[Congressional Record Volume 160, Number 147 (Thursday, December 4, 2014)]
[House]
[Pages H8385-H8632]
[...]
Motion Offered by Mr. McKeon
Mr. McKEON. Mr. Speaker, I have a motion at the desk.
The SPEAKER pro tempore. The Clerk will designate the motion.
The text of the motion is as follows:
Mr. McKeon moves that the House concur in the Senate
amendment to H.R. 3979 with an amendment consisting of the
text of Rules Committee Print 113-58 modified by the
amendments printed in part A of House Report 113-646 and the
amendment specified in section 5 of House Resolution 770.
The text of the House amendment to the Senate amendment to the text
is as follows:
[[Page H8388]]
In lieu of the matter proposed to be inserted by the Senate
amendment to H.R. 3979, insert the following:
SECTION 1. SHORT TITLE.
(a) Short Title.--This Act may be cited as the ``Carl Levin
and Howard P. `Buck' McKeon National Defense Authorization
Act for Fiscal Year 2015''.
[...]
SEC. 1052. RESPONSE OF THE DEPARTMENT OF DEFENSE TO
COMPROMISES OF CLASSIFIED INFORMATION.
(a) Findings.--Congress makes the following findings:
(1) Compromises of classified information cause
indiscriminate and long-lasting damage to United States
national security and often have a direct impact on the
safety of warfighters.
(2) In 2010, hundreds of thousands of classified documents
were illegally copied and disclosed across the Internet.
(3) Classified information has been disclosed in numerous
public writings and manuscripts endangering current
operations.
(4) In 2013, nearly 1,700,000 files were downloaded from
United States Government information systems, threatening the
national security of the United States and placing the lives
of United States personnel at extreme risk. The majority of
the information compromised relates to the capabilities,
operations, tactics, techniques, and procedures of the Armed
Forces of the United States, and is the single greatest
quantitative compromise in the history of the United States.
(5) The Department of Defense is taking steps to mitigate
the harm caused by these leaks.
(6) Congress must be kept apprised of the progress of the
mitigation efforts to ensure the protection of the national
security of the United States.
(b) Reports Required.--
(1) Initial report.--Not later than 60 days after the date
of the enactment of this Act, the Secretary of Defense shall
submit to the congressional defense committees a report on
actions taken by the Secretary in response to significant
compromises of classified information. Such report shall
include each of the following:
(A) A description of any changes made to Department of
Defense policies or guidance
[[Page H8450]]
relating to significant compromises of classified
information, including regarding security clearances for
employees of the Department, information technology, and
personnel actions.
(B) An overview of the efforts made by any task force
responsible for the mitigation of such compromises of
classified information.
(C) A description of the resources of the Department that
have been dedicated to efforts relating to such compromises.
(D) A description of the plan of the Secretary to continue
evaluating the damage caused by, and to mitigate the damage
from, such compromises.
(E) A general description and estimate of the anticipated
costs associated with mitigating such compromises.
(2) Updates to report.--During calendar years 2015 and
2016, the Secretary shall submit to the congressional defense
committees quarterly updates to the report required by
paragraph (1). Each such update shall include information
regarding any changes or progress with respect to the matters
covered by such report.
[...]
SEC. 1627. PROHIBITION ON NATIONAL INTELLIGENCE PROGRAM
CONSOLIDATION.
(a) Prohibition.--No amounts authorized to be appropriated
or otherwise made available to the Department of Defense may
be used during the period beginning on the date of the
enactment of this Act and ending on December 31, 2015, to
execute--
(1) the separation of the National Intelligence Program
budget from the Department of Defense budget;
(2) the consolidation of the National Intelligence Program
budget within the Department of Defense budget; or
(3) the establishment of a new appropriations account or
appropriations account structure for the National
Intelligence Program budget.
(b) Definitions.--In this section:
(1) National intelligence program.--The term ``National
Intelligence Program'' has the meaning given the term in
section 3 of the National Security Act of 1947 (50 U.S.C.
3003).
(2) National intelligence program budget.--The term
``National Intelligence Program budget'' means the portions
of the Department of Defense budget designated as part of the
National Intelligence Program.
SEC. 1628. PERSONNEL SECURITY AND INSIDER THREAT.
(a) Report Required.--Not later than March 30, 2015, the
Secretary of Defense shall submit to Congress a report on the
plans of the Department to address--
(1) the adoption of an interim capability to continuously
evaluate the security status of the employees and contractors
of the Department who have been determined eligible for and
granted access to classified information by the Department of
Defense Central Adjudication Facilities;
(2) the use of an interim system to assist in developing
requirements, lessons learned, business rules, privacy
standards, and operational concepts applicable to the
objective automated records checks and continuous evaluation
capability required by the strategy for modernizing personnel
security;
(3) the engineering for an interim system and the objective
automated records checks and continuous evaluation capability
for initial investigations and reinvestigations required by
the strategy for modernizing personnel security to support
automation-assisted insider threat analyses conducted across
the law enforcement, personnel security, human resources,
counterintelligence, physical security, network behavior
monitoring, and cybersecurity activities of all the
components of the Department of Defense, pursuant to
Executive Order 13587;
(4) how competitive processes and open systems designs will
be used to acquire advanced commercial technologies
throughout the life cycle of the objective continuous
evaluation capability required by the strategy for
modernizing personnel security;
(5) how the senior agency official in the Department of
Defense for insider threat detection and prevention will be
supported by experts in counterintelligence, personnel
security, law enforcement, human resources, physical
security, network monitoring, cybersecurity, and privacy and
civil liberties from relevant components of the Department
and experts in information technology, large-scale data
analysis, systems engineering, and program acquisition;
(6) how the senior agency official, in developing the
integrated, automation-assisted insider threat capability,
will be supported by--
(A) the Under Secretary of Defense for Acquisition,
Technology, and Logistics;
(B) the Chief Information Officer of the Department of
Defense; and
(C) the Under Secretary of Defense for Personnel and
Readiness; and
(7) who will be responsible and accountable for managing
the development and fielding of the automation-assisted
insider threat capability.
(b) Inclusion of Gaps.--The report required under
subsection (a) shall include specific gaps in policy and
statute to address the requirements placed on the Department
by section 907(c) of the National Defense Authorization Act
for Fiscal Year 2014 (Public Law 113-66) and Executive Order
13587.
(c) Strategy for Modernizing Personnel Security Defined.--
In this section, the term ``strategy for modernizing
personnel security'' means the strategy developed under
section 907(c) of the National Defense Authorization Act for
Fiscal Year 2014 (Public Law 113-66).
[...]