<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 116–258—DEC. 23, 2020?>


<?I97 134 STAT. ?>
<?I98 134 STAT. ?>
<?I99 134 STAT. ?>
<?I50 PUBLIC LAW 116–258—DEC. 23, 2020?>
<?I51 PUBLIC LAW 116–258—DEC. 23, 2020?>
<?I52 PUBLIC LAW 116–258—DEC. 23, 2020?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 116–258: To direct the Director of the National Science Foundation to support research on the outputs that may be generated by generative adversarial networks, otherwise known as deepfakes, and other comparable techniques that may be developed in the future, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>258</docNumber>
<citableAs>Public Law 116–258</citableAs><citableAs>134 Stat. 1150</citableAs>
<approvedDate>2020-12-23</approvedDate>
<dc:date>2020-12-23</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>116</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?1149</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 116–258—DEC. 23, 2020</centerRunningHead>
<coverTitle>IDENTIFYING OUTPUTS OF GENERATIVE <br/>ADVERSARIAL NETWORKS ACT</coverTitle>
</note>
<page identifier="/us/stat/134/1150">134 STAT. 1150</page>
<dc:type>Public Law</dc:type><docNumber>116–258</docNumber>
<congress value="116">116th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To direct the Director of the National Science Foundation to support research on the outputs that may be generated by generative adversarial networks, otherwise known as deepfakes, and other comparable techniques that may be developed in the future, and for other purposes.<sidenote><p class="centered fontsize8" id="x23492c2e-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2020-12-23">Dec. 23, 2020</approvedDate></p><p class="centered fontsize8" id="x23492c2f-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/116/s/2904">S. 2904</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x23492c30-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Identifying Outputs of Generative Adversarial Networks Act.</p><p class="leftAlign firstIndent0 fontsize8" id="x23492c31-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s9101">15 USC 9101 note</ref>.</p><p class="leftAlign firstIndent0 fontsize8" id="x23492c32-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s9101">15 USC 9101</ref>.</p></sidenote>
<section id="d104206e106" identifier="/us/pl/116/258/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Identifying Outputs of Generative Adversarial Networks Act</shortTitle>” or the “<shortTitle role="act">IOGAN Act</shortTitle>”.</content></section>
<section id="d104206e119" identifier="/us/pl/116/258/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>FINDINGS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x23497a53-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Congress finds the following:</chapeau><paragraph class="fontsize10" id="y23497a54-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s2/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>Gaps currently exist on the underlying research needed to develop tools that detect videos, audio files, or photos that have manipulated or synthesized content, including those generated by generative adversarial networks. Research on digital forensics is also needed to identify, preserve, recover, and analyze the provenance of digital artifacts.</content></paragraph>
<paragraph class="fontsize10" id="y23497a55-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s2/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The National Science Foundation’s focus to support research in artificial intelligence through computer and information science and engineering, cognitive science and psychology, economics and game theory, control theory, linguistics, mathematics, and philosophy, is building a better understanding of how new technologies are shaping the society and economy of the United States.</content></paragraph>
<paragraph class="fontsize10" id="y23497a56-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s2/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The National Science Foundation has identified the “10 Big Ideas for NSF Future Investment” including “Harnessing the Data Revolution” and the “Future of Work at the Human-Technology Frontier”, with artificial intelligence is a critical component.</content></paragraph>
<paragraph class="fontsize10" id="y23497a57-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s2/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The outputs generated by generative adversarial networks should be included under the umbrella of research described in paragraph (3) given the grave national security and societal impact potential of such networks.</content></paragraph>
<paragraph class="fontsize10" id="y23497a58-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s2/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>Generative adversarial networks are not likely to be utilized as the sole technique of artificial intelligence or machine learning capable of creating credible deepfakes. Other techniques may be developed in the future to produce similar outputs.<page identifier="/us/stat/134/1151">134 STAT. 1151</page></content></paragraph>
</section>
<section id="d104206e155" identifier="/us/pl/116/258/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x23497a59-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s9102">15 USC 9102</ref>.</p></sidenote><heading>NSF SUPPORT OF RESEARCH ON MANIPULATED OR SYNTHESIZED CONTENT AND INFORMATION SECURITY.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x2349c87a-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  The Director<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x2349c87b-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote> of the National Science Foundation, in consultation with other relevant Federal agencies, shall support merit-reviewed and competitively awarded research on manipulated or synthesized content and information authenticity, which may include—</chapeau><paragraph class="fontsize10" id="y2349c87c-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s3/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>fundamental research on digital forensic tools or other technologies for verifying the authenticity of information and detection of manipulated or synthesized content, including content generated by generative adversarial networks;</content></paragraph>
<paragraph class="fontsize10" id="y2349c87d-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s3/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>fundamental research on technical tools for identifying manipulated or synthesized content, such as watermarking systems for generated media;</content></paragraph>
<paragraph class="fontsize10" id="y2349c87e-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s3/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>social and behavioral research related to manipulated or synthesized content, including human engagement with the content;</content></paragraph>
<paragraph class="fontsize10" id="y2349c87f-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s3/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>research on public understanding and awareness of manipulated and synthesized content, including research on best practices for educating the public to discern authenticity of digital content; and</content></paragraph>
<paragraph class="fontsize10" id="y2349c880-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s3/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x2349c881-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote><content>research awards coordinated with other federal agencies and programs, including the Defense Advanced Research Projects Agency and the Intelligence Advanced Research Projects Agency, with coordination enabled by the Networking and Information Technology Research and Development Program.</content></paragraph>
</section>
<section id="d104206e201" identifier="/us/pl/116/258/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x2349c882-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s9103">15 USC 9103</ref>.</p></sidenote><heading>NIST SUPPORT FOR RESEARCH AND STANDARDS ON GENERATIVE ADVERSARIAL NETWORKS.</heading><subsection class="firstIndent0 fontsize10" id="y2349ef93-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The Director of the National Institute of Standards and Technology shall support research for the development of measurements and standards necessary to accelerate the development of the technological tools to examine the function and outputs of generative adversarial networks or other technologies that synthesize or manipulate content.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y2349ef94-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Outreach</inline>.—</heading><chapeau>The Director of the National Institute of Standards and Technology shall conduct outreach—</chapeau><paragraph class="fontsize10" id="y2349ef95-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>to receive input from private, public, and academic stakeholders on fundamental measurements and standards research necessary to examine the function and outputs of generative adversarial networks; and</content></paragraph>
<paragraph class="fontsize10" id="y2349ef96-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>to consider the feasibility of an ongoing public and private sector engagement to develop voluntary standards for the function and outputs of generative adversarial networks or other technologies that synthesize or manipulate content.</content></paragraph>
</subsection>
</section>
<section id="d104206e239" identifier="/us/pl/116/258/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>REPORT ON FEASIBILITY OF PUBLIC-PRIVATE PARTNERSHIP TO DETECT MANIPULATED OR SYNTHESIZED CONTENT.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x234a16a7-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Not later than 1 year after the date of enactment of this Act, the Director of the National Science Foundation and the Director of the National Institute of Standards and Technology shall jointly submit to the Committee on Science, Space, and Technology of the House of Representatives, the Subcommittee on Commerce, Justice, Science, and Related Agencies of the Committee on Appropriations of the House of Representatives, the Committee on Commerce, Science, and Transportation of the Senate, and the <page identifier="/us/stat/134/1152">134 STAT. 1152</page>
Subcommittee on Commerce, Justice, Science, and Related Agencies of the Committee on Appropriations of the Senate a report containing—</chapeau><paragraph class="fontsize10" id="y234a16a8-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s5/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the Directors’ findings with respect to the feasibility for research opportunities with the private sector, including digital media companies to detect the function and outputs of generative adversarial networks or other technologies that synthesize or manipulate content; and</content></paragraph>
<paragraph class="fontsize10" id="y234a16a9-e824-11f0-a1e4-69761a48a15a" identifier="/us/pl/116/258/s5/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x234a16aa-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x234a16ab-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>any policy recommendations of the Directors that could facilitate and improve communication and coordination between the private sector, the National Science Foundation, and relevant Federal agencies through the implementation of innovative approaches to detect digital content produced by generative adversarial networks or other technologies that synthesize or manipulate content.</content></paragraph>
</section>
<section id="d104206e264" identifier="/us/pl/116/258/s6" role="definitions" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x234a16ac-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s9104">15 USC 9104</ref>.</p></sidenote><heading>GENERATIVE ADVERSARIAL NETWORK DEFINED.</heading><content style="-uslm-lc:I658120">   In this Act, the term “<term>generative adversarial network</term>” means, with respect to artificial intelligence, the machine learning process of attempting to cause a generator artificial neural network (referred to in this paragraph as the “generator” and a discriminator artificial neural network (referred to in this paragraph as a “discriminator”) to compete against each other to become more accurate in their function and outputs, through which the generator and discriminator create a feedback loop, causing the generator to produce increasingly higher-quality artificial outputs and the discriminator to increasingly improve in detecting such artificial outputs.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2020-12-23">December 23, 2020</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/116/s/2904">S. 2904</ref> (<ref href="/us/bill/116/hr/4355">H.R. 4355</ref>):</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/116/268">116–268</ref> (<committee>Comm. on Science, Space, and Technology</committee>) accompanying <ref href="/us/bill/116/hr/4355">H.R. 4355</ref>.
</note>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/116/289">116–289</ref> (<committee>Comm. on Commerce, Science, and Transporta­tion</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 166 (2020):</heading>
<p class="indentUp4 firstIndent-1" id="x234a3dbd-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Nov. 18, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="x234a3dbe-e824-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 8, considered and passed House.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>