111-352, Presidential Policy Directive 23, and other relevant statutory authorities under Titles 10, 22, and 50 of the United States Code (U.S.C.)."
United States. Department of Defense
2017-01-13
-
Applying the Law of Targeting to the Modern Battlefield
"As the General Counsel of the Department of Defense, I am personally responsible for providing all legal advice to the Secretary of Defense. I also advise the Department's senior leaders on all legal matters related to worldwide defense activities in the security interest of the United States, including counterterrorism and other military operations taking place in Syria, Iraq, and other areas. I work closely with our top uniformed and civilian lawyers, including the Legal Counsel to the Chairman of the Joint Chiefs of Staff as we support our men and women in uniform and as we help ensure that U.S. military operations worldwide are conducted in compliance with the law. I also collaborate with colleagues outside of the Defense Department, including the State Department Legal Adviser, the General Counsel of the CIA, and the National Security Council Legal Adviser. Despite working for different agencies with different missions, we are all dedicated to ensuring that the United States upholds the rule of law in all that we do."
United States. Department of Defense
O'Connor, Jennifer
2016-11-28
-
Department of Defense Instruction 5505.17: Collection, Maintenance, Use, and Dissemination of Personally Identifiable Information and Law Enforcement Information by DoD Law Enforcement Activities, December 19, 2012 [Incorporating Change 1, Effective November 29, 2016]
"This Instruction, in accordance with the guidance in DoD Directive (DoDD) 5200.27 (Reference (a)) and the authority in DoDD 5106.01 (Reference (b)), establishes policy, assigns responsibilities, and prescribes procedures for DoD law enforcement activities (LEAs) to collect, maintain, use, and disseminate personally identifiable information (PII) and law enforcement information during law enforcement functions (e.g., crime prevention, force protection, and criminal investigations)."
United States. Department of Defense
2016-11-29
-
Regional Defense Combating Terrorism Fellowship Program: Report to Congress Fiscal Year 2015
"This report is provided by the Department of Defense (DoD) in accordance with Title 10 of the United States Code, section 2249c (10 U.S.C. 2249c). The Regional Defense Combating Terrorism Fellowship Program (CTFP) was established to meet an emerging and urgent defense requirement to build partnerships in the struggle against violent extremism through targeted, non-lethal, combating terrorism (CbT) education and training. The CTFP directly supports DoD's efforts by providing CbT education and training for mid- to senior-level international military officers, ministry of defense civilians, and security officials.
The CTFP's goals are: Develop and strengthen human and intellectual capital that understands the ideologies and mechanisms of terrorism and the ways and means of countering them; Build the CbT capabilities and capacities of Partner Nations (PNs); Build and strengthen a global network of CbT experts and practitioners committed to participation in support of U.S. efforts against terrorists and terrorist organizations; Counter ideological support for terrorism and violent extremism; Harmonize views about the threat of terrorism and its evolution; and Develop CbT and counter insurgency (COIN) mutual understandings."
United States. Department of Defense
-
Department of Defense Instruction 1402.05: Background Checks on Individuals in DoD Child Care Services Program, September 11, 2015 [Incorporating Change 1, July 14, 2016]
"It is DoD policy that:
[a.] Individuals who have regular contact with children under 18 years of age in DoD-sanctioned
child care services programs will undergo a criminal history background check in
order to protect the health, safety, and well-being of children in such programs.
[b.] All individuals who have regular contact with children under 18 years of age in DoD-sanctioned
child care services programs and who also have a current or prior DoD affiliation
must also undergo an installation records check (IRC)."
United States. Department of Defense
2016-07-14
-
Department of Defense Directive 5101.18E: DoD Executive Agent for Printed Circuit Board and Interconnect Technology, June 12, 2016
"It is DoD policy that the DoD EA [Executive Agent] for PrCB [Printed Circuit Board] and Interconnect Technology
facilitates access to reliable, trusted, and affordable PrCB fabrication and assembly products and
technologies that meet the quality, performance, and security requirements of the DoD. The
DoD EA for PrCB and Interconnect Technology will facilitate collaboration within and across
the DoD to conduct research, development, and sustainment efforts targeting Component-unique
requirements."
United States. Department of Defense
2016-06-12
-
Department of Defense Instruction 5525.14: DoD Law Enforcement Officers (LEOs) Flying Armed [Incorporating Change 1, Effective August 4, 2016] March 22, 2011
"This Instruction establishes policy, assigns responsibilities, and prescribes procedures for DoD LEOs [Law Enforcement Officers] flying armed (LEOFAs) aboard commercial aircraft in accordance with the guidance in section 1544.219 of title 49, Code of Federal Regulations (CFR) (Reference (a)) and the authority of DoD Directive 5124.02 (Reference (b))."
United States. Department of Defense
2011-03-22
-
Department of Defense Directive 3100.10: Space Policy, October 18, 2012 [Incorporating Change 1, November 4, 2016]
"This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a)) to update established DoD space policy and assigned DoD responsibilities for space-related activities in accordance with the National Space Policy, Presidential Policy Directive-4 (Reference (b)), and the National Security Space Strategy (Reference (c)). It addresses the need to deter aggression, promote stability and responsible use of space, integrate space capabilities, and improve space mission assurance."
United States. Department of Defense
2016-11-04
-
Fact Sheet: Forging Two New Links to the Force of the Future
This document, titled "Forging Two New Links to the Force of the Future," is a fact sheet highlighting two links to forging the force of the future. The first link "Enhancing Geographic, Demographic, and Generational Access in Military Recruiting" contains three "Strategic Focus Areas." These areas are titled: "Better Communicate the Value and Benefits of Military Service"; "Build and Solidify the 'DoD Brand"; and "Office of the Secretary of Defense (OSD) Support to Military Service Recruiting Efforts." The second link "Reinvigorating the Reserve Officers' Training Corps (ROTC) at 100 Years" also contains three "Strategic Focus Areas." These areas are titled: "Enhance Access to Quality ROTC Participants"; "Further Enhance the Quality of ROTC Instructors and Instruction"; and "Enhance ROTC Program Administration."
United States. Department of Defense
2016?
-
Fact Sheet: The Next Two Links to the Force of the Future
This document, titled "The Next Two Links to the Force of the Future," is a fact sheet concerning "Approved Military Personnel Initiatives." The initiatives are as follows: "Enhance Lateral Entry Authority"; "Voluntary 'Opt Out' of Promotion Cycle"; "Permit Adjustment of Lineal Numbers"; "Provide Flexibility for Critical Career Fields"; "Modernize U.S. Military Entrance Processing Command (MEPCOM)"; and "Expand Joint Advertising, Market Research and Studies (JAMRS)/Defense Manpower Data Center Micro-targeting to Create a Recruiting Database." The document also contains "Approved Civilian Workforce Initiatives." The initiatives are as follows: "Enable Direct Hiring of Students and Recent Graduates"; "Establish a Public-Private Talent Exchange"; "Expand Use of Voluntary Separation Incentive Pay (VSIP); "Provide 6 Weeks of Paid Parental Leave for DoD Civilian Employees"; "Leverage Authority to Employ Highly Qualified Experts (HQEs); "Leverage Career Broadening Rotational Programs"; "Increase the Use of Science, Mathematics, and Research for Transformation (SMART) Defense Scholarships"; "Allow Optional Parental Phased Return Through Part-Time Work after the Birth or Adoption of a Child"; "Expand the Use of the Student Training and Academic Recruitment (STAR) Program"; "Better Leverage Civilian Employee Training Funds"; and "Remove Barriers to Mobility Between Civilian Jobs in Different DoD Components."
United States. Department of Defense
2016?
-
Department of Defense Instruction 2000.12: DoD Antiterrorism (AT) Program, March 1, 2012 [Incorporating Change 2, Effective November 15, 2016]
This is the Department of Defense Instruction incorporating changes from DoD Instruction 5111.1. Effective November 15, 2016, this instruction reissues an original instruction delegating antiterrorism efforts to the Under Secretary of Defense for Policy with additional transferal of the DoD AT Program to the Assistant Secretary of Defense of Homeland Defense and Global Security. This instruction also provides detailed antiterrorism policies and updates to existing policies to ensure the safety of civilian and military individuals.
United States. Department of Defense
2012-03-01
-
DoD Manual 3025.01, Volume 2: Defense Support of Civil Authorities: DoD Incident Response, August 11, 2016
"Purpose: This issuance is composed of several volumes, each containing its own purpose. In accordance with the authority in DoD Directives (DoDDs) 5111.13 and 3025.18: [1] This manual: [a] Assigns responsibilities and establishes procedures for Defense Support of Civil Authorities (DSCA). [b] Identifies authorities for DoD Components to provide support of civil authorities and non-DoD entities. For DoD support described in this manual that is not under the oversight of the Assistant Secretary of Defense for Homeland Defense and Global Security (ASD(HD&GS)), this manual identifies the offices of responsibility and oversight. [2] This volume provides general information and references for incidents, disasters, and emergencies that may require DoD support."
United States. Department of Defense
2016-08-11
-
Department of Defense Instruction 5200.44: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN), November 5, 2012 [Incorporating Change 1, August 25, 2016]
"This Instruction [...] Establishes policy and assigns responsibilities to minimize the risk that DoD's warfighting
mission capability will be impaired due to vulnerabilities in system design or sabotage or
subversion of a system's mission critical functions or critical components, as defined in this
Instruction, by foreign intelligence, terrorists, or other hostile elements. [...] It is DoD policy that: [a.] Mission critical functions and critical components within applicable systems shall be
provided with assurance consistent with criticality of the system, and with their role within the
system.
[b.] All-source intelligence analysis of suppliers of critical components shall be used to inform
risk management decisions."
United States. Department of Defense
2016-08-25
-
Directive-Type Memorandum (DTM) 08-052: DoD Guidance for Reporting Questionable Intelligence Activities and Significant or Highly Sensitive Matters, June 17, 2009 [Incorporating Change 7, August 23, 2016]
"This DTM [Directive-Type Memorandum] implements recent Executive Branch guidance in Director of
National Intelligence and Chairman, Intelligence Oversight Board Memorandum
(Reference (a)) concerning the criteria and requirements for reporting intelligence
oversight matters and directs compliance with the guidance contained in Attachment 2. It
establishes the procedures to ensure complete and standardized reporting by the DoD
Intelligence Components and other entities involved in intelligence activities, which
include both foreign intelligence and counterintelligence activities. [...] Questionable intelligence activities and significant or highly sensitive
matters involving intelligence activities may have serious implications for the execution
of DoD missions. It is DoD policy that senior leaders and policymakers within the
Government be made aware of events that may erode the public trust in the conduct of
DoD intelligence operations."
United States. Department of Defense
2016-08-23
-
Department of Defense Information Technology Environment: Way Forward to Tomorrow's Strategic Landscape
"This is a time to be bold. Department of Defense (DoD) stands at a decision cross-road facing an IT future that is fast moving, connected, and highly contested. Innovation continues to accelerate at a rate never-before seen, offering previously unimagined opportunities for the warfighter coupled with a threat environment that also evolves at speeds previously unconceived. This is the challenge we face. The Department's choice of cyber and IT capabilities lay the foundation for success -- from the battlefield, to business, and beyond. Optimizing the DoD IT infrastructure by focusing on foundational IT changes that will advance capabilities, enhance the cybersecurity posture, and improve information sharing with mission partners is essential. In short, the Department's IT environment must be innovative, collaborative, effective, efficient, and capable to support defensive and offensive operations."
United States. Department of Defense
2016
-
DoD Manual (DoDM) 3025.01, Volume 3: Defense Support of Civil Authorities: Pre-planned Dod Support of Law Enforcement Agencies, Special Events, Community Engagement, and Other Non-DoD Entities [August 11, 2016]
"Purpose: This issuance is composed of several volumes, each containing its own purpose. In accordance with the authority in DoD Directives (DoDDs) 5111.13 and 3025.18: [1] This manual: [a] Assigns responsibilities and establishes procedures for Defense Support of Civil Authorities (DSCA). [b] Identifies authorities for DoD Components to provide support of civil authorities and non-DoD entities. For DoD support described in this manual that is not under the oversight of the Assistant Secretary of Defense for Homeland Defense and Global Security (ASD(HD&GS)), this manual identifies the offices of responsibility and oversight. [2] This volume provides general information and references for pre-planned DoD support of civilian law enforcement agencies, special events, community engagement, and non-DoD entities."
United States. Department of Defense
2016-08-11
-
DoD Manual 5240.01: Procedures Governing the Conduct of DoD Intelligence Activities [August 8, 2016]
"Purpose: In accordance with the authority in DoD Directive 5240.01 and Executive Order (E.O.) 12333, this issuance: [1] Establishes procedures to enable DoD to conduct authorized intelligence activities in a manner that protects the constitutional and legal rights and the privacy and civil liberties of U.S. persons. DoD authorized intelligence activities are foreign intelligence and counterintelligence (CI) activities unless otherwise specified in this issuance. [2] Authorizes the Defense Intelligence Components to collect, retain, and disseminate information concerning U.S. persons in compliance with applicable laws, Executive orders, policies, and regulations."
United States. Department of Defense
2016-08-08
-
DoD Manual (DoDM) 3025.01, Volume 1: Defense Support of Civil Authorities: Overview [August 11, 2016]
"This manual is composed of several volumes, each containing its own purpose. In accordance with the authority in DoD Directives (DoDDs) 5111.13 and 3025.18: [1] The manual: [a] Assigns responsibilities and establishes procedures for Defense Support of Civil Authorities (DSCA). [b] Identifies authorities for DoD Components to provide support of civil authorities and non-DoD entities. For DoD support described in this manual that is not under the oversight of the Assistant Secretary of Defense for Homeland Defense and Global Security (ASD(HD&GS)), this manual identifies the offices of responsibility and oversight. [2] This volume provides a general overview of DSCA."
United States. Department of Defense
2016-08-11
-
DoD Intruction 4715.24: The Readiness and Environmental Protection Integration (REPI) Program and Encroachment Management, November 9, 2016
From the purpose statement: "This issuance in accordance with the authority in DoD Directive (DoDD) 5134.01 and in accordance with DoDD 3200.15: [1] Establishes policy, assigns responsibilities, and provides procedures for executing the Readiness and Environmental Protection Integration (REPI) Program in coordination with other encroachment management tools and programs to protect military installations, ranges, and their associated facilities, range infrastructure, and airspace from incompatible development and other encroachment threats. [2] Establishes and provides responsibilities for the REPI Inter-Service Working Group (ISWG) to coordinate and integrate REPI Program tools and strategies."
United States. Department of Defense
2016-11-09
-
DoD Instruction 5525.20: Registered Sex Offender (RSO) Management in DoD, November 14, 2016
"In accordance with the authority in DoD Directive (DoDD) 5124.02, this issuance: [1] Establishes policy and assigns responsibilities for identification, notification, monitoring, and tracking of DoD-affiliated personnel who are RSOs [Registered Sex Offenders], referred to collectively in this issuance as 'DoD-affiliated RSOs,' pursuant to: Chapter 151, Subchapter I, Part A of Title 42, United States Code (U.S.C.), also known and referred to in this issuance as the 'Sex Offender Registration and Notification Act (SORNA).' Section 16928a of Title 42, U.S.C., also known and referred to in this issuance as the 'Military Sex Offender Reporting Act of 2015 (MSORA).' [2] Provides procedures for the use of National Crime Information Center (NCIC) information retrieved through the Identity Matching Engine for Security and Analysis (IMESA) for DoD identification, notification, monitoring, and tracking of DoD-affiliated RSOs."
United States. Department of Defense
2016-11-14
-
Principles Related to the Protection of Medical Care Provided by Impartial Humanitarian Organizations During Armed Conflict: Memorandum for Secretaries of the Military Departments, October 3, 2016
"Drafted by military and civilian lawyers within the Department, the statement reflects legal principles related to the protection of the wounded and sick and of impartial humanitarian organizations during armed conflicts. Where the principles were not already legally binding as a matter of treaty or custom, the statement conveys the United States' support for the recognition of the principles as customary international law. Although I expect that all DoD orders and guidance are already consistent with the principles, I nonetheless request the prompt review of all relevant orders, rules of engagement, directives, regulations, policies, practices, and procedures under your purview to ensure that they are consistent with these principles. I also request that you continue to ensure that all DoD personnel adhere to these principles during all armed conflicts, however such conflicts are characterized, and in all other military operations."
United States. Department of Defense
2016-10-03
-
DoD Directive 5210.56: Arming and the Use of Force, November 18, 2016
"This issuance: [1] Establishes policy and standards and assigns responsibilities for arming, carrying of firearms, and
the use of force by DoD personnel performing security and protection, law and order, investigative, or
counterintelligence duties; and for personal protection when related to the performance of official duties.
[2] Establishes policy and standards and assigns responsibilities for contractor personnel required to
carry a firearm in accordance with applicable DoD contracts. [...] [4] Provides requirements, authorizations, and restrictions on carrying firearms and the use of force to
protect DoD installations, property, and personnel, and to enforce law and order in accordance with DoD
Instruction (DoDI) 5200.08 and DoD 5200.08-R."
United States. Department of Defense
2016-11-18
-
DoD Directive 6055.09E: Explosives Safety Management (ESM), November 18, 2016
According to the policy set forth in this directive, "The DoD:
[a.] Protects people and property from the unintentional, potentially-damaging effects of DoD
military munitions.
[b.] Exposes the minimum number of people for the minimum time to the minimum amount
of DoD military munitions required to safely and effectively execute the mission.
[c.] Provides for the explosives and chemical agent safety of DoD military munitions (also
referred to as ammunition and explosives (AE)) throughout the munition's life cycle as a DoD
military munition and without regard to its location.
[d.] Provides for explosives and chemical agent safety during munitions response actions.
[e.] Develops explosives and chemical agent safety standards that provide minimum safety
standards for the military munitions covered by this issuance.
[f.] Requires DoD Components to implement and maintain an effective ESM [Explosives Safety Management] Program
(ESMP).
g. When outside the United States, in accordance with applicable international agreements,
respects host-nation, coalition, or multinational explosives safety standards, and applies them
when more protective than U.S. standards."
United States. Department of Defense
2016-11-18
-
Submarine Industrial Base and the Viability of Producing Additional Attack Submarines Beyond the Fiscal Year 2017 Shipbuilding Plan in the 2017-2030 Timeframe, Report to Congress
"The VIRGINA Class Submarine (VCS) program is healthy and maintaining a construction rate of two SSNs [nuclear powered submarines] per year. The Navy is committed to maintaining this rate as long as feasible within budgetary constraints. The Navy assesses that procurement of additional attack submarines beyond those in the FY 2017 shipbuilding plan is viable, and would have a positive effect on the overall submarine industrial base cost and workload profiles. In particular, the procurement of VCS with the Virginia Payload Module (VPM) at a steady cadence of two per year during the procurement years of the COLUMBIA Class SSBNs [strategic submarine ballistic nuclear] is achievable, and would provide benefit to Navy's attack submarine force inventory. Maintaining a two per year VCS procurement cadence will result in the procurement of seven additional SSNs over the FY 2017 - FY 2030 timeframe. This ramp up in production will require increased management and investment, jointly managed by both the Navy and the shipbuilders, to ensure all aspects of the nuclear shipbuilding enterprise are prepared. The key areas of concern are shipbuilder facilities, work force readiness (manpower ramp up), and supplier/vendor industrial base health. As increased VCS procurements will present facilities, manpower, and vendor base challenges additional to those already presented by the baseline FY 2017 shipbuilding plan, the Navy is working closely with the shipbuilders to ensure that these issues can be managed successfully and without negatively impacting the COLUMBIA Class program. A stable construction plan and adequate funding lead time are critical to stabilize the vendor base health, and will also be needed to allow for facilities and manpower ramp ups at the shipyards to meet the increased workload volume."
United States. Department of Defense
2017-07
-
Department of Defense Instruction 1300.06: Conscientious Objectors [July 12, 2017]
"In accordance with the authority in DoD Directive 5124.02, this issuance establishes policy, assigns responsibilities, and prescribes procedures governing conscientious objectors and for processing requests for discharge of Service members from the Military Services based on conscientious objection."
United States. Department of Defense
2017-07-12
-
Public Affairs Guidance (PAG) On Embedding Media During Possible Future Operations/Deployments In The U.S. Central Commands (CENTCOM) Area Of Responsibility (AOR)
"This is in response to your October 27, 2005, Freedom of Information Act (FOIA) request, which was received in this Office on November 8, 2005. The Office of the Assistant Secretary of Defense for Public Affairs has advised this Office that there is no non-disclosure agreement for access to classified material for embedded reporters. We are providing the enclosed document, which addresses public affairs guidance for embedded reporters, for your information."
United States. Department of Defense
2008-01-19
-
Department of Defense Instruction 5200.44: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)
"This Instruction, in accordance with the authorities in DoD Directive (DoDD) 5134.01 (Reference (a)) and DoDD 5144.02 (Reference (b)): a. Establishes policy and assigns responsibilities to minimize the risk that DoD's warfighting mission capability will be impaired due to vulnerabilities in system design or sabotage or subversion of a system's mission critical functions or critical components, as defined in this Instruction, by foreign intelligence, terrorists, or other hostile elements. b. Implements the DoD's TSN strategy, described in the Report on Trusted Defense Systems (Reference (c)) as the Strategy for Systems Assurance and Trustworthiness, through Program Protection and cybersecurity implementation to provide uncompromised weapons and information systems. The TSN strategy integrates robust systems engineering, supply chain risk management (SCRM), security, counterintelligence, intelligence, cybersecurity, hardware and software assurance, and information systems security engineering disciplines to manage risks to system integrity and trust. c. Incorporates and cancels Directive-Type Memorandum 09-016 (Reference (d)). d. Directs actions in accordance with the SCRM implementation strategy of National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (Reference (e)), section 806 of Public Law 111-383 (Reference (f)), DoDD 5000.01 (Reference (g)), DoDI 5000.02 (Reference (h)), DoDI 8500.01 (Reference (i)), Committee on National Security Systems Directive No. 505 (Reference (j)), and National Institute for Science and Technology Special Publication 800-161 (Reference (k))."
United States. Department of Defense
2017-07-27
-
Department of Defense Instruction 8520.03: Identity Authentication for Information Systems
"In accordance with the authority in DoD Directive (DoDD) 5144.1 (Reference (a)), this Instruction: a. Implements policy in DoD Instruction (DoDI) 8500.01 (Reference (b)), assigns responsibilities, and prescribes procedures for implementing identity authentication of all entities to DoD information systems. b. Establishes policy directing how all identity authentication processes used in DoD information systems will conform to Reference (b). c. Implements use of the DoD Common Access Card, which is the DoD personal identity verification credential, into identity authentication processes in DoD information systems where appropriate in accordance with Deputy Secretary of Defense Memorandum (Reference (c)). d. Aligns identity authentication with DoD identity management capabilities identified in the DoD Identity Management Strategic Plan (Reference (d)). e. Establishes and defines sensitivity levels for the purpose of determining appropriate authentication methods and mechanisms. Establishes and defines sensitivity levels for sensitive information as defined in Reference (b) and sensitivity levels for classified information as defined in Volume 1 of DoD Manual 5200.01 (Reference (e))."
United States. Department of Defense
2017-07-27
-
Department of Defense Instruction 5205.13: Defense Industrial Base (DIB) Cyber Security (CS) Activities
"This Instruction establishes policy, assigns responsibilities, and delegates authority in accordance with the authority in DoD Directive (DoDD) 5144.02 (Reference (a)) for directing the conduct of DIB [defense industrial base] CS/IA [cyber security/information assurance] activities to protect unclassified DoD information, as defined in the Glossary, that transits or resides on unclassified DIB information systems and networks."
United States. Department of Defense
2017-07-27