[Congressional Record Volume 158, Number 80 (Thursday, May 31, 2012)]
[House]
[Pages H3290-H3309]




          INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2013


                             General Leave

  Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that all 
Members may have 5 legislative days to revise and extend their remarks 
and include extraneous material on the bill, H.R. 5743.
  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Michigan?
  There was no objection.
  The SPEAKER pro tempore. Pursuant to House Resolution 667 and rule 
XVIII, the Chair declares the House in the Committee of the Whole House 
on the state of the Union for the consideration of the bill, H.R. 5743.
  The Chair appoints the gentleman from Kansas (Mr. Yoder) to preside 
over the Committee of the Whole.

                              {time}  1418


                     In the Committee of the Whole

  Accordingly, the House resolved itself into the Committee of the 
Whole House on the state of the Union for the consideration of the bill 
(H.R. 5743) to authorize appropriations for fiscal year 2013 for 
intelligence and intelligence-related activities of the United States 
Government, the Community Management Account, and the Central 
Intelligence Agency Retirement and Disability System, and for other 
purposes, with Mr. Yoder in the chair.
  The Clerk read the title of the bill.
  The CHAIR. Pursuant to the rule, the bill is considered read the 
first time.
  The gentleman from Michigan (Mr. Rogers) and the gentleman from 
Maryland (Mr. Ruppersberger) each will control 30 minutes.
  The Chair recognizes the gentleman from Michigan.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield myself such time as I 
might consume.
  Mr. Chairman, I first wish to make an announcement with respect to 
the availability of the classified annex to the bill for the Members of 
the House. This is to reinforce a previous announcement made to Members 
by the Committee on Rules on May 23, 2012, and an informal announcement 
by leadership.

                              {time}  1420

  Mr. Chairman, the classified Schedule of Authorizations and the 
classified annex accompanying the bill remain available for review by 
Members at the offices of the Permanent Select Committee on 
Intelligence in room HVC 304 of the Capitol Visitors Center. The 
committee office will open during regular business hours for the 
convenience of any Member who wishes to review this material prior to 
its consideration by the House.
  I recommend that Members wishing to review the classified annex 
contact the committee's director of security to arrange a time and date 
for that viewing. This will assure the availability of committee staff 
to assist Members who desire assistance during their review of these 
classified documents.
  Mr. Chairman, we're especially pleased with this year's fiscal 2013 
Intelligence authorization bill and its presence here on the floor 
today. This will be our third authorization since I assumed the 
chairmanship and my colleague, Mr. Ruppersberger, assumed the ranking 
member position on the House Intelligence Committee.
  The bill is a vital tool for congressional oversight of the 
intelligence community's classified activities and is critical to 
ensuring that our intelligence agencies have the resources and 
authorities they need to do their important work.
  The Intelligence authorization bill funds U.S. intelligence 
activities spanning 17 separate agencies. This bill is significantly 
below last year's inactive budget, but up modestly from the President's 
roughly $72 billion in the unclassified number budget request for 
fiscal year 2013. It is also completely in line with the House budget 
resolution, which provides for a modest increase of defense activities 
above the President's budget.
  The FY13 bill sustains our current intelligence capabilities and 
provides for the development of future capabilities, all while 
achieving significant savings and ensuring the intelligence agencies 
are being good stewards of the taxpayers' dollars. The U.S. 
intelligence community plays a critical role in the war on terrorism 
and securing the country from many threats that we face. Effective and 
aggressive congressional oversight is essential to ensuring continued 
success in the intelligence community. The current challenging fiscal 
environment demands the accountability and financial oversight of our 
classified intelligence programs that can only come with an 
Intelligence authorization bill.
  The bill's comprehensive classified annex provides detailed guidance 
on intelligence spending, including adjustments to costly but important 
programs. The bill funds requirements of the men and women of the 
intelligence community, both military and civilian, many of whom 
directly support the war zones and are engaged in other dangerous 
operations designed to keep America safe.
  It provides oversight and authorization for vital intelligence 
activities, including global counterterrorism operations such as the 
one that took out Osama bin Laden; efforts by the National Security 
Agency to defend us from advance foreign state-sponsored cyberthreats; 
countering the proliferation of weapons of mass destruction; global 
monitoring of foreign militaries and advanced weapons tests; and 
research and development of new technology to maintain our intelligence 
agencies' technological edge, including work on code breaking and spy 
satellites.
  To stay competitive amidst declining budgets, the IC must wring out 
cost in all realms of operations--collection, processing, analysis, 
logistics, and ``back office'' operations. This bill promotes operating 
efficiencies in a number of areas, particularly in information 
technology, the ground processing of satellite data, and the 
intelligence, surveillance, and reconnaissance departments. The bill 
holds personnel levels, one of the biggest cost drivers, at last year's 
levels. Even so, the bill adds a limited number of new personnel 
positions for select, high-priority positions, such as FBI surveillance 
officers to keep watch on terrorists.
  The bill contains additional funding for intelligence collection 
programs, including increased counterintelligence to thwart foreign 
spies. The bill also increases funding for our intelligence community's 
comparative advantage--cutting-edge research and development.

[[Page H3291]]

  While we're on the subject of funding our intelligence agencies, I 
think I would be remiss if we didn't briefly discuss the looming threat 
of sequestration and the devastating consequences it would have for our 
vital intelligence operations. The intelligence community and the 
congressional intelligence oversight committees have worked together 
over the last year, in recognition of the current challenging fiscal 
environment, to find efficiencies in the intelligence budget. And we've 
done that. We've actually done more in certain areas by finding 
efficiencies in other areas and reducing the overall cost of our 17 
agencies.
  Unlike the dangerous, across-the-board cuts of the 1990s, however, 
these funding cuts were carefully selected to ensure that no important 
operational intelligence capabilities were impacted. Let me be clear: 
The intelligence community has given until it hurts to produce better 
budget efficiencies, but we have done this without adversely affecting 
the mission, which is critically important.
  All of this careful work, however, will have been done for nothing if 
Congress doesn't avert the sequestration train wreck. Sequestration 
will require a devastating cut to defense spending that will also 
entail dangerous across-the-board reductions in intelligence funding. 
The across-the-board nature of the sequester means that there is very 
little discretion left to our intelligence agencies on how to apportion 
these reductions.
  Let me give you just a few examples of the dangerous impact this 
would have. Thousands of intelligence officers and specialized 
technicians will be laid off, to include those working around the 
world, and around the clock, to stop terrorist plots before they arrive 
on U.S. shores. The National Security Agency would have to 
significantly reduce its ability to intercept, translate, and analyze 
terrorist communications about their plans to attack the United States 
and Western targets. This would significantly reduce our odds of 
detecting and disrupting those terrorist plots. Intelligence community 
support to our soldiers and marines in harm's way in Afghanistan would 
significantly be curtailed. Also, the National Geospatial-Intelligence 
Agency would be forced to cut back the number of satellite images that 
it analyzes, reducing our odds of detecting significant foreign 
military activity, such as North Korean preparations for an attack on 
our troops in South Korea.
  Our intelligence agencies and the important work they do is our first 
line of defense against the many threats around the world to our 
national security. Sequestration would be dangerous and irresponsible 
for many reasons, not the least of which is the threat to those vital 
intelligence capabilities, and Congress must act to avoid it. The House 
has put an offer on the table that would avert this disaster. We passed 
a bill earlier this month with responsible spending reforms that will 
bring down the debt without endangering our national security. I urge 
my colleagues in the Senate to take up this bill without further delay.

  The bipartisan fiscal year 2013 Intelligence authorization bill 
preserves and advances national security and is also fiscally 
responsible. We have proven it can be done. The secrecy that is a 
necessary part of our country's intelligence work requires that the 
congressional Intelligence Committees conduct strong and effective 
oversight on behalf of the American people. That strong and effective 
oversight is impossible, however, without an annual Intelligence 
Authorization bill.
  I want to thank all of the members on the committee for their 
bipartisan effort to find agreement on a bill that saves money and 
moves forward smartly on protecting the interests of national security 
for the United States.
  I reserve the balance of my time.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield myself such time as I may 
consume.
  I rise today in support of the Intelligence Authorization Act for 
Fiscal Year 2013. It is a bipartisan bill that gives our intelligence 
professionals the resources, capabilities, and the authorities they 
need to keep our country safe. When Chairman Rogers and I took over the 
leadership of the Intelligence Committee, we made a commitment to 
bipartisanship. We believe politics has no place on the Intelligence 
Committee. The stakes are just too high.
  We also made a commitment to passing intelligence budgets to give the 
intelligence community financial direction and to conduct proper 
oversight. I commend Chairman Rogers for making this an open process 
where we reached agreement on issues that will make this country safer 
and the intelligence process more efficient.
  But we also know we're facing tough economic times so we must use 
every dollar wisely. This budget is about 4 percent below the enacted 
levels for FY 2012. It holds personnel at last year's levels and 
authorizes an initiative to achieve major efficiencies and improve 
performance and information technology. We made cuts where appropriate, 
eliminated redundancies, and pushed programs to come in on time and on 
budget.
  The bill allocates resources to critical national security 
priorities: space, cybersecurity, counterintelligence, and 
counterterrorism.
  We restored some of the cuts to commercial satellite imagery to 
ensure the warfighter and policymakers have the images they need. I 
believe commercial competition is important to ensure the warfighter 
and other policymakers get high-quality products while keeping costs 
down. It drives innovation and provides a much-needed policy in case 
there are problems with other government problems.

                              {time}  1430

  The bill reinforces cybersecurity by protecting the intelligence 
community's networks from countries like China and others trying to 
steal our valuable data.
  The bill also makes counterintelligence a priority by increasing 
surveillance of foreign spies from countries like China, Russia, and 
Iran.
  The bill improves supply-chain security and adds the 
counterintelligence analysts this Nation needs.
  The bill enhances counterterrorism efforts to continue the fight 
against al Qaeda and its affiliates around the world.
  The bill increases oversight on the spending of domestic intelligence 
agencies.
  The bill also expands the intelligence community's capabilities 
around the global to ensure the United States is capable and ready to 
address the threats worldwide.
  The bill authorizes the Defense Clandestine Service created by the 
Department of Defense to reorganize its human intelligence collection 
and partner with the CIA's National Clandestine Service.
  The Democrats on the House Intelligence Committee remain committed to 
giving our intelligence professionals what they need to do their jobs 
while also providing proper oversight and protecting personal privacy.
  Provisions offered by the minority members were accepted as part of 
the chairman's mark and other amendments were adopted unanimously by 
the committee.
  Congresswoman Schakowsky introduced an amendment that protects the 
inspector general of an intelligence agency from across-the-board cuts 
to preserve their role as a watchdog of an organization. I commend Ms. 
Schakowsky for her good work on this bill.
  Congressman Thompson introduced an amendment to expand our efforts to 
prevent drug cultivation on Federal lands. I commend Mr. Thompson for 
his efforts on this bill as well.
  In fact, we wouldn't be here today without the hard work of all of 
the members of the Intelligence Committee. This is truly a bipartisan 
product. The bill passed through markup by a margin of 19 0, a true 
testament to the bipartisan spirit of the committee.
  I urge my colleagues to support the Intelligence Authorization Act 
for 2013. This bill ensures the Nation's intelligence community is 
effective, fiscally sound, and subject to appropriate oversight.
  I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield 2 minutes to a 
distinguished member of the committee, the gentleman from California 
(Mr. Nunes).
  Mr. NUNES. Mr. Chairman, today is another milestone in our work to 
conduct strong oversight of the intelligence community. In just under 2 
years as chairman and ranking member, the gentleman from Michigan and

[[Page H3292]]

the gentleman from Maryland have proven that the Intelligence Committee 
is now really not just a bipartisan committee, but I think more 
importantly a nonpartisan committee, which is why this bill passed out 
of committee 19 0.
  During these austere times, it is also important to not only sustain 
our Nation's intelligence capabilities and provide for future needs, 
but to do so in a fiscally responsible way. This bill achieves 
significant savings by holding the line on authorizing spending below 
last year's levels--curbs unnecessary personnel growth--and targets 
intelligence investments. Included in this bill are the tools necessary 
to reduce operational costs of the intelligence community's front-line 
operators and provisions to conduct a house cleaning of ``back office'' 
operations.
  Moreover, this bill ensures that acquisitions are done on cost and on 
schedule while still expanding the IC community's comparative advantage 
of cutting-edge research and technology.
  One of the critical gaps this bill fixes is with structural 
deficiencies in the CIA Inspector General's Office. We are taking steps 
to allow the CIA to better recruit and retain a professional staff of 
investigators. This is done by allowing the IG to designate certain 
positions as law enforcement officers for retirement purposes.
  Mr. Chairman, it is critical that the Congress demand accountability 
and financial oversight of our classified intelligence programs. That 
can only be done through consistent passage of an intelligence 
authorization bill. I urge all Members to support the bill before us 
today.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield 4 minutes to my 
distinguished colleague from the State of California (Mr. Thompson).
  Mr. THOMPSON of California. Mr. Chairman, I thank the gentleman for 
yielding, and I also thank the chairman and the ranking member for 
making sure that we're able to work together to produce a document that 
will benefit the entire country in regard to our national security, and 
I rise in strong support of this year's Intelligence authorization 
bill.
  As the ranking member of the Subcommittee on Terrorism, Human 
Intelligence, Analysis, and Counterintelligence, I'm pleased that we're 
able to put this product forward, and I strongly support the bill's 
emphasis on developing stronger counterintelligence capabilities 
throughout the intelligence community.
  Every time I travel overseas to observe operating conditions, I've 
been impressed by the work being done by our intelligence personnel, 
but also concerned about the increasing threats and challenges that we 
face. Today, our intelligence officers are facing increasingly hostile 
foreign intelligence services, insurgent groups, terrorists 
organizations, industrial spies, and the threat of cyberattacks. Many 
of our adversaries are working together in ways we haven't seen before. 
This is no longer the Cold War world with little cameras and secret 
compartments. It's now more complicated to find out how our enemies are 
getting intelligence on the United States and how these same enemies 
are protecting their own secrets.
  To address this threat, this bill provides additional resources to 
enable our intelligence community to collect better information and 
provide better analysis on how our adversaries are working against us.
  Second, since the emergence of the Arab Spring, our subcommittee has 
been examining how the intelligence community has been identifying the 
types of trends that have literally transformed countries overnight, 
countries like Tunisia and Egypt.
  I've heard firsthand from our intelligence personnel that they need 
more to better get a handle on the dynamics in their countries and 
their regions. The Arab Spring phenomenon can happen anywhere anytime, 
and our intelligence community must be better prepared the next time. 
This bill enables the intelligence community to rebuild its global 
mission by realigning and adding to its current resources dedicated to 
this collection effort. With these resources, intelligence personnel 
will have more tools to identify and report signs of instability in 
real-time.
  This bill also includes a number of other provisions that I believe 
are important to our national security. The bill requires the Director 
of National Intelligence to continue compiling threat assessment of 
foreign drug traffickers that are turning our public lands in the 
United States into hostile areas to further their operations. This 
threat assessment was first required in last year's authorization; and 
given the scope of the problem, it's essential that our efforts to 
combat foreign drug traffickers on our Federal property be continued.
  Also, the bill restores funding for the National Gang Intelligence 
Center. The analysis that the NGIC has provided on the growing gang 
influence in the U.S. military, for example, is critical to finding an 
adequate solution to this problem and the very reason Congress created 
the NGIC in the first place. It's important that this work continue.
  I am a little disappointed that we weren't able to do some things 
that we all believe are necessary. For example, the expansion of the 
Science, Technology, Engineering and Math cooperative programs at 
colleges and universities is extremely important; and I think we need 
to continue to do more to make sure that we're able to grow that 
resource.
  Mr. Chairman, our intelligence community must be prepared for any and 
all threats. While Osama bin Laden may no longer pose a direct threat 
to our country's safety and security, the remaining elements of al 
Qaeda and other emerging terrorist organizations are more determined 
than ever. It's critical for Congress to pass this bill, and I strongly 
support that we do so today.
  Mr. ROGERS of Michigan. Mr. Chairman, I would yield 2\1/2\ minutes to 
the gentleman from Kansas (Mr. Pompeo).
  Mr. POMPEO. Mr. Chairman, I want to first start by commending 
Chairman Rogers and Ranking Member Ruppersberger for their great work 
on crafting this bipartisan bill, a strong piece of legislation that 
addresses some tremendously important issues that face our country.
  While this legislation in its detail--and we've heard the chairman 
speak about it--talks about new initiatives and programs and three-
letter Agencies, this is about something different from that. This is 
about protecting the American people. This is about keeping the 
citizens of El Dorado and Coffeyville and Wichita and Anthony, Kansas, 
safe against a staggeringly large and very real threat.
  On September 11, now over a decade ago, we began to enter a very 
different time, very different war. Now 15 years ago, I was serving in 
the military. I served along the East German border. Then it was 
different. We could see the enemy. They wore uniforms. There were 
fences and boundaries. And today, we live in a very, very different 
world. And this legislation, the 2013 Intelligence bill, attempts to, 
in a fiscally responsible way while protecting the privacy of every 
American citizen in a conscientious way, address those very real 
threats.

                              {time}  1440

  It is easy sometimes to forget--to forget from a decade ago and 
forget that al Qaeda is still there, active and trying, fighting 
vigorously to take down the American way of life. And to see this 
thoughtful piece of legislation put together in a way that both parties 
could agree to, that both parties could say this makes sense, these are 
the resources we have available, we're going to do this in a fiscally 
prudent way, is something that I think should encourage each of us and 
cause every Member to support this legislation.
  We can't allow anyone to forget that this threat is real. The gravity 
and consequences of not having an active and capable intelligence set 
of agencies and forces is too important. I know the chairman and 
ranking member both understand this, and I want to thank them for their 
work. I want to encourage each and every one of my colleagues to 
support the FY 2013 Intelligence Authorization bill.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to my 
distinguished colleague from the State of Rhode Island (Mr. Langevin), 
whom I consider one of the foremost experts in the area of 
cybersecurity. Thank you for your work in that field, Mr. Langevin.
  (Mr. LANGEVIN asked and was given permission to revise and extend his 
remarks.)

[[Page H3293]]

  Mr. LANGEVIN. I thank the gentleman for yielding.
  I thank both Chairman Rogers and Ranking Member Ruppersberger for 
their outstanding work on this very important legislation and so many 
aspects contained in it.
  Last September, I proudly spoke in support of the fiscal year 2012 
Intelligence authorization bill because it addressed critical 
cybersecurity needs as well as many issues of great importance, not 
just to me but to our country and to the men and women of our 
intelligence services. I was pleased to be a part of a bipartisan 
effort within the Intelligence Committee to craft that legislation and 
gratified by the overwhelming bipartisan support that it garnered.
  Earlier this year, the House considered the Cyber Intelligence 
Sharing and Protection Act, which also received bipartisan support and, 
in my opinion, is a critical first step to confront the serious 
challenges our Nation faces in the realm of cybersecurity.
  Now, I continue to advocate for action on CISPA and on the 
comprehensive cybersecurity legislation that will ultimately be 
necessary to address this issue, but today I'm proud to support H.R. 
5743, the fiscal year 2013 Intelligence authorization bill because it 
builds on these earlier efforts to give the U.S. intelligence community 
the tools and funding it needs to meet the challenges of the future. 
Just as importantly, it supports the men and women of the intelligence 
community who enable those investments and keep our Nation secure.
  The National Counterintelligence Executive recently warned that China 
and Russia are conducting sophisticated cyberespionage against the 
U.S., in addition to more traditional espionage operations. They and 
other countries seek to undermine our military, technological, and 
innovative edge by exploiting our vulnerabilities in the cyber realm, 
in particular, our critical infrastructure. This situation presents a 
pervasive threat to U.S. economic security, and I'm very sad to say 
that they're having success.
  The estimates on the losses to U.S. industry and government from 
economic espionage range from $2 billion to over $400 billion a year. 
Now, this massive spread only emphasizes that we don't yet have the 
information we need to fully understand and combat this threat.
  The CHAIR. The time of the gentleman has expired.
  Mr. RUPPERSBERGER. I yield the gentleman an additional 30 seconds.
  Mr. LANGEVIN. The National Counterintelligence Executive cautions 
that the intelligence community can't entirely prevent cybertheft of 
national and industrial secrets, but the community can minimize the 
hostile activity and mitigate the effects. Those efforts will be more 
successful if the agencies collaborate, build public-private 
partnerships, and improve intelligence collection and analysis of the 
cyberthreat to our country.
  The FY 2013 bill responds by giving the intelligence agencies the 
resources they need to develop a strong, unified effort to counter 
China, Russia, and other actors that might threaten our economic 
security or technological edge. The bill also does a lot to protect our 
supply chain, which is another area of vulnerability.
  This is a good bill, it's an important bill, and I urge my colleagues 
to support it.
  Mr. ROGERS of Michigan. Mr. Chairman, I'll reserve my time.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to my 
distinguished colleague from the State of California (Mr. Schiff).
  Mr. SCHIFF. I thank the gentleman for yielding, and I want to rise to 
congratulate our chairman, Mr. Rogers, and our ranking member, Mr. 
Ruppersberger, for their extraordinary work in putting this bill 
together, and the incredible and bipartisan operation of the committee. 
This work product and the committee operations I think were a model 
that many of the rest of the committees on the Hill would do well to 
follow.

  I rise in strong support of H.R. 5743, an authorization bill that 
gives our intelligence community the tools they need to keep America 
safe.
  I'd like to focus on the technical aspects of the bill, specifically 
the intelligence community's future investments in key overhead 
technologies. This is a good bill, as it makes necessary budget cuts 
without affecting the mission of the intelligence community. And there 
is one issue in particular I would like to highlight.
  Since 9/11, we have been investigating the potential advantages of 
persistent video. Current systems that simply snap pictures miss 
critical dynamics of the adversary. Standard pictures limited to 
capturing isolated points in time can't tell where a bad actor came 
from or where they went after they committed an act of terror.
  Hypothetically consider: What if we could use a video and video a 
hostile area 24 hours a day, 365 days a year, and during this period a 
roadside bomb occurred? With a variety of capabilities, we could simply 
rewind and watch the perpetrators as they planted the device and trace 
their locations both before and after the device exploded. Independent 
of the source--whether space, ground, or air--we simply can't do that 
with still photography. Similarly, such a capacity might help us 
identify proliferators of nuclear and missile technology.
  I favor an approach that invests in new technologies that go beyond 
our past and present capabilities. In my role as ranking member for the 
Technical and Tactical Subcommittee, I work to ensure that cost, 
schedule, and performance are met as we strive to explore this 
potential advantage for national security.
  Mr. Chairman and Ranking Member, again, I want to thank you for the 
opportunity to express my views on this bill. I support it 
wholeheartedly and recommend its passage.
  Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve my time.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield 3 minutes to my 
distinguished colleague from the State of Kentucky (Mr. Chandler).
  Mr. CHANDLER. First, I want to start by saying just how wonderful it 
is to be a part of a committee that actually works well together, and I 
thank Chairman Rogers and Ranking Member Ruppersberger for that. In 
this place these days, it seems a bit unusual, but on this committee, 
in my view, they are not Republicans and Democrats; there are patriots 
and Americans, and I appreciate that.
  I'm proud to support this bill, the Intelligence Authorization Act 
for Fiscal Year 2013. This bill authorizes vital funding for our 
intelligence activities which we need to protect America and American 
interests.
  Congress has an obligation to support intelligence gathering while 
also protecting our civil liberties and considering our fiscal 
responsibilities. I believe this bill does just that, ensuring that we 
have resources and tools needed to keep our country safe even in this 
tough economic time.
  We live in complicated times, when terrorists can execute a 
cyberattack from halfway around the world, bringing down a nation's 
infrastructure or compromising individuals' identities and bank 
accounts. Now, more than ever before, our intelligence capabilities are 
critical to the safety and security of our country.
  In my tenure on the Intelligence Committee, I've had the privilege of 
working with the fine men and women of the intelligence community, and 
I'm here to tell you they are committed patriots who protect our Nation 
and our way of life every day. I cannot overstate how important the 
work they do is to the safety of our Nation.
  This bill, which passed out of the committee with overwhelming 
bipartisan support, allocates resources to critical national programs, 
including those that detect, prevent, and disrupt terrorist attacks 
against Americans. It enhances counterterrorism efforts to continue the 
fight against al Qaeda and its affiliates around the world. 
Furthermore, this bill shows the committee's commitment to giving our 
intelligence professionals what they need to do their jobs while 
providing oversight and protecting personal privacy.
  The world just saw how first-rate our intelligence community is after 
the successful mission to kill Osama bin Laden last year. This 
legislation ensures that we can continue to have the world's premiere 
intelligence capabilities.
  Again, I thank the chairman and I thank the ranking member for the 
tremendous way that they cause the committee to work together. It's an 
honor

[[Page H3294]]

to serve on this committee, and I thank you.

                              {time}  1450

  Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve the 
balance of my time.
  Mr. RUPPERSBERGER. Mr. Chairman, can I ask how much time each side 
has remaining?
  The CHAIR. The gentleman from Maryland has 15 minutes remaining. The 
gentleman from Michigan has 18 minutes remaining.
  Mr. RUPPERSBERGER. Mr. Chairman, I reserve the balance of my time, 
also.
  Mr. ROGERS of Michigan. Mr. Chairman, I have one more speaker who is 
on his way to the floor, I understand, so I continue to reserve the 
balance of my time.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield myself such time as I may 
consume.
  I'm proud that the bill under consideration has an emphasis on 
supporting counterintelligence resources. Last year, the chairman and I 
made it a priority to review the community's counterintelligence 
posture after learning more about the aggressive ways foreign 
intelligence and security services continue to steal U.S. secrets, 
including trade secrets, from U.S. companies.
  One of the most disturbing reports came from the National 
Counterintelligence Executive which said that Russia and China are both 
aggressively utilizing cyberspace to steal U.S. economic secrets. This 
informative unclassified report is available on the Director of 
National Intelligence Web site. I encourage every U.S. business to read 
it to understand the threat they face today. The hard work and money it 
takes to innovate and conduct research are all at risk.
  What China, Russia, and any other country who engage in espionage 
realize is that it's faster and cheaper to steal U.S. creativity than 
to develop it themselves. The report also gives examples of the 
millions of dollars that are at stake, like a single proprietary paint 
formula from Valspar valued at $20 million. These are some economic 
impacts of espionage, but they are also the cost to our national 
security and those of our allies.
  A spy within our intelligence community, with access to our most 
sensitive secrets, can mean the lives of our sources and our troops. In 
these cases, it is impossible to calculate the impact. Espionage is 
countered by the villages of our counterintelligence professionals. 
These are the people we depend upon to discover the spies within our 
midst. I'm proud that this bill adds the resources and personnel for 
this critical mission.
  I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield 3 minutes to the 
gentleman from Nevada (Mr. Heck).
  Mr. HECK. Mr. Chairman, I rise today in support of H.R. 5743, the 
Fiscal Year 2013 Intelligence Authorization Act.
  This bill strikes the appropriate balance between the necessity for 
fiscal restraint and providing our intelligence community the resources 
they need so that they can continue to play a vital role in our 
national security. This is especially true in the technical collection 
systems that are the focus of the Subcommittee on Technical and 
Tactical Intelligence.
  H.R. 5743 puts the focus on how well our entire technical collection 
architecture systems work together. In the past, we have had a tendency 
to focus on a few large acquisition programs and not on the total 
capability that all systems bring to the nation. This bill leverages 
advancements in technology by making changes that are focused on 
ensuring collection platforms work together to simultaneously collect 
and correlate data.
  Additionally, through funding for the National Geospatial-
Intelligence Agency programs, this bill incrementally advances the 
ability to coordinate collection across a diverse set of collection 
platforms that are fielded by the intelligence and military 
communities.
  H.R. 5743 also takes an important first step toward reducing the cost 
of launch, and encourages the further development of commercial launch 
services. While the cost of getting to space has not traditionally been 
the focus of the intelligence community, these essential reforms will 
allow us to reallocate these savings to our Nation's core intelligence 
missions.
  Mr. Chairman, again I urge support of H.R. 5743. I thank the chairman 
and the ranking member for their leadership on this issue.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield myself as much time as I may 
consume.
  For the third time in 3 years, Chairman Rogers and I have stood on 
the floor of the House encouraging our colleagues to support our 
intelligence budget bill. We both rise in support of the Intelligence 
Authorization Act for Fiscal Year 2013. I would like to thank Chairman 
Rogers for his bipartisan leadership on this bill.
  The bill gives our intelligence professionals the resources, 
capabilities, and authorities they need to protect American and 
American interests. We crafted a bill that addresses our core needs, 
including space, cybersecurity, counterintelligence, and 
counterterrorism, while also keeping an eye on the bottom line. This 
bill is about 4 percent below last year's budget and holds personnel at 
last year's levels.
  The Intelligence Committee came together as Democrats and Republicans 
to do what is right for our country and for the intelligence community. 
The bill unanimously passed out of our committee by a margin of 19 0.
  I would also like to thank the staff of the Intelligence Committee 
for their hard work on this bill. You're only as good as your team and 
your staff.
  I urge my colleagues to support the Intelligence Authorization Act 
for FY 2013.
  Mr. Chairman, I yield back the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield myself as much time as 
I may consume.
  I, too, want to thank the ranking member for his bipartisan 
leadership on this very, very important issue, our national security, 
and the staffs of both committees. We did something very unusual. We 
have the staffs work together to produce an authorization bill, and we 
think it makes a much better product with a lot more voices in the mix. 
We think we have gotten to a place that will protect America and save 
money for the taxpayers. That's a good place to be.
  And at the end of the day, this is about a very serious issue. It's 
about the fact that we have folks all around the world who are getting 
up in the morning trying to commit acts of violence against U.S. 
citizens or our allies. It's about nation-states who want to steal the 
very prosperity of America by stealing our intellectual property 
through spying or cyberspying. It's about nation-states who are making 
an investment in cyberattack capability that would actually cause 
catastrophic harm to the United States economy. It is about nation-
states who are engaged in the development of nuclear weapons for 
certainly no good purpose.
  In the nineties we had a peace dividend because the structure of the 
threat changed fundamentally, and we could rearrange the way we looked 
at the world and our defense posture and our national security posture 
around the world. And I think this is a good moment to caution where we 
go in the future.
  This is not like the nineties. We don't enjoy the same peace dividend 
in the sense that the world is more complicated and, in many ways, more 
dangerous than it has ever been before. Those intelligence services are 
getting aggressive. Our adversaries are getting better. They are 
investing in space and cyber in a way that is breathtaking if we don't 
keep pace. We don't have to spend dollar for dollar, but we do have to 
match intellectual capital with the solutions that we need to keep 
America safe.
  The very brave men and women who risk their lives all over the globe 
to protect our soldiers by providing them state-of-the-art and up-to-
date information, or by recruiting somebody in a very dangerous place 
somewhere else that might give us that little bit of advantage in 
knowing what our adversaries are up to, we owe a great debt of 
gratitude to those very brave Americans who risk their lives every 
single day in defense of this Nation. They are silent and quiet 
warriors, but deserve no less of our appreciation and gratitude for 
faithful service to this great Nation.
  This bill reflects that, and it reflects the important status that we 
are going

[[Page H3295]]

to have to take in the intelligence community when it comes to 
protecting America in what is promising to be a dangerous future when 
it comes to our adversaries. This bill, we think, takes head-on those 
new challenges, so that America can be equally prosperous in the future 
and as safe as we have ever been.
  With that, Mr. Chairman, I yield back the balance of my time.
  Ms. RICHARDSON. Mr. Chair, today I rise in support of H.R. 5743, the 
Intelligence Authorization Act for Fiscal Year 2013. This bipartisan 
bill, which was reported by the Permanent Select Committee on 
Intelligence by a unanimous 19 0 vote, provides funding and policy 
guidance to the America's intelligence community. Few bills are as 
important to our nation's security as this one.
  H.R. 5743 provides the necessary resources to vital security 
programs, many of which focus on detecting and preventing terrorist 
attacks. It is critical that America maintains its qualitative security 
edge with respect to intelligence gathering, data analysis, and 
counter-terrorism. This bill would ensure that happens.
  I recognize that given these challenging economic circumstances, 
difficult choices have to be made. This has led the Committee to 
authorize funding for intelligence activities at level that is four 
percent below last year's enacted budget. I appreciate the way Chairman 
Rogers and Ranking Member Ruppersberger have worked together in an 
effort to fashion a bill that strikes an appropriate balance.
  The committee has made fiscally responsible choices when deciding 
where to cut funding, eliminating redundancies and directing that other 
programs be managed more efficiently.
  Mr. Chair, for obvious reasons many of the programs authorized by 
this legislation cannot be discussed publicly. However, these programs 
are subjected to congressional oversight and scrutiny by the 
Intelligence Committee, which takes seriously obligation to ensure that 
the programs authorized under this legislation and the officials who 
administer them operate within constitutional and legal bounds.
  I am pleased that the bill also contains provisions to strengthen the 
protection of the identities of covert agencies, to combat attempts by 
other countries to buy technology that could be used to develop weapons 
of mass destruction, and to enhance our counterterrorism efforts. As a 
member of the Committee on Homeland Security I know how important it is 
to make counterintelligence and counterterrorism efforts priorities.
  It is a sad truth that we live in an age where our most pressing 
concern is the imminent threat of another terrorist attack. Our enemy 
does not respond to logic or reason, and therefore we must be prepared 
for every situation.
  Mr. Chair, I support this bill because I am persuaded that it 
furthers the nation's security interests and is the right thing to do. 
I urge my colleagues to join me in voting for H.R. 5743.
  The CHAIR. All time for general debate has expired.
  Pursuant to the rule, the amendment in the nature of a substitute 
recommended by the Permanent Select Committee on Intelligence, printed 
in the bill, shall be considered as an original bill for the purpose of 
amendment under the 5-minute rule and shall be considered read.
  The text of the committee amendment in the nature of a substitute is 
as follows:

                               H.R. 5743

       Be it enacted by the Senate and House of Representatives of 
     the United States of America in Congress assembled,

     SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

       (a) Short Title.--This Act may be cited as the 
     ``Intelligence Authorization Act for Fiscal Year 2013''.
       (b) Table of Contents.--The table of contents for this Act 
     is as follows:

Sec. 1. Short title; table of contents.
Sec. 2. Definitions.

                    TITLE I--INTELLIGENCE ACTIVITIES

Sec. 101. Authorization of appropriations.
Sec. 102. Classified Schedule of Authorizations.
Sec. 103. Personnel ceiling adjustments.
Sec. 104. Intelligence Community Management Account.

 TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

Sec. 201. Authorization of appropriations.

                     TITLE III--GENERAL PROVISIONS

Sec. 301. Increase in employee compensation and benefits authorized by 
              law.
Sec. 302. Restriction on conduct of intelligence activities.
Sec. 303. Non-reimbursable details.
Sec. 304. Strategy for security clearance reciprocity.
Sec. 305. Repeal or modification of certain reporting requirements.

  TITLE IV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY

Sec. 401. Clarification on authority of CIA to transfer funds to CIA 
              activities authorized by law.
Sec. 402. Authorities of the Inspector General for the Central 
              Intelligence Agency.
Sec. 403. Working capital fund.
Sec. 404. Intelligence community assistance to counter drug trafficking 
              organizations using public lands.

                         TITLE V--OTHER MATTERS

Sec. 501. Extension of National Commission for the Review of the 
              Research and Development Programs of the United States 
              Intelligence Community.
Sec. 502. Technical amendment to title 5, United States Code.
Sec. 503. Technical amendment to the National Security Act of 1947.

     SEC. 2. DEFINITIONS.

       In this Act:
       (1) Congressional intelligence committees.--The term 
     ``congressional intelligence committees'' means--
       (A) the Select Committee on Intelligence of the Senate; and
       (B) the Permanent Select Committee on Intelligence of the 
     House of Representatives.
       (2) Intelligence community.--The term ``intelligence 
     community'' has the meaning given that term in section 3(4) 
     of the National Security Act of 1947 (50 U.S.C. 401a(4)).

                    TITLE I--INTELLIGENCE ACTIVITIES

     SEC. 101. AUTHORIZATION OF APPROPRIATIONS.

       Funds are hereby authorized to be appropriated for fiscal 
     year 2013 for the conduct of the intelligence and 
     intelligence-related activities of the following elements of 
     the United States Government:
       (1) The Office of the Director of National Intelligence.
       (2) The Central Intelligence Agency.
       (3) The Department of Defense.
       (4) The Defense Intelligence Agency.
       (5) The National Security Agency.
       (6) The Department of the Army, the Department of the Navy, 
     and the Department of the Air Force.
       (7) The Coast Guard.
       (8) The Department of State.
       (9) The Department of the Treasury.
       (10) The Department of Energy.
       (11) The Department of Justice.
       (12) The Federal Bureau of Investigation.
       (13) The Drug Enforcement Administration.
       (14) The National Reconnaissance Office.
       (15) The National Geospatial-Intelligence Agency.
       (16) The Department of Homeland Security.

     SEC. 102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS.

       (a) Specifications of Amounts and Personnel Levels.--The 
     amounts authorized to be appropriated under section 101 and, 
     subject to section 103, the authorized personnel ceilings as 
     of September 30, 2013, for the conduct of the intelligence 
     activities of the elements listed in paragraphs (1) through 
     (16) of section 101, are those specified in the classified 
     Schedule of Authorizations prepared to accompany the bill 
     H.R. 5743 of the One Hundred Twelfth Congress.
       (b) Availability of Classified Schedule of 
     Authorizations.--
       (1) Availability to committees of congress.--The classified 
     Schedule of Authorizations referred to in subsection (a) 
     shall be made available to the Committee on Appropriations of 
     the Senate, the Committee on Appropriations of the House of 
     Representatives, and to the President.
       (2) Distribution by the president.--Subject to paragraph 
     (3), the President shall provide for suitable distribution of 
     the classified Schedule of Authorizations, or of appropriate 
     portions of the Schedule, within the executive branch.
       (3) Limits on disclosure.--In carrying out paragraph (2), 
     the President may disclose only that budget-related 
     information necessary to execute the classified Schedule of 
     Authorizations and shall not disclose the Schedule or any 
     portion of the Schedule publicly.

     SEC. 103. PERSONNEL CEILING ADJUSTMENTS.

       (a) Authority for Increases.--With the approval of the 
     Director of the Office of Management and Budget, the Director 
     of National Intelligence may authorize employment of civilian 
     personnel in excess of the number authorized for fiscal year 
     2013 by the classified Schedule of Authorizations referred to 
     in section 102(a) if the Director of National Intelligence 
     determines that such action is necessary to the performance 
     of important intelligence functions, except that the number 
     of personnel employed in excess of the number authorized 
     under such section may not, for any element of the 
     intelligence community, exceed 3 percent of the number of 
     civilian personnel authorized under such Schedule for such 
     element.
       (b) Authority for Conversion of Activities Performed by 
     Contract Personnel.--
       (1) In general.--In addition to the authority in subsection 
     (a) and subject to paragraph (2), if the head of an element 
     of the intelligence community makes a determination that 
     activities currently being performed by contract personnel 
     should be performed by employees of such element, the 
     Director of National Intelligence, in order to reduce a 
     comparable number of contract personnel, may authorize for 
     that purpose employment of additional full-time equivalent 
     personnel in such element equal to the number of full-time 
     equivalent contract personnel performing such activities.
       (2) Concurrence and approval.--The authority described in 
     paragraph (1) may not be exercised unless the Director of 
     National Intelligence concurs with the determination 
     described in such paragraph.

[[Page H3296]]

       (c) Notice to Congressional Intelligence Committees.--The 
     Director of National Intelligence shall notify the 
     congressional intelligence committees in writing at least 15 
     days prior to each exercise of an authority described in 
     subsection (a).

     SEC. 104. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT.

       (a) Authorization of Appropriations.--There is authorized 
     to be appropriated for the Intelligence Community Management 
     Account of the Director of National Intelligence for fiscal 
     year 2013 the sum of $530,652,000. Within such amount, funds 
     identified in the classified Schedule of Authorizations 
     referred to in section 102(a) for advanced research and 
     development shall remain available until September 30, 2014.
       (b) Authorized Personnel Levels.--The elements within the 
     Intelligence Community Management Account of the Director of 
     National Intelligence are authorized 831 full-time or full-
     time equivalent personnel as of September 30, 2013. Personnel 
     serving in such elements may be permanent employees of the 
     Office of the Director of National Intelligence or personnel 
     detailed from other elements of the United States Government.
       (c) Classified Authorizations.--
       (1) Authorization of appropriations.--In addition to 
     amounts authorized to be appropriated for the Intelligence 
     Community Management Account by subsection (a), there are 
     authorized to be appropriated for the Community Management 
     Account for fiscal year 2013 such additional amounts as are 
     specified in the classified Schedule of Authorizations 
     referred to in section 102(a). Such additional amounts for 
     advanced research and development shall remain available 
     until September 30, 2014.
       (2) Authorization of personnel.--In addition to the 
     personnel authorized by subsection (b) for elements of the 
     Intelligence Community Management Account as of September 30, 
     2013, there are authorized such additional personnel for the 
     Community Management Account as of that date as are specified 
     in the classified Schedule of Authorizations referred to in 
     section 102(a).

 TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

     SEC. 201. AUTHORIZATION OF APPROPRIATIONS.

       There is authorized to be appropriated for the Central 
     Intelligence Agency Retirement and Disability Fund for fiscal 
     year 2013 the sum of $514,000,000.

                     TITLE III--GENERAL PROVISIONS

     SEC. 301. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS 
                   AUTHORIZED BY LAW.

       Appropriations authorized by this Act for salary, pay, 
     retirement, and other benefits for Federal employees may be 
     increased by such additional or supplemental amounts as may 
     be necessary for increases in such compensation or benefits 
     authorized by law.

     SEC. 302. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES.

       The authorization of appropriations by this Act shall not 
     be deemed to constitute authority for the conduct of any 
     intelligence activity which is not otherwise authorized by 
     the Constitution or the laws of the United States.

     SEC. 303. NON-REIMBURSABLE DETAILS.

       Section 113A of the National Security Act of 1947 (50 
     U.S.C. 404h 1) is amended--
       (1) by striking ``An officer or employee of the United 
     States or member of the Armed Forces'' and inserting ``(a) 
     Civilian Employees.--An officer or employee of the United 
     States'';
       (2) by striking the second sentence; and
       (3) by adding at the end the following new subsections:
       ``(b) Members of the Armed Forces.--A member of the Armed 
     Forces may be detailed to the staff of an element of the 
     intelligence community funded through the National 
     Intelligence Program on a non-reimbursable basis, as jointly 
     agreed to by the head of the receiving and detailing 
     elements, for a period not to exceed three years.
       ``(c) No Limitation on Other Authority.--This section does 
     not limit any other source of authority for or non-
     reimbursable details.
       ``(d) No Effect on Appropriations.--A non-reimbursable 
     detail made under this section shall not be considered an 
     augmentation of the appropriations of the element of the 
     intelligence community receiving such detail.''.

     SEC. 304. STRATEGY FOR SECURITY CLEARANCE RECIPROCITY.

       (a) Strategy.--The President shall develop a strategy and a 
     timeline for carrying out the requirements of section 3001(d) 
     of the Intelligence Reform and Terrorism Prevention Act of 
     2004 (50 U.S.C. 435b(d)). Such strategy and timeline shall 
     include--
       (1) a process for accomplishing the reciprocity required 
     under such section for a security clearance issued by a 
     department or agency of the Federal Government, including 
     reciprocity for security clearances that are issued to both 
     persons who are and who are not employees of the Federal 
     Government; and
       (2) a description of the specific circumstances under which 
     a department or agency of the Federal Government may not 
     recognize a security clearance issued by another department 
     or agency of the Federal Government.
       (b) Congressional Notification.--Not later than 180 days 
     after the date of the enactment of this Act, the President 
     shall inform Congress of the strategy and timeline developed 
     under subsection (a).

     SEC. 305. REPEAL OR MODIFICATION OF CERTAIN REPORTING 
                   REQUIREMENTS.

       (a) Repeal of Reporting Requirements.--
       (1) Acquisition of technology relating to weapons of mass 
     destruction and advanced conventional munitions.--Section 721 
     of the Intelligence Authorization Act for Fiscal Year 1997 
     (50 U.S.C. 2366) is repealed.
       (2) Threat of attack on the united states using weapons of 
     mass destruction and the safety and security of russian 
     nuclear facilities and nuclear military forces.--Section 114 
     of the National Security Act of 1947 (50 U.S.C. 404i) is 
     amended--
       (A) in the heading, by striking ``additional annual reports 
     from the director of national intelligence'' and inserting 
     ``annual report on hiring and retention of minority 
     employees'';
       (B) by striking subsections (a), (c), and (d);
       (C) by striking ``(b) Annual Report on Hiring and Retention 
     of Minority Employees.--'';
       (D) by redesignating paragraphs (1) through (5) as 
     subsections (a) through (e), respectively;
       (E) in subsection (b) (as so redesignated)--
       (i) by redesignating subparagraphs (A), (B), and (C), as 
     paragraphs (1), (2), and (3), respectively; and
       (ii) in paragraph (2) (as so redesignated), by 
     redesignating clauses (i) and (ii) as subparagraphs (A) and 
     (B), respectively; and
       (F) in subsection (e) (as redesignated by subparagraph 
     (D)), by redesignating subparagraphs (A), (B), and (C), as 
     paragraphs (1), (2), and (3), respectively.
       (3) Measures to protect the identities of covert agents.--
     Title VI of the National Security Act of 1947 (50 U.S.C. 421 
     et seq.) is amended--
       (A) by striking section 603; and
       (B) by redesignating sections 604, 605, and 606 as sections 
     603, 604, and 605, respectively.
       (b) Modification of Reporting Requirements.--
       (1) Intelligence advisory committees.--Section 410(b) of 
     the Intelligence Authorization Act for Fiscal Year 2010 
     (Public Law 111 259; 124 Stat. 2725) is amended to read as 
     follows:
       ``(b) Notification of Establishment of Advisory 
     Committee.--The Director of National Intelligence and the 
     Director of the Central Intelligence Agency shall each notify 
     the congressional intelligence committees each time each such 
     Director creates an advisory committee. Each notification 
     shall include--
       ``(1) a description of such advisory committee, including 
     the subject matter of such committee;
       ``(2) a list of members of such advisory committee; and
       ``(3) in the case of an advisory committee created by the 
     Director of National Intelligence, the reasons for a 
     determination by the Director under section 4(b)(3) of the 
     Federal Advisory Committee Act (5 U.S.C. App) that an 
     advisory committee cannot comply with the requirements of 
     such Act.''.
       (2) Customer feedback on department of homeland security 
     intelligence reporting.--Section 210A(g)(2) of the Homeland 
     Security Act of 2002 (6 U.S.C. 124h) is amended--
       (A) by inserting ``and the Select Committee on 
     Intelligence'' after ``Committee on Homeland Security and 
     Governmental Affairs''; and
       (B) by inserting ``and the Permanent Select Committee on 
     Intelligence'' after ``and the Committee on Homeland 
     Security''.
       (3) Intelligence information sharing.--Section 102A(g)(4) 
     of the National Security Act of 1947 (50 U.S.C. 403 1(g)(4)) 
     is amended to read as follows:
       ``(4) The Director of National Intelligence shall, in a 
     timely manner, report to Congress any statute, regulation, 
     policy, or practice that the Director believes impedes the 
     ability of the Director to fully and effectively ensure 
     maximum availability of access to intelligence information 
     within the intelligence community consistent with the 
     protection of the national security of the United States.''.
       (c) Conforming Amendments.--
       (1) Report submission dates.--Section 507 of the National 
     Security Act of 1947 (50 U.S.C. 415b) is amended--
       (A) in subsection (a)--
       (i) by striking ``(1) The date'' and inserting ``The 
     date'';
       (ii) in the matter preceding subparagraph (A), by striking 
     ``subsection (c)(1)(A)'' and inserting ``subsection (c)(1)'';
       (iii) by striking paragraph (2);
       (iv) by striking subparagraphs (A) and (C);
       (v) in subparagraph (G), by striking ``114(c)'' and 
     inserting ``114''; and
       (vi) by redesignating subparagraphs (B), (D), (E), (F), 
     (G), (H), and (I), as paragraphs (1), (2), (3), (4), (5), 
     (6), and (7), respectively; and
       (B) in subsection (c)(1)--
       (i) by striking ``(A) Except as provided'' and inserting 
     ``Except as provided''; and
       (ii) by striking subparagraph (B).
       (2) Table of contents of the national security act of 
     1947.--The table of contents in the first section of the 
     National Security Act of 1947 is amended--
       (A) by striking the item relating to section 114 and 
     inserting the following new item:

``Sec. 114. Annual report on hiring and retention of minority 
              employees.''; and

       (B) by striking the items relating to sections 603, 604, 
     605, and 606 and inserting the following new items:

``Sec. 603. Extraterritorial jurisdiction.
``Sec. 604. Providing information to Congress.
``Sec. 605. Definitions.''.

  TITLE IV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY

     SEC. 401. CLARIFICATION ON AUTHORITY OF CIA TO TRANSFER FUNDS 
                   TO CIA ACTIVITIES AUTHORIZED BY LAW.

       Section 5(a)(1) of the Central Intelligence Agency Act of 
     1949 (50 U.S.C. 403f(a)(1)) is amended by striking ``any of 
     the functions or activities authorized under section 104A of 
     the National Security Act of 1947 (50 U.S.C. 403

[[Page H3297]]

     4a).'' and inserting ``any functions or activities of the 
     Agency authorized by law''.

     SEC. 402. AUTHORITIES OF THE INSPECTOR GENERAL FOR THE 
                   CENTRAL INTELLIGENCE AGENCY.

       Section 17(e)(7) of the Central Intelligence Agency Act of 
     1949 (50 U.S.C. 403q(e)(7)) is amended--
       (1) by striking ``Subject to applicable law'' and inserting 
     ``(A) Subject to applicable law''; and
       (2) by adding at the end the following new subparagraph:
       ``(B)(i) The Inspector General may designate an officer or 
     employee appointed in accordance with subparagraph (A) as a 
     law enforcement officer solely for purposes of subchapter III 
     of chapter 83 or chapter 84 of title 5, United States Code, 
     if such officer or employee is appointed to a position in 
     which the duty is to investigate suspected offenses against 
     the criminal laws of the United States.
       ``(ii) In carrying out clause (i), the Inspector General 
     shall ensure that any authority under such clause is 
     exercised in a manner consistent with the provisions of 
     section 3307 of title 5, United States Code, as they relate 
     to law enforcement officers.
       ``(iii) For purposes of applying sections 3307(d), 8335(b), 
     and 8425(b) of title 5, United States Code, the Inspector 
     General may exercise the functions, powers, and duties of an 
     agency head or appointing authority with respect to the 
     Office.''.

     SEC. 403. WORKING CAPITAL FUND.

       Section 21 of the Central Intelligence Agency Act of 1949 
     (50 U.S.C. 403u) is amended--
       (1) in subsection (b)(1)--
       (A) in subparagraph (B), by striking ``; and'' and 
     inserting a semicolon;
       (B) in subparagraph (C), by striking the period and 
     inserting ``; and''; and
       (C) by adding at the end the following new subparagraph:
       ``(D) authorize such providers to advertise through Federal 
     Government-owned websites the services of such providers to 
     the entities to which such providers are providing items 
     under the program, provided that the Director shall not 
     authorize such providers to distribute gifts or promotional 
     items.''; and
       (2) in subsection (c)--
       (A) in paragraph (2)(E), by striking ``equipment or 
     property'' and inserting ``equipment, recyclable materials, 
     or property''; and
       (B) in paragraph (3)(B), by striking ``subsection (f)(2)'' 
     and inserting ``subsections (b)(1)(D) and (f)(2)''.

     SEC. 404. INTELLIGENCE COMMUNITY ASSISTANCE TO COUNTER DRUG 
                   TRAFFICKING ORGANIZATIONS USING PUBLIC LANDS.

       Section 401(b) of the Intelligence Authorization Act for 
     Fiscal Year 2012 (Public Law 112 87; 125 Stat. 1887) is 
     amended in the matter preceding paragraph (1)--
       (1) by inserting ``and annually thereafter,'' after ``Not 
     later than 180 days after the date of the enactment of this 
     Act,'';
       (2) by striking ``submit to'' and inserting ``inform'';
       (3) by striking ``a report on the results'' and inserting 
     ``of the results''; and
       (4) by striking ``Such report'' and inserting ``Information 
     provided under this subsection''.

                         TITLE V--OTHER MATTERS

     SEC. 501. EXTENSION OF NATIONAL COMMISSION FOR THE REVIEW OF 
                   THE RESEARCH AND DEVELOPMENT PROGRAMS OF THE 
                   UNITED STATES INTELLIGENCE COMMUNITY.

       Section 1007 of the Intelligence Authorization Act for 
     Fiscal Year 2003 (Public Law 107 306; 50 U.S.C. 401 note) is 
     amended by striking ``Not later than one year after the date 
     on which all members of the Commission are appointed pursuant 
     to section 701(a)(3) of the Intelligence Authorization Act 
     for Fiscal Year 2010'' and inserting ``Not later than March 
     31, 2013''.

     SEC. 502. TECHNICAL AMENDMENT TO TITLE 5, UNITED STATES CODE.

       Section 3132(a)(1)(B) of title 5, United States Code, is 
     amended by inserting ``, the Office of the Director of 
     National Intelligence'' after ``the Central Intelligence 
     Agency''.

     SEC. 503. TECHNICAL AMENDMENT TO THE NATIONAL SECURITY ACT OF 
                   1947.

       Section 605 of the National Security Act of 1947 (50 U.S.C. 
     426) (as redesignated by section 305 of this Act) is 
     amended--
       (1) in paragraph (4)--
       (A) in subparagraph (A), by striking ``intelligence 
     agency'' each place it appears and inserting ``element of the 
     intelligence community'';
       (B) in subparagraph (B)(i), by striking ``intelligence 
     agency'' and inserting ``element of the intelligence 
     community''; and
       (C) in subparagraph (C), by striking ``intelligence 
     agency'' and inserting ``element of the intelligence 
     community'';
       (2) by striking paragraph (5);
       (3) by redesignating paragraphs (6) through (10) as 
     paragraphs (5) through (9), respectively; and
       (4) in paragraph (5) (as so redesignated), by striking 
     ``intelligence agency'' and inserting ``element of the 
     intelligence community''.

  The CHAIR. No amendment to the committee amendment in the nature of a 
substitute shall be in order except those printed in House Report 112 
504. Each amendment may be offered only in the order printed in the 
report, by a Member designated in the report, shall be considered read, 
shall be debatable for the time specified in the report equally divided 
and controlled by the proponent and an opponent, shall not be subject 
to amendment, and shall not be subject to a demand for division of the 
question.


           Amendment No. 1 Offered by Mr. Rogers of Michigan

  The CHAIR. It is now in order to consider amendment No. 1 printed in 
House Report 112 504.
  Mr. ROGERS of Michigan. Mr. Chairman, I have an amendment at the desk 
made in order under the rule, amendment No. 1.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       Strike section 401 (page 18, lines 4 through 12).
       Strike section 403 (page 19, line 13 through page 20, line 
     11).

  The CHAIR. Pursuant to House Resolution 667, the gentleman from 
Michigan (Mr. Rogers) and a Member opposed each will control 5 minutes.
  The Chair recognizes the gentleman from Michigan.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield myself as much time as 
I might consume.
  Mr. Chairman, this is a manager's amendment to the bill, and very 
simply--and I don't want to waste a lot of time on it--it would simply 
strike two technical provisions to allow us to resolve any potential 
issues going forward.
  There were two technical issues that were deemed by the 
Parliamentarian as appropriation language. We just wanted to take that 
language out to make sure that there were no issues. It doesn't change 
the nature of the bill in any way, and it has bipartisan support. I 
would urge the body's support of the Rogers amendment.
  I yield back the balance of my time.

                              {time}  1500

  Mr. RUPPERSBERGER. I rise in opposition to the amendment, but I do 
support the amendment.
  The CHAIR. Without objection, the gentleman from Maryland is 
recognized for 5 minutes.
  There was no objection.
  Mr. RUPPERSBERGER. I yield back the balance of my time.
  The CHAIR. The question is on the amendment offered by the gentleman 
from Michigan (Mr. Rogers).
  The amendment was agreed to.


         Amendment No. 2 Offered by Mr. Thompson of California

  The CHAIR. It is now in order to consider amendment No. 2 printed in 
House Report 112 504.
  Mr. THOMPSON of California. Mr. Chairman, I have an amendment at the 
desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of title III, add the following new section:

     SEC. 306. SUBCONTRACTOR NOTIFICATION PROCESS.

       Not later than October 1, 2013, the Director of National 
     Intelligence shall submit to the congressional intelligence 
     committees a report assessing the method by which contractors 
     at any tier under a contract entered into with an element of 
     the intelligence community are granted security clearances 
     and notified of classified contracting opportunities within 
     the Federal Government and recommendations for the 
     improvement of such method. Such report shall include--
       (1) an assessment of the current method by which 
     contractors at any tier under a contract entered into with an 
     element of the intelligence community are notified of 
     classified contracting opportunities;
       (2) an assessment of any problems that may reduce the 
     overall effectiveness of the ability of the intelligence 
     community to identify appropriate contractors at any tier 
     under such a contract;
       (3) an assessment of the role the existing security 
     clearance process has in enhancing or hindering the ability 
     of the intelligence community to notify such contractors of 
     contracting opportunities;
       (4) an assessment of the role the current security 
     clearance process in enhancing or hindering the ability of 
     contractors at any tier under a contract entered into with an 
     element of the intelligence community to execute classified 
     contracts;
       (5) a description of the method used by the Director of 
     National Intelligence for assessing the effectiveness of the 
     notification process of the intelligence community to produce 
     a talented pool of subcontractors;
       (6) a description of appropriate goals, schedules, 
     milestones, or metrics used to measure the effectiveness of 
     such notification process; and
       (7) recommendations for improving such notification 
     process.

  The CHAIR. Pursuant to House Resolution 667, the gentleman from 
California (Mr. Thompson) and a Member opposed each will control 5 
minutes.

[[Page H3298]]

  The Chair recognizes the gentleman from California.
  Mr. THOMPSON of California. I yield myself such time as I may 
consume.
  My amendment will help small businesses that have the proper security 
clearances to better navigate the intelligence community's contracting 
process, and will ensure that they get a fair shot at business 
opportunities should these companies have the technical expertise and 
capabilities needed. This change will be good for small businesses and 
will strengthen our national security.
  Second- and third-tier contractors produce highly specialized 
technology for the intelligence community, but work directly for larger 
companies. These small businesses have extraordinary talent and 
expertise, but often find themselves excluded from many business 
opportunities with the larger intelligence community because, for 
example, they lack access to the classified databases where these 
opportunities are presented. Sometimes that access is as simple as a 
computer connection for cleared experts to review contracting 
opportunities.
  By limiting small businesses that have the appropriate security 
clearances from these contracting opportunities, we all lose. The 
intelligence community loses access to the best technical solutions by 
limiting who is able to fulfill or to even bid for those contracts. 
Small businesses lose the opportunity to display their expertise and to 
expand their companies. As important, the taxpayer loses by virtue of a 
lack of market competition and is given no assurance that the 
government is getting the best price for its classified contract 
requirements.
  My amendment addresses this problem by requiring an assessment of the 
IC's current contracting practices and a review of these practices to 
determine if they present unfair barriers to competition for small 
businesses. In particular, my amendment requires the Director of 
National Intelligence to report to Congress how the intelligence 
community is currently working with second- and third-tier contractors 
and to identify any problems that may reduce the overall effectiveness 
of this contracting process. In this report, the DNI will be required 
to offer recommendations to improve the methods by which second- and 
third-tier contractors are granted security clearances and notified of 
classified contracting opportunities.
  Mr. Chairman, second- and third-tier contractors who support the 
technical efforts of the intelligence community are an underutilized 
asset. These same second-and third-tier contractors are also small 
businesses that many of our communities depend upon for jobs and for 
the economies in their local areas. My amendment ensures that the 
intelligence community is getting access to the best available 
technology while ensuring that small businesses around the country have 
a fair shot at expanding their companies.
  I urge my colleagues to support this amendment, and I reserve the 
balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I rise to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I yield myself such time as I may consume.
  I want to thank Mr. Thompson for working with us, not only on the 
overall bill, but on any amendment that might strengthen the process. I 
am committed to continue to work with Mr. Thompson on these very 
issues, and I would support the amendment.
  I yield back the balance of my time.
  Mr. THOMPSON of California. I yield back the balance of my time.
  The CHAIR. The question is on the amendment offered by the gentleman 
from California (Mr. Thompson).
  The amendment was agreed to.


                 Amendment No. 3 Offered by Mr. Conyers

  The CHAIR. It is now in order to consider amendment No. 3 printed in 
House Report 112 504.
  Mr. CONYERS. Mr. Chairman, I have an amendment at the desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of title III, add the following new section:

     SEC. 306. REPORT ON CONSEQUENCES OF MILITARY STRIKE AGAINST 
                   IRAN.

       Not later than 60 days after the date of the enactment of 
     this Act, the Director of National Intelligence shall submit 
     to the congressional intelligence committees a report 
     containing an assessment of the consequences of a military 
     strike against Iran.

  The CHAIR. Pursuant to House Resolution 667, the gentleman from 
Michigan (Mr. Conyers) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentleman from Michigan.
  Mr. CONYERS. I yield myself such time as I may consume.
  Mr. Chairman and Members, I rise in support of this amendment with my 
colleagues Mr. Ellison of Minnesota and Ms. Lee of California. Our 
amendment would require the Director of National Intelligence to submit 
to the congressional Intelligence Committee within 60 days a report 
containing an analysis of the potential consequences of a military 
strike against Iran.
  In recent months, the possibility of a preemptive military strike 
against Iran has been openly discussed as a policy option of last 
resort as our country and our allies determine how best to confront the 
challenge posed by Iran's nuclear program. At the same time, the 
national discussion has prompted a large number of current and former 
military and intelligence officials to come forward to encourage the 
Congress and the administration to consider the possible consequences 
both intended and others that may be unintended of such a strike.
  These high-level officials include former United States and Israeli 
national security officials, including a former Bush administration 
National Intelligence Council chairman, a former National Intelligence 
officer for the Near East and South Asia, General Colin Powell's former 
chief of staff, five retired generals, the former director of the 
Israeli Mossad, and a former chief of staff of the Israel Defense 
Forces.
  All of these experts have raised concerns that an attack on Iran 
could possibly result in serious harm to the global economy, 
potentially ignite a regional war and even push Iran into building a 
nuclear weapon. With consequences as serious as these being raised by 
outside and former national security experts, it is critical that the 
expertise and collective wisdom of our intelligence community be added 
to this debate so that our country's policy options involving war and 
peace can be rigorously examined by this body.
  For these reasons, I encourage my colleagues to support my amendment, 
and I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I rise to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield myself such time as I 
may consume.
  This is an interesting amendment. This is something that we do as a 
matter of course in the committee, and it is as serious a matter as we 
consider: issues of war. It is also interesting that the consequences 
of a nuclear Iran are not a part of this. We would encourage that to 
happen, and we will engage in that discussion in the committee. A 
nuclear arms race in the Middle East is a catastrophe that is the worst 
part of a nightmare. Saudi Arabia has said, Hey, if Iran goes nuclear, 
we very well can't not go nuclear.
  We believe that other nations--Turkey, Egypt, others--have said it's 
probably in our best interests not to be the ones without a nuclear 
weapon program if Iran gets a nuclear weapon. The proliferation of 
nuclear weapons across the Middle East is dangerous, incredibly 
dangerous. That's one outcome. We also have to consider that outcome as 
well.

                              {time}  1510

  Think about where Israel is today. This is a talk about U.S. action 
against Iran, something that we should consider. We should be very 
careful about all of those considerations. Now think about Israel and 
what they may or may not have to do when it comes to taking out a 
nuclear weapon program where they know one of its destinations will 
impact the very existence of the people of Israel. They live in a 
dangerous neighborhood. Egypt is now an uncertain partner in peace. 
There is violence

[[Page H3299]]

breaking out in the Sinai because of the turmoil and the changes 
happening in Egypt. Hamas is well armed, as well armed as we have ever 
seen them, with missiles aimed at Israel. Hezbollah has about 30,000--
the public number--we believe of very accurate missile systems pointed 
at Israel. Iran is moving and marching forward. Clearly the IAEA just 
recently reported a 27 percent enrichment rate on traces of uranium. 
That doesn't get you to the all-important 95, but it crosses a very 
critical threshold and a dangerous one, that 20 percent enrichment 
rate. That is a dangerous place for them to be. You hit 20, it's a lot 
easier to get to 95.
  They have certainly shown that they are bad actors in the world. We 
should consider that as well, and we do in the Intelligence Committee. 
Imagine the fact that somebody would make the calculation, a nation-
state, to assassinate an ambassador of another nation in our Nation's 
capital. And if they killed U.S. civilians, so be it.
  We have seen a proliferation of these types of attacks from Iran. 
They haven't been very good at it yet. We've caught most of them. But 
they're learning from every event. And it's happening in places like 
Turkey, Pakistan, Argentina, and other places around the world. We are 
in a scary place indeed.
  I won't oppose this amendment, but we need to look at this in total. 
I will tell you that if you want to stop Iran from getting a nuclear 
weapons program, we have to step up. We're doing a fine job on the 
sanctions now--thanks to this body leading the way for sanctions 
working--but they also have to believe that military options are on the 
table. If they do not believe it, they'll continue down this path that 
is dangerous for the national security interests of the United States, 
of the Middle East, and indeed the world. Nuclear weapons in the hands 
of rogue elements is a thing that keeps me up every single night. I 
can't imagine that arms race in the Middle East making the job of 
stopping that any easier indeed.
  I will not oppose this amendment, but I do think it's important that 
we put it in all of the context of the threat that a nuclear Iran 
poses, not just to the Middle East but to the world.
  With that, I yield back the balance of my time.
  Mr. CONYERS. Mr. Chairman, I yield 1 minute to the distinguished 
gentleman from Ohio (Mr. Kucinich).
  Mr. KUCINICH. Thank you very much, Mr. Conyers. And I want to thank 
the chair as well for accepting the amendment, and I rise in support of 
the amendment.
  I think that Chairman Rogers' concerns are well stated. I know that 
the security of this country is something that you're committed to, as 
am I. This amendment, I think, will help slow down the rush towards war 
by asking those who are involved in our intelligence gathering to focus 
on just what a war with Iran will mean.
  I've been studying this in terms of the effects because we had a 
discussion a few years ago in Congress about the potential of bunker 
busters being used, and I looked at that and consulted with medical 
scientists who told me that a bunker buster would cause radiation to go 
hundreds, even thousands, of miles not only through Iran, but outside 
the country and into other countries, as well. It would be a major 
health catastrophe with a lot of innocent people killed.
  We have to think of the broad impact here of a potential attack. And 
I think that it's good that you're including this in the bill.
  Mr. CONYERS. Mr. Chairman, I want to thank the ranking member and the 
chairman of the Intelligence Committee for their concern about this 
phase of intelligence, and I hope to enjoy their support and the 
support of the committee as a whole in having this amendment added to 
the work that is going on here today.
  I urge support of the amendment, and I yield back the balance of my 
time.
  Ms. LEE of California. Mr. Chair, first, let me thank my esteemed 
colleague Congressman John Conyers for giving me the opportunity to 
speak on this important amendment.
  I would also like to recognize Congressman Keith Ellison who has been 
an outstanding leader on issues affecting the Middle East.
  Mr. Chair, first let me say unequivocally that we can all agree that 
we must work to prevent an Iran armed with nuclear weapons--which would 
never be unacceptable.
  That is not what this amendment is about, this amendment is 
noncontroversial.
  This amendment is really just about common sense.
  It would simply require that the National Intelligence Director give 
Congress a report outlining their assessment of the consequences of 
launching a military strike against Iran.
  This amendment is necessary because, once again we hear very loudly 
the drum beat of war.
  If we have learned anything from the past ten years, it is that we 
have to be deliberate, be thoughtful, be careful, and know exactly what 
we are getting ourselves into before we launch another war in the 
Middle East.
  These decisions should not be taken lightly, and they must be based 
on sound reasoning, and the best information, and the best 
intelligence.
  We have a duty to our brave men and women in uniform who have 
sacrificed so much during the past decade of war to have an informed 
debate about the consequences of military action.
  I urge you to vote ``yes'' on this amendment.
  The CHAIR. The question is on the amendment offered by the gentleman 
from Michigan (Mr. Conyers).
  The amendment was agreed to.


                  Amendment No. 4 Offered by Mr. Farr

  The CHAIR. It is now in order to consider amendment No. 4 printed in 
House Report 112 504 as modified by the order of the House of today.
  Mr. FARR. I have an amendment at the desk made in order by the rule.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of title III, add the following new section:

     SEC. 306. SENSE OF CONGRESS ON THE CONSIDERATION OF FOREIGN 
                   LANGUAGES AND CULTURES IN THE DEVELOPMENT OF 
                   CYBER TOOLS BY THE INTELLIGENCE COMMUNITY.

       It is the sense of Congress that the head of each element 
     of the intelligence community should take into consideration 
     foreign languages and cultures during the development by such 
     element of the intelligence community of training, tools, and 
     methodologies to protect the networks of the United States 
     against cyber attacks and intrusions from foreign entities.

  The CHAIR. Pursuant to House Resolution 667, the gentleman from 
California (Mr. Farr) and a Member opposed each will control 5 minutes.
  The Chair recognizes the gentleman from California.
  Mr. FARR. Mr. Chairman, I yield myself such time as I may consume.
  (Mr. FARR asked and was given permission to revise and extend his 
remarks.)
  Mr. FARR. I want to thank our colleagues on this committee. Those of 
us who are not on the committee have the opportunity to share in 
participating in the debate on this bill and voting for it. I have to 
say over the years I've been here, I don't think this bill has been 
brought to the floor in such bipartisan unity as it has this session. I 
want to congratulate both of them for their leadership.
  Mr. Chairman, I also want to point out with this amendment that 
cyberanalysis is a relatively new field to the intelligence community. 
Training and tool development have focused on computer networks, but 
it's also important to understand the plans and intentions of foreign 
actors who are involved in cyberattacks and intrusions.
  How do we best understand foreign plans and intentions? Is it by 
providing some aspects of foreign language and cultural training to 
intelligent professionals that includes cyberanalysts? This training is 
essential because it helps the intelligence community to understand the 
behavior of our potential adversaries. It helps them anticipate the 
actions that they may be taking, and it helps them develop potential 
allies.
  The traditional missions of the intelligence community have undergone 
many changes, and the community must invest in new tools and develop 
creative ways to train its men and women. My amendment is necessary 
because the intelligence community department heads are not as focused 
as they should be on the gaps in foreign language skills and cultural 
knowledge in the workforce.
  The intelligence community provides specialized training for its men 
and women in foreign languages and culture, in analysis, in 
cybersecurity. However, aspects of all these areas should be brought 
together as a part of the toolkit for cyberanalysts to best meet our 
Nation's challenges.

[[Page H3300]]

  My amendment will not cause undue burden to the intelligence 
community. It will serve as an essential reminder to those whose 
decisions impact training and tool development to remember the value 
and importance of including foreign languages and cultural knowledge in 
all aspects of our intelligence mission.
  I know of no opposition to my amendment, and I would hope that it 
would be supported by both sides of the aisle.
  I reserve the balance of my time.
  When we talk about critical STEM knowledge and skills for our Intel 
workforce, we should also be talking about STEM L, which combines STEM 
with foreign language.
  STEM is Science, Technology, Engineering, and Math. Including foreign 
language and culture training with STEM would create a power-house 
workforce for the Intelligence Community.
  For example, just as cyber analysts should understand some aspects of 
foreign language and culture, language and intelligence analysts should 
also have some understanding of computer network concepts and 
technology.
  The Intelligence Community trains its workforce in STEM and foreign 
language, but not together. The training is stove-piped by career 
field.
  This does not suggest that all types of intelligence analysts need to 
be experts in STEM or even in a foreign language. However, the 
Intelligence Community should consider exploring cross-pollination of 
knowledge.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. Thank you, Mr. Chairman. I just want to 
applaud the gentleman for his work. We look forward to working with him 
as we move forward, and I will support the amendment.
  With that, I yield back the balance of my time.
  Mr. FARR. Thank you for your support, and I yield back the balance of 
my time.
  The CHAIR. The question is on the amendment offered by the gentleman 
from California (Mr. Farr).
  The amendment was agreed to.

                              {time}  1520


                 Amendment No. 5 Offered by Mr. Cuellar

  The CHAIR. It is now in order to consider amendment No. 5 printed in 
House Report 112 504.
  Mr. CUELLAR. Mr. Chairman, I have an amendment at the desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of title IV, add the following new section:

     SEC. 405. INTELLIGENCE SHARING WITH MEXICO AND CANADA.

       (a) Authorization.--The Director of National Intelligence 
     may--
       (1) if the Director determines that the sharing of 
     intelligence information with Mexico and Canada for purposes 
     of reducing drug trafficking would not threaten national 
     security, allow the sharing of such intelligence information 
     with Mexico and Canada; and
       (2) make use of intelligence information from Mexico and 
     Canada for such purposes.
       (b) Type of Information.--Information shared or used under 
     subsection (a) may include the movements of drug cartels and 
     other criminal behavior.

  The CHAIR. Pursuant to House Resolution 667, the gentleman from Texas 
(Mr. Cuellar) and a Member opposed each will control 5 minutes.
  The Chair recognizes the gentleman from Texas.
  Mr. CUELLAR. Mr. Chairman, I yield myself such time as I may consume.
  Mr. Chairman, I rise today and encourage my colleagues to support my 
amendment to the Intelligence Authorization Act of Fiscal Year 2013.
  Particularly, I want to thank Chairman Rogers and our ranking member, 
Mr. Ruppersberger, for their bipartisan approach on this particular 
piece of legislation.
  My amendment would authorize the Director of National Intelligence to 
participate in information sharing with the Republic of Mexico and 
Canada for the purposes of border security and combating drug 
trafficking and any related crimes.
  Nothing in this amendment requires the Director of National 
Intelligence to share their information, but based on this information, 
this amendment simply gives the agency the power to do so in the event 
that the Director sees the real benefit in combating the flow of drugs 
throughout the United States and our neighbors.
  This important amendment will go a long way in making sure that our 
northern and southern neighbors have all the tools we can offer to stop 
the violence and trafficking caused by drug cartels. The Republic of 
Mexico, Canada, and the United States share a deep concern over the 
threat to our societies by drug trafficking and other criminal 
organizations operating on both sides of our common borders. The 
growing operational and financial capabilities of criminal groups that 
traffic in drugs, arms, persons, as well as transnational criminal 
activity, pose a clear and present threat to our lives and the well-
being of U.S., Canadian, and Mexican citizens.
  North America must make it a priority to break the power and impunity 
of drug and criminal organizations that threaten the health and public 
safety of their citizens and the stability and security of the region. 
Both the Canadian and Mexican Governments are profoundly committed to 
the concerted bilateral strategic and tactical cooperation necessary to 
combat effectively this criminal activity, particularly the threat it 
presents to our Nation's youth and the importance of having adequate 
access to intelligence information.
  This amendment will make whatever intelligence gathered by the United 
States that can be shared, will be shared to stop the flow of illegal 
drugs. In addition, this amendment will ensure that whatever 
intelligence gathered by our neighbors can be properly used by our law 
enforcement to make sure that we stop the drugs.
  Finally, Mr. Chairman, I certainly want to say that I do appreciate, 
again, the work of our ranking member, the chairman. I hope that the 
chairman is supportive of this amendment, and I certainly want to thank 
all the committee members.
  I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I yield myself such time as I may consume.
  I want to compliment the gentleman for his work in bringing attention 
to this very important issue.
  We have a serious problem on our southern border with our friend, 
neighbor, and ally, Mexico. They are under siege by organized criminal 
narcotrafficking organizations.
  If you have just looked at the sheer death count and the murder and 
mayhem in some of the provinces along our southern border, it is 
shocking; and I think this will serve to at least make an advance on 
trying to help our southern neighbors get a handle on what is a serious 
and growing violent problem to our neighbor to the south. And I commend 
the gentleman and look forward to working with him in the future on 
this very important issue, and I would support the amendment.
  I yield back the balance of my time.
  Mr. CUELLAR. Again, I want to thank Chairman Rogers for his work, our 
ranking member also, and the committee staff. Thank you for the 
support.
  I yield back the balance of my time.
  The CHAIR. The question is on the amendment offered by the gentleman 
from Texas (Mr. Cuellar).
  The amendment was agreed to.


                  Amendment No. 6 Offered by Ms. Hahn

  The CHAIR. It is now in order to consider amendment No. 6 printed in 
House Report 112 504 as modified by the order of the House of today.
  Ms. HAHN. Mr. Chairman, I have an amendment at the desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of title IV (page 21, after line 2), add the 
     following new section:

     SEC. 405. CIVIL LIBERTIES PROTECTION OFFICER REVIEW OF 
                   CYBERSECURITY POLICIES, PROGRAMS, AND 
                   ACTIVITIES.

       Section 103D(b) of the National Security Act of 1947 (50 
     U.S.C. 403 3d(b)) is amended--
       (1) in paragraph (6), by striking ``and'' at the end;
       (2) by redesignating paragraph (7) as paragraph (8); and
       (3) by inserting after paragraph (6) the following new 
     paragraph:

[[Page H3301]]

       ``(7) ensure that any coordination and training between an 
     element of the intelligence community and a law enforcement 
     agency does not violate the Constitutional rights of racial 
     or ethnic minorities; and''.

  The CHAIR. Pursuant to House Resolution 667, the gentlewoman from 
California (Ms. Hahn) and a Member opposed each will control 5 minutes.
  The Chair recognizes the gentlewoman from California.
  Ms. HAHN. I also want to start out by thanking Chairman Rogers and 
Ranking Member Ruppersberger for bringing forward this bipartisan bill, 
and I am echoing I think what everyone is feeling today, that I think 
it's important for the American people to see this, to see us come 
together on such an important issue when it comes to protecting all 
Americans, so it feels good to be a part of this today.
  I know that we face complex challenges and threats to our national 
security, and I don't think anyone ever wants to see another September 
11 terrorist attack on this Nation. To prevent that, I know we need to 
use many tools at our disposal to combat the ever-evolving dangers that 
threaten our society. We need all levels of law enforcement to work 
together to ensure that we're safe.
  We must protect the rights of all of our citizens as we do this. We 
cannot allow our desire to protect our country come at the expense of 
any group in this great country. This is the promise of our Nation's 
Founding Fathers. The promise of equal justice under the law is etched 
in our Supreme Court building. This is part of our Nation's DNA that 
there is the promise of equality.
  My amendment furthers this promise. It requires the Civil Liberties 
Protection Officer, which is in the Office of the Director of National 
Intelligence, to ensure that any training between the intelligence 
community and law enforcement includes the protection of constitutional 
rights of racial and ethnic minorities.
  Mr. Chairman, we cannot take our national security for granted, but 
we have to ensure that everyone has equal justice under the law.
  I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I yield myself such time as I may consume.
  I want to thank the gentlelady for her concern on these very 
important issues. One of the things that's so important, I think, to 
our country, is that we do have a strong and robust national security 
service of all sorts.
  In order for that to work and be the most effective, people have to 
have trust in it. They have to understand that their rights are 
protected, and I think this amendment states exactly where they are and 
where they should be. And, therefore, I won't oppose the amendment, and 
I applaud the gentlelady's concern and effort. It will serve as a 
valuable reminder, I think, to the men and women who are standing tall 
in our defense what it's all about and why they do it.
  I support the amendment, and I yield back the balance of my time.
  Ms. HAHN. Thank you to the chairman and the ranking member for 
bringing this bipartisan bill forward that I think will have such great 
support.
  I yield back the balance of my time.
  The CHAIR. The question is on the amendment offered by the 
gentlewoman from California (Ms. Hahn).
  The amendment was agreed to.


          Amendment No. 7 Offered by Ms. Jackson Lee of Texas

  The CHAIR. It is now in order to consider amendment No. 7 printed in 
House Report 112 504.
  Ms. JACKSON LEE of Texas. Mr. Chairman, I have an amendment at the 
desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of title IV (page 21, after line 2), add the 
     following new section:

     SEC. 405. SENSE OF CONGRESS ON HIRING OF MINORITY EMPLOYEES 
                   BY THE CENTRAL INTELLIGENCE AGENCY.

       It is the sense of Congress that the Director of the 
     Central Intelligence Agency should take such actions as the 
     Director considers necessary to increase the recruitment and 
     training of ethnic minorities as officers and employees of 
     the Central Intelligence Agency.

  The CHAIR. Pursuant to House Resolution 667, the gentlewoman from 
Texas (Ms. Jackson Lee) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentlewoman from Texas.
  Ms. JACKSON LEE of Texas. I thank the chairperson of the Intelligence 
Committee and the ranking member and speak in the spirit of 
bipartisanship, and I congratulate both gentlemen for recognizing that 
the security and intelligence of America speaks loudly to the idea of 
bipartisanship.
  Just a few hours ago, I was in a classified briefing--for fear of 
anyone thinking that I will share that classified briefing, I will not. 
But what I will say is it is clear that intelligence is a key to the 
peace and security that the American people have experienced since 9/
11. Through the work of Members of Congress and the intelligence 
community, of which we owe a great deal of that gratitude, we have been 
able to, for now some 11 years plus on our soil, experience the safety 
and security, although we have had many attempts.
  For that reason, I believe this is important work. My amendment says 
that it is important for the Director to consider the necessary 
processes to increase the recruitment and training of ethnic minorities 
as officers and employees of the CIA.

                              {time}  1530

  We have done this before. We have encouraged them to do so. And we 
can say that there have been gradual steps. And we applaud that. But 
the men and women who conduct this important work certainly deserve our 
support and all of the resources that we can muster to make sure they 
are successful in their endeavors. Yet we also ensure that the CIA 
itself reflects the American population and that of the world. Having 
agents who can be deployed anywhere at any time is vital to our 
national security, as well as the ability to interact with foreign 
nationals who speak the language is truly important. A diverse 
workforce can make America safer and more secure.
  Historically, there's been an exclusion of minorities, particularly 
African Americans and Latinos, in the highest levels of national 
security. Let's continue to break that barrier. It's taken decades for 
minorities to make inroads into America's national security apparatus. 
And I know that this is a sense of Congress, but I always have faith 
that people will adhere to a positive statement by this body.
  Although the number of CIA employees remains a classified secret, the 
Agency has released some numbers over the years. In 1966, blacks 
represented 10 percent of the CIA's total workforce and only 3 percent 
of the Agency's officers in senior intelligence service, whereas 17 
percent of the clerical staff and 22 percent of the Agency's blue 
collar workforce was African American.
  Over this past weekend, we commemorated, mourned, and celebrated our 
fallen soldiers. I had the privilege of having uncles who went off to 
war in World War II, one who served as a chief petty officer in the 
United States Navy. That was the integrated United States Navy. I can 
tell you that we are better for it when we utilize the talents of all 
Americans.
  In 1992, a declassified study of CIA personnel found that about half 
of all black intelligence officers reported that they had been victims 
of racial harassment by the Agency. As of today, of the CIA's core of 
case officers, which is believed to number more than 1,000, only 11 
percent are minorities and 18 percent are women. The majority of the 
Agency's top managers are still predominantly nonminorities.
  According to CIA officials, one-third of the new operations officers 
hired in 2011 have been women, while just 11 percent have been 
minorities, as traditionally defined: African Americans, Asian 
Americans, or Latinos. Twenty percent of all new operations officers 
are native speakers of a foreign language and 75 percent have advanced 
proficiency in foreign languages, many because they've lived abroad. 
Almost half have advanced degrees.
  I applaud that and I truly believe, as some may be listening and 
saying, Aren't we are all Americans? Yes, we are. If we are all 
Americans, then our

[[Page H3302]]

CIA, one of our most storied Agencies, needs to join and continue to 
recruit and improve on bringing in the diverse picture of the face of 
America because we'll be better for it.
  When President Truman integrated the United States military, we 
became better for it. We celebrate all people who are willing to put 
the Nation's uniform on and die for their country. Likewise, for this 
wonderful intelligence Agency, we do the same.
  With that, I ask my colleagues to support my amendment, and I reserve 
the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, though I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I yield myself such time as I may consume.
  I thank the gentlelady for her amendment. Certainly, the good news 
is, as she said, she has pointed out the progress that has been made. 
And that's right, they have done an exceptionally good job of 
understanding that diversity is part of the success of our intelligence 
services. So restating that policy is probably a good idea. I will not 
oppose the amendment, and I yield back the balance of my time.
  Ms. JACKSON LEE of Texas. I thank the gentleman. I thank the ranking 
member as well.
  In closing, let me just pay tribute to Garrett Jones, who served as a 
CIA station chief in Somalia during peacekeeping operations in 1993 and 
was cited as an African American officer who was able to work 
undercover for weeks in North Mogadishu, which his duty officers said 
would have been all but impossible by Jones' other officers.
  We all have a contribution to make. And I look forward to this sense 
of Congress not being weeded out in conference and reemphasizing the 
importance of this effort.
  With that I ask support of my amendment, and I yield back the balance 
of my time.
  Mr. Chair, I rise to debate my amendment #7 to H.R. 5743 
``Intelligence Authorization Act,'' which is a Sense of Congress that 
the Director of the Central Intelligence Agency should take such 
actions as the Director considers necessary to increase the recruitment 
and training of ethnic minorities as officers and employees of the 
Central Intelligence Agency.
  The men and women who conduct this important work certainly deserve 
our support and all of the resources that we can muster to make sure 
that they're successful in their endeavors. Yet, we must also ensure 
that the CIA itself reflects the American population and that of the 
world. Having agents who can be deployed anywhere at any time is vital 
to our national security. As is a diversity of thought and perspectives 
that can be garnered by having a diverse workforce.
  Historically there has been an exclusion of minorities, particularly 
African Americans and Latinos in the highest levels of national 
security.
  It has taken decades for minorities to make inroads into America's 
national security apparatus.
  Although the number of CIA employees remains a classified secret, the 
agency has released some numbers over the years. In 1996 Blacks 
represented 10 percent of the CIA's total work force and only 3 percent 
of the agency's officers in senior intelligence service whereas 17 
percent of the clerical staff and 22 percent of the agency's blue-
collar work force was African American.
  In 1992 a declassified study of CIA personnel found that about half 
of all black intelligence officers reported that they had been victims 
of racial harassment by the agency.
  As of today the CIA's corps of case officers which is believed to 
number more than 1,000 and only 11 percent are minorities and 18 
percent are women.
  The Majority of the agency's top managers are still predominantly 
White males.
  According to the CIA officials one-third of the new operations 
officers hired in 2011 have been women. While just 11 percent have been 
minorities as traditionally defined (African Americans, Asian Americans 
or Latinos), 20 percent of all new operations officers are native 
speakers of a foreign language and 75 percent have advanced proficiency 
in foreign languages, many because they have lived abroad. Almost half 
have advanced degrees.
  There have been improvements since 1992, however, more must and 
should be done to ensure that diversity is reflected at the highest 
levels of the CIA.
  The value of diversity in a spy service that operates in almost every 
country would seem to be obvious.
  Garrett Jones who served as CIA station chief in Somalia during 
peacekeeping operations in 1993, cited the example of an African 
American officer who was able to work undercover for weeks in north 
Mogadishu, which he said would have been all but impossible for Jones 
or any of the station's other white officers. As we must deploy CIA 
agents all over the world. We need agents that are able to blend into a 
variety of situations. We need diversity.
  Interest in working for the CIA rose after the Sept. 11 attacks. 
Between October 2001 and October 2002, the agency received 170,000 
resumes.
  Since founding of Office of the Director of National Intelligence 
minority representation increased to nearly 23 percent in 2009 in FY 
2009, up since FY05, when it was 20 percent. Minorities received nearly 
25 percent of promotions in FY09 and over 27 percent of new hires were 
minority. Women earned 46 percent of promotions in FY09, significantly 
higher than their representation at about 39 percent.
  Letitia ``Tish'' Long is the first woman to head a major intelligence 
agency as director of the National Geospatial-Intelligence Agency, the 
office responsible for collecting and analyzing overhead imagery and 
geospatial information.
  Women have held the #2 spot at several intelligence agencies, 
including National Security Agency, National Reconnaissance Office and 
NGA. CIA however has never had a woman as #2, but has had a woman in 
its #3 spot.
  My amendment is a reflection of the need to continue to place the 
spotlight on the intelligence community to ensure that they continue in 
their efforts to reflect the needs of this country by recruiting, 
training, and retaining qualified minorities,
  The CHAIR. The question is on the amendment offered by the 
gentlewoman from Texas (Ms. Jackson Lee).
  The amendment was agreed to.


          Amendment No. 8 Offered by Ms. Jackson Lee of Texas

  The CHAIR. It is now in order to consider amendment No. 8 printed in 
House Report 112 504.
  Ms. JACKSON LEE of Texas. I have an amendment at the desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       After section 501 (page 21, after line 14), insert the 
     following new section:

     SEC. 502. SENSE OF CONGRESS ON THE NEED FOR THE INTELLIGENCE 
                   COMMUNITY TO PROTECT CIVIL LIBERTIES OF 
                   RELIGIOUS AND ETHNIC MINORITIES.

       It is the sense of Congress that the intelligence community 
     should take all appropriate actions necessary to protect the 
     civil liberties of religious and ethnic minorities.

  The CHAIR. Pursuant to House Resolution 667, the gentlewoman from 
Texas (Ms. Jackson Lee) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentlewoman from Texas.
  Ms. JACKSON LEE of Texas. Again, let me thank the chairman of the 
committee and the ranking member for bringing forward a bipartisan 
initiative, and I hope that this would add to, again, reemphasizing 
what we have begun to do and that we will continue to do, and that is 
to recognize the value of security, but also recognize what Americans 
hold dear--their privacy, their respect for individual rights, their 
civil liberties. And so this amendment speaks specifically to the 
importance of protecting the civil liberties of religious and ethic 
minorities.
  I can cite the moments in history where we have failed. Certainly, 
the Japanese interment loudly speaks in current, modern-day history of 
the tragedy of not respecting the civil liberties of Americans. 
Certainly, if we went as far back as the slave history of America, we 
can see that those who are on American soil who would have sought well 
to be Americans, their civil liberties were not protected.
  But America has made great progress, and I think it is important as 
we look at new populations that come to this country that we 
particularly focus on this whole concept of religious liberty. It is a 
concept that sometimes is very difficult to adhere to. I may not agree 
with your faith and your religion, but you have the right to practice 
it as long as you're not doing harm to the American people.
  For example, President George W. Bush in 2001 told the American 
Congress during that very difficult time that terrorists practice a 
fringe form of Islamic extremism that has been rejected by Muslim 
scholars and the vast

[[Page H3303]]

majority of Muslim clerics, a fringe movement that perverts the 
peaceful teachings of Islam.
  And so this particular faith certainly has been one that has been 
most noted. I think we have all come to the conclusion that we should 
protect the civil liberties of those who practice their faith under the 
Constitution of the United States, which the First Amendment guarantees 
the right to the freedom of access, freedom of movement, freedom of 
religion, freedom of speech.
  I would hope that in the intelligence community, as they do their 
work fighting terrorism, fighting the potential of those terrorist 
cells that may find themselves on our soil, that they will recognize 
the right of individuals to practice the faith and the aspect of the 
faith that follows the tenets of their faith and not categorize those 
individuals simply because of their faith that they might be intending 
to do us wrong.
  There are many incidences where we have the kind of treatment of 
individuals because they happen to be of a particular background, 
particular ethnicity, racial background, and then, of course, faith. 
But I want to speak to this amendment so that people will know that it 
is a broad base, because many times we have disagreement with a number 
of subsets of different faiths, whether it's Protestant, whether it's 
faith that we are used to addressing.
  So it is a statement that says that the civil liberties of all 
Americans will not be deprived through the necessity of protecting this 
land through our intelligence community on the basis of their religion 
and ethnic minorities.
  We know that in some jurisdictions there have been incidences of 
individuals that believe that their privacy has been intruded upon. I 
would hope that in the framework of the fine work that the intelligence 
community has to do that there is no intimidation of making sure that 
civil liberties can be protected.
  Many of us have debated a number of bills on the floor of the House 
dealing with privacy questions. I think it is important in this sense 
of Congress to always restate that we are committed to national 
security, but we're committed to the civil liberties of those within 
our soil--American citizens.
  With that, I ask my colleagues to support my amendment, and I reserve 
the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The CHAIR. Without objection, the gentleman is recognized for 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I yield myself such time as I may consume.
  I want to thank the gentlelady. Civil liberties are incredibly 
important. It's important that the American people have faith in their 
intelligence services that they are, in fact, catching bad guys and 
protecting Americans' civil liberties. The good news is that as a part 
of the Director of National Intelligence they have a Civil Liberties 
Protection Officer. This is a reaffirmation, I think, of that valuable 
work that that particular officer does, and really all of the members 
of our intelligence community need be reminded that protection of 
American civil liberties is an important value and an important thing 
to do while in fact you're catching the bad guys.
  I support the amendment and yield back the balance of my time.
  Ms. JACKSON LEE of Texas. Let me capture what the chairman said. I 
like the terminology that says the American people must have faith in 
their intelligence community, but faith in the principles upon which we 
live. And they must know that the Constitution is a living, breathing 
document. And we as Members of Congress must as well.

                              {time}  1540

  So, again, I make a plea that this sense of Congress is a 
reaffirmation, but also an encouragement and a statement that should be 
in this bill that we respect the civil liberties of racial, ethnic, and 
religious minorities, and in fact so will our intelligence community.
  With that in mind, I would ask my colleagues to support the amendment 
and also ask that it be maintained even in conference, the 
reaffirmation of this important instruction as the civil liberties 
protection officer operates and does the work that they need to do. I 
ask my colleagues to support the amendment, and I yield back the 
balance of my time.
  Mr. Chair, I rise to debate my amendment #8 to H.R. 5743, 
``Intelligence Authorization Act,'' which is a Sense of Congress that 
the intelligence community should take all appropriate actions 
necessary to protect the civil liberties of religious and ethnic 
minorities.
  We can obtain vital intelligence without compromising our civil 
liberties. As you know, risks to civil liberties are inherent in the 
very nature of domestic intelligence. This is because intelligence 
necessarily operates in secret and as a result, it is difficult to 
subject intelligence activities to the checks and balances that the 
Framers of the Constitution realized were essential to prevent abuses 
of power. Even judicial reviews of intelligence activities are often 
given deference.
  Intelligence is the information we use to identify and locate 
individuals involved in planning terrorist acts. This information must 
then be used to prevent any potential attack and can be done in ways 
that are legally permissible.
  Domestic intelligence community left unchecked could pose significant 
dangers to open government, individual privacy, and civil liberties. My 
amendment is designed as a limitation for a reason. We need a bill that 
is strong on civil liberties, and includes protections against 
infringement of our constitutional right to privacy.
  My amendment serves as a reminder that the American people have put 
their faith in the intelligence community and in Congress to protect 
not only their security but the very essence of what makes America 
great . . . our freedoms.
  Thomas Jefferson in 1787 stated that ``[A] bill of rights is what the 
people are entitled to against every government on earth, general or 
particular, and what no just government should refuse.''
  The September 11, 2001 terrorist attacks on America have forced 
serious reflections about the institutional framework of civil society 
and the commitment to democratic principles. Although the balancing of 
the protections of citizens' rights and liberties against their peace 
and security is a continuous constitutional struggle. Especially during 
war and national crisis.
  According to Justice Sandra Day O'Connor ``We're likely to experience 
more restrictions on our personal freedom than has ever been the case 
in our country . . . it will cause us to re-examine some of our laws 
pertaining to criminal surveillance, wiretapping, immigration and so 
on'' (New York Times, Sept. 29 2001).
  Our efforts to provide for the safety and security has required 
Americans to accept certain restriction on their freedoms--more 
surveillance of their papers and communications, more searches of their 
belongings, possible detention without a writ of habeas corpus, and 
proceedings by military tribunals without the standard protections of 
due process of civil courts.
  I realize that we must give our intelligence community the proper 
tools to protect us while upholding the civil liberties of Americans.
  We must always recognize that the American people are being asked to 
trade off civil liberties and personal freedom for a greater sense of 
security from the threat of terrorist.
  It is no answer to these legitimate concerns that police officers or 
member of the intelligence community who monitor political or religious 
meetings, compile dossiers on political activists, or infiltrate lawful 
protest organizations are complying with the Fourth Amendment and are 
doing no more than any member of the public could do on his or her own. 
When government acts, it has a special obligation to respect 
constitutional rights--which include the First as well as the Fourth 
Amendment--an obligation not imposed on private citizens. My amendment 
is a Sense that it is the intent of this body to protect the civil 
liberties of the very groups that may be monitored as a direct response 
to our concerns about a terrorist attack. We must be led not by fear 
but by reason!
  The challenge to our intelligence community is the same as the 
challenge for the nation as a whole. Securing the Nation's freedom 
depends not on making a choice between security and liberty, but in 
designing and implementing policies that allow the American people to 
be both safe and free.
  Increased threats of terrorism after September 11, 2001, lightning-
fast technological innovation, and the erosion of key privacy 
protections under the law threaten to alter the American way of life in 
fundamental ways.
  Terrorism threatens--and is calculated to threaten--not only our 
sense of safety, but also our freedom and way of life. Terrorists 
intend to frighten us into changing our basic laws and values and to 
take actions that are not in our long-term interests.
  While the government has both the power and the obligation under the 
Constitution to

[[Page H3304]]

defend the nation and its security, these powers cannot be exercised in 
a manner that contravenes individual constitutional liberties. Among 
others, these include the First Amendment's guarantee of freedom of 
speech, religion, and association, and the Fourth Amendment's 
protection against unreasonable searches and seizures. In addition, as 
with all government powers, national security and intelligence 
gathering powers should be subject to checks and balances, including 
meaningful judicial review and probing oversight by the Congress.
  The internment of thousands of Japanese serves as a reminder for why 
we must protect the civil liberties of religious and ethnic minorities.


  JAPANESE INTERNMENT--A LESSON ON THE IMPORTANCE OF PROTECTING CIVIL 
                               LIBERTIES

  One week after the Pearl Harbor attack, President Franklin D. 
Roosevelt promised to preserve constitutional freedoms, ``We will not, 
under any threat, or in the face of any danger, surrender the 
guarantees of liberty our forefathers framed for us in our Bill of 
Rights'' but it was not long after that speech that the War Department 
was concerned about a foreign threat to the west coast.
  Congress held hearing and in 1942 the Congressional Subcommittee on 
Aliens and Sabotage recommended ``the immediate evacuation of all 
persons of Japanese lineage and all the other, aliens and citizens 
alike, whose presence shall be deemed dangerous or inimical to the 
defense of the U.S. from all strategic areas''. President Roosevelt 
signed the Executive order 9066 calling for the evacuations . . . 
Roosevelt justified the action as ``war requires every possible 
protection against espionage and against sabotage to national-defense 
material, national-defense premises . . .''
  The result: More than 120,000 Japanese Americans, the majority of 
whom were American citizens or legal permanent residents were placed in 
internment camps violating their civil rights to be treated with 
fairness and equality, without discrimination and their Fifth Amendment 
right to due process.
  It was not until 1988 that victims received a reparation check and an 
apology from President Reagan. ``The United States unjustly interned, 
evacuated, or relocated you and many other Japanese Americans . . . and 
unfairly denied Japanese Americans and their families fundamental 
liberties during World War II . . . the Nation's actions were rooted 
deeply in racial prejudice, wartime hysteria, and a lack of political 
leadership.''
  My amendment stands as a reminder that we must not repeat the 
mistakes of our past.


                        protect personal privacy

  When the Bill of Rights was written, protecting personal privacy was 
largely an issue of protecting the integrity of physical property--and 
so the Fourth Amendment speaks of the people's right to security in 
their ``persons, houses, papers, and effects . . .''
  Today, our most intimate conversations, correspondence and records 
are apt to be recorded digitally, rather than contained in paper 
records secured in private homes and offices. Likewise, the most 
routine details of daily life--credit card purchases at a drug store or 
bookstore, passage through a toll booth or subway station, the 
television shows recorded by a digital video recorder--now leave 
electronic footprints scattered across a myriad of computer databases.
  Today, the transformation of our society from one dependent primarily 
on the privacy of ``persons, houses, papers, and effects'' in the 
physical world is accelerating exponentially. As the result of this 
transformation, a host of previously anonymous behavior and private 
information can now be captured and linked to a specific person without 
any trespass into the person's home or office.
  Our laws are struggling to catch up. So far, the courts have left 
largely immune from Fourth Amendment scrutiny a range of highly 
personal information--including financial records, medical records, and 
library and book records--on a theory that there is no reasonable 
expectation of privacy in information in the hands of third parties. 
See, e.g., United States v. Miller, 425 U.S. 435 (1976).
  Today, we live a world in which a personal calendar or journal--once 
stored in paper form in a home, office, or briefcase--is now as likely 
to be stored on a personal digital assistant connected to a server 
owned by a third party. In such a world, the courts should reconsider 
the idea that information held by third parties lacks constitutional 
protection.
  In United States v. United States District Court (``Keith''), 407 
U.S. 297 (1972), the Supreme Court decided that wiretapping was subject 
to the Fourth Amendment even if it was conducted for national security 
purposes. That case involved a domestic terrorist conspiracy to bomb 
the office of the Central Intelligence Agency in Ann Arbor, Michigan. 
Still, without dismissing the real national security threat posed by 
such illegal activity, the Supreme Court rejected Attorney General John 
Mitchell's claim of a clandestine domestic intelligence gathering power 
that would allow the executive branch to wiretap without court review 
or congressional authorization.
  Such an unchecked power, the Supreme Court observed, would inevitably 
pose dangers to lawful dissent: ``Though the investigative duty of the 
executive may be stronger in such [national security] cases, so also is 
there greater jeopardy to constitutionally protected speech. . . . 
History abundantly documents the tendency of government--however 
benevolent and benign its motives--to view with suspicion those who 
most fervently dispute its policies. . . . The price of lawful public 
dissent must not be a dread of subjection to an unchecked surveillance 
power.'' Keith, 407 U.S. at 313 314.
  Safeguards also must exist to protect First Amendment freedoms of 
speech, worship and association. When conducting counter-terrorism and 
counter-intelligence investigations, the Department of Justice operates 
under guidelines approved by the Attorney General. The purpose of 
investigative guidelines is to ensure that intrusive investigative 
techniques are used to monitor terrorists, spies, and foreign agents, 
not political or religious organizations engaged in lawful dissent. 
These guidelines recognize that such techniques, which are left largely 
unregulated by the Fourth Amendment, pose a risk to First Amendment 
freedom of association.
  The Supreme court has recognized a ``vital relationship between 
freedom to associate and privacy in one's associations.'' NAACP v. 
State of Alabama, 357 U.S. 449, 462 (1958). Where individuals 
participate in unpopular political or religious organizations, members 
of those organizations fear--often with good reason--``economic 
reprisal, loss of employment, threat of physical coercion, and other 
manifestations of public hostility.'' Routine, intrusive government 
investigations of lawful, but unpopular, political organizations would 
clearly pose a serious risk to the First Amendment because their 
members would fear that such information, if leaked, could be used 
against them.
  It should be the Government's burden to establish, to the 
satisfaction of Congress, that intelligence gathering initiatives do 
not pose a threat to fundamental American values. Congress can decide 
simply to forbid the policy from going forward at all because it cannot 
be implemented consistently with fundamental American civil liberties. 
Support my amendment!


                  Racial Profiling/Religious Profiling

  The Department of Justice, DOJ, banned any use of racial profiling in 
2003. Despite this, racial profiling still occurs; there are some who 
claim racial profiling led to the 50 percent decrease in violent crime. 
In reality, racial profiling is against our basic values, it does not 
work, and it actually hinders effective law enforcement. That opinion 
is shared by law enforcement professionals and legal scholars, as well 
advocates of populations most likely to be targeted by profiling. The 
overwhelming weight of statistical data supports this position.
  As the Ranking Member on the Homeland Security Subcommittee on 
Transportation and Senior Member of the Judiciary Committee, I am aware 
of the injustices that are faced by minorities in this country due to 
racial profiling. In Homeland Security I had to sit through a hearing 
on the Radicalization of our Prisons, the need to watch Muslim 
Americans, and certain Somali Americans.
  In the days following the devastating attacks of September 11, 2001, 
this country came together in an unprecedented and inspiring display of 
unity and patriotism. Americans of differing ethnicities, background 
and religions came together in support of the nation.
  In his address to a joint session of Congress on September 20, 2001, 
President George W. Bush told Congress, the American people, and the 
world that ``terrorists practice a fringe form of Islamic extremism 
that has been rejected by Muslim scholars and the vast majority of 
Muslim clerics; a fringe movement that perverts the peaceful teachings 
of Islam.''
  The Homeland Security Committee continues to focus on the Islamic 
faith and those who follow it, as a threat to national security. We set 
the example that the Intelligence Community follows. We must stand up 
to violations of a person's civil liberty, but most especially for 
religious and ethic minorities. It is clear that Muslim Americans since 
9/11 have been singled out and targeted for their religious beliefs.
  Racial and religious profiling is against our basic values, it does 
not work, and it actually hinders effective law enforcement. That 
opinion is shared by law enforcement professionals and legal scholars, 
as well advocates of populations most likely to be targeted by 
profiling. The overwhelming weight of statistical data supports this 
position.
  And yet, there are still those who insist that it is a valid tool for 
crime fighting and anti-terrorism work. They insist that if you have 
nothing to hide, you have no reason to mind answering a few simple 
questions, that it is a minor inconvenience. I find that inexplicable.

[[Page H3305]]

  It is more than a minor inconvenience to have the police or FBI come 
into your workplace, to question you in front of your coworkers, and 
put your job at risk. It is more than a minor inconvenience to be 
stopped on the street, to be pulled over on a pretext, so that police 
officers can find a reason to question you. When the use of force or 
threat of force by police officers is dramatically increasing, it is 
more than a minor inconvenience to be more likely to be pulled over and 
put in that position, because of the color of your skin.
  Thirty two million Americans have reported that they were the victims 
of racial profiling. That is thirty two million Americans humiliated, 
intimidated, and treated as second class citizens in service of a 
policy that does nothing to keep us safer.
  In past years, I have supported measures that would end this 
practice. I look forward to hearing from the witnesses about how we can 
end this ineffective, un-American practice, whether through training, 
executive orders, or through legislation we craft in Congress.


                     RACIAL PROFILING AND TERRORISM

                         ``DRIVING WHILE ARAB''

  The events of September 11, 2001, have had a profound impact on 
racial profiling. Following the terrorist attacks, law enforcement 
agents have subjected individuals of Arab or South Asian descent, 
Muslims, and Sikhs to racial profiling. While national and local 
statistics are not yet available, anecdotal accounts how Arabs, 
Muslims, and Sikhs have endured racial profiling.
  For example, in the months following September 11th, a new type of 
racial profiling has developed: ``driving while Arab.'' Arabs, Muslim, 
and Sikhs across the country were subjected to traffic stops and 
searches based in whole or part on their ethnicity or religion.
  On October 4, 2001, in Gwinnett, Georgia, an Arab motorist's car was 
stopped, he was approached by a police officer whose gun was drawn, and 
he was called a ``bin Laden supporter'' all for making an illegal U-
turn. On October 8, 2001, two Alexandria, VA, police officers stopped 
three Arab motorists. The officers questioned the motorists about a 
verse of the Koran hanging from the rear view mirror, and asked about 
documents in the back seat. The police officer confiscated the 
motorists' identification cards and drove off without explanation. He 
returned 10 minutes later, and claimed be had had to take another call.
  On December 5, 2001, a veiled Muslim woman in Burbank, Illinois, was 
stopped by a police officer for driving with suspended plates. The 
officer asked the woman when Ramadan was over, asked her offensive 
question about her hair, and pushed her into his patrol car as he 
arrested her for driving with suspended plates. The woman was released 
from custody later that day.


                    DEPORTATION WITHOUT DUE PROCESS

  A particularly egregious form of terrorism profiling occurs when Arab 
men and women are detained and deported without due process.
  Since September 11th, hundreds of Arab and Muslim individuals have 
been detained on suspicion of terrorist activity. Practically none of 
these individuals was involved with terrorism. However, many were 
detained for weeks and eventually changed with minor immigration 
violations.
  Based on these minor immigration violations some were deported. In 
one case, two Pakistani immigrants were arrested and detained 45 days 
for allegedly overstaying their visas.
  In another case an Israeli was detained for 66 days before being 
charged with entering the United States unlawfully.
  In a particularly shocking case, a French teacher from Yemen, who was 
married to an American citizen and therefore eligible to become a 
citizen himself, was reporting for duty as an army recruit at Fort 
Campbell, Kentucky, on September 15, 2001. The man was apprehended by 
Federal agents, separated from his wife and interrogated for 12 hours. 
The agents accused him of violating immigration laws, conspiring with 
Russian terrorists, spousal abuse, and threatened him with beatings. 
The man was given a lie detector test which proved he was telling the 
truth when he denied being associated with terrorists.


                    CONSEQUENCES OF RACIAL PROFILING

  The consequences of Racial Profiling for minority groups in the 
United States, for Arab, Muslim and Sikh groups, and in the 
immigrations context are dire for individual who are both innocent and 
guilty of criminal activity.
  In the case of the innocent, for every person in possession of drugs 
apprehended through profiling, many more law-abiding minorities are 
treated as if they are criminals.
  Racial profiling increases the stops and arrests of minority groups. 
Frequent stops and arrests of minorities generate more extensive 
criminal histories, and result in longer sentences.
  Racial profiling results in increased arrests and convictions of 
minorities. In many states, a felony conviction can impact a person's 
ability to exercise their basic social rights. In 46 States and the 
District of Columbia, convicted adults cannot vote. Thirty-two States 
disenfranchise felons on parole, while 29 States disenfranchise felons 
on probation.
  The CHAIR. The question is on the amendment offered by the 
gentlewoman from Texas (Ms. Jackson Lee).
  The amendment was agreed to.


                 Amendment No. 9 Offered by Mrs. Myrick

  The CHAIR. It is now in order to consider amendment No. 9 printed in 
House Report 112 504.
  Mrs. MYRICK. Mr. Chairman, I have an amendment at the desk.
  The CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       After section 501 (page 21, after line 14), insert the 
     following new section:

     SEC. 502. PROTECTING THE INFORMATION TECHNOLOGY SUPPLY CHAIN 
                   OF THE UNITED STATES.

       (a) Report.--Not later than 90 days after the date of the 
     enactment of this Act, the Director of National Intelligence 
     shall submit to the congressional intelligence committees a 
     report that--
       (1) identifies foreign suppliers of information technology 
     (including equipment, software, and services) that are linked 
     directly or indirectly to a foreign government, including--
       (A) by ties to the military forces of a foreign government;
       (B) by ties to the intelligence services of a foreign 
     government; or
       (C) by being the beneficiaries of significant low interest 
     or no interest loans, loan forgiveness, or other support by a 
     foreign government;
       (2) assesses the vulnerability to malicious activity, 
     including cyber crime or espionage, of the telecommunications 
     networks of the United States due to the presence of 
     technology produced by suppliers identified under paragraph 
     (1).
       (b) Form.--The report required under subsection (a) shall 
     be submitted in unclassified form, but may include a 
     classified annex.
       (c) Telecommunications Networks of the United States 
     Defined.--In this section, the term ``telecommunications 
     networks of the United States'' includes--
       (1) telephone systems;
       (2) Internet systems;
       (3) fiber optic lines, including cable landings;
       (4) computer networks; and
       (5) smart grid technology under development by the 
     Department of Energy.

  The CHAIR. Pursuant to House Resolution 667, the gentlewoman from 
North Carolina (Mrs. Myrick) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentlewoman from North Carolina.
  Mrs. MYRICK. Mr. Chairman, first, like other Members today, I want to 
express my gratitude and thanks to Chairman Rogers and Ranking Member 
Ruppersberger for all of the work that they've done, just the 
incredible bipartisan working relationship that they've established on 
our committee. It really is kind of unheard of, and we're very proud of 
it, and I'm very proud to be a member of the committee.
  I rise today to urge my colleagues to support my amendment to the 
Intelligence authorization bill, and I'm pleased that Representative 
Wolf is a cosponsor of this initiative, and I'd like to thank him for 
his support and all his work on this issue.
  This amendment would require the Director of National Intelligence to 
submit an unclassified report to Congress that would identify foreign 
suppliers of information technology with ties to a foreign government, 
military, or intelligence service. It would also require the DNI to 
provide an assessment of the risks associated with such entities.
  The U.S. Government has serious concerns about public and private 
sector information technology supply chains. A network is only as 
secure as the components that make up that network. If the origin of 
those components is unknown or the security of those components is 
compromised, that's a major flaw in the network.
  I believe these concerns need to be better shared with industry and 
the public. Sharing more information along these lines will help the 
private sector better understand potential risks and take action that 
will help the U.S. Government mitigate its supply-chain concerns.
  The more that the private sector knows of potential problems, the 
better it can protect itself. If the private sector is more aware of 
potential risks, then it can better work with the Federal Government to 
mitigate potential supply-chain concerns.
  I would like to thank Chairman Rogers for his support of this 
amendment,

[[Page H3306]]

and I again urge my colleagues to support the amendment on the floor.
  I reserve the balance of my time.
  Mr. RUPPERSBERGER. Mr. Chairman, I rise in opposition to the 
amendment, though I do not oppose it.
  The CHAIR. Without objection, the gentleman from Maryland is 
recognized for 5 minutes.
  There was no objection.
  Mr. RUPPERSBERGER. First, I support this amendment as a continuation 
of the work that we have begun in Congress as an attempt to focus our 
intelligence community and the executive Agencies to this important 
threat that my friend and colleague has made.
  Ms. JACKSON LEE of Texas. Will the gentleman yield?
  Mr. RUPPERSBERGER. I yield to the gentlewoman from Texas.
  Ms. JACKSON LEE of Texas. I do not rise on the gentlelady's 
amendment. In the statement I made on amendment No. 7, I indicated that 
the CIA officer's name that was undercover, that was not the CIA's 
undercover agent's name, which I would not give. It was the section 
station director's name, Mr. Garrett Jones. The CIA agent was 
undercover and remains unnamed. But he was an African American who did 
his duty because of his background.
  Mr. RUPPERSBERGER. I yield back the balance of my time.
  Mrs. MYRICK. Mr. Chairman, I yield such time as he may consume to the 
chairman of our committee, the gentleman from Michigan (Mr. Rogers).
  Mr. ROGERS of Michigan. I want to thank the gentlelady from North 
Carolina, say thank you very, very much for her work on the supply 
chain and its vulnerabilities. She has spent a lot of time on our 
committee making sure that we're doing all the right things to try to 
protect the supply chain when it comes to cyberthreats and other 
vulnerabilities that may exist, so I couldn't support the amendment 
more.
  Lastly, I would just like to thank the gentlelady. This will be her 
last authorization bill. She has been a fantastic member of this 
committee and has brought a lot of stature to the issues she's engaged 
in--everything from home-grown terrorism to cyber to supply chain 
management. She has been a national treasure on that committee. She 
will be sorely missed. I wanted to offer our congratulations and our 
thanks to a job well done.
  Mrs. MYRICK. I thank the gentleman for his kind words, and I yield 
back the balance of my time.
  The CHAIR. The question is on the amendment offered by the 
gentlewoman from North Carolina (Mrs. Myrick).
  The amendment was agreed to.
  The Acting CHAIR (Mr. Platts). The question is on the committee 
amendment in the nature of a substitute, as amended.
  The amendment was agreed to.
  The Acting CHAIR. Under the rule, the Committee rises.
  Accordingly, the Committee rose; and the Speaker pro tempore (Mr. 
Yoder) having assumed the chair, Mr. Platts, Acting Chair of the 
Committee of the Whole House on the state of the Union, reported that 
that Committee, having had under consideration the bill (H.R. 5743) to 
authorize appropriations for fiscal year 2013 for intelligence and 
intelligence-related activities of the United States Government, the 
Community Management Account, and the Central Intelligence Agency 
Retirement and Disability System, and for other purposes, and, pursuant 
to House Resolution 667, he reported the bill back to the House with an 
amendment adopted in the Committee of the Whole.
  The SPEAKER pro tempore. Under the rule, the previous question is 
ordered.
  Is a separate vote demanded on any amendment to the amendment 
reported from the Committee of the Whole?
  If not, the question is on the committee amendment in the nature of a 
substitute, as amended.
  The amendment was agreed to.
  The SPEAKER pro tempore. The question is on the engrossment and third 
reading of the bill.
  The bill was ordered to be engrossed and read a third time, and was 
read the third time.


                           Motion to Recommit

  Mr. CRITZ. Mr. Speaker, I have a motion to recommit.
  The SPEAKER pro tempore. Is the gentleman opposed to the bill?
  Mr. CRITZ. I am, in its present form.
  The SPEAKER pro tempore. The Clerk will report the motion to 
recommit.
  The Clerk read as follows:

       Mr. Critz moves to recommit the bill, H.R. 5743, to the 
     Permanent Select Committee on Intelligence with instructions 
     to report the same back to the House forthwith with the 
     following amendment:
       After section 501 (page 21, after line 14), insert the 
     following new section:

     SEC. 502. PROTECTING UNITED STATES MILITARY STRENGTH, 
                   TECHNOLOGICAL PROWESS, AND AMERICAN JOBS.

       (a) In General.--In obligating and expending funds 
     authorized to be appropriated by this Act, the head of each 
     element of the intelligence community shall take all steps 
     necessary to protect and ensure that--
       (1) the intelligence and military capability of the United 
     States is not improperly transferred to or stolen by a 
     foreign nation or a state sponsor of terrorism;
       (2) the intelligence and military capability of the United 
     States and sensitive information pertaining to economic, 
     financial, and consumer information is protected from 
     cybersecurity attacks, including cybersecurity attacks from 
     Iran and China; and
       (3) contracts and work performed for such element of the 
     intelligence community is first provided to United States 
     companies and workers and not outsourced to foreign-owned 
     companies, unless the Director of National Intelligence 
     determines that it is in the interests of national security.
       (b) State Sponsor of Terrorism Defined.--In this section, 
     the term ``state sponsor of terrorism'' means any country the 
     government of which the Secretary of State determines has 
     repeatedly provided support for acts of international 
     terrorism pursuant to section 6(j) of the Export 
     Administration Act of 1979 (as continued in effect pursuant 
     to the International Emergency Economic Powers Act), section 
     40 of the Arms Export Control Act, section 620A of the 
     Foreign Assistance Act of 1961, or any other provision of 
     law.

  Mr. CRITZ (during the reading). Mr. Speaker, I ask unanimous consent 
that the reading be dispensed with.
  Mr. ROGERS of Michigan. I object.
  The SPEAKER pro tempore. Objection is heard.
  The Clerk will read.
  The Clerk continued to read.

                              {time}  1550

  Mr. ROGERS of Michigan (during the reading). Mr. Speaker, I ask 
unanimous consent that the motion be considered as read.
  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Michigan?
  There was no objection.
  The SPEAKER pro tempore. The gentleman from Pennsylvania is 
recognized for 5 minutes.
  Mr. CRITZ. Mr. Speaker, intelligence gathering has always been a key 
component of keeping America strong and resilient through our history, 
and it is imperative in this post-9/11 era.
  It is crucial that the intelligence community be provided the 
resources they need to combat threats from foreign powers and global 
terrorist organizations. This is why I'm offering this final amendment 
today, to help strengthen our defenses against physical and 
cybersecurity attacks.
  Mr. Speaker, this is the final amendment to the bill. This amendment 
will not kill the bill or send it back to the committee. If it is 
adopted, the bill will immediately proceed to final passage as amended.
  My amendment contains three components that will ensure we continue 
to provide the best security to our Nation.
  First, it would instruct the head of each element of the intelligence 
community to take all steps and precautions to ensure that the 
intelligence and military capability of the United States is not 
improperly transferred or stolen by a foreign nation or a state sponsor 
of terrorism.
  Mr. Speaker, we live in a time where information is readily available 
and transferable at the click of a mouse or the stroke of a keyboard. 
While the advantages of such readily available information have helped 
spur economic opportunities and growth, it has also opened the door for 
one of the many intelligence challenges we face as a Nation.
  We already have in place a number of protocols that dictate how and 
under what circumstances our military can transfer technology, goods, 
and services to our allies across the globe, but it is imperative that 
we do everything we can to ensure this information doesn't end up in 
the hands of unfriendly foreign powers or state sponsors of terrorism.

[[Page H3307]]

  Within the past few years, we have seen foreign nations attempt to 
steal our Nation's military technology and sensitive information 
through the use of joint ventures and other techniques. We must do 
everything that we can to ensure that our military and intelligence 
secrets remain our secrets. Many of those same capabilities reside in, 
are accessed through, or are enabled through cyberspace.
  Reliable access to cyberspace is critical to U.S. national security, 
public safety, and economic well-being, but cyberthreats continue to 
grow in scope and severity daily. Tens of thousands of new malicious 
software programs originating from Iran or China are identified each 
day, threatening our security, our economy, and our citizens.
  No longer do we need to just worry about foreign spies infiltrating 
our military and intelligence agencies. Our worry must now extend to 
the young man or woman sitting in their apartment 6,000 miles away 
utilizing a laptop to tap into our government mainframes.
  Secondly, my amendment would direct the head of each element of the 
intelligence community to take those steps necessary to ensure that our 
Nation's intelligence and military capabilities, as well as sensitive 
economic, financial, and consumer information, remain protected from 
improper transfer, theft, or cybersecurity attack.
  Finally, my amendment would ensure that we continue to promote 
American businesses and keep jobs--especially one of such crucial 
importance--in America.
  As the number of threats to our Nation has grown and the required 
response has put a large demand on the intelligence community, we have 
increasingly relied on contractors to perform tasks to ensure the 
safety of our Nation. This amendment would instruct our intelligence 
community to always put American workers first and not outsource these 
jobs to foreign-owned companies.
  Mr. Speaker, I have witnessed the detrimental effects that 
outsourcing has had. Numerous areas of our country have also seen the 
ugly effects of outsourcing, and we must put American workers and 
businesses first, especially in the critical sphere of intelligence.
  Compounding the economic damage outsourcing has done to our country, 
the national security risk posed by allowing foreign companies to 
operate our intelligence capabilities would be catastrophic to the 
environment of our Nation.
  Mr. Speaker, in the global environment in which we operate, we must 
keep America strong, keep America competitive, and keep America first.
  Mr. Speaker, again, my amendment will be the final amendment to the 
bill. I have great respect for the chairman, Mr. Rogers, and the 
ranking member, Mr. Ruppersberger, for the bipartisan bill they put 
together. It is important to note that this amendment will not kill the 
bill or send it back to committee. If it is adopted, the bill will 
immediately proceed to final passage as amended. My amendment will 
ensure we have an even stronger American intelligence community.
  I urge a ``yes'' vote on this final amendment, and I yield back the 
balance of my time.
  Mr. ROGERS of Michigan. Mr. Speaker, I rise in opposition to the 
motion to recommit.
  The SPEAKER pro tempore. The gentleman is recognized for 5 minutes.
  Mr. ROGERS of Michigan. First of all, this is a motion to recommit. 
Let's not fool ourselves. And I understand this is the loyal opposition 
portion of the debate. It happens in each and every bill; I get it.
  We've spent a lot of time in a bipartisan way getting the bill, and I 
think it's one of our better products given the detail with which we 
went over every budget line and operational detail in this budget. So 
when I read this, it looks like it was prepared fairly quickly in order 
to meet the time demand here, and it's very concerning.
  In some of the things that we've done--even in this Chamber, we 
debated the cybersecurity bill and people had strong passions on both 
sides of the aisle of that bill about protection of civil liberties and 
just making sure there were checks and balances on our ability just to 
share information, a very small little piece. When you read this bill, 
that makes our cybersecurity bill look like a walk in the park. This is 
an expansion of the government involved in the Internet in a way that I 
find a little bit scary and shocking that they would allow it to get 
this far. Let me read it:

       The intelligence community shall take all steps necessary 
     to protect and ensure that--
       Sensitive information pertaining to economic, financial, 
     and consumer information is protected from cybersecurity 
     attacks.

  That means you've got to reach way out into the Internet. Now you've 
just empowered the intelligence community--the very people we said we 
want to keep separate--into the Internet. This is dangerous. That's 
what happens when you get in a hurry and try to have a political 
amendment on a very bipartisan bill, and that's unfortunate about this.
  The first paragraph, I would submit, we should make as a part of the 
``department of redundancy department.'' All of that already happens. 
We do that as a matter of course and mission.
  Again, it's a little bit surprising that they would allow this. I 
would even hope that your Members would take a very close look at this. 
You have just put your Members in a pretty bad spot about making them 
vote on something that will actually have the government involved in 
your Internet. Welcome to the laptop near you. Very concerning to me.
  I will passionately oppose this, would urge all of my colleagues to 
passionately oppose this, and I yield back the balance of my time.
  The SPEAKER pro tempore. Without objection, the previous question is 
ordered.
  There was no objection.
  The SPEAKER pro tempore. The question is on the motion to recommit.
  The question was taken; and the Speaker pro tempore announced that 
the noes appeared to have it.
  Mr. CRITZ. Mr. Speaker, on that I demand the yeas and nays.
  The yeas and nays were ordered.
  The SPEAKER pro tempore. Pursuant to clause 9 of rule XX, the Chair 
will reduce to 5 minutes the minimum time for any electronic vote on 
the question of passage.
  The vote was taken by electronic device, and there were--yeas 180, 
nays 235, not voting 16, as follows:

                             [Roll No. 300]

                               YEAS--180

     Ackerman
     Altmire
     Andrews
     Baca
     Baldwin
     Barrow
     Bass (CA)
     Becerra
     Berkley
     Berman
     Bishop (GA)
     Bishop (NY)
     Blumenauer
     Bonamici
     Boren
     Boswell
     Brady (PA)
     Braley (IA)
     Brown (FL)
     Butterfield
     Capps
     Capuano
     Cardoza
     Carnahan
     Carney
     Carson (IN)
     Castor (FL)
     Chandler
     Chu
     Cicilline
     Clarke (MI)
     Clarke (NY)
     Cleaver
     Clyburn
     Cohen
     Connolly (VA)
     Cooper
     Costello
     Courtney
     Critz
     Crowley
     Cuellar
     Cummings
     Davis (CA)
     Davis (IL)
     DeFazio
     DeGette
     DeLauro
     Deutch
     Dicks
     Dingell
     Doggett
     Donnelly (IN)
     Edwards
     Engel
     Eshoo
     Farr
     Fattah
     Filner
     Frank (MA)
     Fudge
     Garamendi
     Gonzalez
     Green, Al
     Green, Gene
     Grijalva
     Gutierrez
     Hahn
     Hanabusa
     Hastings (FL)
     Heinrich
     Higgins
     Himes
     Hinchey
     Hinojosa
     Hirono
     Hochul
     Holden
     Holt
     Honda
     Hoyer
     Israel
     Jackson (IL)
     Jackson Lee (TX)
     Johnson (GA)
     Johnson, E. B.
     Jones
     Kaptur
     Keating
     Kildee
     Kind
     Kissell
     Kucinich
     Langevin
     Larsen (WA)
     Larson (CT)
     Lee (CA)
     Levin
     Lewis (GA)
     Lipinski
     Loebsack
     Lofgren, Zoe
     Lowey
     Lujan
     Lynch
     Markey
     Matheson
     Matsui
     McCollum
     McDermott
     McGovern
     McIntyre
     McNerney
     Meeks
     Michaud
     Miller (NC)
     Miller, George
     Moore
     Moran
     Murphy (CT)
     Nadler
     Napolitano
     Neal
     Olver
     Owens
     Pallone
     Pascrell
     Pastor (AZ)
     Pelosi
     Perlmutter
     Peters
     Peterson
     Pingree (ME)
     Polis
     Price (NC)
     Quigley
     Rahall
     Reyes
     Richardson
     Richmond
     Ross (AR)
     Rothman (NJ)
     Roybal-Allard
     Ruppersberger
     Rush
     Ryan (OH)
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Schakowsky
     Schiff
     Schrader
     Schwartz
     Scott (VA)
     Scott, David
     Serrano
     Sewell
     Sherman
     Sires
     Smith (WA)
     Speier
     Stark
     Sutton
     Thompson (CA)
     Thompson (MS)
     Tierney
     Tonko
     Towns
     Tsongas
     Van Hollen
     Visclosky
     Walz (MN)
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Welch
     Wilson (FL)
     Woolsey
     Yarmuth

                               NAYS--235

     Adams
     Aderholt
     Akin
     Alexander
     Amash
     Amodei
     Austria
     Bachmann
     Bachus
     Barletta
     Bartlett
     Barton (TX)
     Bass (NH)
     Benishek
     Berg

[[Page H3308]]


     Biggert
     Bilbray
     Bilirakis
     Bishop (UT)
     Black
     Blackburn
     Bonner
     Bono Mack
     Boustany
     Brady (TX)
     Brooks
     Broun (GA)
     Buchanan
     Bucshon
     Buerkle
     Burgess
     Calvert
     Camp
     Campbell
     Canseco
     Cantor
     Capito
     Carter
     Cassidy
     Chabot
     Chaffetz
     Coble
     Coffman (CO)
     Cole
     Conaway
     Conyers
     Costa
     Cravaack
     Crawford
     Crenshaw
     Culberson
     Davis (KY)
     Denham
     Dent
     DesJarlais
     Diaz-Balart
     Dold
     Dreier
     Duffy
     Duncan (SC)
     Duncan (TN)
     Ellmers
     Emerson
     Farenthold
     Fincher
     Fitzpatrick
     Flake
     Fleischmann
     Fleming
     Flores
     Forbes
     Foxx
     Franks (AZ)
     Frelinghuysen
     Gallegly
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gibson
     Gingrey (GA)
     Gohmert
     Goodlatte
     Gosar
     Gowdy
     Graves (GA)
     Graves (MO)
     Griffin (AR)
     Griffith (VA)
     Grimm
     Guthrie
     Hall
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (WA)
     Hayworth
     Heck
     Hensarling
     Herger
     Herrera Beutler
     Huelskamp
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Issa
     Jenkins
     Johnson (IL)
     Johnson (OH)
     Johnson, Sam
     Jordan
     Kelly
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kline
     Labrador
     Lamborn
     Lance
     Landry
     Lankford
     Latham
     LaTourette
     Latta
     LoBiondo
     Long
     Lucas
     Luetkemeyer
     Lummis
     Lungren, Daniel E.
     Manzullo
     Marchant
     Marino
     McCarthy (NY)
     McCaul
     McClintock
     McCotter
     McHenry
     McKeon
     McKinley
     McMorris Rodgers
     Meehan
     Mica
     Miller (FL)
     Miller (MI)
     Miller, Gary
     Mulvaney
     Murphy (PA)
     Myrick
     Neugebauer
     Noem
     Nugent
     Nunes
     Nunnelee
     Olson
     Palazzo
     Paul
     Paulsen
     Pearce
     Pence
     Petri
     Pitts
     Platts
     Poe (TX)
     Pompeo
     Posey
     Price (GA)
     Quayle
     Reed
     Rehberg
     Reichert
     Renacci
     Ribble
     Rigell
     Rivera
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross (FL)
     Royce
     Runyan
     Ryan (WI)
     Scalise
     Schilling
     Schmidt
     Schock
     Schweikert
     Scott (SC)
     Scott, Austin
     Sensenbrenner
     Sessions
     Shimkus
     Shuler
     Shuster
     Simpson
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Southerland
     Stearns
     Stivers
     Stutzman
     Sullivan
     Terry
     Thompson (PA)
     Thornberry
     Tiberi
     Tipton
     Turner (NY)
     Turner (OH)
     Upton
     Walberg
     Walden
     Walsh (IL)
     Webster
     West
     Westmoreland
     Whitfield
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yoder
     Young (AK)
     Young (IN)

                             NOT VOTING--16

     Burton (IN)
     Clay
     Doyle
     Ellison
     Fortenberry
     Granger
     Guinta
     Lewis (CA)
     Mack
     Maloney
     McCarthy (CA)
     Rangel
     Roby
     Slaughter
     Velazquez
     Young (FL)

                              {time}  1620

  Messrs. GOWDY, STIVERS, GRIMM, THOMPSON of Pennsylvania, KINGSTON, 
COLE, CARTER, MULVANEY and NUNNELEE changed their votes from ``yea'' to 
``nay.''
  So the motion to recommit was rejected.
  The result of the vote was announced as above recorded.
  The SPEAKER pro tempore. The question is on the passage of the bill.
  The question was taken; and the Speaker pro tempore announced that 
the ayes appeared to have it.


                             Recorded Vote

  Mr. ROGERS of Michigan. Madam Speaker, I demand a recorded vote.
  A recorded vote was ordered.
  The SPEAKER pro tempore. This will be a 5-minute vote.
  The vote was taken by electronic device, and there were--ayes 386, 
noes 28, not voting 17, as follows:

                             [Roll No. 301]

                               AYES--386

     Ackerman
     Adams
     Aderholt
     Akin
     Alexander
     Altmire
     Amodei
     Andrews
     Austria
     Baca
     Bachmann
     Bachus
     Baldwin
     Barletta
     Barrow
     Bartlett
     Barton (TX)
     Bass (CA)
     Bass (NH)
     Becerra
     Benishek
     Berg
     Berkley
     Berman
     Biggert
     Bilbray
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Black
     Blackburn
     Bonamici
     Bonner
     Bono Mack
     Boren
     Boswell
     Boustany
     Brady (PA)
     Brady (TX)
     Braley (IA)
     Brooks
     Broun (GA)
     Brown (FL)
     Buchanan
     Bucshon
     Buerkle
     Burgess
     Butterfield
     Calvert
     Camp
     Campbell
     Canseco
     Cantor
     Capito
     Capps
     Cardoza
     Carnahan
     Carney
     Carson (IN)
     Carter
     Cassidy
     Castor (FL)
     Chabot
     Chaffetz
     Chandler
     Chu
     Cicilline
     Clarke (MI)
     Clyburn
     Coble
     Coffman (CO)
     Cohen
     Cole
     Conaway
     Connolly (VA)
     Conyers
     Cooper
     Costa
     Costello
     Courtney
     Cravaack
     Crawford
     Crenshaw
     Critz
     Crowley
     Cuellar
     Culberson
     Cummings
     Davis (CA)
     Davis (IL)
     Davis (KY)
     DeFazio
     DeGette
     DeLauro
     Denham
     Dent
     DesJarlais
     Deutch
     Diaz-Balart
     Dicks
     Dingell
     Doggett
     Dold
     Donnelly (IN)
     Dreier
     Duffy
     Duncan (SC)
     Edwards
     Ellmers
     Emerson
     Engel
     Eshoo
     Farenthold
     Farr
     Fattah
     Fincher
     Fitzpatrick
     Flake
     Fleischmann
     Fleming
     Flores
     Forbes
     Foxx
     Franks (AZ)
     Frelinghuysen
     Fudge
     Gallegly
     Garamendi
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gingrey (GA)
     Gohmert
     Gonzalez
     Goodlatte
     Gosar
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Green, Al
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grijalva
     Grimm
     Guthrie
     Gutierrez
     Hahn
     Hall
     Hanabusa
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (FL)
     Hastings (WA)
     Hayworth
     Heck
     Heinrich
     Hensarling
     Herger
     Herrera Beutler
     Higgins
     Himes
     Hinchey
     Hinojosa
     Hirono
     Hochul
     Holden
     Honda
     Hoyer
     Huelskamp
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jackson Lee (TX)
     Jenkins
     Johnson (GA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jordan
     Kaptur
     Keating
     Kelly
     Kildee
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kissell
     Kline
     Labrador
     Lamborn
     Lance
     Landry
     Langevin
     Lankford
     Larsen (WA)
     Larson (CT)
     Latham
     Latta
     Levin
     Lipinski
     LoBiondo
     Loebsack
     Long
     Lowey
     Lucas
     Luetkemeyer
     Lujan
     Lummis
     Lungren, Daniel E.
     Lynch
     Maloney
     Manzullo
     Marchant
     Marino
     Matheson
     Matsui
     McCarthy (NY)
     McCaul
     McClintock
     McCollum
     McCotter
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     McNerney
     Meehan
     Meeks
     Mica
     Michaud
     Miller (FL)
     Miller (MI)
     Miller (NC)
     Miller, Gary
     Moore
     Moran
     Mulvaney
     Murphy (CT)
     Murphy (PA)
     Myrick
     Nadler
     Napolitano
     Neal
     Neugebauer
     Noem
     Nugent
     Nunes
     Nunnelee
     Olson
     Owens
     Palazzo
     Pallone
     Pascrell
     Pastor (AZ)
     Paulsen
     Pearce
     Pelosi
     Pence
     Perlmutter
     Peters
     Peterson
     Petri
     Pingree (ME)
     Pitts
     Platts
     Poe (TX)
     Pompeo
     Posey
     Price (GA)
     Price (NC)
     Quayle
     Quigley
     Rahall
     Reed
     Rehberg
     Reichert
     Renacci
     Reyes
     Ribble
     Richardson
     Richmond
     Rigell
     Rivera
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross (AR)
     Ross (FL)
     Rothman (NJ)
     Roybal-Allard
     Royce
     Runyan
     Ruppersberger
     Ryan (OH)
     Ryan (WI)
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Scalise
     Schakowsky
     Schiff
     Schilling
     Schmidt
     Schock
     Schrader
     Schwartz
     Schweikert
     Scott (SC)
     Scott (VA)
     Scott, Austin
     Scott, David
     Sensenbrenner
     Serrano
     Sessions
     Sewell
     Sherman
     Shimkus
     Shuler
     Shuster
     Simpson
     Sires
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Southerland
     Speier
     Stearns
     Stivers
     Stutzman
     Sullivan
     Sutton
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tierney
     Tipton
     Tonko
     Towns
     Tsongas
     Turner (NY)
     Turner (OH)
     Upton
     Van Hollen
     Visclosky
     Walberg
     Walden
     Walsh (IL)
     Walz (MN)
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Webster
     Welch
     West
     Westmoreland
     Whitfield
     Wilson (FL)
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yarmuth
     Yoder
     Young (IN)

                                NOES--28

     Amash
     Blumenauer
     Capuano
     Clarke (NY)
     Duncan (TN)
     Filner
     Frank (MA)
     Gibson
     Holt
     Jackson (IL)
     Johnson (IL)
     Jones
     Kind
     Kucinich
     Lee (CA)
     Lewis (GA)
     Lofgren, Zoe
     Markey
     McDermott
     McGovern
     Miller, George
     Olver
     Paul
     Polis
     Rush
     Stark
     Woolsey
     Young (AK)

                             NOT VOTING--17

     Burton (IN)
     Clay
     Cleaver
     Doyle
     Ellison
     Fortenberry
     Guinta
     LaTourette
     Lewis (CA)
     Mack
     McCarthy (CA)
     Rangel
     Roby
     Slaughter
     Tiberi
     Velazquez
     Young (FL)

                              {time}  1628

  Mr. RUSH changed his vote from ``aye'' to ``no.''
  So the bill was passed.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.

                              {time}  1630


        Authorizing the Clerk to Make Corrections in Engrossment

  Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that in 
the engrossment of the bill, H.R. 5743, the Clerk be authorized to make 
such technical and conforming changes as necessary to reflect the 
actions of the House.
  The SPEAKER pro tempore (Mr. Woodall). Is there objection to the 
request of the gentleman from Michigan?

[[Page H3309]]

  There was no objection.


               Permission to Include Exchange of Letters

  Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent to 
include an exchange of letters with the chairman of the Committee on 
Homeland Security with respect to the bill at this point in the Record.
  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Michigan?
  There was no objection.

         House of Representatives, Permanent Select Committee on 
           Intelligence,
                                     Washington, DC, May 31, 2012.
     Hon. Peter King,
     Chairman, Committee on Homeland Security, House of 
         Representatives, Washington, DC.
       Dear Mr. Chairman: Thank you for your letter regarding 
     certain intelligence and intelligence-related programs and/or 
     activities of the Department of Homeland Security that are 
     authorized in H.R. 5743, the Intelligence Authorization Act 
     for Fiscal Year 2013.
       While the Permanent Select Committee on Intelligence 
     continues to authorize these programs and intelligence-
     related activities consistent with the legislative history 
     describing the respective jurisdictions of the Permanent 
     Select Committee on Intelligence and the Committee on 
     Homeland Security (Congressional Record, January 4, 2005, 
     page H25), I agree that certain elements of these activities 
     could raise issues that would benefit from discussion amongst 
     the Committees and the Department of Homeland Security with 
     respect to the overall organization of the Department, and 
     would be glad to discuss such issues.
       As you asked, I will include a copy of your letter to me 
     and this response in the Congressional Record during 
     consideration of H.R. 5743 on the House floor.
           Sincerely,
                                                      Mike Rogers,
     Chairman.
                                  ____

                                         House of Representatives,


                               Committee on Homeland Security,

                                     Washington, DC, May 29, 2012.
     Hon. Mike Rogers,
     Chairman, House Permanent Select Committee on Intelligence, 
         House of Representatives, Washington, DC.
       Dear Chairman Rogers: I am writing in regards to the 
     Intelligence Authorization Act for Fiscal Year 2013 recently 
     approved by the House Permanent Select Committee on 
     Intelligence--specifically, the section of the legislation 
     that authorizes the newly created Homeland Security 
     Intelligence Program (HSIP) at the Department of Homeland 
     Security (DHS).
       As you know, the HSIP, in essence, consists of several 
     activities within the Office of Intelligence and Analysis at 
     DHS that the Director of National Intelligence has deemed 
     should no longer be part of the National Intelligence Program 
     (NIP). While the details of the program are classified, the 
     creation of the HSIP raises new issues that are of mutual 
     interest to our committees and requires further discussion 
     between our staffs and clarification from DHS.
       While those discussions are ongoing and will take time, I 
     understand the importance of advancing this legislation to 
     the House floor in an expeditious manner and I do not, in any 
     way, wish to impede that from happening. However, given that 
     there remains issues that our committees must work through 
     with DHS--including how to best fund, organize, and budget 
     certain HSIP activities--I respectfully request that we 
     formally memorialize our mutual agreement to continue our 
     dialogue regarding the HSIP as legislation moves forward as 
     you approach a conference with the Senate.
       I also request that this letter and your response be 
     included in the House Permanent Select Committee report of 
     this bill and in the Congressional Record during 
     consideration of this measure on the House floor. Thank you 
     for your attention to this matter.
           Sincerely,
                                                    Peter T. King,
     Chairman.

                          ____________________