PolicyBrief
S. 2602
119th CongressJul 31st 2025
A bill to amend title 10, United States Code, to expand the scope of affirmation of authority for cyber operations to include defense of critical infrastructure of the Department of Defense, and for other purposes.
IN COMMITTEE

This bill expands the Department of Defense's authority for cyber operations to explicitly include the defense of its critical infrastructure.

Mike Rounds
R

Mike Rounds

Senator

SD

LEGISLATION

DoD Expands Cyber War Authority: Now Includes Defense of Its Own 'Critical Infrastructure'

This bill is a straightforward update to Title 10 of the U.S. Code, which governs the military. Essentially, it expands the Department of Defense’s (DoD) authority to conduct cyber operations. Right now, the DoD can use these powers for things like protecting military forces. This legislation adds a new, crucial area: the defense of the DoD’s own critical infrastructure. Think of it as giving the military clear permission to use its cyber tools to fight back when its essential internal systems are under attack.

The New Rulebook for Digital Defense

Section 1 of the bill is where the action is, explicitly changing the rules to include the “defense of critical infrastructure of the Department of Defense” under the existing affirmation of authority for cyber operations. This isn't just about protecting a single server; it’s about safeguarding the networks and systems that keep the entire military machine running. For example, if a foreign actor launched a sophisticated attack aimed at crippling the logistical systems that move supplies for a deployed unit, this bill clarifies that the DoD has the authority to conduct cyber operations to defend those systems.

What Counts as 'Critical Infrastructure'?

This is where the fine print matters. The bill doesn't just say “everything.” It defines “critical infrastructure of the Department of Defense” very specifically: it’s any DoD asset so vital that if a cyber attack took it out, it would “seriously cripple the DoD’s ability to do its job” or operate the armed forces. This definition is key because it sets the threshold for when the military can activate this expanded authority. If you’re building software or providing services to the DoD, this means the military is now explicitly authorized to use its full cyber arsenal to protect the systems you work on, provided they meet this high bar of criticality.

The Real-World Impact: Security vs. Scope

On the one hand, this is a necessary update. Cyber threats are constant, and the military needs clear, unambiguous authority to protect its core functions—like communication networks, intelligence systems, and logistics platforms. This change strengthens the DoD's defensive posture, which is a clear benefit for national security. It means faster, more decisive action when essential military capabilities are on the line.

On the other hand, expanding military authority in cyberspace always raises questions about scope and oversight. The definition of 'critical infrastructure'—something that would “seriously cripple” the DoD—is subjective. While it sounds high-stakes, that subjectivity gives the DoD significant latitude in deciding which systems qualify and when to launch a defensive operation. For the average person, the concern isn't about the military protecting its tanks, but how this expanded military cyber authority might interact with, or potentially cross over into, civilian networks or data if a 'defensive' operation requires action beyond the strict confines of DoD networks. While the intent is internal defense, the nature of cyberspace means lines can get blurry, and the public needs assurance that this expansion of power is narrowly focused and well-governed.