National Academies Press: OpenBook

The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary (2019)

Chapter: Appendix D: SCRM-Specific NDAA/Public Laws (2009-2019)

« Previous: Appendix C: SCRM Policy, Guidance, and Standards
Suggested Citation:"Appendix D: SCRM-Specific NDAA/Public Laws (2009-2019)." National Academies of Sciences, Engineering, and Medicine. 2019. The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary. Washington, DC: The National Academies Press. doi: 10.17226/25475.
×
Page 68
Suggested Citation:"Appendix D: SCRM-Specific NDAA/Public Laws (2009-2019)." National Academies of Sciences, Engineering, and Medicine. 2019. The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary. Washington, DC: The National Academies Press. doi: 10.17226/25475.
×
Page 69
Suggested Citation:"Appendix D: SCRM-Specific NDAA/Public Laws (2009-2019)." National Academies of Sciences, Engineering, and Medicine. 2019. The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary. Washington, DC: The National Academies Press. doi: 10.17226/25475.
×
Page 70

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

D SCRM-Specific NDAA/ Public Laws (2009-2019) The following is a chronological listing of identified National Defense Autho- rization Act (NDAA) sections that are specific to Supply Chain Risk Management (SCRM). The titles sometimes do not reflect the underlying impact to SCRM implementation that may be contained therein. 1. NDAA FY09, Section 254, Public Law 110-417, Trusted Defense Systems, October 14, 2008. 2. NDAA FY10, Section 843, Public Law 111-84, Report on Rare Earth Materi- als in the Defense Supply Chain, October 28, 2009. 3. NDAA FY11, Section 806, Public Law 111-383, Requirements for Informa- tion Relating to Supply Chain Risk, January 7, 2011. 4. NDAA FY11, Section 932, Public Law 111-383, Strategy on Computer Soft- ware Assurance, January 7, 2011. 5. NDAA FY12, Section 818, Public Law 112-81, Detection and Avoidance of Counterfeit Parts, December 31, 2011. 6. NDAA FY12, Section 852, Public Law 112-81, Strategy for Securing the De- fense Supply Chain and Industrial Base, December 31, 2011. 7. NDAA FY13, Section 806, Public Law 112-239, Extension of Authority Relat- ing to Management of Supply Chain Risk, January 2, 2013. 8. NDAA FY13, Section 833, Public Law 112-239, Contractor Responsibilities in Regulations Relating to Detection and Avoidance of Counterfeit Parts, January 2, 2013. 68

Appendix D 69 9. NDAA FY13, Section 933, Public Law 112-239, Improvements in Assurance of Computer Software by the Department of Defense, December 26, 2013. 10. NDAA FY13, Section 938, Public Law 112-239, Sense of Congress on Po- tential Security Risks to Department of Defense Networks, January 2, 2013. 11. NDAA FY13, Section 1412, Public Law 112-239, Additional Security of Strategy Materials Supply Chains, January 2, 2013. 12. NDAA FY14, Section 803, Public Law 113-66, Identification and Replace- ment of Obsolete Electronic Parts, December 26, 2013. 13. NDAA FY14, Section 937, Public Law 113-66, Joint Federated Centers for Trusted Defense Systems for the Department of Defense, December 26, 2013. 14. NDAA FY14, Section 3113, Public Law 113-66, Enhanced Procurement Au- thority to Manage Supply Chain Risk, December 26, 2013. 15. NDAA FY15, Section 815, Public Law 113-291, Permanent Authority for Use of Simplified Acquisition Procedures for Certain Commercial Items, December 19, 2014. 16. NDAA FY15, Section 817, Public Law 113-291, Sourcing Requirements Related to Avoiding Counterfeit Electronic Parts, December 19, 2014. 17. NDAA FY15, Section 1078, Public Law 113-291, Notification of Foreign Threats to Information Technology Systems Impacting National Security, December 19, 2014. 18. NDAA FY16, Section 806, Public Law 114-92, Secretary of Defense Waiver of Acquisition Laws to Acquire Vital National Security Capabilities, Novem- ber 25, 2015. 19. NDAA FY16, Section 1647, Public Law 114-92, Evaluation of Cyber Vulner- abilities of Major Weapon Systems of the Department of Defense, Novem- ber 25, 2015. 20. NDAA FY17, Section 231, Public Law 114-328, Strategy for Assured Access to Trusted Microelectronics, December 23, 2016. 21. NDAA FY17, Section 807, Public Law 114-328, Cost, Schedule, and Perfor- mance of Major Defense Acquisition Programs, December 23, 2016. 22. NDAA FY17, Section 887, Public Law 114-328. Review and Report on Con- tractual Flow-Down Provisions, December 23, 2016. 23. NDAA FY18, Section 807, Public Law 115-91, Process for Enhanced Supply Chain Scrutiny, December 12, 2017. 24. NDAA FY18, Section 1069, Public Law 115-91, Recommendations for Interagency Vetting of Foreign Investments Affecting National Security, December 12, 2017. Spec. Item (c) (2). 25. NDAA FY18, Section 1634, Public Law 115-91, Prohibition on Use of Prod- ucts and Services Developed or Provided by Kaspersky Lab, December 12, 2017. Spec. Item (c) (2).

70 Lethality at Risk 26. NDAA FY18, Section 1696, Public Law 115-91, Pilot Program on Enhancing Information Sharing for Security of Supply Chain, December 12, 2017. 27. NDAA FY19, Section 252 [Expected P.L.115-874], Improvement of the Air Force Supply Chain, August 13, 2018. 28. NDAA FY19, Section 868 [Expected P.L.115-874], Implementation of Rec- ommendations of the Final Report of the Defense Science Board Task Force on the Design and Acquisition of Software for Defense Systems, August 13, 2018. 29. NDAA FY19, Section 881 [Expected P.L.115-874], Permanent Supply Chain Risk Management Authority, August 13, 2018. 30. NDAA FY19, Section 1613 [Expected P.L.115-874], Evaluation and En- hanced Security of Supply Chain for Protected Satellite Communications Programs and Overhead Persistent Infrared Systems, August 13, 2018. 31. NDAA FY19, Section 1644 [Expected P.L.115-874], Assistance for Small Manufacturers in the Defense Industrial Supply Chain and Universities on Matters Relating to Cybersecurity, August 13, 2018. 32. NDAA FY19, Section 1655 [Expected P.L.115-874], Mitigation of Risks to National Security Posed by Providers of Information Technology Products and Services Who Have Obligations to Foreign Governments, August 13, 2018. 33. NDAA FY19, Section 1793 [Expected P.L.115-874], Review of and Report on Certain Defense Technologies Critical to the United States Maintaining Superior Military Capabilities, August 13, 2018.

Next: Appendix E: Defense Federal Acquisition Regulation Supplement Subparts Addressing SCRM »
The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary Get This Book
×
Buy Paperback | $60.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

High-performance electronics are key to the U.S. Air Force’s (USAF’s) ability to deliver lethal effects at the time and location of their choosing. Additionally, these electronic systems must be able to withstand not only the rigors of the battlefield but be able to perform the needed mission while under cyber and electronic warfare (EW) attack. This requires a high degree of assurance that they are both physically reliable and resistant to adversary actions throughout their life cycle from design to sustainment.

In 2016, the National Academies of Sciences, Engineering, and Medicine convened a workshop titled Optimizing the Air Force Acquisition Strategy of Secure and Reliable Electronic Components, and released a summary of the workshop. This publication serves as a follow-on to provide recommendations to the USAF acquisition community.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!