[Congressional Record Volume 160, Number 147 (Thursday, December 4, 2014)] [House] [Pages H8385-H8632] [...] Motion Offered by Mr. McKeon Mr. McKEON. Mr. Speaker, I have a motion at the desk. The SPEAKER pro tempore. The Clerk will designate the motion. The text of the motion is as follows: Mr. McKeon moves that the House concur in the Senate amendment to H.R. 3979 with an amendment consisting of the text of Rules Committee Print 113-58 modified by the amendments printed in part A of House Report 113-646 and the amendment specified in section 5 of House Resolution 770. The text of the House amendment to the Senate amendment to the text is as follows: [[Page H8388]] In lieu of the matter proposed to be inserted by the Senate amendment to H.R. 3979, insert the following: SECTION 1. SHORT TITLE. (a) Short Title.--This Act may be cited as the ``Carl Levin and Howard P. `Buck' McKeon National Defense Authorization Act for Fiscal Year 2015''. [...] SEC. 1052. RESPONSE OF THE DEPARTMENT OF DEFENSE TO COMPROMISES OF CLASSIFIED INFORMATION. (a) Findings.--Congress makes the following findings: (1) Compromises of classified information cause indiscriminate and long-lasting damage to United States national security and often have a direct impact on the safety of warfighters. (2) In 2010, hundreds of thousands of classified documents were illegally copied and disclosed across the Internet. (3) Classified information has been disclosed in numerous public writings and manuscripts endangering current operations. (4) In 2013, nearly 1,700,000 files were downloaded from United States Government information systems, threatening the national security of the United States and placing the lives of United States personnel at extreme risk. The majority of the information compromised relates to the capabilities, operations, tactics, techniques, and procedures of the Armed Forces of the United States, and is the single greatest quantitative compromise in the history of the United States. (5) The Department of Defense is taking steps to mitigate the harm caused by these leaks. (6) Congress must be kept apprised of the progress of the mitigation efforts to ensure the protection of the national security of the United States. (b) Reports Required.-- (1) Initial report.--Not later than 60 days after the date of the enactment of this Act, the Secretary of Defense shall submit to the congressional defense committees a report on actions taken by the Secretary in response to significant compromises of classified information. Such report shall include each of the following: (A) A description of any changes made to Department of Defense policies or guidance [[Page H8450]] relating to significant compromises of classified information, including regarding security clearances for employees of the Department, information technology, and personnel actions. (B) An overview of the efforts made by any task force responsible for the mitigation of such compromises of classified information. (C) A description of the resources of the Department that have been dedicated to efforts relating to such compromises. (D) A description of the plan of the Secretary to continue evaluating the damage caused by, and to mitigate the damage from, such compromises. (E) A general description and estimate of the anticipated costs associated with mitigating such compromises. (2) Updates to report.--During calendar years 2015 and 2016, the Secretary shall submit to the congressional defense committees quarterly updates to the report required by paragraph (1). Each such update shall include information regarding any changes or progress with respect to the matters covered by such report. [...] SEC. 1627. PROHIBITION ON NATIONAL INTELLIGENCE PROGRAM CONSOLIDATION. (a) Prohibition.--No amounts authorized to be appropriated or otherwise made available to the Department of Defense may be used during the period beginning on the date of the enactment of this Act and ending on December 31, 2015, to execute-- (1) the separation of the National Intelligence Program budget from the Department of Defense budget; (2) the consolidation of the National Intelligence Program budget within the Department of Defense budget; or (3) the establishment of a new appropriations account or appropriations account structure for the National Intelligence Program budget. (b) Definitions.--In this section: (1) National intelligence program.--The term ``National Intelligence Program'' has the meaning given the term in section 3 of the National Security Act of 1947 (50 U.S.C. 3003). (2) National intelligence program budget.--The term ``National Intelligence Program budget'' means the portions of the Department of Defense budget designated as part of the National Intelligence Program. SEC. 1628. PERSONNEL SECURITY AND INSIDER THREAT. (a) Report Required.--Not later than March 30, 2015, the Secretary of Defense shall submit to Congress a report on the plans of the Department to address-- (1) the adoption of an interim capability to continuously evaluate the security status of the employees and contractors of the Department who have been determined eligible for and granted access to classified information by the Department of Defense Central Adjudication Facilities; (2) the use of an interim system to assist in developing requirements, lessons learned, business rules, privacy standards, and operational concepts applicable to the objective automated records checks and continuous evaluation capability required by the strategy for modernizing personnel security; (3) the engineering for an interim system and the objective automated records checks and continuous evaluation capability for initial investigations and reinvestigations required by the strategy for modernizing personnel security to support automation-assisted insider threat analyses conducted across the law enforcement, personnel security, human resources, counterintelligence, physical security, network behavior monitoring, and cybersecurity activities of all the components of the Department of Defense, pursuant to Executive Order 13587; (4) how competitive processes and open systems designs will be used to acquire advanced commercial technologies throughout the life cycle of the objective continuous evaluation capability required by the strategy for modernizing personnel security; (5) how the senior agency official in the Department of Defense for insider threat detection and prevention will be supported by experts in counterintelligence, personnel security, law enforcement, human resources, physical security, network monitoring, cybersecurity, and privacy and civil liberties from relevant components of the Department and experts in information technology, large-scale data analysis, systems engineering, and program acquisition; (6) how the senior agency official, in developing the integrated, automation-assisted insider threat capability, will be supported by-- (A) the Under Secretary of Defense for Acquisition, Technology, and Logistics; (B) the Chief Information Officer of the Department of Defense; and (C) the Under Secretary of Defense for Personnel and Readiness; and (7) who will be responsible and accountable for managing the development and fielding of the automation-assisted insider threat capability. (b) Inclusion of Gaps.--The report required under subsection (a) shall include specific gaps in policy and statute to address the requirements placed on the Department by section 907(c) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) and Executive Order 13587. (c) Strategy for Modernizing Personnel Security Defined.-- In this section, the term ``strategy for modernizing personnel security'' means the strategy developed under section 907(c) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66). [...]