[Congressional Record Volume 160, Number 150 (Wednesday, December 10, 2014)] [House] [Pages H8951-H8962] INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2014 AND 2015 Mr. ROGERS of Michigan. Mr. Speaker, I move to suspend the rules and concur in the Senate amendment to the bill (H.R. 4681) to authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes. The Clerk read the title of the bill. The text of the Senate amendment is as follows: Senate amendment: Strike all after the enacting clause and insert the following: SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) Short Title.--This Act may be cited as the ``Intelligence Authorization Act for Fiscal Year 2015''. [[Page H8952]] (b) Table of Contents.--The table of contents for this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. Sec. 3. Budgetary effects. TITLE I--INTELLIGENCE ACTIVITIES Sec. 101. Authorization of appropriations. Sec. 102. Classified Schedule of Authorizations. Sec. 103. Personnel ceiling adjustments. Sec. 104. Intelligence Community Management Account. TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 201. Authorization of appropriations. TITLE III--GENERAL PROVISIONS Subtitle A--General Matters Sec. 301. Increase in employee compensation and benefits authorized by law. Sec. 302. Restriction on conduct of intelligence activities. Sec. 303. National intelligence strategy. Sec. 304. Software licensing. Sec. 305. Reporting of certain employment activities by former intelligence officers and employees. Sec. 306. Inclusion of Predominantly Black Institutions in intelligence officer training program. Sec. 307. Management and oversight of financial intelligence. Sec. 308. Analysis of private sector policies and procedures for countering insider threats. Sec. 309. Procedures for the retention of incidentally acquired communications. Sec. 310. Clarification of limitation of review to retaliatory security clearance or access determinations. Sec. 311. Feasibility study on consolidating classified databases of cyber threat indicators and malware samples. Sec. 312. Sense of Congress on cybersecurity threat and cybercrime cooperation with Ukraine. Sec. 313. Replacement of locally employed staff serving at United States diplomatic facilities in the Russian Federation. Sec. 314. Inclusion of Sensitive Compartmented Information Facilities in United States diplomatic facilities in the Russian Federation and adjacent countries. Subtitle B--Reporting Sec. 321. Report on declassification process. Sec. 322. Report on intelligence community efficient spending targets. Sec. 323. Annual report on violations of law or executive order. Sec. 324. Annual report on intelligence activities of the Department of Homeland Security. Sec. 325. Report on political prison camps in North Korea. Sec. 326. Assessment of security of domestic oil refineries and related rail transportation infrastructure. Sec. 327. Enhanced contractor level assessments for the intelligence community. Sec. 328. Assessment of the efficacy of memoranda of understanding to facilitate intelligence-sharing. Sec. 329. Report on foreign man-made electromagnetic pulse weapons. Sec. 330. Report on United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda and its affiliated or associated groups. Sec. 331. Feasibility study on retraining veterans in cybersecurity. SEC. 2. DEFINITIONS. In this Act: (1) Congressional intelligence committees.--The term ``congressional intelligence committees'' means-- (A) the Select Committee on Intelligence of the Senate; and (B) the Permanent Select Committee on Intelligence of the House of Representatives. (2) Intelligence community.--The term ``intelligence community'' has the meaning given that term in section 3(4) of the National Security Act of 1947 (50 U.S.C. 3003(4)). SEC. 3. BUDGETARY EFFECTS. The budgetary effects of this Act, for the purpose of complying with the Statutory Pay-As-You-Go-Act of 2010, shall be determined by reference to the latest statement titled ``Budgetary Effects of PAYGO Legislation'' for this Act, submitted for printing in the Congressional Record by the Chairman of the Senate Budget Committee, provided that such statement has been submitted prior to the vote on passage. TITLE I--INTELLIGENCE ACTIVITIES SEC. 101. AUTHORIZATION OF APPROPRIATIONS. Funds are hereby authorized to be appropriated for fiscal year 2015 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government: (1) The Office of the Director of National Intelligence. (2) The Central Intelligence Agency. (3) The Department of Defense. (4) The Defense Intelligence Agency. (5) The National Security Agency. (6) The Department of the Army, the Department of the Navy, and the Department of the Air Force. (7) The Coast Guard. (8) The Department of State. (9) The Department of the Treasury. (10) The Department of Energy. (11) The Department of Justice. (12) The Federal Bureau of Investigation. (13) The Drug Enforcement Administration. (14) The National Reconnaissance Office. (15) The National Geospatial-Intelligence Agency. (16) The Department of Homeland Security. SEC. 102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS. (a) Specifications of Amounts and Personnel Levels.--The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2015, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations prepared to accompany the bill H.R. 4681 of the One Hundred Thirteenth Congress. (b) Availability of Classified Schedule of Authorizations.-- (1) Availability.--The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President. (2) Distribution by the president.--Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations, or of appropriate portions of the Schedule, within the executive branch. (3) Limits on disclosure.--The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except-- (A) as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C. 3306(a)); (B) to the extent necessary to implement the budget; or (C) as otherwise required by law. SEC. 103. PERSONNEL CEILING ADJUSTMENTS. (a) Authority for Increases.--The Director of National Intelligence may authorize employment of civilian personnel in excess of the number authorized for fiscal year 2015 by the classified Schedule of Authorizations referred to in section 102(a) if the Director of National Intelligence determines that such action is necessary to the performance of important intelligence functions, except that the number of personnel employed in excess of the number authorized under such section may not, for any element of the intelligence community, exceed 3 percent of the number of civilian personnel authorized under such Schedule for such element. (b) Treatment of Certain Personnel.--The Director of National Intelligence shall establish guidelines that govern, for each element of the intelligence community, the treatment under the personnel levels authorized under section 102(a), including any exemption from such personnel levels, of employment or assignment in-- (1) a student program, trainee program, or similar program; (2) a reserve corps or as a reemployed annuitant; or (3) details, joint duty, or long term, full-time training. (c) Notice to Congressional Intelligence Committees.--The Director of National Intelligence shall notify the congressional intelligence committees in writing at least 15 days prior to each exercise of an authority described in subsection (a). SEC. 104. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT. (a) Authorization of Appropriations.--There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2015 the sum of $507,400,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2016. (b) Authorized Personnel Levels.--The elements within the Intelligence Community Management Account of the Director of National Intelligence are authorized 794 positions as of September 30, 2015. Personnel serving in such elements may be permanent employees of the Office of the Director of National Intelligence or personnel detailed from other elements of the United States Government. (c) Classified Authorizations.-- (1) Authorization of appropriations.--In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Community Management Account for fiscal year 2015 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts for advanced research and development shall remain available until September 30, 2016. (2) Authorization of personnel.--In addition to the personnel authorized by subsection (b) for elements of the Intelligence Community Management Account as of September 30, 2015, there are authorized such additional personnel for the Community Management Account as of that date as are specified in the classified Schedule of Authorizations referred to in section 102(a). TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM SEC. 201. AUTHORIZATION OF APPROPRIATIONS. There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund for fiscal year 2015 the sum of $514,000,000. [[Page H8953]] TITLE III--GENERAL PROVISIONS Subtitle A--General Matters SEC. 301. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS AUTHORIZED BY LAW. Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law. SEC. 302. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES. The authorization of appropriations by this Act shall not be deemed to constitute authority for the conduct of any intelligence activity which is not otherwise authorized by the Constitution or the laws of the United States. SEC. 303. NATIONAL INTELLIGENCE STRATEGY. (a) In General.--Title I of the National Security Act of 1947 (50 U.S.C. 3021 et seq.) is amended by inserting after section 108 the following: ``SEC. 108A. NATIONAL INTELLIGENCE STRATEGY. ``(a) In General.--Beginning in 2017, and once every 4 years thereafter, the Director of National Intelligence shall develop a comprehensive national intelligence strategy to meet national security objectives for the following 4-year period, or a longer period, if appropriate. ``(b) Requirements.--Each national intelligence strategy required by subsection (a) shall-- ``(1) delineate a national intelligence strategy consistent with-- ``(A) the most recent national security strategy report submitted pursuant to section 108; ``(B) the strategic plans of other relevant departments and agencies of the United States; and ``(C) other relevant national-level plans; ``(2) address matters related to national and military intelligence, including counterintelligence; ``(3) identify the major national security missions that the intelligence community is currently pursuing and will pursue in the future to meet the anticipated security environment; ``(4) describe how the intelligence community will utilize personnel, technology, partnerships, and other capabilities to pursue the major national security missions identified in paragraph (3); ``(5) assess current, emerging, and future threats to the intelligence community, including threats from foreign intelligence and security services and insider threats; ``(6) outline the organizational roles and missions of the elements of the intelligence community as part of an integrated enterprise to meet customer demands for intelligence products, services, and support; ``(7) identify sources of strategic, institutional, programmatic, fiscal, and technological risk; and ``(8) analyze factors that may affect the intelligence community's performance in pursuing the major national security missions identified in paragraph (3) during the following 10-year period. ``(c) Submission to Congress.--The Director of National Intelligence shall submit to the congressional intelligence committees a report on each national intelligence strategy required by subsection (a) not later than 45 days after the date of the completion of such strategy.''. (b) Table of Contents Amendments.--The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 108 the following new item: ``Sec. 108A. National intelligence strategy.''. SEC. 304. SOFTWARE LICENSING. Section 109 of the National Security Act of 1947 (50 U.S.C. 3044) is amended-- (1) in subsection (a)(2), by striking ``usage; and'' and inserting ``usage, including-- ``(A) increasing the centralization of the management of software licenses; ``(B) increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics; ``(C) analyzing software license data to inform investment decisions; and ``(D) providing appropriate personnel with sufficient software licenses management training; and''; (2) in subsection (b)-- (A) in paragraph (1), by striking ``; and'' and inserting a semicolon; (B) in paragraph (2), by striking ``usage.'' and inserting ``usage, including-- ``(A) increasing the centralization of the management of software licenses; ``(B) increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics; ``(C) analyzing software license data to inform investment decisions; and ``(D) providing appropriate personnel with sufficient software licenses management training; and''; and (C) by adding at the end the following new paragraph: ``(3) based on the assessment required under paragraph (2), make such recommendations with respect to software procurement and usage to the Director of National Intelligence as the Chief Information Officer considers appropriate.''; and (3) by adding at the end the following new subsection: ``(d) Implementation of Recommendations.--Not later than 180 days after the date on which the Director of National Intelligence receives recommendations from the Chief Information Officer of the Intelligence Community in accordance with subsection (b)(3), the Director of National Intelligence shall, to the extent practicable, issue guidelines for the intelligence community on software procurement and usage based on such recommendations.''. SEC. 305. REPORTING OF CERTAIN EMPLOYMENT ACTIVITIES BY FORMER INTELLIGENCE OFFICERS AND EMPLOYEES. (a) Restriction.--Title III of the National Security Act of 1947 (50 U.S.C. 3071 et seq.) is amended by inserting after section 303 the following new section: ``SEC. 304. REPORTING OF CERTAIN EMPLOYMENT ACTIVITIES BY FORMER INTELLIGENCE OFFICERS AND EMPLOYEES. ``(a) In General.--The head of each element of the intelligence community shall issue regulations requiring each employee of such element occupying a covered position to sign a written agreement requiring the regular reporting of covered employment to the head of such element. ``(b) Agreement Elements.--The regulations required under subsection (a) shall provide that an agreement contain provisions requiring each employee occupying a covered position to, during the two-year period beginning on the date on which such employee ceases to occupy such covered position-- ``(1) report covered employment to the head of the element of the intelligence community that employed such employee in such covered position upon accepting such covered employment; and ``(2) annually (or more frequently if the head of such element considers it appropriate) report covered employment to the head of such element. ``(c) Definitions.--In this section: ``(1) Covered employment.--The term `covered employment' means direct employment by, representation of, or the provision of advice relating to national security to the government of a foreign country or any person whose activities are directly or indirectly supervised, directed, controlled, financed, or subsidized, in whole or in major part, by any government of a foreign country. ``(2) Covered position.--The term `covered position' means a position within an element of the intelligence community that, based on the level of access of a person occupying such position to information regarding sensitive intelligence sources or methods or other exceptionally sensitive matters, the head of such element determines should be subject to the requirements of this section. ``(3) Government of a foreign country.--The term `government of a foreign country' has the meaning given the term in section 1(e) of the Foreign Agents Registration Act of 1938 (22 U.S.C. 611(e)).''. (b) Regulations and Certification.-- (1) Regulations.--Not later than 90 days after the date of the enactment of this Act, the head of each element of the intelligence community shall issue the regulations required under section 304 of the National Security Act of 1947, as added by subsection (a) of this section. (2) Certification.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees-- (A) a certification that each head of an element of the intelligence community has prescribed the regulations required under section 304 of the National Security Act of 1947, as added by subsection (a) of this section; or (B) if the Director is unable to submit the certification described under subparagraph (A), an explanation as to why the Director is unable to submit such certification, including a designation of which heads of an element of the intelligence community have prescribed the regulations required under such section 304 and which have not. (c) Table of Contents Amendments.--The table of contents in the first section of the National Security Act of 1947 is amended-- (1) by striking the second item relating to section 302 (Under Secretaries and Assistant Secretaries) and the items relating to sections 304, 305, and 306; and (2) by inserting after the item relating to section 303 the following new item: ``Sec. 304. Reporting of certain employment activities by former intelligence officers and employees.''. SEC. 306. INCLUSION OF PREDOMINANTLY BLACK INSTITUTIONS IN INTELLIGENCE OFFICER TRAINING PROGRAM. Section 1024 of the National Security Act of 1947 (50 U.S.C. 3224) is amended-- (1) in subsection (c)(1), by inserting ``and Predominantly Black Institutions'' after ``universities''; and (2) in subsection (g)-- (A) by redesignating paragraph (4) as paragraph (5); and (B) by inserting after paragraph (3) the following new paragraph: ``(4) Predominantly black institution.--The term `Predominantly Black Institution' has the meaning given the term in section 318 of the Higher education Act of 1965 (20 U.S.C. 1059e).''. SEC. 307. MANAGEMENT AND OVERSIGHT OF FINANCIAL INTELLIGENCE. (a) Requirement for Plan.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall prepare a plan for management of the elements of the intelligence community that carry out financial intelligence activities. (b) Contents of Plan.--The plan required by subsection (a) shall establish a governance framework, procedures for sharing and harmonizing the acquisition and use of financial analytic tools, standards for quality of analytic products, procedures for oversight and evaluation of resource allocations associated with the joint development of information sharing efforts [[Page H8954]] and tools, and an education and training model for elements of the intelligence community that carry out financial intelligence activities. (c) Briefing to Congress.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall brief the congressional intelligence committees on the actions the Director proposes to implement the plan required by subsection (a). SEC. 308. ANALYSIS OF PRIVATE SECTOR POLICIES AND PROCEDURES FOR COUNTERING INSIDER THREATS. (a) Analysis.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the National Counterintelligence Executive, shall submit to the congressional intelligence committees an analysis of private sector policies and procedures for countering insider threats. (b) Content.--The analysis required by subsection (a) shall include-- (1) a review of whether and how the intelligence community could utilize private sector hiring and human resources best practices to screen, vet, and validate the credentials, capabilities, and character of applicants for positions involving trusted access to sensitive information; (2) an analysis of private sector policies for holding supervisors and subordinates accountable for violations of established security protocols and whether the intelligence community should adopt similar policies for positions of trusted access to sensitive information; (3) an assessment of the feasibility and advisability of applying mandatory leave policies, similar to those endorsed by the Federal Deposit Insurance Corporation and the Securities and Exchange Commission to identify fraud in the financial services industry, to certain positions within the intelligence community; and (4) recommendations for how the intelligence community could utilize private sector risk indices, such as credit risk scores, to make determinations about employee access to sensitive information. SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED COMMUNICATIONS. (a) Definitions.--In this section: (1) Covered communication.--The term ``covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage. (2) Head of an element of the intelligence community.--The term ``head of an element of the intelligence community'' means, as appropriate-- (A) the head of an element of the intelligence community; or (B) the head of the department or agency containing such element. (3) United states person.--The term ``United States person'' has the meaning given that term in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801). (b) Procedures for Covered Communications.-- (1) Requirement to adopt.--Not later than 2 years after the date of the enactment of this Act each head of an element of the intelligence community shall adopt procedures approved by the Attorney General for such element that ensure compliance with the requirements of paragraph (3). (2) Coordination and approval.--The procedures required by paragraph (1) shall be-- (A) prepared in coordination with the Director of National Intelligence; and (B) approved by the Attorney General prior to issuance. (3) Procedures.-- (A) Application.--The procedures required by paragraph (1) shall apply to any intelligence collection activity not otherwise authorized by court order (including an order or certification issued by a court established under subsection (a) or (b) of section 103 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or similar legal process that is reasonably anticipated to result in the acquisition of a covered communication to or from a United States person and shall permit the acquisition, retention, and dissemination of covered communications subject to the limitation in subparagraph (B). (B) Limitation on retention.--A covered communication shall not be retained in excess of 5 years, unless-- (i) the communication has been affirmatively determined, in whole or in part, to constitute foreign intelligence or counterintelligence or is necessary to understand or assess foreign intelligence or counterintelligence; (ii) the communication is reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency; (iii) the communication is enciphered or reasonably believed to have a secret meaning; (iv) all parties to the communication are reasonably believed to be non-United States persons; (v) retention is necessary to protect against an imminent threat to human life, in which case both the nature of the threat and the information to be retained shall be reported to the congressional intelligence committees not later than 30 days after the date such retention is extended under this clause; (vi) retention is necessary for technical assurance or compliance purposes, including a court order or discovery obligation, in which case access to information retained for technical assurance or compliance purposes shall be reported to the congressional intelligence committees on an annual basis; or (vii) retention for a period in excess of 5 years is approved by the head of the element of the intelligence community responsible for such retention, based on a determination that retention is necessary to protect the national security of the United States, in which case the head of such element shall provide to the congressional intelligence committees a written certification describing-- (I) the reasons extended retention is necessary to protect the national security of the United States; (II) the duration for which the head of the element is authorizing retention; (III) the particular information to be retained; and (IV) the measures the element of the intelligence community is taking to protect the privacy interests of United States persons or persons located inside the United States. SEC. 310. CLARIFICATION OF LIMITATION OF REVIEW TO RETALIATORY SECURITY CLEARANCE OR ACCESS DETERMINATIONS. Section 3001(b)(7) of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 3341(b)(7)) is amended-- (1) in the matter preceding subparagraph (A), by striking ``2014--'' and inserting ``2014, and consistent with subsection (j)--''; (2) in subparagraph (A), by striking ``to appeal a determination to suspend or revoke a security clearance or access to classified information'' and inserting ``alleging reprisal for having made a protected disclosure (provided the individual does not disclose classified information or other information contrary to law) to appeal any action affecting an employee's access to classified information''; and (3) in subparagraph (B), by striking ``information,'' inserting ``information following a protected disclosure,''. SEC. 311. FEASIBILITY STUDY ON CONSOLIDATING CLASSIFIED DATABASES OF CYBER THREAT INDICATORS AND MALWARE SAMPLES. (a) In General.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Homeland Security, the Director of the National Security Agency, the Director of the Central Intelligence Agency, and the Director of the Federal Bureau of Investigation, shall conduct a feasibility study on consolidating classified databases of cyber threat indicators and malware samples in the intelligence community. (b) Elements.--The feasibility study required by subsection (a) shall include the following: (1) An inventory of classified databases of cyber threat indicators and malware samples in the intelligence community. (2) An assessment of actions that could be carried out to consolidate such databases to achieve the greatest possible information sharing within the intelligence community and cost savings for the Federal Government. (3) An assessment of any impediments to such consolidation. (4) An assessment of whether the Intelligence Community Information Technology Enterprise can support such consolidation. (c) Report to Congress.--Not later than 30 days after the date on which the Director of National Intelligence completes the feasibility study required by subsection (a), the Director shall submit to the congressional intelligence committees a written report that summarizes the feasibility study, including the information required under subsection (b). SEC. 312. SENSE OF CONGRESS ON CYBERSECURITY THREAT AND CYBERCRIME COOPERATION WITH UKRAINE. It is the sense of Congress that-- (1) cooperation between the intelligence and law enforcement agencies of the United States and Ukraine should be increased to improve cybersecurity policies between these two countries; (2) the United States should pursue improved extradition procedures among the Governments of the United States, Ukraine, and other countries from which cybercriminals target United States citizens and entities; (3) the President should-- (A) initiate a round of formal United States-Ukraine bilateral talks on cybersecurity threat and cybercrime cooperation, with additional multilateral talks that include other law enforcement partners such as Europol and Interpol; and (B) work to obtain a commitment from the Government of Ukraine to end cybercrime directed at persons outside Ukraine and to work with the United States and other allies to deter and convict known cybercriminals; (4) the President should establish a capacity building program with the Government of Ukraine, which could include-- (A) a joint effort to improve cyber capacity building, including intelligence and law enforcement services in Ukraine; (B) sending United States law enforcement agents to aid law enforcement agencies in Ukraine in investigating cybercrimes; and (C) agreements to improve communications networks to enhance law enforcement cooperation, such as a hotline directly connecting law enforcement agencies in the United States and Ukraine; and (5) the President should establish and maintain an intelligence and law enforcement cooperation scorecard with metrics designed to measure the number of instances that intelligence and law enforcement agencies in the United States request assistance from intelligence and law enforcement agencies in Ukraine and the number and type of responses received to such requests. SEC. 313. REPLACEMENT OF LOCALLY EMPLOYED STAFF SERVING AT UNITED STATES DIPLOMATIC FACILITIES IN THE RUSSIAN FEDERATION. (a) Employment Requirement.-- (1) In general.--The Secretary of State shall ensure that, not later than one year after the [[Page H8955]] date of the enactment of this Act, every supervisory position at a United States diplomatic facility in the Russian Federation shall be occupied by a citizen of the United States who has passed, and shall be subject to, a thorough background check. (2) Extension.--The Secretary of State may extend the deadline under paragraph (1) for up to one year by providing advance written notification and justification of such extension to the appropriate congressional committees. (3) Progress report.--Not later than 180 days after the date of the enactment of this Act, the Secretary of State shall submit to the appropriate congressional committees a report on progress made toward meeting the employment requirement under paragraph (1). (b) Plan for Reduced Use of Locally Employed Staff.--Not later than 180 days after the date of the enactment of this Act, the Secretary of State, in coordination with other appropriate government agencies, shall submit to the appropriate congressional committees a plan to further reduce the reliance on locally employed staff in United States diplomatic facilities in the Russian Federation. The plan shall, at a minimum, include cost estimates, timelines, and numbers of employees to be replaced. (c) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means-- (1) the congressional intelligence committees; (2) the Committee on Armed Services, the Committee on Foreign Relations, and the Committee on Appropriations of the Senate; and (3) the Committee on Armed Services, the Committee on Foreign Affairs, and the Committee on Appropriations of the House of Representatives. (d) Rule of Construction.--Nothing in this section shall be construed to infringe on the power of the President, by and with the advice and consent of the Senate, to appoint ambassadors, other public ministers, and consuls.'' SEC. 314. INCLUSION OF SENSITIVE COMPARTMENTED INFORMATION FACILITIES IN UNITED STATES DIPLOMATIC FACILITIES IN THE RUSSIAN FEDERATION AND ADJACENT COUNTRIES. (a) Sensitive Compartmented Information Facility Requirement.--Each United States diplomatic facility that, after the date of the enactment of this Act, is constructed in, or undergoes a construction upgrade in, the Russian Federation, any country that shares a land border with the Russian Federation, or any country that is a former member of the Soviet Union shall be constructed to include a Sensitive Compartmented Information Facility. (b) National Security Waiver.--The Secretary of State may waive the requirement under subsection (a) if the Secretary determines that such waiver is in the national security interest of the United States and submits a written justification to the appropriate congressional committees not later than 180 days before exercising such waiver. (c) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means-- (1) the congressional intelligence committees; (2) the Committee on Armed Services, the Committee on Foreign Relations, and the Committee on Appropriations of the Senate; and (3) the Committee on Armed Services, the Committee on Foreign Affairs, and the Committee on Appropriations of the House of Representatives. Subtitle B--Reporting SEC. 321. REPORT ON DECLASSIFICATION PROCESS. Not later than December 31, 2016, the Director of National Intelligence shall submit to Congress a report describing-- (1) proposals to improve the declassification process throughout the intelligence community; and (2) steps the intelligence community could take, or legislation that may be necessary, to enable the National Declassification Center to better accomplish the missions assigned to the Center by Executive Order No. 13526 (75 Fed. Reg. 707). SEC. 322. REPORT ON INTELLIGENCE COMMUNITY EFFICIENT SPENDING TARGETS. (a) In General.--Not later than April 1, 2016, and April 1, 2017, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the status and effectiveness of efforts to reduce administrative costs for the intelligence community during the preceding year. (b) Elements.--Each report under subsection (a) shall include for each element of the intelligence community the following: (1) A description of the status and effectiveness of efforts to devise alternatives to government travel and promote efficient travel spending, such as teleconferencing and video conferencing. (2) A description of the status and effectiveness of efforts to limit costs related to hosting and attending conferences. (3) A description of the status and effectiveness of efforts to assess information technology inventories and usage, and establish controls, to reduce costs related to underutilized information technology equipment, software, or services. (4) A description of the status and effectiveness of efforts to limit the publication and printing of hard copy documents. (5) A description of the status and effectiveness of efforts to improve the performance of Federal fleet motor vehicles and limit executive transportation. (6) A description of the status and effectiveness of efforts to limit the purchase of extraneous promotional items, such as plaques, clothing, and commemorative items. (7) A description of the status and effectiveness of efforts to consolidate and streamline workforce training programs to focus on the highest priority workforce and mission needs. (8) Such other matters relating to efforts to reduce intelligence community administrative costs as the Director may specify for purposes of this section. SEC. 323. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER. (a) In General.--Title V of the National Security Act of 1947 (50 U.S.C. 3091 et seq.) is amended by adding at the end the following: ``SEC. 511. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER. ``(a) Annual Reports Required.--The Director of National Intelligence shall annually submit to the congressional intelligence committees a report on violations of law or executive order relating to intelligence activities by personnel of an element of the intelligence community that were identified during the previous calendar year. ``(b) Elements.--Each report submitted under subsection (a) shall, consistent with the need to preserve ongoing criminal investigations, include a description of, and any action taken in response to, any violation of law or executive order (including Executive Order No. 12333 (50 U.S.C. 3001 note)) relating to intelligence activities committed by personnel of an element of the intelligence community in the course of the employment of such personnel that, during the previous calendar year, was-- ``(1) determined by the director, head, or general counsel of any element of the intelligence community to have occurred; ``(2) referred to the Department of Justice for possible criminal prosecution; or ``(3) substantiated by the inspector general of any element of the intelligence community.''. (b) Initial Report.--The first report required under section 511 of the National Security Act of 1947, as added by subsection (a), shall be submitted not later than one year after the date of the enactment of this Act. (c) Guidelines.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the head of each element of the intelligence community, shall-- (1) issue guidelines to carry out section 511 of the National Security Act of 1947, as added by subsection (a); and (2) submit such guidelines to the congressional intelligence committees. (d) Table of Contents Amendment.--The table of sections in the first section of the National Security Act of 1947 is amended by adding after the item relating to section 510 the following new item: ``Sec. 511. Annual report on violations of law or executive order.''. (e) Rule of Construction.--Nothing in this section or the amendments made by this section shall be construed to alter any requirement existing on the date of the enactment of this Act to submit a report under any provision of law. SEC. 324. ANNUAL REPORT ON INTELLIGENCE ACTIVITIES OF THE DEPARTMENT OF HOMELAND SECURITY. (a) In General.--For each fiscal year and along with the budget materials submitted in support of the budget of the Department of Homeland Security pursuant to section 1105(a) of title 31, United States Code, the Under Secretary for Intelligence and Analysis of the Department shall submit to the congressional intelligence committees a report for such fiscal year on each intelligence activity of each intelligence component of the Department, as designated by the Under Secretary, that includes the following: (1) The amount of funding requested for each such intelligence activity. (2) The number of full-time employees funded to perform each such intelligence activity. (3) The number of full-time contractor employees (or the equivalent of full-time in the case of part-time contractor employees) funded to perform or in support of each such intelligence activity. (4) A determination as to whether each such intelligence activity is predominantly in support of national intelligence or departmental missions. (5) The total number of analysts of the Intelligence Enterprise of the Department that perform-- (A) strategic analysis; or (B) operational analysis. (b) Feasibility and Advisability Report.--Not later than 120 days after the date of the enactment of this Act, the Secretary of Homeland Security, acting through the Under Secretary for Intelligence and Analysis, shall submit to the congressional intelligence committees a report that-- (1) examines the feasibility and advisability of including the budget request for all intelligence activities of each intelligence component of the Department that predominantly support departmental missions, as designated by the Under Secretary for Intelligence and Analysis, in the Homeland Security Intelligence Program; and (2) includes a plan to enhance the coordination of department-wide intelligence activities to achieve greater efficiencies in the performance of the Department of Homeland Security intelligence functions. (c) Intelligence Component of the Department.--In this section, the term ``intelligence component of the Department'' has the meaning given that term in section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101). SEC. 325. REPORT ON POLITICAL PRISON CAMPS IN NORTH KOREA. (a) In General.--The Director of National Intelligence, in consultation with the Secretary of State, shall submit to the congressional intelligence committees, the Committee on Foreign Relations of the Senate, and the Committee on Foreign Affairs of the House of Representatives a report on political prison camps in North Korea. [[Page H8956]] (b) Elements.--The report required by subsection (a) shall-- (1) describe the actions the United States is taking to support implementation of the recommendations of the United Nations Commission of Inquiry on Human Rights in the Democratic People's Republic of Korea, including the eventual establishment of a tribunal to hold individuals accountable for abuses; and (2) include, with respect to each political prison camp in North Korea to the extent information is available-- (A) the estimated prisoner population of each such camp; (B) the geographical coordinates of each such camp; (C) the reasons for confinement of the prisoners at each such camp; (D) a description of the primary industries and products made at each such camp, and the end users of any goods produced in such camp; (E) information regarding involvement of any non-North Korean entity or individual involved in the operations of each such camp, including as an end user or source of any good or products used in, or produced by, in such camp; (F) information identifying individuals and agencies responsible for conditions in each such camp at all levels of the Government of North Korea; (G) a description of the conditions under which prisoners are confined, with respect to the adequacy of food, shelter, medical care, working conditions, and reports of ill- treatment of prisoners, at each such camp; and (H) unclassified imagery, including satellite imagery, of each such camp. (c) Form.--The report required by subsection (a) shall be submitted in an unclassified form and may include a classified annex if necessary. SEC. 326. ASSESSMENT OF SECURITY OF DOMESTIC OIL REFINERIES AND RELATED RAIL TRANSPORTATION INFRASTRUCTURE. (a) Assessment.--The Under Secretary of Homeland Security for Intelligence and Analysis shall conduct an intelligence assessment of the security of domestic oil refineries and related rail transportation infrastructure. (b) Submission.--Not later than 180 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis shall submit to the congressional intelligence committees-- (1) the results of the assessment required under subsection (a); and (2) any recommendations with respect to intelligence sharing or intelligence collection to improve the security of domestic oil refineries and related rail transportation infrastructure to protect the communities surrounding such refineries or such infrastructure from potential harm that the Under Secretary considers appropriate. SEC. 327. ENHANCED CONTRACTOR LEVEL ASSESSMENTS FOR THE INTELLIGENCE COMMUNITY. Section 506B(c) of the National Security Act of 1947 (50 U.S.C. 3098(c)) is amended-- (1) in paragraph (11), by striking ``or contracted''; (2) by redesignating paragraph (12) as paragraph (13); and (3) by inserting after paragraph (11) the following: ``(12) The best estimate of the number of intelligence collectors and analysts contracted by each element of the intelligence community and a description of the functions performed by such contractors.''. SEC. 328. ASSESSMENT OF THE EFFICACY OF MEMORANDA OF UNDERSTANDING TO FACILITATE INTELLIGENCE- SHARING. Not later than 90 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis, in consultation with the Director of the Federal Bureau of Investigation and the Program Manager of the Information Sharing Environment, shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, the Committee on Homeland Security of the House of Representatives, the Committee on the Judiciary of the Senate, and the Committee on the Judiciary of the House of Representatives an assessment of the efficacy of the memoranda of understanding signed between Federal, State, local, tribal, and territorial agencies to facilitate intelligence-sharing within and separate from the Joint Terrorism Task Force. Such assessment shall include-- (1) any language within such memoranda of understanding that prohibited or may be construed to prohibit intelligence- sharing between Federal, State, local, tribal, and territorial agencies; and (2) any recommendations for memoranda of understanding to better facilitate intelligence-sharing between Federal, State, local, tribal, and territorial agencies. SEC. 329. REPORT ON FOREIGN MAN-MADE ELECTROMAGNETIC PULSE WEAPONS. (a) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Armed Services of the Senate, and the Committee on Armed Services of the House of Representatives a report on the threat posed by man-made electromagnetic pulse weapons to United States interests through 2025, including threats from foreign countries and foreign non-State actors. (b) Form.--The report required under subsection (a) shall be submitted in unclassified form, but may include a classified annex. SEC. 330. REPORT ON UNITED STATES COUNTERTERRORISM STRATEGY TO DISRUPT, DISMANTLE, AND DEFEAT AL-QAEDA AND ITS AFFILIATED OR ASSOCIATED GROUPS. (a) Report.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a comprehensive report on the United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda and its affiliated or associated groups. (2) Coordination.--The report required by paragraph (1) shall be prepared in coordination with the Secretary of State, the Secretary of the Treasury, the Attorney General, and the Secretary of Defense, and the head of any other department or agency of the United States Government that has responsibility for activities directed at combating al-Qaeda and its affiliated or associated groups. (3) Elements.--The report required by paragraph (1) shall include the following: (A) A definition of-- (i) al-Qaeda core, including a list of which known individuals constitute al-Qaeda core; (ii) an affiliated group of al-Qaeda, including a list of which known groups constitute an affiliate group of al-Qaeda; (iii) an associated group of al-Qaeda, including a list of which known groups constitute an associated group of al- Qaeda; and (iv) a group aligned with al-Qaeda, including a description of what actions a group takes or statements it makes that qualify it as a group aligned with al-Qaeda. (B) A list of any other group, including the organization that calls itself the Islamic State (also known as ``ISIS'' or ``ISIL''), that adheres to the core mission of al-Qaeda, or who espouses the same violent jihad ideology as al-Qaeda. (C) An assessment of the relationship between al-Qaeda core and the groups referred to in subparagraph (B). (D) An assessment of the strengthening or weakening of al- Qaeda and the groups referred to in subparagraph (B) from January 1, 2010, to the present, including a description of the metrics that are used to assess strengthening or weakening and an assessment of the relative increase or decrease in violent attacks attributed to such entities. (E) An assessment of whether or not an individual can be a member of al-Qaeda core if such individual is not located in Afghanistan or Pakistan. (F) An assessment of whether or not an individual can be a member of al-Qaeda core as well as a member of a group referred to in subparagraph (B). (G) A definition of defeat of core al-Qaeda. (H) An assessment of the extent or coordination, command, and control between core al-Qaeda and the groups referred to in subparagraph (B), specifically addressing each such group. (I) An assessment of the effectiveness of counterterrorism operations against core al-Qaeda and the groups referred to in subparagraph (B), and whether such operations have had a sustained impact on the capabilities and effectiveness of core al-Qaeda and such groups. (4) Form.--The report required by paragraph (1) shall be submitted in unclassified form, but may include a classified annex. (b) Appropriate Committees of Congress Defined.--In this section, the term ``appropriate committees of Congress'' means-- (1) the congressional intelligence committees; (2) the Committee on Foreign Relations and the Committee on Armed Services of the Senate; and (3) the Committee on Foreign Affairs and the Committee on Armed Services of the House of Representatives. SEC. 331. FEASIBILITY STUDY ON RETRAINING VETERANS IN CYBERSECURITY. Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Defense, the Secretary of Veterans Affairs, and the Secretary of Homeland Security, shall submit to Congress a feasibility study on retraining veterans and retired members of elements of the intelligence community in cybersecurity. The SPEAKER pro tempore. Pursuant to the rule, the gentleman from Michigan (Mr. Rogers) and the gentleman from Maryland (Mr. Ruppersberger) each will control 20 minutes. The Chair recognizes the gentleman from Michigan. General Leave Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that all Members may have 5 legislative days to revise and extend their remarks and to include extraneous material on the bill, H.R. 4681. The SPEAKER pro tempore. Is there objection to the request of the gentleman from Michigan? There was no objection. Mr. ROGERS of Michigan. Mr. Speaker, I yield myself such time as I may consume. Mr. Speaker, I will enter into the Record at the end of my remarks the Joint Explanatory Statement prepared by the House and Senate Intelligence Committees. Mr. Speaker, when Mr. Ruppersberger and I assumed the helm of the committee, we committed to return to the practice of passing the annual intelligence authorization bill, recognizing that it is one of the most critical tools that Congress has to control the intelligence activities of the [[Page H8957]] United States Government. I am proud today that we are bringing the fifth such authorization bill to the floor since Mr. Ruppersberger assumed the role of ranking member and I assumed the role of chairman 4 years ago. As most of the intelligence budget involves highly classified programs, the bulk of the committee's direction is found in the classified annex to the bill, which is very similar to the version passed by the House earlier this year. At an unclassified level, I can report that the classified annex increases the President's budget request by less than 1 percent and is consistent with the Bipartisan Budget Act funding caps. Key committee funding initiatives, vital to national security, are preserved in this bill. These funding initiatives are offset by reductions to unnecessary programs and increased efficiencies. The bill's modest net increase reflects the committee's concern that the President's request does not properly fund a number of important initiatives and leaves several unacceptable shortfalls when it comes to the matters of national security. The bill also provides substantial intelligence resources to help defeat Islamic State in Iraq and the Levant. Earlier this year, the House passed its version of this bill with overwhelming bipartisan support. This bill contains all of the provisions that were not previously enacted into law in the fiscal year 2014 bill, along with provisions added by the Senate. None of these provisions are considered controversial, and we have worked through and vetted to make sure that is accurate with both Republican and Democrat staff and Members. Mr. Speaker, we find ourselves in a very interesting time in history. ISIL is attempting to build a state across the Middle East, from Lebanon to Iraq, including Syria, Jordan, and Israel. The group already controls a swath of land across Iraq and Syria about the size of the State of Indiana, and it is growing. The goal of our counterterrorism strategy is to deny safe haven from which terrorists can plot attacks against the United States and/or our allies. Regrettably, we have not prevented ISIL from establishing such a safe haven, and, as a result, we face a growing threat from that region. At the same time, state actors like Russia and China view this time as an opportunity to expand their reach and expand their influence. Uneven leadership in recent years has emboldened these adversaries to change the international order, at the expense of U.S. interests. We rightly demand that our intelligence agencies provide policymakers with the best and most timely information possible on the threats we face. We ask them to track terrorists wherever they train, plan, and fundraise. We ask them to stop devastating cyber attacks that steal American jobs through theft of intellectual property. We ask them to track nuclear and missile threats. We demand they get it right every time. This bill will ensure that the dedicated men and women of our intelligence community have the funding and authorities and support that they need to meet their mission and to keep us safe. I take this moment, Mr. Speaker, at a time when certainly voices both around the country and around the world are seeking to condemn the very courageous men and women who show up in the intelligence business to provide the information to keep America safe. They are silent warriors. They are faithful patriots. They don't ask for recognition. They don't ask for time. You don't see their names in the front pages of the paper or on TV. They really don't seek that recognition. But they seek the very purpose of being the first to be able to develop that one piece of information that might prevent further conflict, it might prevent a terrorist attack, it might prevent a nuclear launch, it might prevent one Nation from attacking another. In the haze of what seems to be self-loathing these days, by targeting that against these very courageous men and women who cannot defend themselves in public, we are doing a disservice to their courage and their commitment to keep America safe. We find that it is easy to, at some point, go back and point fingers at what we believe may or may not have happened in the work of keeping America safe. It is realistically and holistically unfair that we would do that to these very brave souls who risk their lives today. But here is the good news for Americans. These folks that work in the shadows understand that they have accepted these dangerous and quiet roles, and they will get up this morning, like they have every other morning, and understand it is between them and the United States when it comes to any terrorist attack, or worse, bigger, broader conflict somewhere in the world. So they will do their job; they will do their duty; they will do their mission. They will read the papers and fold them and put them on their desk and go about their work, their important work. But it is wrong that years later we ask these people to have to believe that they might have to get a lawyer to do their job. The next time that America asks them to do something hard and difficult in defense of the United States, we shouldn't be giving them lawyers and subpoenas and the United Nations condemning their actions and looking for prosecutions in their effort to tear the United States down one more level. We ought to be giving them ticker tape parades when they come home from these places and say: Thank you for your sacrifice, and thank you for your family's sacrifice. We can sleep better at night knowing that you have had the courage to stand where no other American was willing to stand in defense of the United States. I hope they take this as certainly my final bill on this particular floor to encourage them to do their good work, to know that Americans who are kissing their kids and putting them on the bus this morning understand that it takes their efforts to keep this country safe, that somebody that shows up for work and is engaged in international commerce understands that it takes their work to keep America safe. Believe me, outside of this town, people across America understand the value and importance and really the essential work that these people do for the defense of America. We should not condemn them, we should be proud of their work, and we should stand behind them. This bill I think represents the work in a bipartisan way that allows them to continue that work, to do the work that protects America. I would be remiss if I didn't thank my good friend Dutch Ruppersberger. Over the last 4 years, these five budgets could not have happened without your work and your staff's work in making sure that we had the best product available to make sure that the intelligence community had the resources that they need, the policies that they need, the support that they need, and, yes, every once in a while, the kick in the can that they needed. With that, I reserve the balance of my time. Mr. Speaker, when Dutch and I assumed the helm of the Committee, we committed to return to the practice of passing the annual intelligence authorization bill, recognizing that it is one of the most critical tools Congress has to control the intelligence activities of the U.S. Government. I am proud today that we are bringing the fifth such authorization bill to the floor since I assumed the Chairmanship four years ago. As most of the intelligence budget involves highly classified programs, the bulk of the Committee's direction is found in the classified annex to the bill, which is very similar to the version passed by the House earlier this year. At an unclassified level, I can report that the classified annex increases the President's budget request by less than one percent and is consistent with the Bipartisan Budget Act funding caps. Key Committee funding initiatives, vital to national security, are preserved in this bill. These funding initiatives are offset by reductions to unnecessary programs and increased efficiencies. The bill's modest net increase reflects the Committee's concern that the President's request does not properly fund a number of important initiatives and leaves several unacceptable shortfalls. The bill also provides substantial intelligence resources to help defeat ISIL. Earlier this year the House passed its version of this bill by an overwhelming bipartisan vote. This bill contains all of those provisions that were not previously enacted into law in the FY 14 bill, along with provisions added by the Senate. None of those provisions are considered controversial. Mr. Speaker, we find ourselves in a very interesting time in history. ISIL is attempting to [[Page H8958]] build a state across the Middle East--from Lebanon to Iraq, including Syria, Jordan, and Israel. The group already controls a swath of land across Iraq and Syria. The goal of our counterterrorism strategy is to deny safe haven from which terrorists can plot attacks against the United States and our allies. Regrettably, we have not prevented ISIL from establishing such a safe haven, and as a result we face a growing threat from the region. At the same time, state actors like Russia and China view this time as an opportunity to expand their reach and influence. Uneven leadership in recent years has emboldened these adversaries to change the international order--at the expense of U.S. interests. We rightly demand that our intelligence agencies provide policy makers with the best and most timely information possible on the threats we face. We ask them to track terrorists wherever they train, plan, and fundraise. We ask them to stop devastating cyber attacks that steal American jobs. We ask them to track nuclear and missile threats. And we demand they get it right--every time. This bill will ensure that the dedicated men and women of our Intelligence Community have the funding and authorities--and support-- they need to meet their mission and to keep us safe. Before closing, I want to take a moment to thank the men and women of this country who serve in our Intelligence Community today. It has been a distinct honor to get to know so many of them, and I am proud to have played a role in contributing to their success. I would also like to extend thanks to all of my dedicated staff on the Committee who worked hard over the years to get us back on track in passing the annual Authorization bill and in our daily oversight of the Intelligence Community. Thank you to my current committee staff: Darren Dick, Katie Wheelbarger, Sarah Geffroy, Andy Keiser, Bryan Smith, Ashley Lowry, Susan Phalen, Tom Corcoran, Michael Ellis, Chelsey Campbell, Geof Kahn, Brooke Eisele, Randy Smith, Jim Hildebrand, Shannon Stuart, Rachel Wilson, Lisa Major, Diane Rinaldo. Thank you, as well as to those who are no longer with the staff but played an influential role in committee activities during my tenure as Chairman: Michael Allen, Chris Donesa, Jamil Jaffer, Nathan Hauser, Todd Jones, Frank Garcia, George Pappas, Will Koella, Leah Scott, Fred Fleitz, and Stephanie Pelton. Finally, a big thank you to our dedicated Security and Information Technology staff who keep us up and running everyday: Brandon Smith, Kristin Jepson and Kevin Klein. JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2015 The following consists of the explanatory material to accompany the Intelligence Authorization Act for Fiscal Year 2015. This joint explanatory statement shall have the same effect with respect to the implementation of this Act as if it were a joint explanatory statement of a committee of conference. This explanatory statement is accompanied by a classified annex that contains a classified Schedule of Authorizations. The classified Schedule of Authorizations is incorporated by reference in the Act and has the legal status of public law. The classified annex and classified Schedule of Authorizations are the result of negotiations between the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence to reconcile differences in their respective versions of the Intelligence Authorization Act for Fiscal Year 2015. The congressionally directed actions described in Senate Report No. 113-233, the classified annex that accompanied Senate Report No. 113-233, and the classified annex that accompanied House Report No. 113-463 should be carried out to the extent they are not amended, altered, substituted, or otherwise specifically addressed in either this Joint Explanatory Statement or in the classified annex to this Statement. Section-by-Section Analysis and Explanation The following is a section-by-section analysis and explanation of the Intelligence Authorization Act for Fiscal Year 2015. Title I--Intelligence Activities Section 101. Authorization of appropriations Section 101 lists the United States Government departments, agencies, and other elements for which the Act authorizes appropriations for intelligence and intelligence-related activities for Fiscal Year 2015. Section 102. Classified Schedule of Authorizations Section 102 provides that the details of the amounts authorized to be appropriated for intelligence and intelligence-related activities and the applicable personnel levels by program for Fiscal Year 2015 are contained in the classified Schedule of Authorizations and that the classified Schedule of Authorizations shall be made available to the Committees on Appropriations of the Senate and House of Representatives and to the President. Section 103. Personnel ceiling adjustments Section 103 is intended to provide additional flexibility to the DNI in managing the civilian personnel of the Intelligence Community (IC). Section 103 provides that the DNI may authorize employment of civilian personnel in Fiscal Year 2015 in excess of the number of authorized positions by an amount not exceeding three percent of the total limit applicable to each IC element under Section 102. The DNI may do so only if necessary to the performance of important intelligence functions. Section 104. Intelligence Community Management Account Section 104 authorizes appropriations for the Intelligence Community Management Account (ICMA) of the DNI and sets the authorized personnel levels for the elements within the ICMA for Fiscal Year 2015. Title II--Central Intelligence Agency Retirement and Disability System Section 201. Authorization of appropriations Section 201 authorizes appropriations in the amount of $514,000,000 for Fiscal Year 2015 for the Central Intelligence Agency Retirement and Disability Fund. Title III--General Provisions Subtitle A--General Matters Section 301. Increase in employee compensation and benefits authorized by law Section 301 provides that funds authorized to be appropriated by the Act for salary, pay, retirement, and other benefits for federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in compensation or benefits authorized by law. Section 302. Restriction on conduct of intelligence activities Section 302 provides that the authorization of appropriations by the Act shall not be deemed to constitute authority for the conduct of any intelligence activity that is not otherwise authorized by the Constitution or laws of the United States. Section 303. National intelligence strategy Section 303 amends the National Security Act of 1947 to require the DNI to develop a comprehensive national intelligence strategy every four years beginning in 2017. Section 304. Software licensing Section 304 amends Section 109 of the National Security Act of 1947, which requires chief information officers within the IC to prepare biennial inventories and assessments concerning the use and procurement of software licenses, to make certain enhancements to the biennial assessments required under Section 109. Section 305. Reporting of certain employment activities by former intelligence officers and employees Section 305 requires the head of each element of the IC to issue regulations that require an employee occupying positions with access to particularly sensitive information within such element to sign a written agreement that requires the regular reporting of any employment by, representation of, or the provision of advice relating to national security to the government of a foreign country, or any person whose activities are supervised, directed, controlled, financed, or subsidized by any government of a foreign country, for a two- year period after the employee ceases employment with the IC element. Section 306. Inclusion of Predominantly Black Institutions in intelligence officer training program Section 306 amends the National Security Act of 1947 to include predominantly black institutions in the intelligence officer training programs established under Section 1024 of the Act. Section 307. Management and oversight of financial intelligence Section 307 requires the DNI to prepare a plan for management of the elements of the IC that carry out financial intelligence activities. Section 308. Analysis of private sector policies and procedures for countering insider threats Section 308 directs the DNI to submit to the congressional intelligence committees an analysis of private sector policies and procedures for countering insider threats. Section 309. Procedures for the retention of incidentally acquired communications Section 309 requires the head of each element of the IC to adopt Attorney General-approved procedures that govern the retention of nonpublic telephone or electronic communications acquired without consent of a person who is a party to the communications, including communications in electronic storage. The procedures required under this section shall apply to any intelligence activity that is reasonably anticipated to result in the acquisition of such telephone or electronic communications to or from a United States person not otherwise authorized by court order, subpoena, or similar legal process, regardless of the location where the collection occurs. The procedures shall prohibit the retention of such telephone or electronic communications for a period in excess of five years, unless the communications are determined to fall within one of several categories, enumerated in subsection (b)(3)(B), for which retention in excess of five years is authorized, to include communications that have been affirmatively determined to constitute foreign intelligence or counterintelligence, communications that are reasonably [[Page H8959]] believed to constitute evidence of a crime and are retained by a law enforcement agency, and communications that are enciphered or reasonably believed to have a secret meaning. Because it may be necessary in certain instances for IC elements to retain communications covered by this section for a period in excess of five years that do not fall into the categories specifically enumerated in subsection (b)(3)(B), subsection (b)(3)(B)(vii) provides flexibility for the head of each element of the intelligence community to authorize such extended retention where the head of the element determines that it is necessary to protect the national security of the United States. In the absence of such a determination, Section 309 is intended to establish a default rule for intelligence collection activities, not otherwise authorized by legal process, that requires agencies to delete communications covered by this section after five years, unless a determination is made that the communications constitute foreign intelligence or counterintelligence or otherwise meet the retention requirements set forth in this section. Section 310. Clarification of limitation of review to retaliatory security clearance or access determinations Section 310 makes a technical amendment to Section 3001(b)(7) of the Intelligence Reform and Terrorism Prevention Act of 2004 to clarify that the policies and procedures prescribed by that section (to permit individuals to appeal adverse security clearance or access determinations) are only required to apply to adverse security clearance or access determinations alleged to be in reprisal for having made a protected whistleblower disclosure. Section 311. Feasibility study on consolidating classified databases of cyber threat indicators and malware samples Section 307 requires the DNI to conduct a feasibility study on consolidating classified databases of cyber threat indicators and malware samples in the IC and to provide a report to the congressional intelligence committees summarizing the feasibility study. Section 312. Sense of Congress on cybersecurity threat and cybercrime cooperation with Ukraine Section 312 expresses the sense of Congress concerning cybersecurity threat and cybercrime cooperation between the United States and Ukraine. Section 313. Replacement of locally employed staff serving at United States diplomatic facilities in the Russian Federation Section 313 requires the Secretary of State to ensure that every supervisory position at a U.S. diplomatic facility in the Russian Federation is occupied by a citizen of the United States who has passed a background check and to provide Congress with a plan to further reduce reliance on locally employed staff. Section 314. Inclusion of Sensitive Compartmented Information Facilities in United States diplomatic facilities in the Russian Federation and adjacent countries Section 314 requires that each U.S. diplomatic facility that is constructed in, or undergoes a construction upgrade in, the Russian Federation, any country that shares a land border with the Russian Federation, or any country that is a former member of the Soviet Union, shall be constructed to include a Sensitive Compartmented Information Facility. The Secretary of State may waive the requirements of this section upon a determination that it is in the national security interest of the United States. Subtitle B--Reporting Section 321. Report on declassification process Section 321 requires the DNI to submit a report to Congress describing proposals to improve the declassification process and steps the IC could take or legislation that may be necessary, to enable the National Declassification Center to better accomplish the missions assigned to the Center by Executive Order 13526. Section 322. Report on intelligence community efficient spending targets Section 322 requires the DNI to submit a report to the congressional intelligence committees on the status and effectiveness of efforts to reduce administrative costs for the IC during the preceding year. Section 323. Annual report on violations of law or executive order Section 323 requires the DNI to report annually to the congressional intelligence committees on violations of law or executive order by personnel of an element of the IC that were identified during the previous calendar year. Under the National Security Act, the President is required to keep the congressional intelligence committees fully and currently informed of the intelligence activities of the United States government. Nonetheless, this annual reporting requirement is necessary to ensure that the intelligence oversight committees of the House and Senate are made fully aware of violations of law or executive order, including, in particular, violations of Executive order 12333 for activities not otherwise subject to the Foreign Intelligence Surveillance Act. Section 324. Annual report on intelligence activities of the Department of Homeland Security Section 324 requires the Under Secretary for Intelligence and Analysis of the DHS to provide the congressional intelligence committees with a report on each intelligence activity of each intelligence component of the Department that includes, among other things, the amount of funding requested, the number of full-time employees, and the number of full-time contractor employees. In addition, Section 324 requires the Secretary of Homeland Security to submit to the congressional intelligence committees a report that examines the feasibility and advisability of consolidating the planning, programming, and resourcing of such activities within the Homeland Security Intelligence Program (HSIP). The HSIP budget was established to fund those intelligence activities that principally support missions of the DHS separately from those of the NIP. To date, however, this mechanism has only been used to supplement the budget for the office of Intelligence and Analysis. It has not been used to fund the activities of the non-IC components in the DHS that conduct intelligence-related activities. As a result, there is no comprehensive reporting to Congress regarding the overall resources and personnel required in support of the Department's intelligence activities. Section 325. Report on political prison camps in North Korea Section 325 requires the DNI to submit a report on political prison camps in North Korea to the congressional intelligence committees. Section 326. Assessment of security of domestic oil refineries and related rail transportation infrastructure Section 326 requires the Under Secretary of Homeland Security for Intelligence and Analysis to conduct an intelligence assessment of the security of domestic oil refineries and related rail transportation infrastructure. Section 327. Enhanced contractor level assessments for the intelligence community Section 327 amends the National Security Act of 1947 to require that the annual personnel level assessments for the IC, required under Section 506B of the Act, include a separate estimate of the number of intelligence collectors and analysts contracted by each element of the IC and a description of the functions performed by such contractors. Section 328. Assessment of the efficacy of memoranda of understanding to facilitate intelligence-sharing Section 328 requires the Under Secretary of Homeland Security for Intelligence and Analysis to provide appropriate congressional committees with an assessment of the efficacy of the memoranda of understanding signed between Federal, State, local, tribal, and territorial agencies to facilitate intelligence-sharing within and separate from the Joint Terrorism Task Force. This study should help identify any obstacles to intelligence sharing between agencies, particularly any obstacles that might have impeded intelligence sharing in the wake of the April 2013 bombing of the Boston Marathon, and find improvements to existing intelligence sharing relationships. Section 329. Report on foreign man-made electromagnetic pulse weapons Section 329 requires the DNI to provide appropriate congressional committees with a report on the threat posed by manmade electromagnetic pulse weapons to United States interests through 2025. Section 330. Report on United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda and its affiliated or associated groups Section 330 requires the DNI to provide appropriate congressional committees with a report on the United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda and its affiliated or associated groups. Section 331. Feasibility study on retraining veterans in cybersecurity Section 331 requires the DNI to submit to Congress a feasibility study on retraining veterans and retired members of elements of the IC in cybersecurity. Mr. RUPPERSBERGER. Mr. Speaker, I yield myself such time as I may consume. Chairman Rogers, this is my last opportunity on the floor to thank you again for your leadership. It has, once again, produced a strong, bipartisan, and bicameral Intelligence Authorization Act. Our committee believes that our Nation's security is too important to be a political football. We have had different views, we argue, but we work it out for the good of American people. Mr. Chairman, I hope that your legacy of bipartisanship, hard work, rigorous oversight, and problem-solving continues and spreads throughout the Congress. It is amazing what we can accomplish when we work together to solve problems. I also want to thank our counterparts in the Senate Intelligence Committee, Senators Feinstein and Chambliss, for working very closely with us and each member of our committee. On the Democratic side, I want to acknowledge all the hard work of Mr. Thompson--who is sitting here to my left--Ms. Schakowsky, Mr. Langevin, [[Page H8960]] Mr. Schiff, Mr. Gutierrez, Mr. Pastor, Mr. Himes, and Ms. Sewell. And I want to thank our staff and the dedicated men and women of the intelligence community who work every day and all night throughout the world to protect us. I do agree with the chairman's statements about those men and women throughout the world who are out there protecting us and putting their lives on the line. Now, today, we look beyond this Congress. We come together to set the stage for the continuing oversight of intelligence programs, personnel, and dollars. By doing so, we reinforce to the American people, and to the world, that there are checks and balances. We reinforce that the tools we authorize are for the sole purpose of keeping us, our allies, and our partners safe. In May, the House passed the Intelligence Authorization Act for fiscal years 2014 and 2015 by 345 votes to 19. The Senate, however, took up each year separately. Over the summer, this House passed the FY14 bill, which the President signed. So, we now take up the FY15 bill, which the Senate amended and sent back to us. This amended bill largely mirrors the relevant portions of the House-passed combined bill. Passing a detailed Intelligence Authorization Act ensures that our intelligence agencies spend money only on programs Congress is informed of, approves, and can continuously oversee. {time} 1300 Oversight is extremely important. It helps to make sure that everything our intelligence agencies do follows the Constitution and the laws of the United States and maximizes the civil liberties and privacy of Americans. At the same time, the intelligence agencies need the clear authorization, direction, and guidance from Congress to do their vital work to protect and defend America, its allies, and its partners. The Intelligence Authorization Act is split into four parts: the unclassified legislative text; the unclassified report; the classified annex, which explains our intent for the classified aspects of the bill; and the classified schedule of authorizations. While we have made cuts to certain areas and added money in others to produce a responsible, well thought out, and fiscally prudent budget, the budget for fiscal year 2015 slightly exceeds the President's request. While over the last 4 years we have reduced the intelligence community's budget by over a billion dollars, this year's bill acknowledges the need to make corrections after the drastic cuts of sequestration and the Budget Control Act. Additionally, this bill acknowledges the need to step up our intelligence efforts to counter evolving threats such as ISIL. It is a dangerous world out there, and our bill accounts for that. Let me also mention some specifics in the bill. First, it continues to emphasize the value of our space programs and endorses aggressive action to decrease our reliance on Russian-made engines to launch our national security satellites. Two, it makes investments into research and development to defend against next generation threats and to stay ahead of countries like China and Russia. Three, it further improves the continuous evaluation of insider threats while safeguarding privacy and civil liberties. Next, it enables better intelligence and information sharing to prevent foreign fighters coming in and out of Syria. It also enables cutting-edge Defense Intelligence Agency technology. We must stay ahead of the curve in technology. The bill also further refines the Department of Defense human intelligence capabilities while supporting communitywide human intelligence efforts to better understand the enemies' plans and intentions. It also establishes increased accountability measures for our most sensitive programs. The committee has worked with the intelligence community and the Senate to produce this solid, bipartisan bill. This bill also incorporates the valuable floor amendments the House passed in May. It represents a culmination of our committee's work through extensive hearings and briefings, travel, and in-depth studies. The bill is strong, and I am proud to support it. For the sake of keeping the country, its allies, and partners safe and for the sake of thoroughly overseeing even the most classified intelligence programs, I urge my colleagues to pass the bill today. Mr. Speaker, I reserve the balance of my time. Mr. ROGERS of Michigan. Mr. Speaker, I yield myself such time as I may consume. I thought I would take a moment to extend my thanks to all the dedicated staff on the committee, certainly from the Republican side and to the Democrats as well, who worked hard over the years to get us back on track in passing this annual authorization bill in our daily oversight of the intelligence community. If you will indulge me, Mr. Speaker, thank you to my current committee staff: Darren Dick, Katie Wheelbarger, Sarah Geffroy, Andy Keiser, Bryan Smith, Ashley Lowry, Susan Phalen, Tom Corcoran, Michael Ellis, Chelsey Campbell, Geof Kahn, Brooke Eisele, Randy Smith, Jim Hildebrand, Shannon Stuart, Rachel Wilson, Lisa Major, and Diane Rinaldo. Thank you as well to staff who have played an influential role in the committee activities during my tenure as chairman in reengaging this as a force for oversight in the Intelligence Committee: Michael Allen, Chris Donesa, Jamil Jaffer, Nathan Hauser, Todd Jones, Frank Garcia, George Pappas, Will Koella, Leah Scott, Fred Fleitz, and Stephanie Pelton. Finally, a big thank you to our dedicated security and information technology staff, by the way, who have done well to beat back the hordes of our nation state actors who, for some reason, Mr. Speaker, took a good interest in what we were doing in that classified space, and they kept us up and running every single day: Brandon Smith, Kristin Jepson, and Kevin Klein. Mr. Speaker, I reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to the gentleman from California (Mr. Thompson), a great member of our committee who specialized in infrastructure and also worked very hard to make sure that our Embassies have the intelligence information they need to protect themselves. Mr. THOMPSON of California. I thank the gentleman for yielding and for all the good work you did on the committee as the ranking member. I also want to thank Chairman Rogers for the good work that he did as the chairman. Working together, he was very accommodating and allowed all of us to be able to address specific issues that were of concern to us and regarding the security of our great Nation. Thank you, Mr. Chairman. We are going to miss you. Mr. Speaker, I rise today in strong support of the passage of this bill. This bill will provide greater national security for our country and the people that we all represent. The bill contains two important provisions that I authored that protect our communities at home and diplomatic facilities abroad. My district is home to several oil refineries, employing thousands of people, providing well-paying, good, middle class jobs, and are a key part of our regional economy. As domestic oil production continues to increase in the region, I have heard from several of my constituents and my local governments about their growing concern regarding the security of the shipment and storage of crude oil and subsequent refined products. I believe we have the responsibility to protect our workers, our domestic refineries, and our communities from potential threats. Included in this bill is a provision that directs the Department of Homeland Security Office of Intelligence and Analysis to conduct an assessment of the security of our Nation's oil refineries and related rail transportation infrastructure. It directs the office to make recommendations on how to improve intelligence collection and sharing of information to better protect those facilities in the surrounding communities from any harm. Additionally, studies conducted in response to the terrible 2012 attack on Benghazi identified the need for security personnel at U.S. diplomatic posts to receive threat information in a more timely manner. [[Page H8961]] The SPEAKER pro tempore. The time of the gentleman has expired. Mr. RUPPERSBERGER. Mr. Speaker, I yield the gentleman an additional 30 seconds. Mr. THOMPSON of California. In response to this need, this bill requires the Director of National Intelligence to provide an assessment of the status of threat information sharing between the intelligence community and diplomatic security personnel and to propose actions to help make sure security personnel at U.S. Embassies are better able to request and receive security enhancements in a timely manner. By making sure our intelligence community is taking concerns seriously and sharing the necessary information, we can better assess and mitigate threats and increase security at home and abroad and make our country safer. I urge my colleagues to join me in passing this good piece of legislation. Mr. ROGERS of Michigan. Mr. Speaker, I reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Speaker, I yield 2 minutes to the gentleman from California, Mr. Adam Schiff, a great member of our committee with a tremendous work ethic. He reads almost every piece of intelligence information and comes to quality and informed conclusions. He also has focused a lot and specialized in working with legislation involving transparency and accountability and has spent a lot of time on an area that is very important to our Intelligence Committee, the space program. Mr. SCHIFF. Mr. Speaker, I thank the gentleman for yielding, and I want to join my colleagues in urging the House to support the 2015 Intelligence Authorization Act which has now returned to us from the Senate, but before I address the substance of the bill, I would like to congratulate Chairman Rogers and Ranking Member Ruppersberger for their extraordinary efforts to get this bill passed and to the President. As a member of the Intelligence Committee, I know how hard they and the staff have worked to make this happen, and I would especially like to congratulate Chairman Rogers and wish him well as he prepares to leave the House at the end of the year. It has been a great pleasure working with you, and I wish you all the very best. These are challenging days for America's intelligence officers and analysts. As ISIS continues to threaten the Middle East; as Russia's ``little green men'' continue to coordinate attacks on the Ukrainian Government; as North Korea's young, isolated, and often dangerously erratic leader continues his behavior; and as the international community continues its efforts to secure Iran's agreement to dismantle its nuclear weapons program and infrastructure, our intelligence professionals play a vital role in keeping us safe and secure. Developing and maintaining actionable intelligence on ISIS is of particular urgency. While the intelligence community has been following ISIS' growth for some time, the group's takeover of a large swath of Syria and Iraq has made it a top intelligence priority. If we are to be effective in partnering with regional allies to degrade and destroy ISIS, we need to be able to develop the very best intelligence and accurate ground truth. That takes time, and it takes assets--on the ground, in the air, in space--to collect information. It also takes the world class analysts of our intelligence community to turn that information into recommendations for policymakers. We must also remain focused on Russian efforts to destabilize its neighbors, particularly Ukraine, but also the Baltic States. Our intelligence community has given us insight into Russian involvement in these efforts and into the events that led to the tragic downing of the Malaysian airliner last summer. The bill also prioritizes vital efforts at nonproliferation and will help give us the tools that we need to assess events on the ground in North Korea and Iran and wherever there is a threat of WMD. These are but a few of the important matters covered in the Intelligence Authorization bill. As a member of the committee who has been proud to work closely with both the chair and ranking member, I am confident it supports our intelligence professionals while providing oversight that is so critical to the proper functioning of our intelligence agencies. Mr. ROGERS of Michigan. Mr. Speaker, I continue to reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Speaker, I yield myself such time as I may consume. Mr. Speaker, in closing, I urge my colleagues to vote for this important bipartisan and bicameral bill. It is the single most effective oversight tool we have, and it ensures that our intelligence community has what it needs to keep us and our allies safe. Intelligence is often the first line of defense against a dangerous world. Without it, we are in the dark, and we are vulnerable. Finally, once again, let me just say thank you to my good friend, Mr. Chairman, and to the members of the committee, to our colleagues in the Senate, and to the men and women of the intelligence community. It has been my honor and privilege to work with you under your great leadership during the 113th Congress. I also want to thank the Republican and Democratic staffs for working together. That is what makes it work. You are only as good as your team and your staff. I also would like to acknowledge the Democratic staff: Staff Director Heather Molino, Amanda Rogers-Thorpe, Bob Minehart, Linda Cohen, Carly Blake, Allison Getty, Deb Haynie, and Michael Bahar. I also thank staff members who were with us but have retired: Mike Shank, Janet Fisher, and Khizer Sayed. Mr. Speaker, I yield back the balance of my time. Mr. ROGERS of Michigan. Mr. Speaker, I yield myself the balance of my time. Mr. Speaker, again, I want to thank my friends on the other side of the aisle, from Dutch to Heather, and the whole entire team for putting this product together by putting our country first. It is very important. I challenge every Member to read this material next year when it is announced that you can review the classified annex. Review the classified annex. I think they will have a better perspective at the huge number of challenges facing the United States when it comes to real threats developing around the world. Mr. Speaker, I would again say thanks to all, and I yield back the balance of my time. Mr. LANGEVIN. Mr. Speaker, I am proud to support the Intelligence Authorization Act. As a member of the Armed Services and Intelligence Committees, I know these Authorization bills provide the necessary accountability, direction, and resources for those who keep our nation safe. Today's bill reflects the continuation of the Committee's bipartisan and bicameral work, and I want to thank Chairman Rogers and Ranking Member Ruppersberger for their strong and consistent leadership on these critical issues. Today I want to highlight two areas of specific interest to me. First, this legislation strikes a careful balance between ensuring that our nation's secrets are kept safe and providing appropriate transparency with the American people. There are lawful ways to raise concerns of wrongdoing and procedures to declassify information when appropriate. In the past, Congress has strengthened these avenues, including by enhancing whistleblower protections and the role of Inspectors General. As it has each year, this bill adds to the mission of counterintelligence to ensure that information is protected and that the tools utilized by security professionals are handled lawfully and with full consideration for the privacy and civil liberties of our intelligence professionals. This bill continues this important direction, asking the DNI to establish appropriate guidelines to govern how publicly available information can be utilized. Second, this bill continues to support the work of the men and women at the front lines of cybersecurity. It helps cyber professionals at NSA, FBI, and DHS to hone their tools and skills to protect us, while supporting initiatives to grow the next-generation cyber workforce. And it will further aid the Intelligence Community in understanding and defending certain networks from cyber threats. Mr. Speaker, I am proud of our work on this bill, and I urge its passage. The SPEAKER pro tempore. The question is on the motion offered by the gentleman from Michigan (Mr. Rogers) that the House suspend the [[Page H8962]] rules and concur in the Senate amendment to the bill, H.R. 4681. The question was taken. The SPEAKER pro tempore. In the opinion of the Chair, two-thirds being in the affirmative, the ayes have it. Mr. AMASH. Mr. Speaker, on that I demand the yeas and nays. The yeas and nays were ordered. The SPEAKER pro tempore. Pursuant to clause 8 of rule XX, further proceedings on this motion will be postponed. ____________________ [Congressional Record Volume 160, Number 150 (Wednesday, December 10, 2014)] [House] [Pages H8991-H8992] From the Congressional Record Online through the Government Printing Office [www.gpo.gov] INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2014 AND 2015 The SPEAKER pro tempore. The unfinished business is the vote on the motion to suspend the rules and concur in the Senate amendment to the bill (H.R. 4681) to authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, on which the yeas and nays were ordered. The Clerk read the title of the bill. The SPEAKER pro tempore. The question is on the motion offered by the gentleman from Michigan (Mr. Rogers) that the House suspend the rules and concur in the Senate amendment. This is a 5-minute vote. The vote was taken by electronic device, and there were--yeas 325, nays 100, not voting 9, as follows: [Roll No. 558] YEAS--325 Adams Aderholt Amodei Bachmann Bachus Barber Barletta Barr Barrow (GA) Barton Beatty Becerra Benishek Bera (CA) Bilirakis Bishop (GA) Bishop (NY) Bishop (UT) Black Blackburn Boustany Brady (PA) Brady (TX) Braley (IA) Brooks (IN) Brown (FL) Brownley (CA) Buchanan Bucshon Bustos Butterfield Byrne Calvert Camp Capito Capps Cardenas Carney Carson (IN) Carter Cartwright Cassidy Castor (FL) Castro (TX) Chabot Chaffetz Cicilline Clay Cleaver Clyburn Coble Coffman Cole Collins (GA) Collins (NY) Conaway Connolly Cook Cooper Costa Cotton Courtney Cramer Crawford Crenshaw Crowley Cuellar Culberson Daines Davis (CA) Davis, Danny Davis, Rodney DeGette Delaney DeLauro Denham Dent DeSantis Deutch Diaz-Balart Dingell Duffy Edwards Ellison Ellmers Engel Enyart Esty Farenthold Fattah Fincher Fitzpatrick Fleischmann Fleming Flores Forbes Fortenberry Foster Foxx Frankel (FL) Franks (AZ) Frelinghuysen [[Page H8992]] Fudge Gabbard Gallego Gardner Gerlach Gibbs Gingrey (GA) Goodlatte Granger Graves (MO) Green, Al Green, Gene Griffin (AR) Grimm Guthrie Hanna Harper Harris Hartzler Hastings (WA) Heck (NV) Hensarling Herrera Beutler Higgins Himes Hinojosa Holding Horsford Hoyer Hudson Huizenga (MI) Hultgren Hunter Hurt Israel Issa Jeffries Jenkins Johnson (GA) Johnson (OH) Johnson, E. B. Johnson, Sam Jolly Joyce Keating Kelly (IL) Kelly (PA) Kennedy Kilmer Kind King (IA) King (NY) Kinzinger (IL) Kirkpatrick Kline Kuster LaMalfa Lamborn Lance Langevin Lankford Larsen (WA) Larson (CT) Latham Latta Levin Lipinski LoBiondo Loebsack Long Lowey Lucas Luetkemeyer Lujan Grisham (NM) Lujan, Ben Ray (NM) Lynch Maffei Maloney, Carolyn Maloney, Sean Marchant Marino Matheson McAllister McCarthy (CA) McCarthy (NY) McCaul McHenry McIntyre McKeon McKinley McMorris Rodgers McNerney Meehan Meeks Meng Messer Michaud Miller (MI) Miller, George Moran Mullin Murphy (FL) Murphy (PA) Napolitano Neal Neugebauer Noem Nolan Norcross Nunes Nunnelee Olson Owens Palazzo Pascrell Pastor (AZ) Paulsen Payne Pearce Pelosi Perlmutter Peters (CA) Peters (MI) Peterson Petri Pingree (ME) Pittenger Pitts Pompeo Price (GA) Price (NC) Quigley Rahall Reed Reichert Renacci Rice (SC) Richmond Rigell Roby Rogers (AL) Rogers (KY) Rogers (MI) Rokita Rooney Ros-Lehtinen Roskam Ross Rothfus Roybal-Allard Royce Ruiz Runyan Ruppersberger Rush Ryan (OH) Ryan (WI) Sanchez, Linda T. Sanchez, Loretta Sarbanes Scalise Schiff Schneider Schock Schwartz Schweikert Scott (VA) Scott, David Sessions Sewell (AL) Shea-Porter Sherman Shimkus Shuster Simpson Sinema Sires Slaughter Smith (MO) Smith (NE) Smith (NJ) Smith (TX) Southerland Stewart Stivers Stutzman Terry Thompson (CA) Thompson (MS) Thompson (PA) Thornberry Tiberi Titus Tonko Tsongas Turner Upton Valadao Van Hollen Vargas Veasey Vela Visclosky Wagner Walberg Walden Walorski Walz Wasserman Schultz Waxman Webster (FL) Wenstrup Westmoreland Whitfield Williams Wilson (FL) Wilson (SC) Wittman Wolf Womack Yoder Young (AK) Young (IN) NAYS--100 Amash Bass Bentivolio Blumenauer Bonamici Brat Bridenstine Brooks (AL) Broun (GA) Burgess Chu Clark (MA) Clarke (NY) Clawson (FL) Cohen Conyers Cummings DeFazio DelBene DesJarlais Doggett Doyle Duncan (SC) Duncan (TN) Eshoo Farr Garamendi Garcia Garrett Gibson Gohmert Gosar Gowdy Graves (GA) Grayson Griffith (VA) Grijalva Gutierrez Hahn Hanabusa Hastings (FL) Heck (WA) Holt Honda Huelskamp Huffman Jackson Lee Jones Jordan Kaptur Kildee Kingston Labrador Lee (CA) Lewis Lofgren Lowenthal Lummis Massie Matsui McClintock McCollum McDermott McGovern Meadows Mica Moore Mulvaney Nadler Nugent O'Rourke Pallone Perry Pocan Poe (TX) Polis Posey Rangel Ribble Roe (TN) Rohrabacher Salmon Sanford Schakowsky Scott, Austin Sensenbrenner Serrano Speier Stockman Swalwell (CA) Takano Tierney Tipton Velazquez Waters Weber (TX) Welch Woodall Yarmuth Yoho NOT VOTING--9 Campbell Capuano Duckworth Hall Miller (FL) Miller, Gary Negrete McLeod Schrader Smith (WA) Announcement by the Speaker Pro Tempore The SPEAKER pro tempore (Mr. Hultgren) (during the vote). There are 2 minutes remaining. {time} 1704 Mr. SERRANO changed his vote from ``yea'' to ``nay.'' Mr. ELLISON changed his vote from ``nay'' to ``yea.'' So (two-thirds being in the affirmative) the rules were suspended and the Senate amendment was concurred in. The result of the vote was announced as above recorded. A motion to reconsider was laid on the table. Stated against: Mr. ELLISON. Mr. Speaker, during rollcall vote No. 558 on H.R. 4681, I mistakenly recorded my vote as ``yes'' when I should have voted ``no.'' ____________________