[Congressional Record Volume 160, Number 83 (Friday, May 30, 2014)] [House] [Pages H5029-H5034] PROVIDING FOR CONSIDERATION OF H.R. 4745, TRANSPORTATION, HOUSING AND URBAN DEVELOPMENT, AND RELATED AGENCIES APPROPRIATIONS ACT, 2015; PROVIDING FOR CONSIDERATION OF H.R. 4681, INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2014 AND 2015; AND FOR OTHER PURPOSES Mr. BISHOP of Utah. Mr. Speaker, by direction of the Committee on Rules, I call up House Resolution 604 and ask for its immediate consideration. The Clerk read the resolution, as follows: H. Res. 604 Resolved, That at any time after adoption of this resolution the Speaker may, pursuant to clause 2(b) of rule XVIII, declare the House resolved into the Committee of the Whole House on the state of the Union for consideration of the bill (H.R. 4745) making appropriations for the Departments of Transportation, and Housing and Urban Development, and related agencies for the fiscal year ending September 30, 2015, and for other purposes. The first reading of the bill shall be dispensed with. All points of order against consideration of the bill are waived. General debate shall be confined to the bill and shall not exceed one hour equally divided and controlled by the chair and ranking minority member of the Committee on Appropriations. After general debate the bill shall be considered for amendment under the five-minute rule. Points of order against provisions in the bill for failure to comply with clause 2 of rule XXI are waived. During consideration of the bill for amendment, the chair of the Committee of the Whole may accord priority in recognition on the basis of whether the Member offering an amendment has caused it to be printed in the portion of the Congressional Record designated for that purpose in clause 8 of rule XVIII. Amendments so printed shall be considered as read. When the committee rises and reports the bill back to the House with a recommendation that the bill do pass, the previous question shall be considered as ordered on the bill and amendments thereto to final passage without intervening motion except one motion to recommit with or without instructions. Sec. 2. (a) At any time after adoption of this resolution the Speaker may, pursuant to clause 2(b) of rule XVIII, declare the House resolved into the Committee of the Whole House on the state of the Union for consideration of the bill (H.R. 4681) to authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes. The first reading of the bill shall be dispensed with. All points of order against consideration of the bill are waived. General debate shall be confined to the bill and amendments specified in this resolution and shall not exceed one hour equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence. After general debate the bill shall be considered for amendment under the five-minute rule. (b) In lieu of the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence now printed in the bill, it shall be in order to consider as an original bill for the purpose of amendment under the five- minute rule an amendment in the nature of a substitute consisting of the text of Rules Committee Print 113-45. That amendment in the nature of a substitute shall be considered as read. All points of order against that amendment in the nature of a substitute are waived. (c) No amendment to the amendment in the nature of a substitute made in order as original text shall be in order except those printed in the report of the Committee on Rules accompanying this resolution and amendments en bloc described in subsection (f). (d) Each amendment printed in the report of the Committee on Rules shall be considered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question in the House or in the Committee of the Whole. (e) All points of order against amendments printed in the report of the Committee on Rules or amendments en bloc described in subsection (f) are waived. (f) It shall be in order at any time for the chair of the Permanent Select Committee on Intelligence or his designee to offer amendments en bloc consisting of amendments printed in the report of the Committee on Rules not earlier disposed of. Amendments en bloc offered pursuant to this subsection shall be considered as read, shall be debatable for 20 minutes equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence or their designees, shall not be subject to amendment, and shall not be subject to a demand for division of the question in the House or in the Committee of the Whole. (g) At the conclusion of consideration of the bill for amendment the Committee shall rise and report the bill to the House with such amendments as may have been adopted. Any Member may demand a separate vote in the House on any amendment adopted in the Committee of the Whole to the bill or to the amendment in the nature of a substitute made in order as original text. The previous question shall be considered as ordered on the bill and amendments thereto to final passage without intervening motion except one motion to recommit with or without instructions. Sec. 3. On any legislative day during the period from June 2, 2014, through June 6, 2014-- (a) the Journal of the proceedings of the previous day shall be considered as approved; and (b) the Chair may at any time declare the House adjourned to meet at a date and time, within the limits of clause 4, section 5, article I of the Constitution, to be announced by the Chair in declaring the adjournment. Sec. 4. The Speaker may appoint Members to perform the duties of the Chair for the duration of the period addressed by section 3 of this resolution as though under clause 8(a) of rule I. Sec. 5. The Committee on Appropriations may, at any time before 5 p.m. on Wednesday, June 4, 2014, file privileged reports to accompany measures making appropriations for the fiscal year ending September 30, 2015. Sec. 6. House Resolution 567 is amended by adding the following: ``SEC. 7. TRAVEL. ``Clauses 8(a), (b), and (c) of rule X of the Rules of the House of Representatives shall apply to the Select Committee.''. The SPEAKER pro tempore (Mr. Poe of Texas). The gentleman from Utah is recognized for 1 hour. [[Page H5030]] Mr. BISHOP of Utah. Mr. Speaker, for the purpose of debate only, I yield the customary 30 minutes to the gentleman from Massachusetts (Mr. McGovern), pending which I yield myself such time as I may consume. During consideration of this resolution, all time yielded is for the purpose of debate only. General Leave Mr. BISHOP of Utah. Mr. Speaker, I ask unanimous consent that all Members have 5 legislative days with which to revise and extend their remarks. The SPEAKER pro tempore. Is there objection to the request of the gentleman from Utah? There was no objection. Mr. BISHOP of Utah. Mr. Speaker, I am happy to be with you here today. It seems as if only a few hours ago we were all here together-- because it was only a few hours ago. Mr. Speaker, this resolution before us today provides a structured rule for consideration of H.R. 4681, the Intelligence Authorization Act for Fiscal Years 2014 and 2015, and it makes in order a number of amendments for consideration. In addition, this combined resolution provides for an open rule for the consideration of H.R. 4745, the Transportation, Housing and Urban Development, and Related Agencies Appropriations Act of 2015. This resolution provides for 1 hour of general debate on each of these bills equally divided and controlled by the chairman and ranking minority member of the appropriate committees of jurisdiction. The intention of the Rules Committee was to provide ample opportunity to debate issues related to our intelligence community. The intelligence community has done very good bipartisan work on this bill, which is being brought forward under regular order. And while the committee was able to work with some Members to modify their amendments so they would comply with House rules and be made in order, some amendments were still subject to a point of order or were already debated and voted on last week during the USA FREEDOM Act. Some amendments were simply not possible to debate on the floor in open session due to the national security implications. The net result is that this rule makes in order a total of 11 amendments to the intelligence bill, four Republican, six Democrat, and one bipartisan amendment. So the process is inclusive, the rule is fair, and will provide a wide ranging debate on a topic of interest to all Americans. Mr. Speaker, I reserve the balance of my time. Mr. McGOVERN. Mr. Speaker, I want to thank the gentleman for Utah for yielding me the customary 30 minutes. I yield myself such time as I may consume. (Mr. McGOVERN asked and was given permission to revise and extend his remarks.) Mr. McGOVERN. Mr. Speaker, once again, we are considering a rule that combines two bills together under one single rule. That rule provides an open rule for the Transportation, Housing and Urban Development appropriations bill, or T-HUD, and a structured rule for the Fiscal Years 2014 and 2015 Intelligence Authorization Act. T-HUD is an appropriate acronym, Mr. Speaker, because that is how we can describe this House's action on the bill last year. The Appropriations Committee tried to come up with a bill that funds our Transportation, Housing and Urban Development programs, but it was so woefully inadequate that it never made it to the House floor. Although the T-HUD bill may be $1.2 billion above last year's enacted levels, due to a reduction in offsets caused by a decline in Federal Housing Administration receipts, the program level in this bill is actually $1.8 billion below last year's level. On the transportation side, this bill provides no funding for high- speed rail, and it cuts $200 million from Amtrak's capital funding. And if that weren't bad enough, I want to highlight one particularly egregious rider in the T-HUD bill, a rider that would exempt Wisconsin, Mississippi, and Idaho from Federal truck weight limits on their interstates. Mr. Speaker, there have been no reviews by highway safety experts or cost-benefit analysis on the effect of increased size and weight limits on these roads and bridges, yet the majority decided to go forward with these extraneous riders anyway. I would remind my colleagues that in the last surface transportation reauthorization bill, Congressman Lou Barletta offered an amendment that required DOT to conduct a comprehensive study on the impact of increasing truck size and weight on road safety and infrastructure costs. It passed with strong bipartisan support, and the Department of Transportation is currently in the process of completing the study, which should be finished by the fall of this year. Mr. Barletta sent a letter to the Rules Committee before last night's meeting requesting that a point of order against this rider be made available. I support Mr. Barletta's request, and I wish the Rules Committee would not have protected this provision. We should not be raising truck size and weights in a State-by-State patchwork approach before DOT even has a chance to finish its study, especially when the highway trust fund is expected to run out of money this summer and our roads and our bridges are already in horrible disrepair. I will insert letters from AAA, the Owner-Operator Independent Drivers Association, law enforcement officers, first responders, and road safety groups all opposing this rider. American Automobile Association, Washington, DC, May 20, 2014. Hon. Harold Rogers, Chair, Committee on Appropriations, House of Representatives, Washington, DC. Hon. Nita Lowey, Ranking Member, Committee on Appropriations, House of Representatives, Washington, DC. Dear Chairman Rogers and Ranking Member Lowey: AAA opposes Section 125 of the Transportation, Housing and Urban Development (THUD) Appropriations Bill for Fiscal Year 2015 that would increase the current federal truck size and weight limits. This section carves out special interest exemptions from federal truck size and weight regulations for Idaho, Mississippi and Wisconsin. We urge you to remove Section 125 from the bill. Study after study has shown that increasing truck size or weight increases wear and tear on roads and dramatically impacts bridges. At a time when the federal Highway Trust Fund and many state budgets across the country are nearly tapped out, we cannot afford to allow bigger trucks to run up the cost of maintaining infrastructure. We also are concerned with the safety impact of allowing heavier trucks on the nation's roadways. According to NHTSA, fatalities in crashes involving large trucks increased four percent from 3,781 in 2011 to 3,921 in 2012. Of these fatalities in 2012, 73 percent were occupants of other vehicles, 10 percent were non-occupants, and 18 percent were occupants of large trucks. Congress has recognized the importance of a stronger national freight program and work is underway to establish a robust national freight strategy. Considering changes to truck size and weight limits outside the context of this national discussion, and the two-year truck size and weight study required by MAP-21, is premature. Thank you for consideration of AAA's views on this important safety issue. Sincerely, Avery Ash, Director, Federal Relations. ____ Owner-Operator Independent Drivers Association, May 20, 2014. Hon. Harold Rogers, Chairman, Committee on Appropriations, House of Representatives, Washington, DC. Hon. Nita M. Lowey, Ranking Member, Committee on Appropriations, House of Representatives, Washington, DC. Dear Chairman Rogers and Ranking Member Lowey: On behalf of our nation's small business trucking professionals, the Owner-Operator Independent Drivers Association (OOIDA) writes in opposition to language in the FY2015 Transportation and Housing and Urban Development Appropriations Bill that allows trucks weighing up to 129,000 pounds on Interstate Highways in Idaho. Not only is the expansion of existing weight limits on these roads outside of the highway reauthorization process, but this provision comes as the Department of Transportation is conducting a Congressionally-mandated study on truck size and weight provisions nationally. This study should be allowed to continue without Congress passing legislation, such as the Idaho provision, which would put heavier trucks on Interstate Highway System miles where they currently are not permitted. Current federal Interstate System weight limits were put in place to halt an ``arms race'' between states attempting to garner favor with major shippers as a way to attract business. Today's generally uniform limits focus attention on the national nature of our [[Page H5031]] Interstate System. The Idaho provision, a state-wide allowance of trucks on currently designated Interstate Highway miles above the existing Interstate weight cap, would be a step backwards from this sensible approach. While proponents of this provision argue that Idaho is at a disadvantage compared to neighboring states with higher weight limits on Interstate highways, it is critical to remember that those states operated these heavier-weight vehicles on their Interstate system prior to the passage of federal legislation in 1991 that froze maximum weights on longer-combination vehicles. Idaho's state government could have enacted legislation prior to the 1991 freeze setting an Interstate weight allowance equal to its neighboring states, but it did not. Additionally, neighboring states also have strict permitting requirements for these heavier weight loads, requirements that are absent from the provision included in the THUD bill. While Idaho conducted a pilot study regarding use of heavier weight trucks, it is important to note that none of those trucks in the study operated on Idaho Interstate System roads. Federal studies that have examined operations of heavier vehicles on Interstate System roads, including the initial work completed for the on-going MAP-21 truck size and weight study, show significant infrastructure and safety concerns with bigger and heavier trucks. These are facts that OOIDA members and other small business truckers know full well given that the highway is their workplace. Further, while proponents of bigger and heavier trucks argue that the entire trucking industry is supportive of a weight increase, the overwhelming majority of drivers and motor carriers do not see a benefit from increasing truck size and weights. Heavier weights may lead to cost savings for shippers and receivers; however, for the small business truckers that make up more than 90 percent of the trucking industry, heavier trucks only mean higher fuel, repair, and equipment costs. Bearing in mind that that MAP-21 study has yet to be completed, we urge the Appropriations Committee to remove this language from the FY2015 Transportation Appropriations Bill. Should you have any questions, please contact Ryan Bowley in our Washington Office. Sincerely, Todd Spencer, Executive Vice President. ____ National Troopers Coalition, NAEMT, and National Sheriffs' Association. May 29, 2014. Dear Members of Congress, We are writing on behalf of the nation's law enforcement officers and first responders to express our opposition to any truck size or weight increases. We understand that proposals to allow heavier trucks and thaw the freeze on longer combination vehicles are being considered as part of annual appropriations legislation. We urge you to reject these proposals. Bigger trucks would add new dangers to our roads. Allowing heavier or longer trucks would threaten the safety of motorists as well as law enforcement officers and first responders because heavier and longer trucks would be more difficult to control, take longer to stop, and increase crash severity. Studies conducted by the U.S. Department of Transportation have found that trucks with multiple trailers and trucks that are heavier are associated with higher crash rates. (2000 US DOT Comprehensive Truck Size and Weight Study; 2013 US DOT ``Desk Scan'') Bigger trucks also would impose a huge economic cost in terms of further damage to our already deteriorating highway infrastructure, the additional strain to our aging and deficient bridges and the costs associated with cleaning up crashes. These are additional costs that would be borne by all levels of government and ultimately by the taxpayers. The current proposals to allow bigger trucks have not been the subject of congressional hearings. We question the appropriateness of making changes such as these that affect public safety in a funding bill without full and open public debate. Representing law enforcement and first responders across the country, we are united in opposing bigger trucks. Not only do these trucks endanger the traveling public, but they also put at risk law enforcement officers and first responders. Please oppose any provisions that would increase the size or weight of trucks. Thank you, Mat Hodapp, Chairman, National Troopers Coalition. Don Lundy, BS, NREMT-P, President, National Association of Emergency Management Technicians. Aaron D. Kennard, Executive Director, National Sheriffs' Association. Mr. McGOVERN. Mr. Speaker, this rule, as I noted earlier, also covers debate on H.R. 4681, the Fiscal Years 2014 and 2015 Intelligence Authorization Act. The intelligence authorization bill is one of the many important pieces of legislation that comes before the House every year--or nearly every year. Last year, for fiscal year 2014, the bill was marked up in committee, but the majority never seemed to be able to find the time to bring it to the House floor, which is why today we are dealing with a 2-year authorization for both the current fiscal year, FY 2014, and the coming fiscal year, FY 2015. Now, a great deal has happened since the fiscal year 2013 intelligence bill was approved in December of 2012--everything from Edward Snowden to the sequester, from extreme weather events to drone strikes that also killed innocent civilians, from new technologies and cyber sabotage to protecting our human assets on the ground in dangerous regions. While the underlying bill attempts to deal with these and other issues in a bipartisan manner, some of the choices it makes weaken rather than strengthen our ability to accurately assess potential and real threats to our security. One particularly troubling example is the bill's failure to strengthen the intelligence community's ability to analyze and assess how climate change affects our national security. Over a decade ago, the National Intelligence Estimate--or NIE--noted with grave concern how extreme weather and environmental changes were adversely affecting global food security, as well as increased refugee and IDP populations due to droughts, floods, and other extreme weather events. {time} 0930 The NIE described how such events contribute or can even drive social and political instability, which might threaten our national security interests. Given the acceleration of extreme weather and climate change over the last decade or so, I would think that we would want to encourage our intelligence agencies to analyze the national security implications of climate change, whether that is how storm surges and rising sea levels and temperatures might affect our Navy, or how competition over resources might affect the opening of the Arctic or water wars in the Middle East and northern Africa--but no. Instead, this bill continues the Republican foolishness of pretending that climate change does not exist. Some of my Republicans colleagues would rather stick their heads in the stand. That is not the way to run a government, Mr. Speaker. Over 30 amendments were submitted to the Rules Committee for consideration, and I wish that all of them were made in order under this rule. It doesn't take long to debate 30-something amendments. I believe that the House is fully capable of handling such a debate. After all, we should be pretty rested after a 5\1/2\-day break at the beginning of this week and a 9-day recess starting tomorrow. Surely, we could use the 2\1/2\ days when we are in Washington to actually debate the intelligence bill. Several of these amendments dealt with highly controversial aspects of drone strikes, many of which have killed or wounded innocent civilians. I was glad to see that the U.S. did not carry out any drone strikes for the past month in Pakistan, where our use of drones has contributed to tensions between our two nations. Our colleague and a member of the Intelligence Committee, the gentlewoman from Illinois (Ms. Schakowsky), submitted an amendment to ban so-called signature strikes against unknown targets. Her amendment modestly calls for the U.S. Government to know, with near-certainty, that at least one individual who is a known target will be present before the strike is launched. I am outraged that her amendment was not made in order under this rule. Other amendments, including bipartisan amendments, dealt with increasing the transparency of decisionmaking and reporting from drone strikes; others would have simply banned their use. The U.S. is increasingly dependent on the use of unmanned weaponized aerial vehicles to deliver deadly force against individuals and groups residing or operating in other countries. As we wind down the war in Afghanistan, we need to take a hard look at how we should pursue the so-called global war on terror, especially the use of drone strikes and operations outside the boundaries of international law enforcement. [[Page H5032]] I regret that all of the amendments brought before the Rules Committee dealing with drone strikes were not made in order, as each dealt with a different facet of the policy and each deserved to be debated by this House. I would also like to say a word about the McCollum amendment, which was also denied by the Rules Committee. Our intelligence agencies should never ever use humanitarian work or workers as a cover for covert operations or a means to gather intelligence. Whether we are talking about a vaccination campaign to protect children from polio or the delivery of food to desperate refugees, leave such plots and machinations to the movies. Keep them out of U.S. policy and covert operations. They endanger all humanitarian workers and place obstacles in the way of carrying out urgent and essential global health and humanitarian work in places where too many dangers already exist. Mr. Speaker, before I reserve my time, I also want to point out that this rule contains a provision which makes a change in the procedures for the special Select Committee on Benghazi, which was established by the House just a few weeks ago. The new provision allows the chairman of the new select committee to authorize foreign travel as part of the investigation. Mr. Speaker, the Congress has already conducted seven investigations of the Benghazi matter--seven. Many of us have argued that an additional eighth inquiry is not necessary, but since the House insists on proceeding, we would like to make sure that some of the partisan abuses that marked the previous inquiries will not be repeated by the new select committee, particularly with regard to foreign travel. Mr. Cummings has often protested the partisan abuses of foreign travel at the Committee on Oversight and Government Reform, and I insert in the Record a letter from Mr. Cummings to Mr. Issa, asking him to delay a Republican-only delegation to Libya, so that Democrats could join the delegation as well. House of Representatives, Committee on Oversight and Government Reform, Washington, DC, September 20, 2013. Hon. Darrell E. Issa, Chairman, Committee on Oversight and Government Reform, House of Representatives, Washington, DC. Dear Mr. Chairman: I am writing to request that you immediately postpone your upcoming delegation to Libya and several other countries until you come into compliance with your own Committee directives, stop your partisan efforts to deliberately exclude Democrats from this trip, and provide adequate notice to allow Democratic Members to join this delegation at a later date. On April 6, 2011, upon becoming Chairman of the Committee, you issued a memorandum to all Committee Members entitled ``Rules for Committee-Authorized Foreign Travel.'' According to that memorandum, ``All delegations must be bipartisan.'' Earlier today, however, I obtained a copy of an itinerary for a trip you apparently have been planning to Libya and several other countries next week, presumably as part of the Committee's ongoing investigation into the attack in Benghazi in 2012. The only congressional travelers on this itinerary are you and your Republican staffer. No Democratic Members are listed on the itinerary, and you have not contacted me or my staff about this trip. According to this itinerary, you are planning to leave this Sunday, which means Democratic participation at this late date is impossible. Your 2011 memo also says that the ``purpose must be very specific for each country.'' Yet, your itinerary states only that the Libya portion of the trip is ``TBD,'' although it may include a ``visit'' to the embassy and a ``working lunch.'' Your itinerary does not identify a single U.S. government official, Libyan official, or other individual the Committee plans to interview or speak with during this delegation. Your 2011 memo also says that the only exception to conducting bipartisan international delegations is ``in rare circumstances and at the sole discretion of the Chairman.'' However, you have not identified any such circumstances in this case that would justify excluding Democratic Members. Moreover, I have obtained other documents showing that you have been planning this delegation for more than a week, so there are no exigencies that would have prohibited you from consulting with Democrats. Although you claim that your investigation of the Benghazi attacks is bipartisan, your efforts to secretly plan an official trip to Libya--and then deliberately exclude Democrats from joining--is part of an unfortunate pattern of partisanship that undermines the credibility of this investigation. Last October, Rep. Jason Chaffetz undertook exactly the same partisan maneuver when he traveled to Libya--at your direction--and excluded Democratic Members from that trip. At that time, my staff obtained a last-minute copy of his itinerary that listed the Committee activity in Libya as ``TBD'' and failed to identify any officials to be interviewed. We now know that Rep. Chaffetz met personally with General Carter Ham, the Commander of AFRICOM, as well as Gregory Hicks, the Deputy Chief of Mission, who was then called before the Committee to testify. The problem with these actions is that they effectively deny Democratic Members the ability to effectively investigate this incident. Since your secret delegation appears to violate your own directive to the Committee, I request that you postpone it until such time as Democratic Members are given an adequate opportunity to join. Sincerely, Elijah E. Cummings, Ranking Member. Mr. McGOVERN. In October of 2012, Oversight Committee Republicans went on a delegation to Libya, but they did not inform Democratic members until 24 hours before they departed. In September 2013, Oversight Committee Republicans planned a second delegation to Libya without contacting Democratic members at all. Ranking Member Cummings requested that the trip be postponed to allow Democrats to join, but his request was denied. This is no way to conduct a serious investigation, and this is one of the reasons why so many people on our side of the aisle have called foul over the way the House Republican leadership is dealing with this important issue. So before the House grants any new authorities to the select committee, I would be grateful for some assurance from my chairman that this new authority will not be misused in the highly partisan manner demonstrated by Chairman Issa at the Oversight Committee. Mr. SESSIONS. Will the gentleman yield? Mr. McGOVERN. I yield to the gentleman from Texas. Mr. SESSIONS. I thank the gentleman from Massachusetts (Mr. McGovern) for yielding to me, and I appreciate him bringing this issue up, as he did in the Rules Committee at the time of the hearing. I want to assure the gentleman and each of the Members of this body that the gentleman who will be the new chairman of the committee, the gentleman from South Carolina (Mr. Gowdy), has every intent to make sure that his work, the assignments that will be given as they move forward, including travel, will be done on a fair basis. Mr. Gowdy is aware of and knows the sensitive nature of not only the investigation, but also how this will be handled; and Mr. Gowdy, I assure you, is very prepared to match and to meet the Members that Ms. Pelosi has put on the committee, and I think that you will see that the Members who will serve as a result of the Speaker appointing them will serve with honor and distinction and will work well and fairly together. I thank the gentleman for asking the question. Mr. McGOVERN. I thank the gentleman for his answer and for his reassurances, and we will certainly be watching. In our opinion, fairness means consultation with the Democrats and not leaving us out of the loop. Again, I would point out to my colleagues that the inquiries into the Benghazi situation thus far have been highly partisan, and the Oversight Committee, in particular, I think, has been run in an inappropriate manner. So I appreciate the gentleman's assurances, and we will watch and hope that what the gentleman just said will actually occur. With that, I reserve the balance of my time. Mr. BISHOP of Utah. Mr. Speaker, I reserve the balance of my time. Mr. McGOVERN. Mr. Speaker, I yield 3 minutes to the gentleman from Mississippi (Mr. Thompson), the distinguished ranking member of the Committee on Homeland Security. Mr. THOMPSON of Mississippi. Mr. Speaker, I rise in opposition to this rule that allows for consideration of H.R. 4681, the Intelligence Authorization Act for Fiscal Years 2014 and 2015. I am troubled that just 11 amendments were allowed under the rule and many solid amendments that would enhance oversight and transparency were blocked, particularly an amendment by [[Page H5033]] Representative Gabbard to expand the authority and oversight of the intelligence community by the Privacy and Civil Liberties Oversight Board. With respect to the underlying bill, I would like to discuss a number of provisions that deserve to be highlighted. The bill sets the stage for potentially significant reforms to government contract employees' ability to access classified information that warrant thoughtful consideration by the House and further clarification. Specifically, H.R. 4681 directs the Director of National Intelligence to ensure that elements of the intelligence community engage in continuous evaluation of its employees to detect behaviors that may result in unauthorized disclosures. The bill also directs a cost-benefit analysis of replacing the standard periodic reinvestigation process with automated continuous evaluation programs. While I agree that there are weaknesses in the current security clearance process that warrant reform, it is important that, before wholesale changes are made, Congress expresses its expectations about the scope of such programs, establishes metrics for evaluating their efficacy, and ensures that due process protections for impacted individuals are available. We have an obligation to 5.2 million Americans whose livelihoods depend on maintaining their security clearances to ensure that agencies that establish these programs do so in a manner that guards against abuses, including targeting and retaliation by supervisors, as well as improper or excessive invasions of privacy. The urge to adopt continuous evaluation in response to high-profile incidents involving individuals with access to classified information who violated the terms of their oath is understandable. However, the adoption of continuous evaluation does not absolve the intelligence community of its obligations to bolster the protection of its classified holdings. Regrettably, Mr. Speaker, H.R. 4681 may send the wrong message to agencies, as it does not include language to direct agencies to raise the bar on access controls, thereby giving the impression that our concern is principally about employees' actions and behaviors. The SPEAKER pro tempore. The time of the gentleman has expired. Mr. McGOVERN. I yield an additional 2 minutes to the gentleman. Mr. THOMPSON of Mississippi. I appreciate the gentleman yielding. I also have concerns, Mr. Speaker, about the bill's view of the future of security clearance investigations and adjudications and the degree to which it sets the stage for computers and algorithms to replace humans in the process. Specifically, it direct the DNI to conduct a cost-benefit analysis on reducing or eliminating the manual process for security clearance investigations and adjudications. The guiding principle in the adjudication process is the concept of the whole person, where information is brought to bear to give a picture of an individual. The prospect that we would empower a computer to render judgment of a person's integrity, character, and loyalty to our Nation is troubling. In the coming weeks, I will be introducing a comprehensive security clearance reform bill that, among other things, addresses known weaknesses in the current system, establishes expectations for continuous evaluation programs, and demands proper performance from investigative service providers. It also would greatly expand the resources and responsibilities of the Public Interest Declassification Board. A well-resourced and robust board is essential to increasing accountability of the intelligence community. I am pleased that the underlying bill will renew the authorization of the board. Before I yield back, Mr. Speaker, I would note that, while I am pleased that the bill authorizes intelligence operations within DHS, I am disturbed that, in advance of today's vote, members of the Homeland Security Committee staff were not granted access to the classified annex of this legislation, as it is relevant to the committee's oversight jurisdiction. I would hope that, as this bill moves through the legislative process, the stovepipes that exist within this Chamber that hinder critical information-sharing and oversight can be overcome for the benefit of the American people. Mr. BISHOP of Utah. Mr. Speaker, I reserve the balance of my time. Mr. McGOVERN. May I inquire of the gentleman if he has any additional speakers? Mr. BISHOP of Utah. I am ready to close whenever you are. Mr. McGOVERN. Mr. Speaker, I yield myself the balance of my time. I urge my colleagues to oppose this rule for all of the reasons I stated earlier, but, Mr. Speaker, I want to close with one final thought: this intelligence bill includes several provisions regarding the use of contractors, security clearance reform, strengthening investigations by the inspector general, and so on. We need to recognize that these reforms were not initiated by us. They are a result of the massive release of leaked information that brought very serious matters about actual and potential abuses by our intelligence agencies on how they monitor and maintain data on ordinary law-abiding citizens. This leaked information caused alarm throughout our society, by our constituents, by our press, and by Members of Congress--and rightfully so. It caused alarm among some of our closest international allies--and rightfully so. So while we may hold different views about the individual who confiscated and leaked the information, let us all recognize that none of the NSA and FISA reforms recently passed by this House--and none of the reforms included in this bill--would have happened if that information had not been leaked because we would not have known about the abuses being carried on in our name by various intelligence agencies. Mr. Speaker, I respect those men and women who serve our Nation in our intelligence agencies, but I don't respect a culture that intentionally keeps the American people and the Congress in the dark about the extent and nature of our intelligence operations. More reforms are still needed; more transparency is still needed. I believe we can be safe and protect the American people without sacrificing the liberties that we all treasure. With that, I yield back the balance of my time. {time} 0945 Mr. BISHOP of Utah. Mr. Speaker, I yield myself such time as I may consume. I am actually pleased to stand before the House today in support of this rule as well as the underlying pieces of the legislation, H.R. 4681 about intelligence and H.R. 4745 called the T-HUD bill. From the testimony that we received in the Rules Committee on these measures, it appears that both of these measures have enjoyed bipartisan cooperation in their formation and from their respective committee processes. One of the toughest responsibilities that a Member of the Congress has is to help prioritize the Federal expenditures of resources that we take from the American people. Sometimes, worthy projects and programs have to be trimmed to meet budget requirements and prioritization. While there are some spending choices--which I disagree--contained in H.R. 4745, overall, it is still a balanced measure which will provide for American infrastructure so essential for the economic growth and jobs, and maintains discipline by adhering to the top-line funding levels arrived at through that 2-year budget agreement that was passed by Congress. The $52 billion for transportation provided in these agencies is $7.8 billion below the President's request and still actually $1.8 billion less than the 2014 enacted level. Members have a chance, under the open rule of this resolution provided, to argue for changes in the prioritization. I am pleased that one of the things this bill recognizes is that States are different. Those of us who live in the wide-open West have been able to use transportation to help the desert blossom. We should not try to restrict every State to the same standards with a one-size-fits-all approach. The committee was very wise in what they actually did. Announcement by the Speaker Pro Tempore The SPEAKER pro tempore. The gentleman will suspend. The Chair would ask occupants of the gallery to cease audible conversation. [[Page H5034]] Mr. BISHOP of Utah. Mr. Speaker, switching gears to the intelligence reauthorization measure, every Member of the House takes seriously our responsibility to preserve individual liberty and freedoms under the Constitution. We also have a constitutional obligation to provide for the common defense, because without a strong national defense, which includes the indispensable work of the defense intelligence agencies, personal freedoms are also at risk. The question is achieving and maintaining a balance in deciding how to best preserve inalienable constitutional rights against possible incursions by technologists, whether inadvertent or intentional, as our Nation deals with the very real threats both at home and abroad. Technology gives us wonderful tools, but it can also be a fertile ground for abuse of privacy. We have a responsibility as Members of Congress to exercise oversight in U.S. intelligence agencies, and that can be difficult since much cannot be debated in open forums with any degree of specificity without bringing great harm to the national security. That is why we have the expertise of standing committees. Not only do they understand these issues, it saves time by allocating the proper amount of time to the discussion of these issues in advance. And from the testimony received in the Rules Committee, I believe that Chairman Rogers and Ranking Member Ruppersberger have demonstrated a strong bipartisan commitment on this issue. Provisions of this bill are aimed at bolstering personal and individual privacy. Passage of H.R. 4681, when you combine it with the passage last week of the U.S. FREEDOM Act, is a good step towards enhancing our U.S. intelligence capability as well as congressional oversight on these issues. It is a good bill. It is a fair rule. I urge its adoption. Ms. JACKSON LEE. Mr. Speaker, I rise to speak on the Rule for H.R. 4681, the ``Intelligence Authorization Act for Fiscal Years 2014,'' and H.R. 4745, the ``Transportation, Housing and Urban Development and Related Agencies Appropriations Act of 2015. H.R. 4681 is a bill authorizing appropriations for our nation's intelligence agencies for Fiscal Year 2014 through Fiscal Year 2015. The bill provides funds for the conduct of intelligence and intelligence-related activities. H.R. 4745 makes appropriations for the Departments of Transportation, and Housing and Urban Development, and related agencies for the fiscal year ending September 30, 2015. Our nation is long past due for a Transportation and Housing and Urban Development Appropriations bill. This bill is about jobs--jobs-- jobs. Unfortunately, H.R. 4745's $17.1. billion in discretionary appropriations for the Department of Transportation for fiscal year 2015, is $727.3 million below the funding for fiscal year 2014. Included in the legislation is $15.7 billion in total budgetary resources for the Federal Aviation Administration (FAA), which is $7.3 million below the fiscal year 2014 enacted level and $446 million above the request. This will provide full funding for all air traffic control personnel, including 14,800 air traffic controllers, 7,300 safety inspectors, and operational support personnel. The bill also fully funds the FAA's Next Generation Air Transportation Systems (NextGen) at $852.4 million, and funds Contract Towers at $140 million. These investments will help ease future congestion and help reduce delays for travelers in U.S. airspace. The Bush Intercontinental Airport and William P. Hobby Airport will benefit from funding provided under this bill: nearly 40 million passengers traveled through Bush Intercontinental Airport (IAH) and an additional 10 million traveled through William P. Hobby (HOU); more than 650 daily departures occur at IAH; IAH is the 11th busiest airport in the U.S. for total passenger traffic; IAH has 12 all-cargo airlines handles more than 419,205 metric tons of cargo in 2012. The funds being sent back to states will repair critical transportation infrastructure that is vital to local, state and the national economy. Further the bill provides for funding for our Nation's housing and urban development programs that fund block grants, special housing programs that serve our Nation's elderly, young, disabled, and veterans. The legislation includes a total of $40.3 billion for the Department of Housing and Urban Development, a decrease of $769 million below the fiscal year 2014 enacted level and $2 billion below the Administration's request. The bill does not contain funding for any new, unauthorized ``sustainable,'' ``livable,'' or ``green'' community development programs. Affordable safe housing is vital to the well-being of elderly, low- wage workers, the unemployed, under-employed, disabled persons and our Nation's veterans. In 2012, Texas ranked second among the 50 states among states with workers earning at or below the federal minimum wage. According to the U.S. Bureau of Labor Statistics, of the 6.1 million workers paid hourly rates in Texas in 2012, 282,000 earned exactly the prevailing federal minimum wage of $7.25 per hour, while 170,000 earned less. In the State of Texas the percentage of persons living in poverty makes the funds provided for housing and mass transit systems including light rail critical: 34% of children live in poverty; 21% of adults (19-64) live in poverty; and 17% of elderly live in poverty. The funds provided will make it possible for low wage workers to have affordable options for travel as well as support access to affordable housing. SECTION 8 AND PUBLIC HOUSING Included in the bill is $26.3 billion for Public and Indian Housing. This is an increase of $6.2 million above the fiscal year 2014 enacted level and $1.2 billion below the requested level. This funding will provide for continued assistance to all families and individuals currently served by this program. The bill also fully funds the President's request for veterans' housing vouchers at $75 million. COMMUNITY PLANNING AND DEVELOPMENT The bill contains $6.2 billion for Community Planning and Development programs--a reduction of $383 million below the fiscal year 2014 enacted level. The Community Development Block Grant formula program is funded at $3 billion--effectively equal to last year's level. HOME Investment Partnerships Program is funded at $700 million, a reduction of $300 million below the fiscal year 2014 enacted level. Homeless assistance grants are funded at $2.1 billion--the same as the previous year's level--which is sufficient for all current grants to be continued. My thanks to the House Rules Committee for making my amendment in order under the rule for H.R. 4681, the Intelligence Authorization Act for Fiscal Year 2014. The Jackson Lee Amendment is simple and one that the majority of the House can support. The Jackson Lee Amendment requires the Director of the Office of National Intelligence to conduct an assessment of the reliance of intelligence activities on contractors to support Government activities, including an assessment of contractors performing intelligence activities, which would include intelligence analysis. I want to thank the Permanent Select Committee on Intelligence for including my amendment in an en bloc for consideration during the debate on amendments, which will take place later. I will speak more on the Jackson Lee Amendment when it comes before the House for consideration under an en bloc amendment to H.R. 4681. Mr. BISHOP of Utah. Mr. Speaker, I yield back the balance of my time, and I move the previous question on the resolution. The previous question was ordered. The resolution was agreed to. A motion to reconsider was laid on the table. ____________________ [Congressional Record Volume 160, Number 83 (Friday, May 30, 2014)] [House] [Pages H5034-H5056] INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2014 AND 2015 General Leave Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that all Members may have 5 legislative days to revise and extend their remarks and include extraneous material on the bill, H.R. 4681. The SPEAKER pro tempore (Mr. Bishop of Utah). Is there objection to the request of the gentleman from Michigan? There was no objection. The SPEAKER pro tempore. Pursuant to House Resolution 604 and rule XVIII, the Chair declares the House in the Committee of the Whole House on the state of the Union for the consideration of the bill, H.R. 4681. The Chair appoints the gentleman from Texas (Mr. Poe) to preside over the Committee of the Whole. [[Page H5035]] {time} 0951 In the Committee of the Whole Accordingly, the House resolved itself into the Committee of the Whole House on the state of the Union for the consideration of the bill (H.R. 4681) to authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, with Mr. Poe of Texas in the chair. The Clerk read the title of the bill. The CHAIR. Pursuant to the rule, the bill is considered read the first time. The gentleman from Michigan (Mr. Rogers) and the gentleman from Maryland (Mr. Ruppersberger) each will control 30 minutes. The Chair recognizes the gentleman from Michigan. Mr. ROGERS of Michigan. Mr. Chairman, I yield myself such time as I might consume. The Intelligence Authorization Act is the annual blueprint for the work of the intelligence community and America's military intelligence efforts. The bill sets the priorities for our critical intelligence efforts and the legal framework of guidance and oversight for those efforts. Since the ranking member and I have assumed the leadership of this committee, we passed three intelligence authorization bills in a bipartisan fashion and hope to continue the tradition and trend with H.R. 4681. Passing a yearly intelligence authorization bill is the primary method by which Congress exerts its budgetary and oversight authority over the intelligence community. As most of the intelligence budget involves highly classified programs, the bulk of this committee's recommendations each year are found in the classified annex to the bill which have been available for Members to review. Among other initiatives, the bill increases funding to address insider threats and improve personnel security programs. At an unclassified level, I can report that the annex for fiscal year 2014 authorizes funding that is slightly below the President's budget request level. Its funding levels are in line with the levels appropriated by the enacted appropriations act for the National Intelligence Program and with the National Defense Authorization Act for the Military Intelligence Program. For fiscal year 2015, the bill increases the President's budget request by less than 1 percent and stays within the Bipartisan Budget Act funding caps. The modest increase reflects the committee's concern that the President's request does not properly fund a number of important initiatives and leaves several unacceptable shortfalls. The legislative provisions that the committee and Congress consider each year are comprised of changes to statute that better enable the community to conduct its important mission and strengthen oversight mechanisms where needed. Mr. Chairman, we find ourselves in a very interesting time in history. Al Qaeda has metastasized into dangerous affiliates, safe havens have emerged in Syria, parts of Libya, Yemen, Somalia, and the tribal areas of Pakistan. Al Qaeda is also regaining a foothold in northeast Afghanistan just as the President announced a complete withdrawal of U.S. military forces and the counterterrorism capability that comes with it by the end of 2016. Uneven leadership in recent years has emboldened adversaries like Russia and China, who are increasing their military and intelligence spending and working to change the international order, as we speak, to the detriment of U.S. interests. Russia occupies 20 percent of the nation of Georgia, invaded and occupied Crimea, threatens invasion of eastern Ukraine. China is bullying its neighbors and expanding claims in the South and East China Seas through which 40 percent of world trade travels. At the same time, North Korea continues its belligerent behavior, and Iran is maneuvering to preserve its capability to develop a nuclear weapon. A nuclear Iran would threaten Israel with annihilation and send the Middle East into a dangerous nuclear arms race. We rightly demand that our intelligence agencies provide policymakers with the best and most timely information possible on all these and other threats. We ask them to track terrorists wherever they train, plan, fundraise. We ask them to stop devastating cyber attacks that are stealing American prosperity and American jobs. We ask them to track nuclear and missile threats. And we demand that they get it right every time. Now we are asking them do it with fewer resources and with what can be described as confusing direction from our Commander in Chief. The dedication of men and women of the intelligence community who volunteer to serve in some of the most difficult places on Earth are some of the finest patriots I have ever had the privilege to meet. And within budget constraints and unclear policy guidance from the White House, this bill ensures that they have resources and authorities necessary to keep our Nation and our people safe and accomplish their mission. As this is the last authorization act I will advance as chairman of the Intelligence Committee, I want to publicly thank my ranking member, my friend, Dutch Ruppersberger. I can't tell what you a privilege it has been to have a partner like Dutch in working through some very difficult issues at a very difficult time in our Nation's history. National security policy should not be partisan, and we have done everything in our power to ensure that this committee at least takes as nonpartisan a view of national security as is humanly possible. It is an honor to work with someone who is also interested in governing and in making progress on an issue so important to our Nation's future. I would like to thank the Chair and urge Member support of H.R. 4681, and I reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chair, I yield myself such time as I may consume. Chairman Rogers, I thank you for your comments. I also have the same comments for you. When we took the leadership of this committee, we knew that the stakes were so high and that we had to work together on behalf of the people of the United States of America. We came together with Republicans, Democrats, liberals, conservatives, moderates, all realizing that we had to come together. Because of your leadership, because of your focus, we have been able to pass FISA, and hopefully we will be able to pass these bills today. We are going to miss you, but you will always be there as my friend, and I will always respect you as a great American who cares about the United States. Thank you. Now, we need to pass this Intelligence Authorization Act for Fiscal Years 2014 and 2015 to ensure rigorous oversight and accountability over all U.S. intelligence agencies and all U.S. intelligence activities. This is so important. We cannot go back to the days when we give the intelligence agencies a blank check to spend as they see fit. We must have oversight. Remember, Congress specifically amended the National Security Act of 1947 to replace blanket intelligence appropriations with specific authorization. Why did we do this? To ensure that our intelligence agencies spend money only on programs of which Congress is informed and approves. So today we need to make sure we maintain this means of critical oversight by passing the bill. The Intelligence Authorization Act for 2014 and 2015 is in four parts: the unclassified legislative text; the unclassified report; the classified annex, which explains our intent for the classified aspects of the bill; and the classified schedule of authorizations for both fiscal years. We have been encouraging all Members to review all parts of the bill, and I am pleased to say that they have come to the Intelligence Committee's SCIF, classified spaces, to do so. The budget for fiscal year 2014 is slightly below the President's budget request, while the budget for fiscal year 2015 is less than 1 percent above the President's budget request. {time} 1000 We both, we made cuts to certain areas and added money in other areas in a responsible, well thought-out way, and a fiscally prudent way. [[Page H5036]] Since Chairman Rogers and I assumed leadership of the committee, we reduced the Intelligence Committee's budget by 20 percent, but this year's bill acknowledges the need to right the ship after the storm of sequestration. The bill sets the priorities of our intelligence professionals and their agencies, and it allocates resources to critical national security programs, including those that detect, prevent, and disrupt potential terrorist attacks. Let me also mention some specifics. The bill continues to emphasize the value of our satellites; scales back the intelligence community's use of contractors; pushes for further improvements in the continuous evaluation of insider threats; provides critical forward-looking funding for Navy airborne intelligence surveillance reconnaissance to maintain military intelligence capabilities during the transition to newer, more capable aircraft; and invests in both the recruitment and retention of the best and the brightest for our cyber workforce, particularly within the FBI. Our younger generation, we must educate them and have them work in this area. We have spent months poring over this bill and its specific authorizations in great detail--in our committee spaces, at the agencies, and in the remotest corners of the Earth where our intelligence professionals operate--and then I can say this is a very good bill, and I am proud to support it. Many of the amendments on the floor today also promise to make a great bill even better. For the sake of keeping the country and its allies safe, and for the sake of rigorously overseeing even the most classified intelligence programs, I urge my colleagues to pass this bill today. I reserve the balance of my time. Mr. ROGERS of Michigan. Mr. Speaker, I yield 3 minutes to the gentleman from North Carolina (Mr. Pittenger). Mr. PITTENGER. Mr. Chairman, I thank Chairman Rogers for this opportunity to speak. I just really want to commend you for your exceptional leadership as a Member of this body and for your service on behalf of the security of our Nation. Over the past year, it has really been a privilege to get to know you and work with you on several initiatives. I am just grateful for the way that you handle the people's business, look forward to working with you more, and also congratulate you on your future endeavors. The legislation before us today provides the intelligence community the authorization needed to protect and defend the United States and supports critical national security programs, such as those protecting Americans against terrorism and cyber attacks. As Members of Congress, we took an oath to the Constitution, which sets forth our duty to provide for the defense of the United States. Passing the yearly Intelligence Authorization Act is a critical component of living up to our constitutional obligations, ensuring America's intelligence agencies have the resources necessary to keep Americans safe. Passing the intelligence authorization is also vital to our important responsibility of providing oversight to the current administration. This legislation ensures Congress, and not the executive branch, is controlling how taxpayer money is being spent on intelligence activities and doing so in the most efficient and effective way possible. We must remember that we have not defeated the threat of terrorism. The terrorists we face today are not a backyard gang; they are sophisticated and have access to the most modern of technologies. Over the last 2 years, we have seen the number of worldwide deaths from terrorism attacks double from 10,000 in 2012 to 20,000 in 2013. The fact that we in America are able to sleep soundly at night is a credit to the men and women who serve our country selflessly. We must continue to provide these brave men and women every tool possible as they continue to provide for our safety. That is why I encourage all my colleagues to join me in supporting this legislation. Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to the gentlewoman from Illinois, Jan Schakowsky, my good friend and a member of our committee, who has been very thoughtful and has allowed us to do the things that we needed to do. Ms. SCHAKOWSKY. Mr. Chairman, I thank the ranking member for yielding. I want to begin by saying that I really appreciate the way in which our committee operates and has come to present this authorization bill to the floor, but I do want to raise some concerns. One of the most controversial issues surrounding our national security is the use of the drone program. A number of us tried to introduce some amendments that would be considered on the floor of the House so that we, along with the American people, could have a conversation about that. These amendments were not made in order. And I want to express what my amendment would have done. It would have prohibited elements of the intelligence community from engaging in so-called signature strikes. That is, lethal strikes in which the target is not specifically identified but whose so-called pattern of life fits the profile, or signature, of a terrorist. In these situations, we don't know the identity of the target. Instead, we draw conclusions from surveillance about whether someone is affiliated with a terrorist organization, or engaged in terrorist conduct. The stakes are high, and inevitably mistakes will be made. There are reports from human rights organizations in past years that we have already made several grave errors, and innocent lives have been lost as a result. We need to recognize that each mistake we make in these situations killing innocent people spawns more numerous and more determined adversaries, undermining our mission there in the first place. How we are perceived abroad matters. Even if some of the strikes reported as mistakes are not mistaken, the fact is that the rest of the world perceives our activities as killing innocent civilians and painting all adult male Muslims in these regions as our enemies. I understand the targeted use, but I think that we cannot kill our way out of this problem and our way to victory. Mr. ROGERS of Michigan. Mr. Chairman, I yield myself such time as I may consume. Mr. Chairman, I just want to thank the gentlelady from Illinois for her strong and passionate position that she takes on some of the counterterrorism strategy issues that are very well debated and certainly well discussed and well overseen in the spaces where appropriate and under the appropriate form and function to do that because they are significant. There is no aspect of that counterterrorism strategy that isn't reviewed both in policy leading up to the daily and monthly counterstrategy meetings that happen in the appropriate agencies and departments and as a part of regular oversight of these particular programs. But I do think it is important to understand something: that all of the focus seems to be on the type of a weapon system that we have used or decided to use or may be using to fight what is a large and growing threat to the United States of America. I think it was interesting that in the Boko Haram case of the 300 girls, it caught the world's attention, that you could have a group that would be so diabolical that they would kidnap 300 girls and sell them into slavery or force them into marriage and do other unspeakable things. Yes, that is right, that is who these groups are. This is the same group that has threatened the United States of America with terrorist attacks. It is an al Qaeda affiliate. We have watched them cut off the heads of other human beings for the purposes of intimidation, we have watched them cut off hands, we have watched them shoot little girls who get on buses to try to go and get an education. We need to understand what threat faces the United States of America. Because our intelligence services have been so good and so aggressive, we haven't had an attack here in the same 9/11 fashion--and some of that, by the way, was just sheer luck preparing for the opportunity to catch them. We need to step back and make sure we are understanding what we are trying to accomplish here and how we try to accomplish it. I think disparaging the very men and women who I know [[Page H5037]] spent hours and months and years in preparation for any counterterrorism strategy that we engage in, and do it in a way that is so responsible--I think Americans would be so proud if they had the opportunity to sit down and talk with these people about how they get to where they are. But I will tell you, aspects of that counterterrorism strategy--some have been referenced--are the most impactful, disruptive activity we have been able to do to stop attacks against the United States and our allies overseas. So I just again caution in this vacuum of safety and relative security that so many have given us, we should be cautious about what we are asking changes to do--and what that would mean for exposure of, say, U.S. pilots or U.S. Special Forces--that we have not had to do for some length of time and still accomplish the mission. By the way, I can clearly say that any reference to some mass civilian casualties or collateral damage is absolutely false, it is false, it is a false narrative for those who seek to stop an effort that we know, in fact, is degrading the ability for attacks against the United States. I reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I yield 3 minutes to the gentleman from California, Mr. Adam Schiff, a valued member of our Intelligence Committee, who has worked closely with me and our committee on very important issues. Mr. SCHIFF. Mr. Chairman, I thank the gentleman for yielding. I rise in support of the Intelligence Authorization Act for Fiscal Years 2014 and 2015. This bill provides the resources and support the intelligence community needs to accomplish their mission while enhancing oversight in several important respects. I want to commend the bipartisan leadership of Chairman Rogers and Ranking Member Ruppersberger on this bill. I congratulate them on, again, advancing an Intelligence Authorization Act. I also want to acknowledge my colleague from Nevada, Dr. Heck, for his work with me on the Technical and Tactical Subcommittee. Chairman Heck did a fabulous job supporting investments in technology and capacity that will pay dividends in years to come. In addition to funding our intelligence priority, the bill includes important new provisions to improve greater oversight of the NSA and other IC elements. It creates an independent inspector general within the NSA who will be fully empowered to investigate abuse, waste, and fraud. The bill also requires an annual report to the Intelligence Committees on violations of law and executive order, including Executive Order 12333. This provision fixes a blind spot under current law and improves the Intelligence Committee's capacity for oversight. While I support the bill, I was disappointed that an amendment I proposed with my colleague Walter Jones was not made in order. This amendment would have required an annual public report on the total number of civilian and combatant casualties caused by drone strikes. By publicly reporting on the use of drones, we would provide additional accountability and transparency, helping to ensure the legitimacy of the actions that we take overseas. The report would also provide a counterpoint to the inflated estimates of civilian casualties frequently seen in the news, in part due to active efforts of our enemies to mislead. I plan to continue working with my colleagues on the committee to provide greater transparency, but this is a very simple method of doing so. In sum, it would simply require that there be an annual accounting of how many combatants are killed and how many noncombatants are killed. It would also have required that the administration or the DNI define those terms so we understand who is being defined as a combatant or noncombatant. The President has set a high standard for the use of drones, that they not be used unless there is a near certainty there will be no civilian casualties. This is a way of holding us accountable to meet that very high standard. It is also, I think, all the more important when we consider that, while we may be the first Nation to use drones in this capacity, we will not be the last, and the standard that we set or fail to set will be one that may be emulated by others around the world. I support this bill. I wish we had the opportunity on the floor to vote on this amendment, but I look forward to working with the committee in the years that follow to incorporate this provision and others to improve transparency and accountability. Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to the gentlewoman from Illinois (Ms. Kelly), a great Member of Congress. Ms. KELLY of Illinois. Mr. Chairman, I thank the chairman and ranking member for their hard work on this important legislation. Every day, America faces threats to our national security. Some threats are evolving, like cyber attacks on our infrastructure. Some are emerging, like the radicals of Boko Haram. And some are right in front of us demanding direct action. Because we face a diverse array of threats, our security depends on an intelligence community that is equally diverse. In a 2011 address to Morehouse College, CIA Director Leon Panetta stated that we need an intelligence community with a workforce that reflects the world it engages. {time} 1015 My amendment helps the intelligence community meet its strategic diversity goals by providing grants to predominantly black institutions that educate future generations of intelligence experts through advanced language training, study abroad, and cultural immersion programs. To remain globally secure, we must have human assets on the ground who can blend in easily abroad, especially in Africa and the Middle East. Overcoming cultural, language, and educational barriers is critical to achieving this goal. I ask that my colleagues support this commonsense amendment. Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to the gentlelady from Texas, Sheila Jackson Lee, a great Member of Congress. Ms. JACKSON LEE. Let me thank the ranking member for yielding and, as well, the chairperson, and let me collectively add my appreciation for the two leaders of this committee. They have committed themselves, without question, to the security of this Nation. I thank them for their collaboration. Mr. Rogers, I thank you for the work that you have done for the Nation and, certainly, for the commitment that you have made to the very important business of this committee. Mr. Ruppersberger, let me thank you for your friendship as well and for the continued collaboration on an issue of great concern to me, but I will speak generally about this legislation and will, again, acknowledge some of the issues that you have looked at and considered and have even included in this legislation as it comes forward. Mr. Chairman, I agree that detecting and disrupting and preventing a national security crisis is of paramount responsibility for this committee and many others, including the committee that I serve on, the Committee on Homeland Security. For that reason, I have interfaced with this committee on a number of issues. I am very glad to note, in particular, that the issue of dealing with the expansive use that has been used, which I will talk about in the en bloc amendment, is clearly something that we should have considered, and in this bill, it did. It got its hand around the enormous use of outside contractors in the intelligence business, and it emphasized recruitment and training. That is positive. There are young, bright persons who I know are willing to serve their country, and this legislation has committed itself to doing that. Now, particularly with this legislation, I also want to appreciate the collaboration between the Judiciary Committee and this committee on the USA FREEDOM Act, and I want to say to America that we have corralled the megadata collection. We have done it in a bipartisan manner, and we will do more and do better. So it is with appreciation for this legislation and in thanking the committee for working with my staff on [[Page H5038]] my amendment that I ask my colleagues to support this legislation. Mr. Chair, I rise to speak on H.R. 4681, the Intelligence Authorization Act for fiscal year 2014. I want to thank the Permanent Select Committee on Intelligence for including my amendment in an en bloc. My amendment to H.R. 4681 is simple and will be an important addition to the legislation, which I believe can be supported by every member of this Committee. My amendment seeks greater transparency to Congress on the people who the Nation relies upon to perform certain types of work required of the Intelligence Community. The Jackson Lee amendment requires the Director of the Office of National Intelligence to conduct an assessment of the reliance of intelligence activities on contractors to support Government objectives, including an assessment of contractors performing intelligence activities, which would include intelligence analysis. The amendment would seek information on the skills necessary to perform intelligence related work and whether Federal employees had these skills. The amendment would also seek statistics on contractors preforming intelligence related work for agencies under the purview of the Office of the Director of National Intelligence. Something is very wrong when the process for screening and vetting government contractors does not identify someone who would have access to--as well as the ability to collect and remove sensitive information from government computers and publicly disclose that information. If each person working in an intelligence role within the government decided to act on their own thoughts for their own purposes on whether they would or would not keep their oath to defend and protect our Nation's secrets then there would be chaos. Our Nation suffers harm in ways we can see, as well as ways that we cannot see when unauthorized disclosures regarding intelligence resources occur. It harms our ability to work with other nations who rely on our ability to keep secret the information they share with our Nation's intelligence agencies. If our global assets and allies cease to trust our ability to keep their work with our intelligence, national defense or diplomatic agencies secret then they will not cooperate with us in our efforts to defend our Nation and our interest around the world. Reckless disclosures make us vulnerable to our Nation's enemies who could make changes to how they hide information because the disclosure of national secrets reveals means and methods. The world is a dangerous place--we have seen within the last 18 months--a bombing during the Boston Marathon, the rise in sectarian violence in Syria that included incidents involving the use of nerve gas; and Boko Haram which kidnapped nearly 300 girls from their school in northern Nigeria. According to the United States Department of State Country Report on Terrorism 2013, published in April of this year indicates that there are 53 Foreign Terrorist Organizations (FTOs). Designation of FTOs is important to our Nation's fight against terrorism and is effective in cutting off support for those groups so designated. In 2013, Ansar al-Dine, Boko Haram, and Jama'atu Ansarul Muslimina Bi Biladis-Sudan were added to the list of FTOs. FTOs are legally defined under Section 219 of the Immigration and Nationality Act, which states the group must be: a foreign organization; engage in terrorist activity or retain the capacity and intent to engage in terrorist activity or terrorism; and participating in terrorist activity or terrorism that threatens the security of the United States or its citizens. United States' National security encompasses national defense, foreign relations, or economic interest. The unauthorized intelligence disclosures last year impacted U.S. national security. The intelligence breach came as a result of a government contractor making public sensitive information is still resonating both internationally and within the United States, where an important debate on privacy and civil liberties is still ongoing. But also around the world the consequences of the unauthorized release of international activity by intelligence agencies is still playing out. The timing of the release of information on the non-U.S. activity of our intelligence agencies caused tremendous tension in our relations with allies at a time when the United States was working to form a global response to the use of chemical weapons against civilians in Syria. In addition to frustrating our efforts to form a strong global response to the use of chemical weapons in Syria it also caused economic harm to U.S. companies internationally. Congress is not able to fully investigate the circumstances that resulted in last year's intelligence breach because the person with many of the answers to questions many of us have is now living in Russia. However, we can look prospectively on how the work of the Intelligence Community under the direction of the Office of the Director of National Intelligence should fill positions that require security clearances. The intelligence work by contractors and Federal employees is critical to the protection of the United States and our interest both domestically and around the world. We should approach the work of the intelligence community as we do when considering the work of the Department of Defense. The work that our Intelligence professionals perform is critical, and a defense in depth approach is necessary to assure that no matter the challenge or the circumstances there will be well trained professionals in place to do what must be done to defend and protect the nation. The Office of the Director of National Intelligence 2013 Report on Security Clearance Determinations provides information on the number of persons with security clearance levels of Confidential, Secret, or Top Secret and had access to classified information as well as those who were favorably adjudicated but did not have access to classified information. I would like to acknowledge the work of the Special Security Directorate (SSD) of the Office of the National Counterintelligence Executive for compiling and processing the data for this report. The 2013 Report on Security Clearance Determinations states that by October 1, 2013 the Nation had 3,738,026 Federal agency employees working for the: Office of the Director of National Intelligence Scattered Castles; Department of Defense; Joint Personnel Adjudication System; Office of Personnel Management; and Central Verification System (CVS). In addition to surveying these agencies a special data call was made to the seven intelligence community agencies with delegated authority to conduct investigations or adjudications to fulfill specific reporting requirements directed by the fiscal year 2010 Intelligence Authorization Act for Fiscal Year 2010. These agencies were the: Central Intelligence Agency; Defense Intelligence Agency; Federal Bureau of Investigation; National Geospatial-Intelligence Agency; National Reconnaissance Office; National Security Agency; and Department of State. In 2013, the total number of persons with a Confidential, Secret or Top Secret security clearance totaled 5,150,379 individuals--of this number 3,738,026 were government agency personnel, 1,056,309 were contractors and 356,044 were categorized as other. Between January and October 1, 2013 there were 777,168 security clearances approved--152,490 were government agency employees and 131,209 were contractors with an additional 12,785 designated as other. Congress must have the ability to make decisions regarding how intelligence agencies fill positions that require security clearances because it has implications for the appropriations process. The Information Security Oversight Office of the National Archives 2012 Report to the President focuses on the classification practices of intelligence agencies. The report addresses the power of ``original classification authorities'' also called ``original classifiers,'' which are individuals designated with Top Secret original classification authority to classify information. Only original classifiers are authorized to determine what information, if disclosed without authorization, would be expected to cause damage to national security. The original classification authority process comes before all other aspects of the security classification system. In 2004, the total number of original classifications was 351,150 and in 2012 the number was 74,477. The cost of government security classification in 2005 was $7.66 billion and in 2011 the total was $11.36 billion. The amount expended in 2011 included: 5.65 billion for protection maintenance; 1.53 billion for security management oversight and planning; 502.51 million for professional education, training and awareness; 352.4 million for classification management; and 52.76 million for declassification. These costs cited are not all encompassing, but were generated by 41 executive branch agencies including the Department of Defense. The funds expended do not include activity by the Central Intelligence Agency, the Defense Intelligence Agency, Office of the Director for National Intelligence, the National Geospatial- Intelligence Agency, the National Reconnaissance Office, and the National Security Agency. The focus on training is critical in the work of the Intelligence Community and it is important that this is a high priority for the agencies represented in the National Archive report. [[Page H5039]] The work by the Intelligence Community to address classification in an evenhanded way can help create and maintain a firm basis for classification of information that is sustainable can go a long way in addressing questions regarding what secrets are critical to our nation's national security and what the public has a right to know. I thank my colleagues on the Intelligence Committee for their hard work in bringing this bill before the full House for consideration. I ask that members of the Congress vote in favor of this bipartisan en bloc amendment to H.R. 4681. Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, may I inquire as to how much time I have remaining? The CHAIR. The gentleman from Maryland has 17 minutes remaining. Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to the gentleman from Vermont, Mr. Peter Welch, my good friend and a great Member of Congress. Mr. WELCH. I thank the gentleman. I thank you for your good work. Mr. Rogers, I thank you for your good work, and we are going to miss you. Your leadership on the Intel Committee has been of great benefit to this institution. Thank you. Mr. Chairman, I have been working with a number of my colleagues, particularly with Cynthia Lummis of Wyoming, on a question that we think is quite important to the security status of our country, and that is more transparency in the budget. This is debated because, by definition, if it is intelligence activity, it is ``secret,'' but on the other hand, the whole point of having transparency in budgets is so the rules of accountability apply across the board. We have 16 different intelligence-gathering agencies, and in all cases, the topline budget is absolutely secret. The 9/11 Commission that was a bipartisan commission of respected national security credentialed people--Lee Hamilton and the Governor of New Jersey, Governor Kean--recommended that this topline number in the intelligence agency budgets be transparent. Why? So that there is a basis for taxpayers and for all of us to start to evaluate whether we are getting our money's worth, whether there is duplication in efforts, whether one agency is stumbling into another, whether there is coordination, whether there is cooperation. The same reasons that we would have the food stamp budget subject to rigid review and accountability applies as well to our security. In fact, it is enormously important that this country be getting its money's worth. The principle of transparency would not in any way compromise, in the view of many respected intelligence leaders like Lee Hamilton, the intelligence gathering and the effort and responsibility to keep us secure. So I was disappointed that we were not allowed to have an amendment on that bill, but I do appreciate the willingness of the ranking member to work with me and also of the chairman to listen to many of us in this body who would like that opportunity to make the case that Lee Hamilton made for transparency. Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I yield myself such time as I may consume. I thank the gentleman from Vermont (Mr. Welch) for his diligent work in the area of transparency on behalf of the American people. As we have seen in this last year, trust in the intelligence community by the citizens it serves is incredibly important. As the ranking member of the House Intelligence Committee, we take seriously the responsibility to provide to the public as much information as possible while protecting sensitive sources and methods. When classification permits, the budget of the intelligence community has been released. In other cases, the American people rely on our committee and on all of their Representatives, like Representative Welch, to review the budget of the intelligence community on their behalf. I look forward to working with Representative Welch to continue to find ways to increase the trust of the American people in the intelligence community as it relates to transparency. I reserve the balance of my time. Mr. ROGERS of Michigan. Mr. Chairman, I continue to reserve the balance of my time for the purpose of closing. Mr. RUPPERSBERGER. Mr. Chairman, I yield myself such time as I may consume. For the sake of rigorous oversight and accountability over all U.S. intelligence agencies and all U.S. intelligence activities, I urge my colleagues to vote for this important, bipartisan bill. I also urge my colleagues to support this bill for the sake of our brave intelligence professionals, who, like our military, work day and night, often in the most austere of places, to keep us safe and our allies safe; and for the sake of all of us--not just in America, but around the world--who benefit from the work of our intelligence agencies, I urge my colleagues to vote for this bill. It is a solid bill that we should be proud to support. Finally, once again, Mr. Chairman, let me thank you for your leadership, our relationship, and your commitment to the people of the United States of America. You served in the military, and you served in the FBI. We are going to miss you. Thank you also to every member on the Intelligence Committee. We have had many debates, many hard negotiations, and many tough struggles, but at all times, whether or not one member or another agreed or disagreed, we respected the fact that another member had another point of view, and then we resolved those issues. Each of us has worked even harder to find common ground on behalf of the American people to protect us from terrorist attacks and other issues that are out there that relate to national security. I yield back the balance of my time. Mr. ROGERS of Michigan. Mr. Chairman, I yield myself the balance of my time. I thank the ranking member for his work. Let the American public understand what happens. There are so many aspersions thrown at the members who serve on the Intelligence and on other committees who must do their work in secret, and certainly, the staff fights through and works through all of these difficult issues. There is plenty of oversight happening. It might not be on the front page of the newspaper. We call that ``disaster day'' in the business of trying to protect American secrets. When the ranking member and I first took over the committee, we reinstituted all of the regular oversight patterns: counterintelligence matters, covert action matters, regular counterterrorism strategy updates, and reviews. Again, every piece of that strategy that is implemented is reviewed by the committee, and it is certainly read and reviewed by me, personally, and, I know, by others on the committee as well. There is a tremendous amount of effort and energy applied to trying to get this right, to making sure that two things happen--one, that they are comporting with the law. They want to do that despite what you might read in the newspaper. They want to do that. They, too, have taken an oath to the Constitution of the United States of America, and they believe that following the law is the right way to do it. They want Congress' support for what they are doing, and they want the American people's support for what they are doing-- because it is so difficult and so hard to come to the right conclusions in a very murky and dangerous world--so that oversight does happen. It happens regularly. I want to thank all of the members of both parties for rigorous debate behind those closed doors. There is no lovefest when those doors close and a ``let's just do what we have to do to get to tomorrow.'' The debates are real and vigorous, and we have different philosophies on how we move forward on some of these intelligence matters and collection matters and on how we balance privacy and civil liberties and security. All of that happens. Sometimes, we find members who just don't agree, but what we do in that space is understand and try to get and make sure that we have all of the resources and all of the policies and all of the authorities our intelligence services need to be impactful to save the [[Page H5040]] United States and to, yes, maybe even save 300 girls or to, yes, maybe even allow for girls in a place like Afghanistan to get an education. That part needs to be right, too. Nuclear proliferation--we have a cyber world that is the single largest national security threat to this country that we are not prepared to handle, and there are a lot of sidebar discussions that have nothing to do with the fact that nation-states are stealing our intellectual property--nation-states like China. You have, according to public reports, countries like Iran that are probing financial institutions right here in the United States and are trying to do destructive attacks. According to public reports, North Korea even attacked a bank in South Korea some months ago. You see China rising up in its influence in the South and East China Seas. You see potential conflict between Vietnam, Japan, and China. These are serious, serious matters. Because they are so far away, I think sometimes we forget, and we come to talk about things that are important--in how we move forward in the intelligence business and how we empower them to do the work of the United States. At the same time, this recent year of, I think, aspersion to the men and women who serve in these capacities is disheartening. This isn't a new thing. George Washington used the intelligence business to try to win the war against the British. Ben Franklin is credited with the first covert action programs by trying to influence British and Tory opinion during the first years of the war. John Jay created the first counterintelligence unit to try to fight back against what the British were doing in spying against the Americans. Jefferson and Madison had secret funds that they took, by the way, which we would no longer approve or support today--secret funds--in order to do covert action-type activities in the earliest days of the founding of our Nation. We need to stop for a minute and think about what is at stake. I think the future and safety and security of the United States is at stake, and we have somehow, over the last year, decided that our intelligence services are the problem. No. I have bad news. Actually, I have good news: they are part of the solution. If you don't want troops engaged in many countries, then you want to support your intelligence services, and you want them to be the best in the world. If you don't want to have to engage in the withdrawal of certain diplomatic and economic and trade arrangements around the world, then you want the best intelligence services that you can possibly get. Here is the good news: we have them. We just need to stand behind them. When they come home from doing hard things, when they lose their colleagues--and they do--they are not looking for a ticker tape parade in New York City. They know that is not going to happen. What they do want to understand is that, when they turn around, the American population and the American citizens are standing with them. Even though Americans can't give them the ``attaboy,'' we can. Those of us who do this work, we can. So I will tell them, on this floor today, on behalf of a grateful Nation, thank you for your service. Stop reading the newspaper. Keep doing your job. It will mean the difference of lives saved around the world. We have so many challenges, and I only say this--and I wasn't planning to say this, Mr. Chairman--that someone came on this floor and said: I don't mind the intelligence people, but I don't like their culture. {time} 1030 These are people who are willing to risk their lives for that flag that stands in the well of this House. They were willing to give their lives for the Constitution they stuck up their hand to support. Is that the culture we don't like and appreciate anymore in America? There have been some bumps in the road, but we ought to applaud these people. We ought to sing their praises. We ought to thank them every single day that they are away from their families, in dangerous places, and risking their lives to collect that one piece of information that maybe saves the girls of Boko Haram or maybe saves the girls who get on their bus today in the United States of America. I hope we shake ourselves out of this notion that we can just continue to beat them and disparage them and call them everything but great patriots and expect them to get up every day and do the job that they need to do to protect this country. This bill, I think, actually does that. We give them clear guidance. We invest in technology that we need to make sure that we keep up with our adversaries around the world who, by the way, are trying to beat us and take advantage of us--places like space, places like cyber, places like HUMINT intelligence, and what they believe is a perceived weakness to deal with a rising tide of terrorists who want to kill Americans here at home. This is an important bill because it is bipartisan. A lot of these issues that are talked about have been fought in the bowels of this House, basically. And we worked through it and we have come to an agreement that this is the right direction, in a bipartisan way, that will serve to protect the United States. So, Mr. Chair, I urge all Members to strongly support this bill. Give them the tools, give Congress the oversight, and give America the ability to sleep well at night, knowing that very brave men and women will do the work that so many would not be interested in doing. With that, Mr. Chairman, I yield back the balance of my time. Mr. McCAUL. Mr. Chair, I rise today in support of H.R. 4681, the ``Intelligence Authorization Act for Fiscal Years 2014 and 2015''. As Chairman of the Committee on Homeland on Security, I understand the importance of this legislation. H.R. 4681 enhances the national security of the United States and is a vital tool for Congressional oversight of the activities of the Intelligence Community. It is critical that our intelligence agencies have all of the resources and authorities they need to accomplish the important responsibility of keeping Americans safe. I commend Chairman Rogers and Ranking Member Ruppersberger for their tireless work on these issues and the exhaustive process of drafting a bipartisan authorization. H.R. 4681 authorizes Federal intelligence, intelligence-related, and information sharing activities, including those of the Department of Homeland Security's Office of Intelligence and Analysis (I&A). I&A is an element of the Department of Homeland Security (DHS) as well as the Intelligence Community, and its activities support missions in both. As such, I&A occupies the unique role as a central conduit for analysis and information sharing among stakeholders which include the intelligence agencies, components of the DHS, other Federal partners, and State, local, tribal, and territorial entities. In this role, I&A supports and collaborates with State and local partners through the National Network of Fusion Centers, and provides analytic support to the DHS components. Consistent with our jurisdiction, the Committee on Homeland Security has conducted extensive oversight over these programs and missions, to include the July 2013 release of a report on ``The National Network of Fusion Centers.'' While I support the overall purpose of the bill, I am concerned that the effort includes provisions that seek to limit the support I&A provides DHS, its component agencies, and to the 78 fusion centers around the nation. I believe this risks depriving the Homeland Security Enterprise of valuable information and expertise at a time when we know the threats to the homeland persist. As the bill moves through the process and negotiations begin with the Senate, I will continue to work to ensure that these issues are addressed and that State and local law enforcement, and other first responders, receive the support they need from the Department of Homeland Security. Mr. CONNOLLY. Mr. Chair, I rise in support of my amendment to the Intelligence Authorization Act for Fiscal Years 2014 and 2015. Under Section 307 of this Act, the Chief Information Officer of the Intelligence Community, along with the respective Chief Information Officers of each element that comprise the IC, are required to conduct an inventory of all existing software licenses--both used and unused-- and then assess the actions that could be carried out to achieve the greatest possible economies of scale and cost-savings in software procurement and usage. [[Page H5041]] My commonsense amendment simply ensures that when those assessments are carried out, the CIOs will examine leading software license management practices. By adopting Connolly #12, Congress will ensure that when the IC examines potential actions to enhance software license management and save taxpayer dollars, four leading practices will be included in the analysis. The management practices contained in my amendment are derived from a recent report issued by the U.S. Government Accountability Office on May 22, 2014, entitled, ``Federal Software Licenses: Better Management Needed to Achieve Significant Savings Government-Wide.'' GAO consulted with software license management experts from the public and private sectors, prior to concluding that Federal agencies are generally not following best practices that could achieve significant cost-savings. These best practices include increasing the centralization of the management of software licenses; increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics; analyzing software license data to inform investment decisions; and providing appropriate personnel with sufficient software licenses management training. I urge all my colleagues to support my straightforward amendment that will enhance the IC's ability to spend taxpayer dollars in the most effective and efficient manner possible when procuring and managing software licenses. The CHAIR. All time for general debate has expired. Pursuant to the rule, the bill shall be considered for amendment under the 5-minute rule. In lieu of the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence, printed in the bill, it shall be in order to consider as an original bill for the purpose of amendment under the 5-minute rule an amendment in the nature of a substitute consisting of the text of Rules Committee Print 113-45. That amendment in the nature of a substitute shall be considered as read. The text of the amendment in the nature of a substitute is as follows: H. R. 4681 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) Short Title.--This Act may be cited as the ``Intelligence Authorization Act for Fiscal Years 2014 and 2015''. (b) Table of Contents.--The table of contents for this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. TITLE I--INTELLIGENCE ACTIVITIES Sec. 101. Authorization of appropriations. Sec. 102. Classified Schedule of Authorizations. Sec. 103. Personnel ceiling adjustments. Sec. 104. Intelligence Community Management Account. TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 201. Authorization of appropriations. TITLE III--GENERAL PROVISIONS Subtitle A--General Matters Sec. 301. Increase in employee compensation and benefits authorized by law. Sec. 302. Restriction on conduct of intelligence activities. Sec. 303. Specific authorization of funding for High Performance Computing Center 2. Sec. 304. Clarification of exemption from Freedom of Information Act of identities of employees submitting complaints to the Inspector General of the Intelligence Community. Sec. 305. Functional managers for the intelligence community. Sec. 306. Annual assessment of intelligence community performance by function. Sec. 307. Software licensing. Sec. 308. Plans to respond to unauthorized public disclosures of covert actions. Sec. 309. Auditability. Sec. 310. Public Interest Declassification Board. Sec. 311. Official representation items in support of the Coast Guard Attache Program. Sec. 312. Declassification review of certain items collected during the mission that killed Osama bin Laden on May 1, 2011. Sec. 313. Merger of the Foreign Counterintelligence Program and the General Defense Intelligence Program. Subtitle B--Reporting Sec. 321. Annual report on violations of law or executive order. Sec. 322. Submittal to Congress by heads of elements of intelligence community of plans for orderly shutdown in event of absence of appropriations. Sec. 323. Reports on chemical weapons in Syria. Sec. 324. Reports to the intelligence community on penetrations of networks and information systems of certain contractors. Sec. 325. Report on electronic waste. Sec. 326. Promoting STEM education to meet the future workforce needs of the intelligence community. Sec. 327. Assessment of security of domestic oil refineries and related rail transportation infrastructure. Sec. 328. Repeal or modification of certain reporting requirements. TITLE IV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY Sec. 401. Gifts, devises, and bequests to the Central Intelligence Agency. Sec. 402. Inspector General of the National Security Agency. TITLE V--SECURITY CLEARANCE REFORM Sec. 501. Continuous evaluation and sharing of derogatory information regarding personnel with access to classified information. Sec. 502. Requirements for intelligence community contractors. Sec. 503. Technology improvements to security clearance processing. Sec. 504. Report on reciprocity of security clearances. Sec. 505. Improving the periodic reinvestigation process. Sec. 506. Appropriate committees of Congress defined. TITLE VI--TECHNICAL AMENDMENTS Sec. 601. Technical amendments to the Central Intelligence Agency Act of 1949. Sec. 602. Technical amendments to the National Security Act of 1947 relating to the past elimination of certain positions. Sec. 603. Technical amendments to the Intelligence Authorization Act for Fiscal Year 2013. SEC. 2. DEFINITIONS. In this Act: (1) Congressional intelligence committees.--The term ``congressional intelligence committees'' means-- (A) the Select Committee on Intelligence of the Senate; and (B) the Permanent Select Committee on Intelligence of the House of Representatives. (2) Intelligence community.--The term ``intelligence community'' has the meaning given that term in section 3(4) of the National Security Act of 1947 (50 U.S.C. 3003(4)). TITLE I--INTELLIGENCE ACTIVITIES SEC. 101. AUTHORIZATION OF APPROPRIATIONS. Funds are hereby authorized to be appropriated for fiscal years 2014 and 2015 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government: (1) The Office of the Director of National Intelligence. (2) The Central Intelligence Agency. (3) The Department of Defense. (4) The Defense Intelligence Agency. (5) The National Security Agency. (6) The Department of the Army, the Department of the Navy, and the Department of the Air Force. (7) The Coast Guard. (8) The Department of State. (9) The Department of the Treasury. (10) The Department of Energy. (11) The Department of Justice. (12) The Federal Bureau of Investigation. (13) The Drug Enforcement Administration. (14) The National Reconnaissance Office. (15) The National Geospatial-Intelligence Agency. (16) The Department of Homeland Security. SEC. 102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS. (a) Specifications of Amounts and Personnel Levels.-- (1) Fiscal year 2014.--The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2014, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations for fiscal year 2014 prepared to accompany the bill H.R. 4681 of the One Hundred Thirteenth Congress. (2) Fiscal year 2015.--The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2015, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations for fiscal year 2015 prepared to accompany the bill H.R. 4681 of the One Hundred Thirteenth Congress. (b) Availability of Classified Schedule of Authorizations.-- (1) Availability.--The classified Schedules of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President. (2) Distribution by the president.--Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedules of Authorizations, or of appropriate portions of the Schedules, within the executive branch. (3) Limits on disclosure.--The President shall not publicly disclose the classified Schedules of Authorizations or any portion of such Schedules except-- (A) as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C. 3306(a)); (B) to the extent necessary to implement the budget; or (C) as otherwise required by law. [[Page H5042]] SEC. 103. PERSONNEL CEILING ADJUSTMENTS. (a) Authority for Increases.--The Director of National Intelligence may authorize employment of civilian personnel in excess of the number authorized for fiscal year 2014 or 2015 by the classified Schedules of Authorizations referred to in section 102(a) if the Director of National Intelligence determines that such action is necessary to the performance of important intelligence functions, except that the number of personnel employed in excess of the number authorized under such section may not, for any element of the intelligence community, exceed 3 percent of the number of civilian personnel authorized under the Schedule for such element during the fiscal year covered by such Schedule. (b) Treatment of Certain Personnel.--The Director of National Intelligence shall establish guidelines that govern, for each element of the intelligence community, the treatment under the personnel levels authorized under section 102(a), including any exemption from such personnel levels, of employment or assignment in-- (1) a student program, trainee program, or similar program; (2) a reserve corps or as a reemployed annuitant; or (3) details, joint duty, or long term, full-time training. (c) Notice to Congressional Intelligence Committees.--The Director of National Intelligence shall notify the congressional intelligence committees in writing at least 15 days prior to each exercise of an authority described in subsection (a). SEC. 104. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT. (a) Authorization of Appropriations.-- (1) Fiscal year 2014.--There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2014 the sum of $528,229,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2015. (2) Fiscal year 2015.--There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2015 the sum of $505,476,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2016. (b) Authorized Personnel Levels.--The elements within the Intelligence Community Management Account of the Director of National Intelligence are authorized 855 positions as of September 30, 2014, and 777 positions as of September 30, 2015. Personnel serving in such elements may be permanent employees of the Office of the Director of National Intelligence or personnel detailed from other elements of the United States Government. (c) Classified Authorizations.-- (1) Authorization of appropriations.-- (A) Fiscal year 2014.--In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Community Management Account for fiscal year 2014 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts for advanced research and development shall remain available until September 30, 2015. (B) Fiscal year 2015.--In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Community Management Account for fiscal year 2014 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts for advanced research and development shall remain available until September 30, 2016. (2) Authorization of personnel.-- (A) Fiscal year 2014.--In addition to the personnel authorized by subsection (b) for elements of the Intelligence Community Management Account as of September 30, 2014, there are authorized such additional personnel for the Community Management Account as of that date as are specified in the classified Schedule of Authorizations referred to in section 102(a). (B) Fiscal year 2015.--In addition to the personnel authorized by subsection (b) for elements of the Intelligence Community Management Account as of September 30, 2015, there are authorized such additional personnel for the Community Management Account as of that date as are specified in the classified Schedule of Authorizations referred to in section 102(a). TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM SEC. 201. AUTHORIZATION OF APPROPRIATIONS. There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund $514,000,000 for each of fiscal years 2014 and 2015. TITLE III--GENERAL PROVISIONS Subtitle A--General Matters SEC. 301. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS AUTHORIZED BY LAW. Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law. SEC. 302. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES. The authorization of appropriations by this Act shall not be deemed to constitute authority for the conduct of any intelligence activity which is not otherwise authorized by the Constitution or the laws of the United States. SEC. 303. SPECIFIC AUTHORIZATION OF FUNDING FOR HIGH PERFORMANCE COMPUTING CENTER 2. Funds appropriated for the construction of the High Performance Computing Center 2 (HPCC 2), as described in the table entitled Consolidated Cryptologic Program (CCP) in the classified annex to accompany the Consolidated and Further Continuing Appropriations Act, 2013 (Public Law 113-6; 127 Stat. 198), in excess of the amount specified for such activity in the tables in the classified annex prepared to accompany the Intelligence Authorization Act for Fiscal Year 2013 (Public Law 112-277; 126 Stat. 2468) shall be specifically authorized by Congress for the purposes of section 504 of the National Security Act of 1947 (50 U.S.C. 3094). SEC. 304. CLARIFICATION OF EXEMPTION FROM FREEDOM OF INFORMATION ACT OF IDENTITIES OF EMPLOYEES SUBMITTING COMPLAINTS TO THE INSPECTOR GENERAL OF THE INTELLIGENCE COMMUNITY. Section 103H(g)(3)(A) of the National Security Act of 1947 (50 U.S.C. 3033(g)(3)(A)) is amended by striking ``undertaken;'' and inserting ``undertaken, and this provision shall qualify as a withholding statute pursuant to subsection (b)(3) of section 552 of title 5, United States Code (commonly known as the `Freedom of Information Act');''. SEC. 305. FUNCTIONAL MANAGERS FOR THE INTELLIGENCE COMMUNITY. (a) Functional Managers Authorized.--Title I of the National Security Act of 1947 (50 U.S.C. 3021 et seq.) is amended by inserting after section 103I the following new section: ``SEC. 103J. FUNCTIONAL MANAGERS FOR THE INTELLIGENCE COMMUNITY. ``(a) Functional Managers Authorized.--The Director of National Intelligence may establish within the intelligence community one or more positions of manager of an intelligence function. Any position so established may be known as the `Functional Manager' of the intelligence function concerned. ``(b) Personnel.--The Director shall designate individuals to serve as manager of intelligence functions established under subsection (a) from among officers and employees of elements of the intelligence community. ``(c) Duties.--Each manager of an intelligence function established under subsection (a) shall have the duties as follows: ``(1) To act as principal advisor to the Director on the intelligence function. ``(2) To carry out such other responsibilities with respect to the intelligence function as the Director may specify for purposes of this section.''. (b) Table of Contents Amendment.--The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 103I the following new item: ``Sec. 103J. Functional managers for the intelligence community.''. SEC. 306. ANNUAL ASSESSMENT OF INTELLIGENCE COMMUNITY PERFORMANCE BY FUNCTION. (a) Annual Assessments Required.--Title V of the National Security Act of 1947 (50 U.S.C. 3091 et seq.) is amended by inserting after section 506I the following new section: ``SEC. 506J. ANNUAL ASSESSMENT OF INTELLIGENCE COMMUNITY PERFORMANCE BY FUNCTION. ``(a) In General.--Not later than April 1, 2016, and each year thereafter, the Director of National Intelligence shall, in consultation with the Functional Managers, submit to the congressional intelligence committees a report on covered intelligence functions during the preceding year. ``(b) Elements.--Each report under subsection (a) shall include for each covered intelligence function for the year covered by such report the following: ``(1) An identification of the capabilities, programs, and activities of such intelligence function, regardless of the element of the intelligence community that carried out such capabilities, programs, and activities. ``(2) A description of the investment and allocation of resources for such intelligence function, including an analysis of the allocation of resources within the context of the National Intelligence Strategy, priorities for recipients of resources, and areas of risk. ``(3) A description and assessment of the performance of such intelligence function. ``(4) An identification of any issues related to the application of technical interoperability standards in the capabilities, programs, and activities of such intelligence function. ``(5) An identification of the operational overlap or need for de-confliction, if any, within such intelligence function. ``(6) A description of any efforts to integrate such intelligence function with other intelligence disciplines as part of an integrated intelligence enterprise. ``(7) A description of any efforts to establish consistency in tradecraft and training within such intelligence function. ``(8) A description and assessment of developments in technology that bear on the future of such intelligence function. ``(9) Such other matters relating to such intelligence function as the Director may specify for purposes of this section. ``(c) Definitions.--In this section: ``(1) The term `covered intelligence functions' means each intelligence function for which a Functional Manager has been established under section 103J during the year covered by a report under this section. ``(2) The term `Functional Manager' means the manager of an intelligence function established under section 103J.''. [[Page H5043]] (b) Table of Contents Amendment.--The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 506I the following new item: ``Sec. 506J. Annual assessment of intelligence community performance by function.''. SEC. 307. SOFTWARE LICENSING. (a) In General.--Title I of the National Security Act of 1947 (50 U.S.C. 3021 et seq.) is amended by inserting after section 108 the following new section: ``SEC. 109. SOFTWARE LICENSING. ``(a) Requirement for Inventories of Software Licenses.-- The chief information officer of each element of the intelligence community, in consultation with the Chief Information Officer of the Intelligence Community, shall biennially-- ``(1) conduct an inventory of all existing software licenses of such element, including utilized and unutilized licenses; ``(2) assess the actions that could be carried out by such element to achieve the greatest possible economies of scale and associated cost savings in software procurement and usage; and ``(3) submit to the Chief Information Officer of the Intelligence Community each inventory required by paragraph (1) and each assessment required by paragraph (2). ``(b) Inventories by the Chief Information Officer of the Intelligence Community.--The Chief Information Officer of the Intelligence Community, based on the inventories and assessments required by subsection (a), shall biennially-- ``(1) compile an inventory of all existing software licenses of the intelligence community, including utilized and unutilized licenses; and ``(2) assess the actions that could be carried out by the intelligence community to achieve the greatest possible economies of scale and associated cost savings in software procurement and usage. ``(c) Reports to Congress.--The Chief Information Officer of the Intelligence Community shall submit to the congressional intelligence committees a copy of each inventory compiled under subsection (b)(1).''. (b) Initial Inventory.-- (1) Intelligence community elements.-- (A) Date.--Not later than 120 days after the date of the enactment of this Act, the chief information officer of each element of the intelligence community shall complete the initial inventory, assessment, and submission required under section 109(a) of the National Security Act of 1947, as added by subsection (a) of this section. (B) Basis.--The initial inventory conducted for each element of the intelligence community under section 109(a)(1) of the National Security Act of 1947, as added by subsection (a) of this section, shall be based on the inventory of software licenses conducted pursuant to section 305 of the Intelligence Authorization Act for Fiscal Year 2013 (Public Law 112-277; 126 Stat. 2472) for such element. (2) Chief information officer of the intelligence community.--Not later than 180 days after the date of the enactment of this Act, the Chief Information Officer of the Intelligence Community shall complete the initial compilation and assessment required under section 109(b) of the National Security Act of 1947, as added by subsection (a). (c) Table of Contents Amendments.--The table of contents in the first section of the National Security Act of 1947 is amended-- (1) by striking the second item relating to section 104 (relating to Annual national security strategy report); and (2) by inserting after the item relating to section 108 the following new item: ``Sec. 109. Software licensing.''. SEC. 308. PLANS TO RESPOND TO UNAUTHORIZED PUBLIC DISCLOSURES OF COVERT ACTIONS. Section 503 of the National Security Act of 1947 (50 U.S.C. 3093) is amended by adding at the end the following new subsection: ``(h) For each type of activity undertaken as part of a covert action, the President shall establish in writing a plan to respond to the unauthorized public disclosure of that type of activity.''. SEC. 309. AUDITABILITY. (a) In General.--Title V of the National Security Act of 1947 (50 U.S.C. 3091 et seq.) is amended by adding at the end the following new section: ``SEC. 509. AUDITABILITY OF CERTAIN ELEMENTS OF THE INTELLIGENCE COMMUNITY. ``(a) Requirement for Annual Audits.--The head of each covered entity shall ensure that there is a full financial audit of such covered entity each year beginning with fiscal year 2014. Such audits may be conducted by an internal or external independent accounting or auditing organization. ``(b) Requirement for Unqualified Opinion.--Beginning as early as practicable, but in no event later than the audit required under subsection (a) for fiscal year 2016, the head of each covered entity shall take all reasonable steps necessary to ensure that each audit required under subsection (a) contains an unqualified opinion on the financial statements of such covered entity for the fiscal year covered by such audit. ``(c) Reports to Congress.--The chief financial officer of each covered entity shall provide to the congressional intelligence committees an annual audit report from an accounting or auditing organization on each audit of the covered entity conducted pursuant to subsection (a). ``(d) Covered Entity Defined.--In this section, the term `covered entity' means the Office of the Director of National Intelligence, the Central Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, the National Reconnaissance Office, and the National Geospatial- Intelligence Agency.''. (b) Table of Contents Amendment.--The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 508 the following new item: ``Sec. 509. Auditability of certain elements of the intelligence community.''. SEC. 310. PUBLIC INTEREST DECLASSIFICATION BOARD. Section 710(b) of the Public Interest Declassification Act of 2000 (Public Law 106-567; 50 U.S.C. 3161 note) is amended by striking ``2014.'' and inserting ``2018.''. SEC. 311. OFFICIAL REPRESENTATION ITEMS IN SUPPORT OF THE COAST GUARD ATTACHE PROGRAM. Notwithstanding any other limitation on the amount of funds that may be used for official representation items, the Secretary of Homeland Security may use funds made available to the Secretary through the National Intelligence Program for necessary expenses for intelligence analysis and operations coordination activities for official representation items in support of the Coast Guard Attache Program. SEC. 312. DECLASSIFICATION REVIEW OF CERTAIN ITEMS COLLECTED DURING THE MISSION THAT KILLED OSAMA BIN LADEN ON MAY 1, 2011. Not later than 120 days after the date of the enactment of this Act, the Director of National Intelligence shall-- (1) in the manner described in the classified annex to this Act-- (A) complete a declassification review of documents collected in Abbottabad, Pakistan, during the mission that killed Osama bin Laden on May 1, 2011; and (B) make publicly available any information declassified as a result of the declassification review required under paragraph (1); and (2) report to the congressional intelligence committees-- (A) the results of the declassification review required under paragraph (1); and (B) a justification for not declassifying any information required to be included in such declassification review that remains classified. SEC. 313. MERGER OF THE FOREIGN COUNTERINTELLIGENCE PROGRAM AND THE GENERAL DEFENSE INTELLIGENCE PROGRAM. Notwithstanding any other provision of law, the Director of National Intelligence shall carry out the merger of the Foreign Counterintelligence Program into the General Defense Intelligence Program as directed in the classified annex to this Act. The merger shall go into effect no earlier than 30 days after written notification of the merger is provided to the congressional intelligence committees. Subtitle B--Reporting SEC. 321. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER. (a) In General.--Title V of the National Security Act of 1947 (50 U.S.C. 3091 et seq.), as amended by section 309, is further amended by adding at the end the following: ``SEC. 510. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER. ``(a) Annual Reports Required.--The Director of National Intelligence shall annually submit to the congressional intelligence committees a report on violations of law or executive order by personnel of an element of the intelligence community that were identified during the previous calendar year. ``(b) Elements.--Each report required under subsection (a) shall include a description of, and any action taken in response to, any violation of law or executive order (including Executive Order 12333 (50 U.S.C. 3001 note)) by personnel of an element of the intelligence community in the course of such employment that, during the previous calendar year, was determined by the director, head, general counsel, or inspector general of any element of the intelligence community to have occurred.''. (b) Initial Report.--The first report required under section 510 of the National Security Act of 1947, as added by subsection (a), shall be submitted not later than one year after the date of the enactment of this Act. (c) Table of Contents Amendment.--The table of sections in the first section of the National Security Act of 1947, as amended by section 309 of this Act, is further amended by adding after the section relating to section 509, as added by such section 309, the following new item: ``Sec. 510. Annual report on violations of law or executive order.''. SEC. 322. SUBMITTAL TO CONGRESS BY HEADS OF ELEMENTS OF INTELLIGENCE COMMUNITY OF PLANS FOR ORDERLY SHUTDOWN IN EVENT OF ABSENCE OF APPROPRIATIONS. (a) In General.--Whenever the head of an applicable agency submits a plan to the Director of the Office of Management and Budget in accordance with section 124 of Office of Management and Budget Circular A-11, pertaining to agency operations in the absence of appropriations, or any successor circular of the Office that requires the head of an applicable agency to submit to the Director a plan for an orderly shutdown in the event of the absence of appropriations, such head shall submit a copy of such plan to the following: (1) The congressional intelligence committees. (2) The Subcommittee on Defense of the Committee on Appropriations of the Senate. (3) The Subcommittee on Defense of the Committee on Appropriations of the House of Representatives. [[Page H5044]] (4) In the case of a plan for an element of the intelligence community that is within the Department of Defense, to-- (A) the Committee on Armed Services of the Senate; and (B) the Committee on Armed Services of the House of Representatives. (b) Head of an Applicable Agency Defined.--In this section, the term ``head of an applicable agency'' includes the following: (1) The Director of National Intelligence. (2) The Director of the Central Intelligence Agency. (3) Each head of each element of the intelligence community that is within the Department of Defense. SEC. 323. REPORTS ON CHEMICAL WEAPONS IN SYRIA. (a) In General.--Not later than 30 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to Congress a report on the Syrian chemical weapons program. (b) Elements.--The report required under subsection (a) shall include the following elements: (1) A comprehensive assessment of chemical weapon stockpiles in Syria, including names, types, and quantities of chemical weapons agents, types of munitions, and location and form of storage, production, and research and development facilities. (2) A listing of key personnel associated with the Syrian chemical weapons program. (3) An assessment of undeclared chemical weapons stockpiles, munitions, and facilities. (4) An assessment of how these stockpiles, precursors, and delivery systems were obtained. (5) A description of key intelligence gaps related to the Syrian chemical weapons program. (6) An assessment of any denial and deception efforts on the part of the Syrian regime related to its chemical weapons program. (c) Progress Reports.--Every 90 days until the date that is 18 months after the date of the enactment of this Act, the Director of National Intelligence shall submit to Congress a progress report providing any material updates to the report required under subsection (a). SEC. 324. REPORTS TO THE INTELLIGENCE COMMUNITY ON PENETRATIONS OF NETWORKS AND INFORMATION SYSTEMS OF CERTAIN CONTRACTORS. (a) Procedures for Reporting Penetrations.--The Director of National Intelligence shall establish procedures that require each cleared intelligence contractor to report to an element of the intelligence community designated by the Director for purposes of such procedures when a network or information system of such contractor that meets the criteria established pursuant to subsection (b) is successfully penetrated. (b) Networks and Information Systems Subject to Reporting.--The Director of National Intelligence shall, in consultation with appropriate officials, establish criteria for covered networks to be subject to the procedures for reporting system penetrations under subsection (a). (c) Procedure Requirements.-- (1) Rapid reporting.--The procedures established pursuant to subsection (a) shall require each cleared intelligence contractor to rapidly report to an element of the intelligence community designated pursuant to subsection (a) of each successful penetration of the network or information systems of such contractor that meet the criteria established pursuant to subsection (b). Each such report shall include the following: (A) A description of the technique or method used in such penetration. (B) A sample of the malicious software, if discovered and isolated by the contractor, involved in such penetration. (C) A summary of information created by or for such element in connection with any program of such element that has been potentially compromised due to such penetration. (2) Access to equipment and information by intelligence community personnel.--The procedures established pursuant to subsection (a) shall-- (A) include mechanisms for intelligence community personnel to, upon request, obtain access to equipment or information of a cleared intelligence contractor necessary to conduct forensic analysis in addition to any analysis conducted by such contractor; (B) provide that a cleared intelligence contractor is only required to provide access to equipment or information as described in subparagraph (A) to determine whether information created by or for an element of the intelligence community in connection with any intelligence community program was successfully exfiltrated from a network or information system of such contractor and, if so, what information was exfiltrated; and (C) provide for the reasonable protection of trade secrets, commercial or financial information, and information that can be used to identify a specific person (other than the name of the suspected perpetrator of the penetration). (3) Limitation on dissemination of certain information.-- The procedures established pursuant to subsection (a) shall prohibit the dissemination outside the intelligence community of information obtained or derived through such procedures that is not created by or for the intelligence community except-- (A) with the approval of the contractor providing such information; (B) to the congressional intelligence committees or the Subcommittees on Defense of the Committees on Appropriations of the House of Representatives and the Senate for such committees and such Subcommittees to perform oversight; or (C) to law enforcement agencies to investigate a penetration reported under this section. (d) Issuance of Procedures and Establishment of Criteria.-- (1) In general.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall establish the procedures required under subsection (a) and the criteria required under subsection (b). (2) Applicability date.--The requirements of this section shall apply on the date on which the Director of National Intelligence establishes the procedures required under this section. (e) Coordination With the Secretary of Defense To Prevent Duplicate Reporting.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence and the Secretary of Defense shall establish procedures to permit a contractor that is a cleared intelligence contractor and a cleared defense contractor under section 941 of the National Defense Authorization Act for Fiscal Year 2013 (Public Law 112-239; 10 U.S.C. 2224 note) to submit a single report that satisfies the requirements of this section and such section 941 for an incident of penetration of network or information system. (f) Definitions.--In this section: (1) Cleared intelligence contractor.--The term ``cleared intelligence contractor'' means a private entity granted clearance by the Director of National Intelligence or the head of an element of the intelligence community to access, receive, or store classified information for the purpose of bidding for a contract or conducting activities in support of any program of an element of the intelligence community. (2) Covered network.--The term ``covered network'' means a network or information system of a cleared intelligence contractor that contains or processes information created by or for an element of the intelligence community with respect to which such contractor is required to apply enhanced protection. (g) Savings Clauses.--Nothing in this section shall be construed to alter or limit any otherwise authorized access by government personnel to networks or information systems owned or operated by a contractor that processes or stores government data. SEC. 325. REPORT ON ELECTRONIC WASTE. (a) Report.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the extent to which the intelligence community has implemented the recommendations of the Inspector General of the Intelligence Community contained in the report entitled ``Study of Intelligence Community Electronic Waste Disposal Practices'' issued in May 2013. Such report shall include an assessment of the extent to which the policies, standards, and guidelines of the intelligence community governing the proper disposal of electronic waste are applicable to covered commercial electronic waste that may contain classified information. (b) Form.--The report required under subsection (a) shall be submitted in unclassified form, but may include a classified annex. (c) Definitions.--In this section: (1) Covered commercial electronic waste.--The term ``covered commercial electronic waste'' means electronic waste of a commercial entity that contracts with an element of the intelligence community. (2) Electronic waste.--The term ``electronic waste'' includes any obsolete, broken, or irreparable electronic device, including a television, copier, facsimile machine, tablet, telephone, computer, computer monitor, laptop, printer, scanner, and associated electrical wiring. SEC. 326. PROMOTING STEM EDUCATION TO MEET THE FUTURE WORKFORCE NEEDS OF THE INTELLIGENCE COMMUNITY. (a) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the Secretary of Education and the congressional intelligence committees a report describing the anticipated hiring needs of the intelligence community in the fields of science, technology, engineering, and mathematics, including cybersecurity and computer literacy. The report shall-- (1) describe the extent to which competitions, challenges, or internships at elements of the intelligence community that do not involve access to classified information may be utilized to promote education in the fields of science, technology, engineering, and mathematics, including cybersecurity and computer literacy, within high schools or institutions of higher education in the United States; (2) include cost estimates for carrying out such competitions, challenges, or internships; and (3) include strategies for conducting expedited security clearance investigations and adjudications for students at institutions of higher education for purposes of offering internships at elements of the intelligence community. (b) Consideration of Existing Programs.--In developing the report under subsection (a), the Director shall take into consideration existing programs of the intelligence community, including the education programs of the National Security Agency and the Information Assurance Scholarship Program of the Department of Defense, as appropriate. (c) Definitions.--In this section: (1) High school.--The term ``high school'' mean a school that awards a secondary school diploma. (2) Institution of higher education.--The term ``institution of higher education'' has the meaning given the term in section 101(a) of the Higher Education Act of 1965 (20 U.S.C. 1001(a)). (3) Secondary school.--The term ``secondary school'' has the meaning given the term in section 9101 of the Elementary and Secondary Education Act of 1965 (20 U.S.C. 7801). [[Page H5045]] SEC. 327. ASSESSMENT OF SECURITY OF DOMESTIC OIL REFINERIES AND RELATED RAIL TRANSPORTATION INFRASTRUCTURE. (a) Assessment.--The Under Secretary of Homeland Security for Intelligence and Analysis shall conduct an intelligence assessment of the security of domestic oil refineries and related rail transportation infrastructure. (b) Submission.--Not later than 180 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis shall submit to the congressional intelligence committees-- (1) the results of the assessment required under subsection (a); and (2) any recommendations with respect to intelligence sharing or intelligence collection to improve the security of domestic oil refineries and related rail transportation infrastructure to protect the communities surrounding such refineries or such infrastructure from potential harm that the Under Secretary considers appropriate. SEC. 328. REPEAL OR MODIFICATION OF CERTAIN REPORTING REQUIREMENTS. (a) Repeal of Reporting Requirements.-- (1) Threat of attack on the united states using weapons of mass destruction.--Section 114 of the National Security Act of 1947 (50 U.S.C. 3050) is amended by striking subsection (b). (2) Treaty on conventional armed forces in europe.--Section 2(5)(E) of the Senate resolution advising and consenting to ratification of the Document Agreed Among the States Parties to the Treaty on Conventional Armed Forces in Europe (CFE) of November 19, 1990, adopted at Vienna May 31, 1996 (Treaty Doc. 105-5) (commonly referred to as the ``CFE Flank Document''), 105th Congress, agreed to May 14, 1997, is repealed. (b) Modification of Reporting Requirements.-- (1) Intelligence advisory committees.--Section 410(b) of the Intelligence Authorization Act for Fiscal Year 2010 (50 U.S.C. 3309) is amended to read as follows: ``(b) Notification of Establishment of Advisory Committee.--The Director of National Intelligence and the Director of the Central Intelligence Agency shall each notify the congressional intelligence committees each time each such Director creates an advisory committee. Each notification shall include-- ``(1) a description of such advisory committee, including the subject matter of such committee; ``(2) a list of members of such advisory committee; and ``(3) in the case of an advisory committee created by the Director of National Intelligence, the reasons for a determination by the Director under section 4(b)(3) of the Federal Advisory Committee Act (5 U.S.C. App.) that an advisory committee cannot comply with the requirements of such Act.''. (2) Intelligence information sharing.--Section 102A(g)(4) of the National Security Act of 1947 (50 U.S.C. 3024(g)(4)) is amended to read as follows: ``(4) The Director of National Intelligence shall, in a timely manner, report to Congress any statute, regulation, policy, or practice that the Director believes impedes the ability of the Director to fully and effectively ensure maximum availability of access to intelligence information within the intelligence community consistent with the protection of the national security of the United States.''. (3) Intelligence community business system transformation.--Section 506D(j) of the National Security Act of 1947 (50 U.S.C. 3100(j)) is amended in the matter preceding paragraph (1) by striking ``2015'' and inserting ``2014''. (4) Activities of privacy and civil liberties officers.-- Section 1062(f)(1) of the Intelligence Reform and Terrorism Prevention Act of 2004 (42 U.S.C. 2000ee-1(f)(1)) is amended in the matter preceding subparagraph (A) by striking ``quarterly'' and inserting ``semiannually''. (c) Conforming Amendments.--The National Security Act of 1947 (50 U.S.C. 3001 et seq.) is amended-- (1) in the table of contents in the first section, by striking the item relating to section 114 and inserting the following new item: ``Sec. 114. Annual report on hiring and retention of minority employees.''; (2) in section 114 (50 U.S.C. 3050)-- (A) by amending the heading to read as follows: ``annual report on hiring and retention of minority employees''; (B) by striking ``(a) Annual Report on Hiring and Retention of Minority Employees.--''; (C) by redesignating paragraphs (1) through (5) as subsections (a) through (e), respectively; (D) in subsection (b) (as so redesignated)-- (i) by redesignating subparagraphs (A) through (C) as paragraphs (1) through (3), respectively; and (ii) in paragraph (2) (as so redesignated)-- (I) by redesignating clauses (i) and (ii) as subparagraphs (A) and (B), respectively; and (II) in the matter preceding subparagraph (A) (as so redesignated), by striking ``clauses (i) and (ii)'' and inserting ``subparagraphs (A) and (B)''; (E) in subsection (d) (as redesignated by subparagraph (C) of this paragraph), by striking ``subsection'' and inserting ``section''; and (F) in subsection (e) (as redesignated by subparagraph (C) of this paragraph)-- (i) by redesignating subparagraphs (A) through (C) as paragraphs (1) through (3), respectively; and (ii) by striking ``subsection,'' and inserting ``section''; and (3) in section 507 (50 U.S.C. 3106)-- (A) in subsection (a)-- (i) by striking ``(1) The date'' and inserting ``The date''; (ii) by striking ``subsection (c)(1)(A)'' and inserting ``subsection (c)(1)''; (iii) by striking paragraph (2); and (iv) by redesignating subparagraphs (A) through (F) as paragraphs (1) through (6), respectively; (B) in subsection (c)(1)-- (i) by striking ``(A) Except'' and inserting ``Except''; and (ii) by striking subparagraph (B); and (C) in subsection (d)(1)-- (i) in subparagraph (A)-- (I) by striking ``subsection (a)(1)'' and inserting ``subsection (a)''; and (II) by inserting ``and'' after ``March 1;''; (ii) by striking subparagraph (B); and (iii) by redesignating subparagraph (C) as subparagraph (B). TITLE IV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY SEC. 401. GIFTS, DEVISES, AND BEQUESTS TO THE CENTRAL INTELLIGENCE AGENCY. Section 12 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3512) is amended-- (1) by striking the section heading and inserting ``gifts, devises, and bequests''; (2) in subsection (a)(2)-- (A) by inserting ``by the Director as a gift to the Agency'' after ``accepted''; and (B) by striking ``this section'' and inserting ``this subsection''; (3) in subsection (b), by striking ``this section,'' and inserting ``subsection (a),''; (4) in subsection (c), by striking ``this section,'' and inserting ``subsection (a),''; (5) in subsection (d), by striking ``this section'' and inserting ``subsection (a)''; (6) by redesignating subsection (f) as subsection (g); and (7) by inserting after subsection (e) the following: ``(f)(1) The Director may engage in fundraising in an official capacity for the benefit of nonprofit organizations that provide support to surviving family members of deceased Agency employees or that otherwise provide support for the welfare, education, or recreation of Agency employees, former Agency employees, or their family members. ``(2) In this subsection, the term `fundraising' means the raising of funds through the active participation in the promotion, production, or presentation of an event designed to raise funds and does not include the direct solicitation of money by any other means.''. SEC. 402. INSPECTOR GENERAL OF THE NATIONAL SECURITY AGENCY. (a) Elevation of Inspector General Status.--The Inspector General Act of 1978 (5 U.S.C. App.) is amended-- (1) in section 8G(a)(2), by striking ``the National Security Agency,''; and (2) in section 12-- (A) in paragraph (1), by inserting ``the National Security Agency,'' after ``the Federal Emergency Management Agency,''; and (B) in paragraph (2), by inserting ``the National Security Agency,'' after ``the National Aeronautics and Space Administration,''. (b) Date of Appointment.--Not later than 90 days after the date of the enactment of this Act, the President shall nominate a person for appointment, by and with the advice and consent of the Senate, as Inspector General of the National Security Agency under section 3(a) of the Inspector General Act of 1978 (5 U.S.C. App.) consistent with the amendments made by subsection (a). (c) Transition Rule.--An individual serving as Inspector General of the National Security Agency on the date of the enactment of this Act pursuant to an appointment made under section 8G of the Inspector General Act of 1978 (5 U.S.C. App.)-- (1) may continue so serving until the President makes an appointment under section 3(a) of such Act with respect to the National Security Agency consistent with the amendments made by subsection (a); and (2) shall, while serving under paragraph (1), remain subject to the provisions of section 8G of such Act that, immediately before the date of the enactment of this Act, applied with respect to the Inspector General of the National Security Agency and suffer no reduction in pay. (d) Special Provisions Concerning the National Security Agency.--The Inspector General Act of 1978 (5 U.S.C. App.) is amended by inserting after section 8J the following new section: ``SEC. 8K. SPECIAL PROVISIONS CONCERNING THE NATIONAL SECURITY AGENCY. ``(a) General Counsel to the Inspector General.-- ``(1) In general.--There is a General Counsel to the Inspector General of the National Security Agency, who shall be appointed by the Inspector General of the National Security Agency. ``(2) Duties.--The General Counsel to the Inspector General of the National Security Agency shall-- ``(A) serve as the chief legal officer of the Office of the Inspector General of the National Security Agency; ``(B) provide legal services only to the Inspector General of the National Security Agency; ``(C) prescribe professional rules of ethics and responsibilities for employees and officers of, and contractors to, the National Security Agency; ``(D) perform such functions as the Inspector General may prescribe; and ``(E) serve at the discretion of the Inspector General. ``(3) Office of the general counsel.--There is an Office of the General Counsel to the Inspector General of the National Security Agency. The Inspector General may appoint to the Office to serve as staff of the General Counsel such legal counsel as the Inspector General considers appropriate. [[Page H5046]] ``(b) Testimony.-- ``(1) Authority to compel.--The Inspector General of the National Security Agency is authorized to require by subpoena the attendance and testimony of former employees of the National Security Agency or contractors, former contractors, or former detailees to the National Security Agency as necessary in the performance of functions assigned to the Inspector General by this Act. ``(2) Refusal to obey.--A subpoena issued under this subsection, in the case of contumacy or refusal to obey, shall be enforceable by order of any appropriate United States district court. ``(3) Notification.--The Inspector General shall notify the Attorney General 7 days before issuing any subpoena under this section. ``(c) Prohibitions on Investigations for National Security Reasons.-- ``(1) Evaluations of prohibitions.--Not later than 7 days after the date on which the Inspector General of the National Security Agency receives notice or a statement under section 8G(d)(2)(C) of the reasons the Secretary of Defense is prohibiting the Inspector General from initiating, carrying out, or completing any audit or investigation, the Inspector General shall submit to the Permanent Select Committee on Intelligence and the Committee on Armed Services of the House of Representatives and the Select Committee on Intelligence and the Committee on Armed Services of the Senate an evaluation of such notice or such statement. ``(2) Inclusion in semi-annual report.--The Inspector General shall include in the semiannual report prepared by the Inspector General in accordance with section 5(a) a description of the instances in which the Secretary of Defense prohibited the Inspector General from initiating, carrying out, or completing any audit or investigation during the period covered by such report.''. TITLE V--SECURITY CLEARANCE REFORM SEC. 501. CONTINUOUS EVALUATION AND SHARING OF DEROGATORY INFORMATION REGARDING PERSONNEL WITH ACCESS TO CLASSIFIED INFORMATION. Section 102A(j) of the National Security Act of 1947 (50 U.S.C. 3024(j)) is amended-- (1) in the heading, by striking ``Sensitive Compartmented Information'' and inserting ``Classified Information''; (2) in paragraph (3), by striking ``; and'' and inserting a semicolon; (3) in paragraph (4), by striking the period and inserting a semicolon; and (4) by adding at the end the following new paragraphs: ``(5) ensure that the background of each employee or officer of an element of the intelligence community, each contractor to an element of the intelligence community, and each individual employee of such a contractor who has been determined to be eligible for access to classified information is monitored on a continual basis under standards developed by the Director, including with respect to the frequency of evaluation, during the period of eligibility of such employee or officer of an element of the intelligence community, such contractor, or such individual employee to such a contractor to determine whether such employee or officer of an element of the intelligence community, such contractor, and such individual employee of such a contractor continues to meet the requirements for eligibility for access to classified information; and ``(6) develop procedures to require information sharing between elements of the intelligence community concerning potentially derogatory security information regarding an employee or officer of an element of the intelligence community, a contractor to an element of the intelligence community, or an individual employee of such a contractor that may impact the eligibility of such employee or officer of an element of the intelligence community, such contractor, or such individual employee of such a contractor for a security clearance.''. SEC. 502. REQUIREMENTS FOR INTELLIGENCE COMMUNITY CONTRACTORS. (a) Requirements.--Section 102A of the National Security Act of 1947 (50 U.S.C. 3024) is amended by adding at the end the following new subsection: ``(x) Requirements for Intelligence Community Contractors.--The Director of National Intelligence, in consultation with the head of each department of the Federal Government that contains an element of the intelligence community and the Director of the Central Intelligence Agency, shall-- ``(1) ensure that-- ``(A) any contractor to an element of the intelligence community with access to a classified network or classified information develops and operates a security plan that is consistent with standards established by the Director of National Intelligence for intelligence community networks; and ``(B) each contract awarded by an element of the intelligence community includes provisions requiring the contractor comply with such plan and such standards; ``(2) conduct periodic assessments of each security plan required under paragraph (1)(A) to ensure such security plan complies with the requirements of such paragraph; and ``(3) ensure that the insider threat detection capabilities and insider threat policies of the intelligence community apply to facilities of contractors with access to a classified network.''. (b) Applicability.--The amendment made by subsection (a) shall apply with respect to contracts entered into or renewed after the date of the enactment of this Act. SEC. 503. TECHNOLOGY IMPROVEMENTS TO SECURITY CLEARANCE PROCESSING. (a) In General.--The Director of National Intelligence, in consultation with the Secretary of Defense and the Director of the Office of Personnel Management, shall conduct an analysis of the relative costs and benefits of potential improvements to the process for investigating persons who are proposed for access to classified information and adjudicating whether such persons satisfy the criteria for obtaining and retaining access to such information. (b) Contents of Analysis.--In conducting the analysis required by subsection (a), the Director of National Intelligence shall evaluate the costs and benefits associated with-- (1) the elimination of manual processes in security clearance investigations and adjudications, if possible, and automating and integrating the elements of the investigation process, including-- (A) the clearance application process; (B) case management; (C) adjudication management; (D) investigation methods for the collection, analysis, storage, retrieval, and transfer of data and records; and (E) records management for access and eligibility determinations; (2) the elimination or reduction, if possible, of the use of databases and information sources that cannot be accessed and processed automatically electronically, or modification of such databases and information sources, to enable electronic access and processing; (3) the use of government-developed and commercial technology for continuous monitoring and evaluation of government and commercial data sources that can identify and flag information pertinent to adjudication guidelines and eligibility determinations; (4) the standardization of forms used for routine reporting required of cleared personnel (such as travel, foreign contacts, and financial disclosures) and use of continuous monitoring technology to access databases containing such reportable information to independently obtain and analyze reportable data and events; (5) the establishment of an authoritative central repository of personnel security information that is accessible electronically at multiple levels of classification and eliminates technical barriers to rapid access to information necessary for eligibility determinations and reciprocal recognition thereof; (6) using digitally processed fingerprints, as a substitute for ink or paper prints, to reduce error rates and improve portability of data; (7) expanding the use of technology to improve an applicant's ability to discover the status of a pending security clearance application or reinvestigation; and (8) using government and publicly available commercial data sources, including social media, that provide independent information pertinent to adjudication guidelines to improve quality and timeliness, and reduce costs, of investigations and reinvestigations. (c) Report to Congress.--Not later than 6 months after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a report on the analysis required by subsection (a). SEC. 504. REPORT ON RECIPROCITY OF SECURITY CLEARANCES. The head of the entity selected pursuant to section 3001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 3341(b)) shall submit to the appropriate committees of Congress a report each year through 2017 that describes for the preceding year-- (1) the periods of time required by authorized adjudicative agencies for accepting background investigations and determinations completed by an authorized investigative entity or authorized adjudicative agency; (2) the total number of cases in which a background investigation or determination completed by an authorized investigative entity or authorized adjudicative agency is accepted by another agency; (3) the total number of cases in which a background investigation or determination completed by an authorized investigative entity or authorized adjudicative agency is not accepted by another agency; and (4) such other information or recommendations as the head of the entity selected pursuant to such section 3001(b) considers appropriate. SEC. 505. IMPROVING THE PERIODIC REINVESTIGATION PROCESS. (a) In General.--Not later than 180 days after the date of the enactment of this Act, and annually thereafter until December 31, 2017, the Director of National Intelligence, in consultation with the Secretary of Defense and the Director of the Office of Personnel Management, shall transmit to the appropriate committees of Congress a strategic plan for updating the process for periodic reinvestigations consistent with a continuous evaluation program. (b) Contents.--The plan required by subsection (a) shall include-- (1) an analysis of the costs and benefits associated with conducting periodic reinvestigations; (2) an analysis of the costs and benefits associated with replacing some or all periodic reinvestigations with a program of continuous evaluation; (3) a determination of how many risk-based and ad hoc periodic reinvestigations are necessary on an annual basis for each component of the Federal Government with employees with security clearances; (4) an analysis of the potential benefits of expanding the Government's use of continuous evaluation tools as a means of improving the effectiveness and efficiency of procedures for confirming the eligibility of personnel for continued access to classified information; and (5) an analysis of how many personnel with out-of-scope background investigations are employed by, or contracted or detailed to, each element of the intelligence community. [[Page H5047]] (c) Periodic Reinvestigations Defined.--In this section, the term ``periodic reinvestigations'' has the meaning given that term in section 3001(a) of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 3341(a)). SEC. 506. APPROPRIATE COMMITTEES OF CONGRESS DEFINED. In this title, the term ``appropriate committees of Congress'' means-- (1) the congressional intelligence committees; (2) the Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate; and (3) the Committee on Armed Services and the Committee on Homeland Security of the House of Representatives. TITLE VI--TECHNICAL AMENDMENTS SEC. 601. TECHNICAL AMENDMENTS TO THE CENTRAL INTELLIGENCE AGENCY ACT OF 1949. Section 21 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3521) is amended-- (1) in subsection (b)(1)(D), by striking ``section (a)'' and inserting ``subsection (a)''; and (2) in subsection (c)(2)(E), by striking ``provider.'' and inserting ``provider''. SEC. 602. TECHNICAL AMENDMENTS TO THE NATIONAL SECURITY ACT OF 1947 RELATING TO THE PAST ELIMINATION OF CERTAIN POSITIONS. Section 101(a) of the National Security Act of 1947 (50 U.S.C. 3021(a)) is amended-- (1) in paragraph (5), by striking the semicolon and inserting ``; and''; (2) by striking paragraphs (6) and (7); (3) by redesignating paragraph (8) as paragraph (6); and (4) in paragraph (6) (as so redesignated), by striking ``the Chairman of the Munitions Board, and the Chairman of the Research and Development Board,''. SEC. 603. TECHNICAL AMENDMENTS TO THE INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2013. (a) Amendments.--Section 506 of the Intelligence Authorization Act for Fiscal Year 2013 (Public Law 112-277; 126 Stat. 2478) is amended-- (1) by striking ``Section 606(5)'' and inserting ``Paragraph (5) of section 605''; and (2) by inserting ``, as redesignated by section 310(a)(4)(B) of this Act,'' before ``is amended''. (b) Effective Date.--The amendments made by subsection (a) shall take effect as if included in the enactment of the Intelligence Authorization Act for Fiscal Year 2013 (Public Law 112-277). The CHAIR. No amendment to the amendment in the nature of a substitute made in order as original text shall be in order except those printed in House Report 113-465 and amendments en bloc described in section 2(f) of House Resolution 604. Each amendment shall be considered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question. Amendments En Bloc No. 1 Offered by Mr. Rogers of Michigan Mr. ROGERS of Michigan. Mr. Chairman, pursuant to House Resolution 604, I offer amendments en bloc. The CHAIR. The Clerk will designate the amendments en bloc. Amendments en bloc No. 1 consisting of amendment Nos. 1, 2, 3, 4, 5, 8, 10, and 11 printed in part A of House Report No. 113-465, offered by Mr. McKeon of California: AMENDMENT NO. 1 OFFERED BY MR. ROGERS OF MICHIGAN Page 9, line 17, strike ``2014'' and insert ``2015''. Page 24, strike lines 1 through 9 and insert the following: ``(b) Elements.--Each report required under subsection (a) shall, consistent with the need to preserve ongoing criminal investigations, include a description of, and any action taken in response to, any violation of law or executive order (including Executive Order 12333 (50 U.S.C. 3001 note)) relating to intelligence activities committed by personnel of an element of the intelligence community in the course of the employment of such personnel that, during the previous calendar year, was-- ``(1) determined by the director, head, or general counsel of any element of the intelligence community to have occurred; ``(2) referred to the Department of Justice for possible criminal prosecution; or ``(3) substantiated by the inspector general of any element of the intelligence community.''. Page 24, after line 13, insert the following: (c) Guidelines.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the head of each element of the intelligence community, shall-- (1) issue guidelines to carry out section 510 of the National Security Act of 1947, as added by subsection (a) of this section; and (2) submit such guidelines to the congressional intelligence committees. Page 24, line 14, redesignate subsection (c) as subsection (d). Page 24, before line 20 insert the following: (e) Rule of Construction.--Nothing in this section or the amendments made by this section shall be construed to alter any requirement existing on the date of the enactment of this Act to submit a report under any provision of law. Page 43, line 11, strike ``the date of the enactment of this Act'' and insert ``the date of the resignation, reassignment, or removal of the Inspector General of the National Security Agency appointed pursuant to section 8G of the Inspector General Act of 1978 (5 U.S.C. App.) as in effect before the date of the enactment of this Act and serving on such date''. Page 45, line 9, insert before ``the National Security'' the following: ``the Office of the Inspector General of''. AMENDMENT NO. 2 OFFERED BY MR. CONNOLLY OF VIRGINIA Page 17, line 7, strike ``usage; and'' and insert ``usage, including--''. Page 17, after line 7, insert the following: ``(A) increasing the centralization of the management of software licenses; ``(B) increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics; ``(C) analyzing software license data to inform investment decisions; and ``(D) providing appropriate personnel with sufficient software licenses management training; and Page 17, line 23, strike ``usage.'' and insert ``usage, including--''. Page 17, after line 23, insert the following: ``(A) increasing the centralization of the management of software licenses; ``(B) increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics; ``(C) analyzing software license data to inform investment decisions; and ``(D) providing appropriate personnel with sufficient software licenses management training. AMENDMENT NO. 3 OFFERED BY MR. KILMER OF WASHINGTON Page 17, line 19, strike ``; and'' and insert a semicolon. Page 17, line 23, strike the period and insert ``; and''. Page 17, after line 23, insert the following: ``(3) based on the assessment required under paragraph (2), make such recommendations with respect to software procurement and usage to the Director of National Intelligence as the Chief Information Officer considers appropriate. Page 18, line 2, strike the quotation mark and the second period. Page 18, after line 2, insert the following: ``(d) Implementation of Recommendations.--Not later than 180 days after the date on which the Director of National Intelligence receives recommendations from the Chief Information Officer of the Intelligence Community in accordance with subsection (b)(3), the Director of National Intelligence shall, to the extent practicable, issue guidelines for the intelligence community on software procurement and usage based on such recommendations.''. AMENDMENT NO. 4 OFFERED BY MR. ROGERS OF MICHIGAN After section 309, insert the following new section: SEC. 310. RESTRICTIONS ON CERTAIN FORMER INTELLIGENCE OFFICERS AND EMPLOYEES. (a) Restriction.--Title III of the National Security Act of 1947 (50 U.S.C. 3071 et seq.) is amended by inserting after section 303 the following new section: ``SEC. 304. RESTRICTIONS ON CERTAIN FORMER INTELLIGENCE OFFICERS AND EMPLOYEES. ``(a) Negotiations.--A covered employee shall notify the element of the intelligence community employing such employee not later than 3 business days after the commencement of any negotiation for future employment or compensation between such covered employee and a covered entity. ``(b) Separation.--A covered employee may not commence employment with or be contracted by a covered entity-- ``(1) for a period of one year following the termination of the service or employment of such covered employee by an element of the intelligence community; and ``(2) for a period of two years following such termination with respect to any matter that was a part of the official responsibility of such covered employee during the final year of the service or employment of such covered employee by an element of the intelligence community. ``(c) Annual Reporting.-- ``(1) Reporting required.--Each former covered employee who was a covered employee at the time of separation from an element of the intelligence community shall annually report in writing to the element of the intelligence community that most recently previously employed such covered employee any payment received in the preceding year from a foreign government or a covered entity. ``(2) Applicability.--The requirement to submit a report under paragraph (1) for each former covered employee shall terminate on the date that is 5 years after the date on which such former covered employee was most recently employed by an element of the intelligence community. ``(d) Determination of Foreign Governments Posing a Significant Counterintelligence Threat.--The Director of National Intelligence shall annually-- [[Page H5048]] ``(1) determine which foreign governments pose a significant counterintelligence threat to the United States; and ``(2) submit to the congressional intelligence committees a list of such foreign governments. ``(e) Definitions.--In this section: ``(1) Covered employee.--The term `covered employee' means-- ``(A) an employee of an element of the intelligence community with access to sensitive compartmented information occupying a position-- ``(i) classified at GS-15 of the General Schedule (chapter 53 of title 5, United States Code); or ``(ii) as a senior civilian officer of the intelligence community (as defined in Intelligence Community Directive No. 610 or any successor directive); and ``(B) a person who during the preceding 12-month period was an officer or employee of the Congress (as defined in section 109(13) of the Ethics in Government Act of 1978 (5 U.S.C. App.)) with access to sensitive compartmented information. ``(2) Covered entity.--The term `covered entity' means-- ``(A) any person acting on behalf or under the supervision of a designated foreign government; or ``(B) any entity owned or controlled by a designated foreign government. ``(3) Designated foreign government.--The term `designated foreign government' means a government that the Director of National Intelligence determines poses a significant counterintelligence threat to the United States under subsection (d).''. (b) Effective Date of Negotiation Period Notice.--The requirement under section 304(a) of the National Security Act of 1947, as added by subsection (a) of this section, shall take effect on the date that is 30 days after the date of the enactment of this Act. (c) Applicability of Separation Period.--The requirement under section 304(b) of the National Security Act of 1947, as added by subsection (a) of this section, shall not apply to a covered employee that has entered into an employment agreement on or before the date of the enactment of this Act. (d) First Reporting Requirement.--The first report required to be submitted by each former covered employee under section 304(c) of the National Security Act of 1947, as added by subsection (a) of this section, shall be submitted not later than one year after the date of the enactment of this Act. (e) First Designation Requirement.--The Director of National Intelligence shall submit to the congressional intelligence committees the initial list of foreign governments under section 304(d) of the National Security Act of 1947, as added by subsection (a) of this section, not later than 30 days after the date of the enactment of this Act. (f) Table of Contents Amendments.--The table of contents in the first section of such Act is amended-- (1) by striking the second item relating to section 302 (Under Secretaries and Assistant Secretaries) and the items relating to sections 304, 305, and 306; and (2) by inserting after the item relating to section 303 the following new item: ``Sec. 304. Restrictions on certain former intelligence officers and employees.''. AMENDMENT NO. 5 OFFERED BY MS. KELLY OF ILLINOIS At the end of subtitle A of title III, add the following new section: SEC. __. INCLUSION OF PREDOMINANTLY BLACK INSTITUTIONS IN INTELLIGENCE OFFICER TRAINING PROGRAM. Section 1024 of the National Security Act of 1947 (50 U.S.C. 3224) is amended-- (1) in subsection (c)(1), by inserting ``and Predominantly Black Institutions'' after ``universities''; and (2) in subsection (g)-- (A) by redesignating paragraph (4) as paragraph (5); and (B) by inserting after paragraph (3) the following new paragraph: ``(4) Predominantly black institution.--The term `Predominantly Black Institution' has the meaning given the term in section 318 of the Higher education Act of 1965 (20 U.S.C. 1059e).''. AMENDMENT NO. 8 OFFERED BY MR. CARNEY OF DELAWARE At the end of subtitle B of title III, add the following new section: SEC. __. REPORT ON DECLASSIFICATION PROCESS. Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to Congress a report describing-- (1) how to improve the declassification process across the intelligence community; and (2) what steps the intelligence community can take, or what legislation may be necessary, to enable the National Declassification Center to better accomplish the missions assigned to the Center by Executive Order 13526. AMENDMENT NO. 10 OFFERED BY MS. JACKSON LEE OF TEXAS At the end of subtitle B of title III, add the following new section: SEC. __. DIRECTOR OF NATIONAL INTELLIGENCE STUDY ON THE USE OF CONTRACTORS IN THE CONDUCT OF INTELLIGENCE ACTIVITIES. The Director of National Intelligence shall conduct an assessment of the reliance of intelligence activities on contractors to support Government activities, including an assessment of-- (1) contractors performing intelligence activities (including intelligence analysis); and (2) the skills performed by contractors and the availability of Federal employees to perform those skills. AMENDMENT NO. 11 OFFERED BY MR. KEATING OF MASSACHUSETTS At the end of subtitle B of title III, add the following new section: SEC. __. ASSESSMENT OF THE EFFICACY OF MEMORANDA OF UNDERSTANDING TO FACILITATE INTELLIGENCE- SHARING. Not later than 90 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis, in consultation with the Director of the Federal Bureau of Investigation and the Program Manager of the Information Sharing Environment, shall submit to the congressional intelligence committees, the Committee on Homeland Security of the House of Representatives, and the Committee on Homeland Security and Governmental Affairs of the Senate an assessment of the efficacy of the memoranda of understanding signed between Federal, State, local, tribal, and territorial agencies to facilitate intelligence-sharing within and separate from the Joint Terrorism Task Force. Such assessment shall include-- (1) any language within such memoranda of understanding that prohibited or may be construed to prohibit intelligence- sharing between Federal, State, local, tribal, and territorial agencies; and (2) any recommendations for memoranda of understanding to better facilitate intelligence-sharing between Federal, State, local, tribal, and territorial agencies. The CHAIR. Pursuant to House Resolution 604, the gentleman from Michigan (Mr. Rogers) and the gentleman from Maryland (Mr. Ruppersberger) each will control 10 minutes. The Chair recognizes the gentleman from Michigan. Mr. ROGERS of Michigan. Mr. Chairman, I yield myself such time as I may consume. Mr. Chairman, I urge the committee to adopt the amendments en bloc, all of which have been examined by both the majority and the minority. I believe these amendments to be noncontroversial, and intended to enhance the underlying bill. The manager's amendment is intended to make minor technical modifications to clarify two provisions that were added in markup. I have an amendment that would require employees at senior level in the intelligence community to endure a ``cooling off'' period before being employed by a company that is owned or controlled by a foreign government that poses a high counterintelligence threat. It would also make them subject to reporting procedures. This amendment stems from my concern that some senior level employees in the intelligence community retire or otherwise separate from the U.S. Government and take employment with foreign companies or foreign- controlled companies after holding positions where they likely learned very sensitive information that would be of value to those particular companies or governments. It is not intended to be punitive prohibition on post-intelligence community employment but rather to establish a procedure to establish that sufficient time has lapsed to avoid conflicts of interest or the appearance of impropriety. Mr. Carney has an amendment that would provide the Congress with a useful report on ways to improve the declassification process across the intelligence community. The intelligence community has declassified a massive amount of documents. Increased transparency through an improved declassification process will help rebuild the confidence of the American people in their intelligence agencies. Mr. Connolly has an amendment that will add several best practices to the assessment our bill requires for intelligence community software licenses. This amendment is all the more important in light of current efforts to improve intelligence community information technology systems. Wise management of software licenses can help save the taxpayers' dollars while making sure our intelligence officers have the tools they need to do their job. Ms. Jackson Lee has an amendment that will help us identify ways to improve the support contractors offer to the intelligence community. It may help us find ways to make the most of scarce resources, all the while ensuring that contractors do not perform inherently governmental functions. Mr. Keating has an amendment concerning intelligence sharing between [[Page H5049]] Federal, State, and local entities, which has been a critical tool to prevent terrorist attacks on American soil. Joint terrorism task forces pool talent, skills, and knowledge from across the law enforcement and intelligence communities into a single entity that can respond with the flexibility and speed to stop impending threats. Even so, we must always look for ways to improve intelligence-sharing relationships. This amendment requires a study of the efficacy of the memoranda of understanding signed between Federal, State, local, tribal, and territorial agencies. The study will help identify any obstacles to intelligence sharing between agencies and find improvements to existing intelligence-sharing relationships. Ms. Kelly has an amendment to expand a grant program by the Director of National Intelligence to include predominantly black institutions. To succeed in their mission, the intelligence agencies need our Nation's top talent, and that means they must make full use of our Nation's diverse population. These grants will help provide study programs in foreign languages such as Farsi, Pashto, Middle Eastern, South Asian, and African dialects. Foreign language skills are critical for intelligence officers, as we all know. Mr. Kilmer has an amendment that will require the intelligence community Chief Information Officer to make recommendations to the Director of National Intelligence based on the software licensing assessment required by section 307 of the bill. It will also require the DNI to issue guidelines to implement those recommendations. These recommendations and guidelines will help the IC implement the results of the important assessment that this bill will require regarding software licensing. I will, therefore, support the amendment. With that, Mr. Chairman, I ask Members to support the en bloc amendment, and I reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chair, I yield myself such time as I may consume. I support all these amendments. I agree with Chairman Rogers that it is very troubling when senior U.S. officials who know our most sensitive secrets leave the Federal Government and immediately go to work for a company that is owned by a foreign country that poses a significant counterintelligence threat to us. I do have some concerns that this restriction might be seen as singling out our intelligence professionals, since it does not apply to every senior official in the government with a top secret clearance. I would be in favor of a waiver procedure for when the risks are low. For example, for someone who wants to teach English at a State-funded university in his or her retirement. But on the whole, I agree with Mr. Rogers and support this provision. I also agree with Mr. Connolly and Mr. Kilmer that we need to find efficiencies in the intelligence community's use of software. In fact, we just don't need to find them, we need to fix them. Finding and fixing inefficiencies translates into saving taxpayer dollars, which is something we must always strive to do. I agree with Ms. Robin Kelly that we need to increase the diversity of our intelligence workforce by adding predominantly black institutions to ongoing intelligence community programs currently designed for Historically Black Colleges. Diversity is a good thing in its own right, and it will create even greater opportunities for intelligence collection. I agree with Mr. Carney that we must reduce our declassification backlog. As The New York Times reported just this week, even material that should be automatically declassified isn't. So we need the Director of National Intelligence to look across the intelligence community and figure out how to improve the declassification process so that more national security information can be made available to the American people now. I also agree with Ms. Sheila Jackson Lee that we need to get a handle on how we are employing our contractors. We need to know whether they are doing the type of work that should be done by U.S. Government employees. Let me be clear, however, that contractors perform a very valuable service, and our companies are among the very best in the world. But there needs to be a clear line between what we expect from our employees, who owe 100 percent of their loyalty to the government, and what we expect from our contractors, whose patriotism is without question, but whose loyalty is also to the company that employs them. Finally, I agree with Mr. Keating, Mr. Rooney, and Mr. Hanna that we need to take a close look at the memoranda of agreement between the Federal Government and the State, local, tribal, and territorial governments to make sure they are written clearly enough and well enough to ensure the free flow of intelligence, while still making sure to protect sources and methods. Intelligence is critical, particularly in the midst of a domestic crisis. And for it to be useful, it must get to those who need it. In addition to the manager's amendment, which makes technical and clarifying changes to the bill, I support all these amendments. I reserve the balance of my time. Mr. ROGERS of Michigan. Mr. Chairman, I reserve the balance of my time. Mr. RUPPERSBERGER. Mr. Chair, I yield 2 minutes to the gentlewoman from Texas (Ms. Jackson Lee). Ms. JACKSON LEE of Texas. Mr. Chair, let me again thank the ranking member and the chairman. Let me also acknowledge the very fine men and women that work in our intelligence community in the United States and around the world. I would like to thank the House Permanent Select Committee on Intelligence for their efforts to include the Jackson Lee amendment in the en bloc amendments and thank them for working with my staff in a very cooperative manner. The Jackson Lee amendment seeks greater transparency to Congress on the people the Nation relies upon to perform certain types of work for the intelligence community. The Jackson Lee amendment requires the Director of the Office of National Intelligence to conduct an assessment of the reliance of intelligence activities on contractors to support government objectives, including an assessment of contractors performing intelligence activities, which would include intelligence analysis. This complements the underlying bill, because the underlying bill has determined to assess the utilization and reduce the number of private contractors. In a Time article dated Monday, July 19, 2010, a comment says: Explosion of contractors in the intelligence community. And that has been the case. It is important that we recognize that contractors can be useful. But like the President stated publicly on August 26, 2013: It is important that we have so many extraordinarily capable folks in our military and our government who can do this--and probably do it cheaper. Well, I agree with the President and this committee. I also take note of an article that cites NSA contractors using LinkedIn profiles to cash in on national security. I believe that with the work that we are doing here in this legislation, along with my amendment, we will get our hands around the idea of outsourcing our intelligence work and develop a pathway of excellence, as we have in the past. We will utilize our veterans, we will utilize military personnel, we will utilize young persons who are interested in this as a career, and we will have the finest intelligence staffing that we have ever had, as we have had in the past. I ask my colleagues to support this amendment. I again thank the chairman and ranking member for including this in the en bloc amendments. I think we are on a pathway of greater success in securing this Nation. Mr. Chair, I support H.R. 4681, the ``Intelligence Authorization Act for Fiscal Years 2014,'' a bill Authorizing appropriations for our nation's intelligence agencies for Fiscal Year 2014 through Fiscal Year 2015. The bill provides funds for the conduct of intelligence and intelligence-related activities. My thanks to the House Rules Committee for making my amendment in order under the rule for H.R. 4681. I appreciate the work of the House Permanent Select Committee on Intelligence efforts to include the Jackson Lee Amendment in the En Bloc. [[Page H5050]] My amendment is simple and makes an important contribution to the bill. The Jackson Lee Amendment seeks greater transparency to Congress on the people the nation relies upon to perform certain types of work for the Intelligence Community. The Jackson Lee Amendment requires the Director of the Office of National Intelligence to conduct an assessment of the reliance of intelligence activities on contractors to support Government objectives, including an assessment of contractors performing intelligence activities, which would include intelligence analysis. The Office of the Director of National Intelligence (ODNI) 2013 Report on Security Clearance Determinations said that on October 1, 2013, the total number of persons with a Confidential, Secret or Top Secrete security clearance totaled 5,150,379 individual. According to the ODNI 3,738,026 were government agency personnel, 1,056,309 were contractors and 356,044 were categorized as other. Between January and October 1, 2013 there were 777,168 security clearances approved--152,490 were government agency employees and 131,209 were contractors with an additional 12,785 designated as other. The cost of government security classification in 2oo5 was $7.66 billion and in 2011 the total was $11.36 billion. The amount expended included: 5.65 billion for protection maintenance; 1.53 billion for security management oversight and planning; 502.51 million for professional education, training and awareness; 352.4 million for classification management; 52.76 million for declassification. The assessment provided for through the Jackson Lee amendment would shed light on the work that our federal agency Intelligence professionals and the role contractors play in protecting our nation. President Obama stated publicly on August 6, 2013 that it is important that we have so many 'extraordinarily capable folks in our military and our government who can do this, and probably do it cheaper.' I agree. That is why I introduced H.R. 4110, the HERO Transition from Battlespace to Workplace Act of 2014. This legislation addresses the problem of underemployed veterans in obtaining positions that take maximum advantage of their skills and experience. For some time I have worked to make sure that transparency, accountability and oversight were firmly established to guide the work of intelligence agencies, including introducing legislation such as H.R. 2434. I thank my colleagues on the Intelligence Committee for their hard work in bringing this bill before the full House for consideration. I ask my Colleagues in the House to vote for this en bloc. [From Time, Jul. 19, 2010] Time To Tame Washington's Intelligence Beast (By Robert Baer) I asked a former colleague who retired from the CIA not long ago what he thought about the Washington Post article Monday, July 19, on the explosion of contractors in the intelligence community. ``It's a horror,'' he said, ``my tax money blowing around Washington like confetti.'' But he reserved his angriest comments for the contractor-driven bureaucracy that allowed a Nigerian would-be suicide bomber-- as alleged by a resulting federal indictment--to board a Northwest flight from Amsterdam to Detroit in December. In spite of the billions and billions of dollars we've showered on contractors, consultants and corporate contracts since 9/ 11, no one managed to disseminate a warning from the Nigerian's father that his son had reportedly become a terrorist. The raw numbers in the Post tell the story. Since 9/11, America's intelligence budget has more than doubled, to $75 billion. The number of people working at the Defense Intelligence Agency has gone from 7,500 to 16,500. The FBI's Joint Terrorism Task Forces have trebled in number, rising from 35 to io6. Personnel at the National Security Agency has doubled. There are 854,000 people with top-secret security clearances, including contractors--almost 1\1/2\ times the population of Washington. It shouldn't come as a surprise, then, that the Nigerian slipped through the cracks: there are so many more cracks now. But we shouldn't reduce the problem to our having become a country saddled with a bureaucratic Frankenstein of timeservers and people cashing in on 9/11. Recently I've been giving talks at government agencies working on counterterrorism. With almost no exceptions, I've found my audiences, including contractors, better informed, more dedicated and better educated than the generation I served with in the CIA. (As I've said elsewhere, if I were applying to the CIA today, I wonder whether I'd make it in.) The problem is that I came away from these talks with the impression that the post-9/11 workforce is bored and even adrift--at least in the sense that there are too many people chasing too little hard intelligence. It's a tooth-to-tail problem. CIA Director Leon Panetta has gone on the record as saying there are only a couple hundred al-Qaeda dead-enders in the mountains between Paldstan and Afghanistan, most of whom are dormant, hiding in caves. With a prey so small and elusive and a bureaucracy so Washington- bound, it shouldn't come as a surprise that we're tripping over ourselves. Nor should it come as a surprise that more money and more contractors aren't a problem of diminishing returns but rather one of adding to the risk. It would be considerably different if we could put this new workforce in the field--for instance, in Afghanistan, a country that demands years and years of on-the-ground experience for a young American intelligence officer to understand it. But our bases there are already overflowing with combat forces, and anyhow, it's too dangerous for Americans to get outside the wire to meet Afghans. Not unlike in Washington, they're stuck behind desks and forced to look at the country from a distance. No one intended to create a monster bureaucracy after 9/ 11--Washington has always thrown money and people at a problem rather than good ideas. But now someone has to seriously calculate the damage the outsourcing of intelligence is causing. The story I keep hearing over and over is that the bright young people who came to Washington to fight terrorism--civil servants and contractors alike-- have become disillusioned, and they will soon turn away from idealism and begin to transform their jobs into comfortable careers. In the case of the contractors, it means more contracts and more contractors. It's all the worse because there are now contractors writing their own contracts. For Washington to retake control of intelligence, it needs to remember that intelligence is inherently a governmental function, no different from the courts, the police or legislation. I wish Washington good luck in taking back ground from the contractors, and I hope it can move faster than the next would-be suicide bomber. Mr. RUPPERSBERGER. Mr. Chairman, I yield back the balance of my time. Mr. ROGERS of Michigan. Mr. Chairman, I yield back the balance of my time. The Acting CHAIR (Mr. Womack). The question is on the amendments en bloc offered by the gentleman from Michigan (Mr. Rogers). The en bloc amendments were agreed to. Amendment No. 6 Offered by Mr. Franks of Arizona The Acting CHAIR. It is now in order to consider amendment No. 6 printed in House Report 113-465. Mr. FRANKS of Arizona. Mr. Chairman, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of subtitle B of title III, add the following new section: SEC. __. REPORT ON FOREIGN MAN-MADE ELECTROMAGNETIC PULSE WEAPONS. (a) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees and the Committees on Armed Services of the House of Representatives and the Senate a report on the threat posed by man-made electromagnetic pulse weapons to United States interests through 2025, including threats from foreign countries and foreign non-State actors. (b) Form.--The report required under subsection (a) shall be submitted in unclassified form, but may include a classified annex. The Acting CHAIR. Pursuant to House Resolution 604, the gentleman from Arizona (Mr. Franks) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Arizona. Mr. FRANKS of Arizona. Mr. Chairman, I thank Chairman Rogers. I believe he has exhibited the best of the House of Representatives and has rendered this country magnificent service, both to our national security and to the stability of this Nation. I thank him deeply for it, and also for the time to speak on this amendment. {time} 1045 Mr. Chairman, the Intelligence Authorization Act of 2015 is a critical milestone toward protecting Americans at home and those who serve our interests and Nation overseas. However, it does not currently address one of the critical concerns, and that is the threat of a manmade nuclear or electromagnetic pulse, or EMP, weapon. My amendment would task the Director of National Intelligence to report to the Congress on the threat posed by manmade electromagnetic pulse weapons to the United States interests through 2025, including those threats from foreign countries and foreign nonstate actors. [[Page H5051]] Mr. Chairman, it is important to note that my amendment does not task another Federal agency with the responsibility of determining our vulnerabilities to EMP and GMD and the potential dangers these threats represent to our civilization. These studies have already been finalized, and their conclusions provide our Nation's leaders and industry officials with the clarity they need to move forward toward protecting our grid. In fact, Mr. Chairman, there have now been nearly a dozen Federal Government reports and studies on the dangers, threats, and vulnerabilities the U.S. electric grid faces from EMP and GMD, including reports from the EMP Commission, Department of Homeland Security, Department of Defense, Department of Energy, the Federal Energy Regulatory Commission, the National Academy of Sciences, and the U.S. national laboratories. All of them come to similar conclusions. The U.S. electric grid is dangerously vulnerable to EMP and GMD. Further, many warn that, given the Nation's current lack of preparedness, a nuclear or natural EMP event is potentially a cataclysmic threat that would be a top national priority for our national security and homeland security. In 2008, the congressionally authorized EMP Commission stated that Russian scientists had proliferated knowledge of a specifically designed EMP weapon to North Korea. There may also exist a form of mobile EMP devices that can take out our electric substations. As The Wall Street Journal reported recently, taking out just a few of these substations simultaneously could potentially cause a nationwide blackout. Our military understands this threat very well, Mr. Chairman, and has protected many of our critical defense assets. We, as a Nation, have spent billions of dollars, in fact, over the years, hardening our nuclear triad, our missile defense capabilities and numerous other critical elements of our national security apparatus against the effects of electromagnetic pulse, particularly the type of electromagnetic pulse that might be generated against us by an enemy. However, our civilian grid, which the Defense Department relies upon for nearly 99 percent of its electricity needs, is completely vulnerable to the same kind of danger. This constitutes, in my opinion, Mr. Chairman, an invitation on the part of certain of our enemies to use the asymmetric capability of an EMP weapon against us, and there is now evidence that such strategy is being considered by certain of those enemies. Mr. Chairman, the time is right for this action, and our efforts today may gain us no note in the annals of history, but my hope is that they will ultimately lead to a time when this country mitigates this threat and disinvites our enemies to try to exploit it against us. I pray it happens just that way. Mr. Chairman, I yield back the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I claim the time in opposition, although I do not oppose the amendment. The Acting CHAIR. Without objection, the gentleman from Maryland is recognized for 5 minutes. There was no objection. Mr. RUPPERSBERGER. Mr. Chairman, I yield myself such time as I may consume. Mr. Franks, a leader in the bipartisan House Electromagnetic Pulse Caucus, has brought attention to the serious threats posed by electromagnetic pulses, whether from a solar storm or a nuclear-armed enemy that could harm our critical infrastructure. Given what we know about our Nation's critical infrastructure vulnerabilities, I support this amendment's purpose, to gain even more information that can better protect our utilities, financial systems, medical facilities, networks, and other infrastructure. Therefore, I support this amendment, and I urge my colleagues to do the same. Mr. Chairman, I yield 2 minutes to the gentleman from Rhode Island (Mr. Langevin), one of the key members of our committee and one of the experts in the area of cybersecurity. (Mr. LANGEVIN asked and was given permission to revise and extend his remarks.) Mr. LANGEVIN. Mr. Chairman, I rise in support of H.R. 4681, the Intelligence Authorization Act for Fiscal Years 2014 and 2015. I am going to keep my remarks brief, but I first wanted to thank Chairman Rogers and Ranking Member Ruppersberger for bringing this bill to the floor in a bipartisan way. The bill before us really is indicative of how the committee is run in a bipartisan way under Chairman Rogers' leadership. In particular, I do want to commend Chairman Rogers for his years of service on the Intelligence Committee and wish him the best in his retirement at the end of this year. He clearly made a difference. Mr. Chairman, this is a balanced measure and really critical to protecting our Nation's security. I have been pleased to work with the chairman and ranking member on several provisions included in the bill. This bill makes critical investments in technical and tactical intelligence, as well as in our human capabilities. In particular, in order to support and develop the long-term health of our most important intelligence resource--human talent--this bill requires the Director of National Intelligence to create a plan to promote cybersecurity and computer literacy among high school and university students. As cyber threats grow in quantity and sophistication, we must do more to train and recruit into the noble calling of government service young people with the interest and aptitude for cybersecurity. The bill authorizes provisions to reduce the risk of information leaks, as well, and unauthorized disclosures of classified information by insiders, while maintaining appropriate levels of trust in our personnel. We cannot afford a repeat of last year's breach of classified information. Mr. Chairman, continued focus is needed to ensure that we, of course, are supporting the efforts of those patriotic Americans who proudly serve our Nation in the intelligence community, while properly safeguarding the privacy and civil liberties that our citizens hold dear. To that end, we must fully absorb the lessons learned over the past decade after passage of the landmark Intelligence Reform and Terrorism Prevention Act and the changes it brought to the IC. The Acting CHAIR. The time of the gentleman has expired. Mr. RUPPERSBERGER. I yield the gentleman an additional 1 minute. Mr. LANGEVIN. I certainly look forward to working with my committee colleagues to continue this tradition of rigorous, responsible, and bipartisan oversight. The work that we do is critical to our national security. Again, I thank Chairman Rogers and Ranking Member Ruppersberger, as well as my colleagues on the committee; and in particular, I want to thank the staff for the hard work that they have done in bringing this bill to the floor on both sides of the aisle. Their work is critical as well. I thank my colleagues. Mr. RUPPERSBERGER. Mr. Chairman, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Arizona (Mr. Franks). The amendment was agreed to. Amendment No. 7 Offered by Mr. Poe of Texas The Acting CHAIR. It is now in order to consider amendment No. 7 printed in House Report 113-465. Mr. POE of Texas. Mr. Chairman, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of subtitle B of title III, add the following: SEC. _. REPORT ON UNITED STATES COUNTERTERRORISM STRATEGY TO DISRUPT, DISMANTLE, AND DEFEAT AL-QAEDA, ITS AFFILIATED GROUPS, ASSOCIATED GROUPS, AND ADHERENTS. (a) Report.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a comprehensive report on the United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda, its affiliated groups, associated groups, and adherents. [[Page H5052]] (2) Coordination.--The report required by paragraph (1) shall be prepared in coordination with the Secretary of State, the Secretary of the Treasury, the Attorney General, and the Secretary of Defense, and the head of any other department or agency of the United States Government that has responsibility for activities directed at combating al-Qaeda, its affiliated groups, associated groups, and adherents. (3) Elements.--The report required by paragraph (1) shall include the following: (A) A definition of-- (i) al-Qaeda core, including a list of which known individuals constitute al-Qaeda core; (ii) an affiliated group of al-Qaeda, including a list of which known groups constitute an affiliate group of al-Qaeda; (iii) an associated group of al-Qaeda, including a list of which known groups constitute an associated group of al- Qaeda; (iv) an adherent of al-Qaeda, including a list of which known groups constitute an adherent of al-Qaeda; and (v) a group aligned with al-Qaeda, including a description of what actions a group takes or statements it makes that qualify it as a group aligned with al-Qaeda. (B) An assessment of the relationship between all identified al-Qaeda affiliated groups, associated groups, and adherents with al-Qaeda core. (C) An assessment of the strengthening or weakening of al- Qaeda, its affiliated groups, associated groups, and adherents, from January 1, 2010, to the present, including a description of the metrics that are used to assess strengthening or weakening and an assessment of the relative increase or decrease in violent attacks attributed to such entities. (D) An assessment of whether or not an individual can be a member of al-Qaeda core if such individual is not located in Afghanistan or Pakistan. (E) An assessment of whether or not an individual can be a member of al-Qaeda core as well as a member of an al-Qaeda affiliated group, associated group, or adherent. (F) A definition of defeat of core al-Qaeda. (G) An assessment of the extent or coordination, command, and control between core al-Qaeda, its affiliated groups, associated groups, and adherents, specifically addressing each such entity. (H) An assessment of the effectiveness of counterterrorism operations against core al-Qaeda, its affiliated groups, associated groups, and adherents, and whether such operations have had a sustained impact on the capabilities and effectiveness of core al-Qaeda, its affiliated groups, associated groups, and adherents. (4) Form.--The report required by paragraph (1) shall be submitted in unclassified form, but may include a classified annex. (b) Appropriate Committees of Congress Defined.--In this section, the term ``appropriate committees of Congress'' means-- (1) the Permanent Select Committee on Intelligence, the Committee on Foreign Affairs, and the Committee on Armed Services of the House of Representatives; and (2) the Select Committee on Intelligence, the Committee on Foreign Relations, and the Committee on Armed Services of the Senate. The Acting CHAIR. Pursuant to House Resolution 604, the gentleman from Texas (Mr. Poe) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Texas. Mr. POE of Texas. Mr. Chairman, I would like to thank Chairman Rogers for supporting this amendment but, more importantly, for his work on the Intelligence Committee for so many years and, prior to that, your work with the FBI. As a former judge, I got to see a lot of FBI agents come and testify in Texas, and they have a wonderful reputation. You also have that reputation, and thank you for your service in law enforcement and in the House. I also want to thank the ranking member for his support, generally, for this amendment. This amendment requires the Director of National Intelligence, in coordination with relevant agencies, to produce a strategy to defeat al Qaeda and its affiliates. The amendment requires that the President clearly define groups like core al Qaeda and al Qaeda affiliates and other terms the administration uses to define this enemy of America. Al Qaeda continues to threaten the security of the United States and our allies, both here at home and abroad. Our intelligence services and our military have scored some real gains against al Qaeda, but al Qaeda in Afghanistan and Pakistan is still able to provide technical, tactical, and strategic direction to its affiliates throughout the world. Al Qaeda has gone from on the verge of strategic defeat to a serious and growing threat, depending on who you ask in our intelligence services or even the administration. Today, al Qaeda controls more territory than it ever has. The fight against al Qaeda is far from over, and it will continue to grow. As chairman of the House Foreign Affairs Subcommittee on Terrorism, Nonproliferation, and Trade, I have held over a dozen bipartisan hearings focusing on this very topic. Once again, I want to thank the chairman and ranking member for including this TNT Subcommittee in some of the work we have been doing together on the very issue of intelligence. During these 12 hearings in our subcommittee, we have yet to find a witness who can articulate or even agree with the administration's counterterrorism strategy or what it is or describe how the administration really views al Qaeda and its threat. This seems to be a problem. This needs to be clarified, so that all of us know exactly what our strategy is nationwide and worldwide. So this amendment is necessary, so we can all get on the same page in the hymnal with a clear strategy to defeat al Qaeda, so we understand what al Qaeda is really doing today in 2014. This is a constantly changing movement, and al Qaeda today isn't the same as the al Qaeda in 2001. We need to have a clear understanding of who we are fighting and how we are going to defeat the al Qaeda terrorists. Drone strikes and target raids are not a strategy; they are tactics. Therefore, I support this amendment, and I urge support by the committee and the whole House. And that's just the way it is. Mr. Chairman, I yield back the balance of my time. Mr. RUPPERSBERGER. Mr. Chairman, I claim the time in opposition, although I am not opposed to the amendment. The Acting CHAIR. Without objection, the gentleman from Maryland is recognized for 5 minutes. There was no objection. Mr. RUPPERSBERGER. I yield myself as much time as I may consume. I support this amendment because the time is right to step back and take stock of where we are and how we are doing in our fight against terrorism. The threat is not going away, but it is rapidly changing. The Director of the FBI, Jim Comey, recently said that the terrorism threat is very much alive and growing in new and more dangerous places around the world. It even surprised him, when he started, just how virulent and dispersed the terrorist threat had become. From Pakistan to Yemen, Afghanistan to Syria, north Africa to Iraq, the threat from al Qaeda is waning in some areas, but growing in others. Unless we approach this dangerous problem holistically and precisely, we risk just squeezing the balloon, suppressing terrorism in one area, only to see it grow in another. So I think it is a good idea to sit down and take a comprehensive look at the problem today, to make sure that we are confronting it in the precisely right way, to make sure that we are measuring our effectiveness correctly, and to make sure that we have the right and most current legal authorities. Mr. Chairman, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Texas (Mr. Poe). The amendment was agreed to. Amendment No. 9 Offered by Mr. Gallego The Acting CHAIR. It is now in order to consider amendment No. 9 printed in House Report 113-465. Mr. GALLEGO. Mr. Chairman, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of subtitle B of title III, add the following new section: SEC. __. REPORT ON RETRAINING VETERANS IN CYBERSECURITY. Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Defense, the Secretary of Veterans Affairs, and the Secretary of Homeland Security, shall submit to Congress recommendations for retraining veterans and retired members of elements of the intelligence community in cybersecurity. The Acting CHAIR. Pursuant to House Resolution 604, the gentleman from Texas (Mr. Gallego) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Texas. [[Page H5053]] Mr. GALLEGO. Mr. Chairman, I would like to begin by thanking Chairman Rogers and the ranking member for an opportunity to work on this issue with them, and I certainly wish Chairman Rogers well in his future endeavors. Mr. Chairman, this amendment helps us find ways to ensure that our veterans and other former public servants can continue their service to our country on cybersecurity, a critical national security need that will only grow in importance over the next several years. While Congress is well aware of the challenges that we face in cybersecurity, it is important to understand that cyber attacks are not only aimed at the government, where they challenge our national security and endanger our troops, but these attacks also target our Nation's economic advantages, our core advantages, when they steal proprietary information and intellectual property from American firms that lead the Nation and lead the world in innovation. {time} 1100 In fact, for the private sector, it is important to know that an IP theft in the U.S. costs companies upwards of $250 billion a year, and global cyber crime costs $338 billion. And when you factor in downtime, either way, that is a lot of money. And we spent up to--no kidding--$1 trillion fixing these problems. These highlight an important point, that if these attacks on American companies are so bad, just use your imagination to figure the threat of foreign-based cyber attacks on the Department of Defense or other critical intelligence agencies. And there is no better group of people than our veterans and our retired members of the intelligence community who could be ready to assist in cybersecurity. This amendment allows us to do everything we can to support our veterans who are looking for jobs along with those retired members of the intelligence community who have already demonstrated their commitment to public service. Mr. Chairman, I reserve the balance of my time. Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the amendment, I ask unanimous consent to control the time in opposition. The Acting CHAIR. Is there objection to the request of the gentleman from Michigan? There was no objection. The Acting CHAIR. The gentleman from Michigan is recognized for 5 minutes. Mr. ROGERS of Michigan. Mr. Chairman, I yield myself such time as I may consume. Our Nation owes a debt of gratitude to its veterans and to the retired members of the intelligence community. We should look for as many ways as possible to help them succeed in the job market. And I want to thank the gentleman for offering the amendment for promoting this. The amendment does, again, highlight the sheer level of threat we face from cyber crime, cyber terrorists, cyber espionage. We are being overwhelmed. When you look at China, Russia, Iran, and now organized crime groups who are approaching nation-state capability, it is as bad as I have ever seen it. And, again, 85 percent of the networks across America are not protected by the government because they are private sector networks. The government, itself, is about 15 percent of those networks. We need to find a pathway, A, to attract the talent that the gentleman from Texas (Mr. Gallego) is talking about; and, B, we need to allow these private sector folks to protect themselves by gaining information, sharing information the government has that could protect those networks from cyber catastrophe. It is happening each and every day. The next generation of cyber warriors are there. And I think this amendment will go a long way to recruit the right talent in the right place to help us meet this growing threat of the future prosperity, safety, and the security of the United States. With that, I yield back the balance of my time. Mr. GALLEGO. Mr. Chairman, I yield 1\1/2\ minutes to the gentleman from Maryland (Mr. Ruppersberger). Mr. RUPPERSBERGER. Mr. Chairman, I support this amendment, and I urge my colleagues to do the same. As I said in the opening hearing on worldwide threats, ``education is the keystone of security and prosperity in the 21st century.'' The cyber threats we face are grave, and we need to train the best, the brightest, and the most dedicated--like our veterans and our retired intelligence professionals--to be our next generation of cyber defenders. We call them cyber warriors. Every day, we hear about cyber attacks in the news. Early last year, for example, our financial sector suffered a wide-scale network denial of service attack that proved difficult and very costly to mitigate. The retail giant, Target, is another recent example of our vulnerability to cyber attacks. And today, The Washington Post stated that Iranian hackers are targeting U.S.A. officials through social networks. We need to pass cybersecurity legislation like CISPA, and we need to do far more to expand our bench of cyber professionals and innovators. We need to invest in early education in science, technology, engineering, and math. And we equally need to leverage the experience and wisdom of our veterans and former intelligence professionals. Our adversaries are making heavy investments in cyber education. We must do the same. For this reason, I support this amendment. I thank my colleague from Texas (Mr. Gallego) for his amendment. He represents the area of Texas that is close to the border. He understands the threat and why we need intelligence to deal with national security. Mr. GALLEGO. Mr. Chairman, many of our servicemembers have made the ultimate sacrifice. There are 4,423 that have died in Operation Iraqi Freedom; 66 in Operation New Dawn; and, as of yesterday, 2,320 have died in Operation Enduring Freedom in Afghanistan, where I just returned from this week. But many of the thousands upon thousands of our troops who did make it home to see their mothers, fathers, spouses, and kids are alive today because actionable intelligence helped them achieve their missions more safety. While there has been a lot of criticism about intelligence collection--and we have had a very robust debate on these issues--I think it is important that we concentrate on the fact that intelligence is so critical to the lives of our men and women in uniform. And it really does help them come back home today safe with their families because of the work of our numerous intelligence agencies who have provided the information they need to stay alive. Mr. Chairman, I also want to do a shout-out to the Air Force ISR Agency in San Antonio, in Bexar County. I know that they do critical work to protect and defend our liberty each and every day. Mr. Chairman, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Texas (Mr. Gallego). The amendment was agreed to. The Acting CHAIR. The question is on the amendment in the nature of a substitute, as amended. The amendment was agreed to. The Acting CHAIR. Under the rule, the Committee rises. Accordingly, the Committee rose; and the Speaker pro tempore (Mr. Poe of Texas) having assumed the chair, Mr. Womack, Acting Chair of the Committee of the Whole House on the state of the Union, reported that that Committee, having had under consideration the bill (H.R. 4681) to authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, and, pursuant to House Resolution 604, he reported the bill back to the House with an amendment adopted in the Committee of the Whole. The SPEAKER pro tempore. Under the rule, the previous question is ordered. Is a separate vote demanded on any amendment to the amendment reported from the Committee of the Whole? If not, the question is on the amendment in the nature of a substitute, as amended. [[Page H5054]] The amendment was agreed to. The SPEAKER pro tempore. The question is on the engrossment and third reading of the bill. The bill was ordered to be engrossed and read a third time, and was read the third time. Motion to Recommit Mr. BISHOP of New York. Mr. Speaker, I have a motion to recommit at the desk. The SPEAKER pro tempore. Is the gentleman opposed to the bill? Mr. BISHOP of New York. In its current form, I am. The SPEAKER pro tempore. The Clerk will report the motion to recommit. The Clerk read as follows: Mr. Bishop of New York moves to recommit the bill, H.R. 4681, to the Permanent Select Committee on Intelligence with instructions to report the same back to the House forthwith with the following amendment: At the end of subtitle A of title III, add the following new section: SEC. __. PROTECTING UNITED STATES MILITARY TECHNOLOGY AND INDUSTRIAL COMPETITIVENESS FROM CHINESE AND OTHER STATE-SPONSORED COMPUTER THEFT. The head of each element of the intelligence community shall-- (1) prioritize efforts to uncover and foil attempts to steal United States military technology, and the intellectual property of United States corporations, by State-sponsored computer hackers from China and other foreign countries; (2) consistent with existing law, immediately inform corporations and internet providers of any computer breaches and the steps necessary to combat further intrusion; (3) coordinate with other Federal agencies to protect critical United States infrastructure, including the electrical grid, nuclear power plants, oil and gas pipelines, financial services, and air traffic safety, from repeated computer hacking attacks; and (4) assist the Department of Justice and other law enforcement agencies, including by supporting the international efforts of United States allies, in efforts to punish and sanction individuals and governments that perpetrate economic espionage and identity theft. Mr. BISHOP of New York (during the reading). Mr. Speaker, I ask unanimous consent to dispense with the reading. The SPEAKER pro tempore. Is there objection to the request of the gentleman from New York? Mr. ROGERS of Michigan. Mr. Speaker, I object. The SPEAKER pro tempore. Objection is heard. The Clerk will read. The Clerk continued to read. The SPEAKER pro tempore. The gentleman from New York is recognized for 5 minutes. Mr. BISHOP of New York. Mr. Speaker, this is the final amendment to the bill, which will not kill the bill or send it back to committee. If adopted, the bill will immediately proceed to final passage, as amended. Mr. Speaker, my amendment responds to the increasing threat of Chinese and other state-sponsored computer hacking of our national infrastructure of computer networks. These cyber attacks have severely undermined our national security and continue to threaten our economy. Not only are the Chinese hacking into our state secrets, but they are stealing our trade secrets, which costs us jobs, and especially jobs of the future. China's conduct is reprehensible and unacceptable for a major trading partner. In response, my amendment requires the heads of the intelligence agencies to prioritize efforts to uncover, stop, and prevent future attempts to steal U.S. military technology and intellectual property. The intelligence agencies are also required to notify businesses and Internet providers when network breaches occur, collaborate with Federal agencies to protect critical infrastructure, and assist law enforcement, as well as our international partners in apprehending, halting, and punishing those who infiltrate our systems. The need for this amendment is clear. Growing evidence reveals extensive activity on the part of the People's Liberation Army to conduct cyber, economic, and industrial espionage. Their hacking knows no bounds in the pursuit of state and trade secrets alike. We have uncovered the traces and telltale signs of hacking into Federal systems and U.S. corporations, like Alcoa, U.S. Steel, energy companies like SolarPowerAG, and even nuclear power providers like Westinghouse Electric Company. This month, the Justice Department indicted five members of the Chinese military for stealing trade secrets in order to prosper from American ingenuity and innovation to undercut our global competitiveness. These are not isolated incidents. The frequency of these attacks has increased over time, costing our economy thousands of jobs and up to $100 billion annually. Not only are the Chinese and their partners in cyber crime refusing to acknowledge evidence we have uncovered, but they refuse to negotiate steps both of our nations could pursue to end this threat. No one single action will stop the Chinese from trying to infiltrate American computer networks, but collaboration between our intelligence agencies, law enforcement, and the private sector can strengthen our defenses, deter cyber espionage from being launched on foreign shores, and protect our jobs. My amendment is not the only step we can take, but it is an important addition to this bill. The United States deserves better for supporting the rights of nations like China to trade in the global marketplace, to be treated with respect, and to participate in the community of nations. We must send the message to China and our rivals that this Congress stands ready to defend our national security and our economy, and we must send a message assuring future generations of Americans that protecting jobs here at home will always be our priority and that our economic might is more important than our military might. Our national security and position as a global leader in innovation and competitiveness depends on it. Mr. Speaker, I urge my colleagues to support this amendment. I yield back the balance of my time. Mr. ROGERS of Michigan. Mr. Speaker, I rise in opposition to the motion to recommit. The SPEAKER pro tempore. The gentleman is recognized for 5 minutes. Mr. ROGERS of Michigan. Mr. Speaker, I thank the gentleman for his interest. This is exciting news. The bill is not crafted correctly, and it opens us up to exposing classified information to corporations that may be foreign-owned and operated by the very counterintelligence threat we seek to push back on. But thank you for this effort. We should reject this. We should include resounding support for the CISPA bill that carefully drafted language to make sure that there is a cyber-sharing relationship, both between the government when it comes to malicious code and the private sector who, remember, is all by itself out there getting attacked by nation-states and large organized criminal groups trying to steal their information. If you think about even the last month or so that General Alexander was the Director of the National Security Agency, just in that last bit of time he was there, the military sites, the government sites were hit 41 million times by people trying to cause destruction or break in and steal something. Again, this is as serious a problem as you can imagine, Mr. Speaker, that we are not prepared to handle. So that CISPA bill that I think you tried to get here--I mean, part of this bill is the redundancy department of redundancy. The second part is just not drafted correctly, and we would love to help you get to the right place. This bill, I think, causes a little more harm than I think you realized without carefully considering how you construct a cyber- sharing malicious code relationship between the government and the private sector. It needs to happen. This way, it just exposes, again, the information to counterintelligence groups that we don't want to have it. So I would strongly urge the rejection of the motion to recommit. But I want to thank the gentleman. I look forward to working in the next few months with the gentleman to make sure that we put in place a fighting chance, a fighting chance for the 85 percent of those private sector networks that are getting absolutely ravaged every single day by cyber attackers, by people who are trying to disrupt activities. {time} 1115 There are public reports that Iran is probing our financial institutions. Think about the idea if they were able or successful to go in and take down a financial institution that has trillions [[Page H5055]] of dollars every single day in global transactions, destroy data, manipulate data, and you don't know who owes whom what. Imagine the economic catastrophe that happens. Well, guess what? This is not Orwellian. It is not next year, it is not 6 months from now, and it is not 10 years from now. It is happening today, and every nation on the face of the Earth is trying to get this capability--including al Qaeda. They are advertising to try to find the right people to develop a capability for a cyberattack to disrupt, to destroy, and to cause chaos. This is as important an issue as I can think of, Mr. Speaker, that I hope we find some resolution on. Again, I have to strongly oppose this motion to recommit for the drafting errors I find in the bill. But I look forward to working with the gentleman on the CISPA bill that is in the Senate and passed by this House in a huge bipartisan way so that we can bring relief and security to the future prosperity of the United States of America. With that, I yield back the balance my time. The SPEAKER pro tempore. Without objection, the previous question is ordered on the motion to recommit. There was no objection. The SPEAKER pro tempore. The question is on the motion to recommit. The question was taken; and the Speaker pro tempore announced that the noes appeared to have it. Mr. BISHOP of New York. Mr. Speaker, on that I demand the yeas and nays. The yeas and nays were ordered. The SPEAKER pro tempore. Pursuant to clause 8 and clause 9 of rule XX, this 15-minute vote on the motion to recommit will be followed by 5-minute votes on passage of the bill, if ordered, and agreeing to the Speaker's approval of the Journal, if ordered. The vote was taken by electronic device, and there were--yeas 183, nays 220, not voting 28, as follows: [Roll No. 270] YEAS--183 Barber Barrow (GA) Bass Beatty Becerra Bera (CA) Bishop (GA) Bishop (NY) Blumenauer Bonamici Brady (PA) Braley (IA) Brown (FL) Brownley (CA) Bustos Butterfield Capps Capuano Cardenas Carney Carson (IN) Cartwright Castor (FL) Castro (TX) Chu Cicilline Clark (MA) Clarke (NY) Cohen Connolly Conyers Cooper Costa Courtney Crowley Cuellar Cummings Davis (CA) Davis, Danny DeFazio DeGette Delaney DeLauro DelBene Deutch Doggett Doyle Duckworth Edwards Ellison Engel Enyart Eshoo Esty Farr Foster Frankel (FL) Fudge Gallego Garamendi Garcia Grayson Green, Gene Grijalva Gutierrez Hahn Hanabusa Heck (WA) Higgins Himes Hinojosa Holt Honda Horsford Hoyer Huffman Israel Jackson Lee Jeffries Johnson (GA) Johnson, E. B. Kaptur Keating Kelly (IL) Kennedy Kildee Kilmer Kind Kirkpatrick Kuster Langevin Larsen (WA) Larson (CT) Lee (CA) Levin Lipinski Loebsack Lofgren Lowenthal Lowey Lujan Grisham (NM) Lujan, Ben Ray (NM) Lynch Maffei Maloney, Carolyn Maloney, Sean Matheson Matsui McCollum McDermott McGovern McIntyre McNerney Meeks Meng Michaud Moore Moran Murphy (FL) Nadler Napolitano Negrete McLeod Nolan O'Rourke Owens Pallone Pascrell Pastor (AZ) Payne Pelosi Perlmutter Peters (CA) Peters (MI) Peterson Pingree (ME) Pocan Polis Price (NC) Quigley Rahall Richmond Roybal-Allard Ruiz Ruppersberger Rush Ryan (OH) Sanchez, Linda T. Sanchez, Loretta Sarbanes Schakowsky Schiff Schneider Schrader Schwartz Scott (VA) Scott, David Serrano Sewell (AL) Shea-Porter Sherman Sinema Sires Smith (WA) Speier Swalwell (CA) Takano Thompson (CA) Thompson (MS) Tierney Titus Tonko Tsongas Van Hollen Vargas Veasey Vela Velazquez Visclosky Walz Wasserman Schultz Waxman Welch Wilson (FL) NAYS--220 Aderholt Amash Amodei Bachmann Bachus Barletta Barr Barton Bentivolio Bilirakis Bishop (UT) Black Blackburn Boustany Brady (TX) Bridenstine Brooks (AL) Brooks (IN) Broun (GA) Buchanan Bucshon Burgess Byrne Calvert Camp Cantor Carter Cassidy Chabot Coble Coffman Cole Collins (GA) Collins (NY) Conaway Cook Cotton Crawford Crenshaw Culberson Daines Davis, Rodney Denham Dent DeSantis DesJarlais Diaz-Balart Duffy Duncan (SC) Duncan (TN) Ellmers Farenthold Fincher Fitzpatrick Fleischmann Fleming Flores Forbes Fortenberry Foxx Franks (AZ) Frelinghuysen Gardner Garrett Gerlach Gibbs Gibson Gingrey (GA) Gohmert Goodlatte Gosar Gowdy Granger Graves (GA) Graves (MO) Griffin (AR) Griffith (VA) Grimm Guthrie Hall Hanna Harper Harris Hastings (WA) Heck (NV) Hensarling Herrera Beutler Holding Hudson Huelskamp Huizenga (MI) Hultgren Hunter Hurt Issa Jenkins Johnson (OH) Johnson, Sam Jolly Jones Jordan Joyce Kelly (PA) King (IA) King (NY) Kingston Kinzinger (IL) Kline Labrador LaMalfa Lamborn Lance Latham Latta LoBiondo Long Lucas Luetkemeyer Lummis Marchant Marino Massie McAllister McCarthy (CA) McCaul McClintock McHenry McKeon McKinley McMorris Rodgers Meadows Meehan Messer Mica Miller (FL) Miller (MI) Mullin Mulvaney Murphy (PA) Neugebauer Noem Nugent Nunes Nunnelee Olson Paulsen Pearce Perry Petri Pittenger Pitts Poe (TX) Pompeo Posey Price (GA) Reed Reichert Renacci Ribble Rice (SC) Rigell Roby Roe (TN) Rogers (AL) Rogers (KY) Rogers (MI) Rohrabacher Rokita Rooney Roskam Ross Rothfus Royce Runyan Ryan (WI) Salmon Sanford Scalise Schock Schweikert Scott, Austin Sensenbrenner Sessions Shimkus Simpson Smith (MO) Smith (NE) Smith (NJ) Smith (TX) Southerland Stewart Stivers Stockman Stutzman Terry Thompson (PA) Thornberry Tiberi Tipton Turner Upton Valadao Wagner Walden Walorski Weber (TX) Webster (FL) Wenstrup Westmoreland Whitfield Williams Wilson (SC) Wittman Wolf Womack Woodall Yoder Yoho Young (AK) Young (IN) NOT VOTING--28 Benishek Campbell Capito Chaffetz Clay Cleaver Clyburn Cramer Dingell Fattah Gabbard Green, Al Hartzler Hastings (FL) Lankford Lewis McCarthy (NY) Miller, Gary Miller, George Neal Palazzo Rangel Ros-Lehtinen Shuster Slaughter Walberg Waters Yarmuth {time} 1145 Messrs. GRIFFITH of Virginia and McHENRY changed their vote from ``yea'' to ``nay.'' So the motion to recommit was rejected. The result of the vote was announced as above recorded. The SPEAKER pro tempore. The question is on the passage of the bill. The question was taken; and the Speaker pro tempore announced that the ayes appeared to have it. Recorded Vote Mr. RUPPERSBERGER. Mr. Speaker, I demand a recorded vote. A recorded vote was ordered. The SPEAKER pro tempore. This is a 5-minute vote. The vote was taken by electronic device, and there were--ayes 345, noes 59, not voting 27, as follows: [Roll No. 271] AYES--345 Aderholt Amodei Bachmann Bachus Barber Barletta Barr Barrow (GA) Beatty Becerra Bera (CA) Bilirakis Bishop (GA) Bishop (NY) Bishop (UT) Black Blackburn Bonamici Boustany Brady (PA) Brady (TX) Braley (IA) Bridenstine Brooks (AL) Brooks (IN) Brown (FL) Brownley (CA) Buchanan Bucshon Bustos Butterfield Byrne Calvert Camp Cantor Capps Cardenas Carney Carson (IN) Carter Cartwright Cassidy Castor (FL) Castro (TX) Chabot Chu Cicilline Clarke (NY) Coble Coffman Cole Collins (GA) Collins (NY) Conaway Connolly Cook Cooper Costa Cotton Courtney Crawford Crenshaw Crowley Cuellar Culberson Cummings Daines Davis (CA) Davis, Danny Davis, Rodney DeGette Delaney DeLauro Denham Dent DeSantis DesJarlais Deutch Diaz-Balart Duckworth Duffy Edwards Ellmers Engel Enyart Eshoo Esty Farenthold Farr Fincher Fitzpatrick Fleischmann Fleming Flores Forbes Fortenberry Foster Foxx Frankel (FL) Franks (AZ) Frelinghuysen Fudge Gabbard Gallego Garamendi Garcia Gardner Garrett Gerlach Gibbs Gingrey (GA) Goodlatte Gowdy Granger Graves (GA) Graves (MO) Grayson Green, Gene Griffin (AR) Griffith (VA) Grimm Guthrie Hahn Hall Hanabusa Hanna Harper Harris Hastings (WA) Heck (NV) Heck (WA) Hensarling [[Page H5056]] Herrera Beutler Higgins Himes Hinojosa Holding Horsford Hoyer Hudson Huizenga (MI) Hultgren Hunter Hurt Israel Issa Jackson Lee Jeffries Jenkins Johnson (GA) Johnson (OH) Johnson, E. B. Johnson, Sam Jolly Jordan Joyce Kaptur Keating Kelly (IL) Kelly (PA) Kennedy Kildee Kilmer Kind King (IA) King (NY) Kinzinger (IL) Kirkpatrick Kline Kuster LaMalfa Lamborn Lance Langevin Larsen (WA) Larson (CT) Latham Latta Levin Lipinski LoBiondo Loebsack Long Lowenthal Lowey Lucas Luetkemeyer Lujan Grisham (NM) Lujan, Ben Ray (NM) Lynch Maffei Maloney, Sean Marchant Marino Matheson Matsui McAllister McCarthy (CA) McCaul McCollum McHenry McIntyre McKeon McKinley McMorris Rodgers McNerney Meadows Meehan Meeks Meng Messer Mica Michaud Miller (FL) Miller (MI) Moran Mullin Murphy (FL) Murphy (PA) Napolitano Negrete McLeod Neugebauer Noem Nolan Nugent Nunes Nunnelee Olson Owens Pallone Pascrell Pastor (AZ) Paulsen Payne Pearce Pelosi Perlmutter Peters (CA) Peters (MI) Peterson Petri Pingree (ME) Pittenger Pitts Poe (TX) Pompeo Price (GA) Price (NC) Quigley Rahall Reed Reichert Renacci Ribble Rice (SC) Richmond Rigell Roby Roe (TN) Rogers (AL) Rogers (KY) Rogers (MI) Rohrabacher Rokita Rooney Roskam Ross Rothfus Roybal-Allard Royce Ruiz Runyan Ruppersberger Rush Ryan (OH) Ryan (WI) Sanchez, Linda T. Sanchez, Loretta Sarbanes Scalise Schiff Schneider Schock Schrader Schwartz Schweikert Scott (VA) Scott, Austin Scott, David Serrano Sessions Sewell (AL) Shea-Porter Sherman Shimkus Simpson Sinema Sires Smith (MO) Smith (NE) Smith (NJ) Smith (TX) Smith (WA) Southerland Stewart Stivers Stutzman Terry Thompson (CA) Thompson (MS) Thompson (PA) Thornberry Tiberi Tipton Titus Tonko Tsongas Turner Upton Valadao Van Hollen Vargas Veasey Vela Visclosky Wagner Walden Walorski Walz Wasserman Schultz Waxman Webster (FL) Wenstrup Westmoreland Whitfield Williams Wilson (FL) Wilson (SC) Wittman Wolf Womack Woodall Yoder Young (AK) Young (IN) NOES--59 Amash Barton Bass Bentivolio Blumenauer Broun (GA) Burgess Capuano Clark (MA) Cohen Conyers DeFazio DelBene Doggett Doyle Duncan (SC) Duncan (TN) Ellison Gibson Gohmert Gosar Grijalva Gutierrez Holt Honda Huelskamp Huffman Jones Kingston Labrador Lee (CA) Lofgren Lummis Maloney, Carolyn Massie McClintock McDermott McGovern Moore Mulvaney Nadler O'Rourke Perry Pocan Polis Posey Salmon Sanford Schakowsky Sensenbrenner Speier Stockman Swalwell (CA) Takano Tierney Velazquez Weber (TX) Welch Yoho NOT VOTING--27 Benishek Campbell Capito Chaffetz Clay Cleaver Clyburn Cramer Dingell Fattah Green, Al Hartzler Hastings (FL) Lankford Lewis McCarthy (NY) Miller, Gary Miller, George Neal Palazzo Rangel Ros-Lehtinen Shuster Slaughter Walberg Waters Yarmuth {time} 1153 Mrs. CAROLYN B. MALONEY of New York changed her vote from ``aye'' to ``no.'' So the bill was passed. The result of the vote was announced as above recorded. A motion to reconsider was laid on the table. Stated for: Mr. WALBERG. Mr. Speaker, on Friday, May 30, 2014, I was unable to vote due to my duties and responsibilities in my daughter's wedding rehearsal and ceremony on the 30th and 31st. Had I been present, I would have voted ``yea'' on rollcall No. 271. personal explanation Mr. AL GREEN of Texas. Mr. Speaker, today I missed the following votes: Democratic Motion to Recommit H.R. 4681. Had I been present, I would have voted ``yes'' on this bill. H.R. 4681--Intelligence Authorization Act for Fiscal Years 2014 and 2015. Had I been present, I would have voted ``yes'' on this bill. ____________________