U.S Code last checked for updates: Nov 22, 2024
§ 3369.
Cooperative actions to detect and counter foreign influence operations
(a)
Findings
Congress makes the following findings:
(1)
The Russian Federation, through military intelligence units, also known as the “GRU”, and Kremlin-linked troll organizations often referred to as the “Internet Research Agency”, deploy information warfare operations against the United States, its allies and partners, with the goal of advancing the strategic interests of the Russian Federation.
(2)
One line of effort deployed as part of these information warfare operations is the weaponization of social media platforms with the goals of intensifying societal tensions, undermining trust in governmental institutions within the United States, its allies and partners in the West, and generally sowing division, fear, and confusion.
(3)
These information warfare operations are a threat to the national security of the United States and that of the allies and partners of the United States. As former Director of National Intelligence Dan Coats stated, “These actions are persistent, they are pervasive and they are meant to undermine America’s democracy.”.
(4)
These information warfare operations continue to evolve and increase in sophistication.
(5)
Other foreign adversaries and hostile non-state actors are increasingly adopting similar tactics of deploying information warfare operations against the West, such as recent state-backed operations from China around the Hong Kong protests identified by social media companies.
(6)
Technological advances, including artificial intelligence, will only make it more difficult in the future to detect fraudulent accounts, deceptive material posted on social media, and malign behavior on social media platforms.
(7)
Because these information warfare operations are deployed within and across private social media platforms, the companies that own these platforms have a responsibility to detect and facilitate the removal or neutralization of foreign adversary networks operating clandestinely on their platforms.
(8)
The social media companies are inherently technologically sophisticated and adept at rapidly analyzing large amounts of data and developing software-based solutions to diverse and ever-changing challenges on their platforms, which makes them well-equipped to address the threat occurring on their platforms.
(9)
Independent analyses confirmed Kremlin-linked threat networks, based on data provided by several social media companies to the Select Committee on Intelligence of the Senate, thereby demonstrating that it is possible to discern both broad patterns of cross-platform information warfare operations and specific fraudulent behavior on social media platforms.
(10)
General Paul Nakasone, Director of the National Security Agency, emphasized the importance of these independent analyses to the planning and conducting of military cyber operations to frustrate Kremlin-linked information warfare operations against the 2018 mid-term elections. General Nakasone stated that the reports “were very, very helpful in terms of being able to understand exactly what our adversary was trying to do to build dissent within our nation.”.
(11)
Institutionalizing ongoing robust, independent, and vigorous analysis of data related to foreign threat networks within and across social media platforms will help counter ongoing information warfare operations against the United States, its allies, and its partners.
(12)
Archiving and disclosing to the public the results of these analyses by the social media companies and trusted third-party experts in a transparent manner will serve to demonstrate that the social media companies are detecting and removing foreign malign activities from their platforms while protecting the privacy of the people of the United States and will build public understanding of the scale and scope of these foreign threats to our democracy, since exposure is one of the most effective means to build resilience.
(b)
Sense of Congress
It is the sense of Congress that—
(1)
the social media companies should cooperate among themselves and with independent organizations and researchers on a sustained and regular basis to share and analyze data and indicators relevant to foreign information warfare operations within and across their platforms in order to detect and counter foreign information warfare operations that threaten the national security of the United States and its allies and partners;
(2)
information from law enforcement and the intelligence community is also important in assisting efforts by these social media companies to identify foreign information warfare operations;
(3)
these analytic efforts should be organized in such a fashion as to meet the highest standards of ethics, confidentiality, and privacy protection of the people of the United States, while still allowing timely research access to relevant data;
(4)
these analytic efforts should be undertaken as soon as possible to facilitate countering ongoing state or state-backed foreign information warfare operations and to aid in preparations for the United States Presidential and congressional elections in 2020 and beyond;
(5)
the structure and operations of social media companies make them well positioned to work with independent organizations and researchers to address foreign adversary threat networks within and across their platforms, and these efforts could be conducted without direct Government involvement, direction, or regulation; and
(6)
if the social media industry fails to take sufficient action to address foreign adversary threat networks operating within or across their platforms, Congress would have to consider additional safeguards for ensuring that this threat is effectively mitigated.
(c)
Requirement to facilitate establishment of Social Media Data and Threat Analysis Center
(1)
Requirement
(2)
Functions
The functions described in this paragraph are the following:
(A)
Acting as a convening and sponsoring authority for cooperative social media data analysis of foreign threat networks involving social media companies and third-party experts, nongovernmental organizations, data journalists, Federally funded research and development centers, academic researchers, traditional media, and international counterparts, as appropriate.
(B)
Facilitating analysis of foreign influence operation, within and across the individual social media platforms as well as hacking and leaking campaigns, and other tactics, and related unlawful activities that fund or subsidize such operations.
(C)
Developing processes to share information from government entities on foreign influence operations with the individual social media companies to inform threat analysis, and working with the Office of the Director of National Intelligence as appropriate.
(D)
Determining and making public criteria for identifying which companies, organizations, or researchers qualify for inclusion in the activities of the Center, and inviting entities that fit the criteria to join.
(E)
Determining jointly with the social media companies what data and metadata related to indicators of foreign adversary threat networks from their platforms and business operations will be made available for access and analysis.
(F)
Developing and making public the criteria and standards that must be met for companies, other organizations, and individual researchers to access and analyze data relating to foreign adversary threat networks within and across social media platforms and publish or otherwise use the results.
(G)
Developing and making public the ethical standards for investigation of foreign threat networks and use of analytic results and for protection of the privacy of the customers and users of the social media platforms and of the proprietary information of the social media companies.
(H)
Developing technical, contractual, and procedural controls to prevent misuse of data, including any necessary auditing procedures, compliance checks, and review mechanisms.
(I)
Developing and making public criteria and conditions under which the Center shall share information with the appropriate Government agencies regarding threats to national security from, or violations of the law involving, foreign activities on social media platforms.
(J)
Hosting a searchable archive aggregating information related to foreign influence and disinformation operations to build a collective understanding of the threats and facilitate future examination consistent with privacy protections.
(K)
Developing data standards to harmonize the sharing of information pursuant to this paragraph.
(d)
Reporting and notifications
The Director of the Center shall—
(1)
not later than August 1, 2021, submit to appropriate congressional committees a report on—
(A)
the estimated funding needs of the Center for fiscal year 2021 and for subsequent years;
(B)
such statutory protections from liability as the Director considers necessary for the Center, participating social media companies, and participating third-party analytical participants;
(C)
such statutory penalties as the Director considers necessary to ensure against misuse of data by researchers; and
(D)
such changes to the Center’s mission to fully capture broader unlawful activities that intersect with, complement, or support information warfare tactics; and
(2)
not less frequently than once each year, submit to the Director of National Intelligence, the Secretary of Defense, and the appropriate congressional committees a report—
(A)
that assesses—
(i)
degree of cooperation and commitment from the social media companies to the mission of the Center; and
(ii)
effectiveness of the Center in detecting and facilitating the removal or neutralization of clandestine foreign information warfare operations from social media platforms; and
(B)
includes such recommendations for legislative or administrative action as the Center considers appropriate to carry out the functions of the Center.
(e)
Periodic reporting to the public
The Director of the Center shall—
(1)
once each quarter, make available to the public a report on key trends in foreign influence and disinformation operations, including any threats to campaigns and elections, to inform the public of the United States; and
(2)
as the Director considers necessary, provide more timely assessments relating to ongoing disinformation campaigns.
(f)
Foreign malign influence campaigns on social media platforms targeting elections for Federal office
(1)
Reports
(A)
Requirement
(B)
Matters included
Each report under subparagraph (A) shall include an analysis of the following:
(i)
The patterns, tools, and techniques of foreign malign influence campaigns across all platforms on social media by a covered foreign country targeting a regularly scheduled general election for Federal office.
(ii)
Inauthentic accounts and “bot” networks across platforms, including the scale to which such accounts or networks exist, how platforms currently act to remove such accounts or networks, and what percentage of such accounts or networks have been removed during the period covered by the report.
(iii)
The estimated reach and impact of intentional or weaponized disinformation by inauthentic accounts and “bot” networks, including an analysis of amplification by users and algorithmic distribution.
(iv)
The trends of types of media that are being used for dissemination through foreign malign influence campaigns, including machine-manipulated media, and the intended targeted groups.
(C)
Initial report
(D)
Form
(2)
Briefings
(A)
Requirement
(B)
Matters to be included
Each briefing under subparagraph (A) shall include the following:
(i)
The patterns, tools, and techniques of foreign malign influence campaigns across all platforms on social media by a covered foreign country targeting a regularly scheduled general election for Federal office.
(ii)
An assessment of the findings from the report for which the briefing is provided.
(iii)
The activities and methods used to mitigate the threats associated with such findings by the Department of Defense, the Department of Homeland Security, or other relevant departments or agencies of the Federal Government.
(iv)
The steps taken by departments or agencies of the Federal Government to cooperate with social media companies to mitigate the threats identified.
(g)
Funding
(h)
Definitions
(1)
Appropriate congressional committees
The term “appropriate congressional committees” means—
(A)
the congressional intelligence committees;
(B)
the Committee on Armed Services, the Committee on Appropriations, the Committee on Homeland Security, the Committee on Foreign Affairs, and the Committee on the Judiciary of the House of Representatives; and
(C)
the Committee on Armed Services, the Committee on Appropriations, the Committee on Homeland Security and Government Affairs, the Committee on Foreign Relations, and the Committee on the Judiciary of the Senate.
(2)
Covered foreign country and foreign malign influence
(3)
Machine-manipulated media
(Pub. L. 116–92, div. E, title LIII, § 5323, Dec. 20, 2019, 133 Stat. 2130; Pub. L. 116–283, div. H, title XCIII, § 9301, Jan. 1, 2021, 134 Stat. 4801.)
cite as: 50 USC 3369