[Congressional Record Volume 161, Number 96 (Tuesday, June 16, 2015)]
[House]
[Pages H4389-H4395]
{time} 1230
PROVIDING FOR CONSIDERATION OF H.R. 2596, INTELLIGENCE AUTHORIZATION
ACT FOR FISCAL YEAR 2016
Mr. COLLINS of Georgia. Mr. Speaker, by direction of the Committee on
Rules, I call up House Resolution 315 and ask for its immediate
consideration.
The Clerk read the resolution, as follows:
H. Res. 315
Resolved, That at any time after adoption of this
resolution the Speaker may, pursuant to clause 2(b) of rule
XVIII, declare the House resolved into the Committee of the
Whole House on the state of the Union for consideration of
the bill (H.R. 2596) to authorize appropriations for fiscal
year 2016 for intelligence and intelligence-related
activities of the United States Government, the Community
Management Account, and the Central Intelligence Agency
Retirement and Disability System, and for other purposes. The
first reading of the bill shall be dispensed with. All points
of order against consideration of the bill are waived.
General debate shall be confined to the bill and amendments
specified in this section and shall not exceed one hour
equally divided and controlled by the chair and ranking
minority member of the Permanent Select Committee on
Intelligence. After general debate the bill shall be
considered for amendment under the five-minute rule. In lieu
of the amendment in the nature of a substitute recommended by
the Permanent Select Committee on Intelligence now printed in
the bill, it shall be in order to consider as an original
bill for the purpose of amendment under the five-minute rule
an amendment in the nature of a substitute consisting of the
text of Rules Committee Print 114-19. That amendment in the
nature of a substitute shall be considered as read. All
points of order against that amendment in the nature of a
substitute are waived. No amendment to that amendment in the
nature of a substitute shall be in order except those printed
in the report of the Committee on Rules accompanying this
resolution. Each such amendment may be offered only in the
order printed in the report, may be offered only by a Member
designated in the report, shall be considered as read, shall
be debatable for the time specified in
[[Page H4390]]
the report equally divided and controlled by the proponent
and an opponent, shall not be subject to amendment, and shall
not be subject to a demand for division of the question in
the House or in the Committee of the Whole. All points of
order against such amendments are waived. At the conclusion
of consideration of the bill for amendment the Committee
shall rise and report the bill to the House with such
amendments as may have been adopted. Any Member may demand a
separate vote in the House on any amendment adopted in the
Committee of the Whole to the bill or to the amendment in the
nature of a substitute made in order as original text. The
previous question shall be considered as ordered on the bill
and amendments thereto to final passage without intervening
motion except one motion to recommit with or without
instructions.
Sec. 2. Notwithstanding clause 8 of rule XX, further
proceedings on the recorded vote ordered on the question of
reconsideration of the vote on the question of concurring in
the matter comprising the remainder of title II of the Senate
amendment to H.R. 1314 may continue to be postponed through
the legislative day of Thursday, July 30, 2015.
The SPEAKER pro tempore. The gentleman from Georgia is recognized for
1 hour.
Mr. COLLINS of Georgia. Mr. Speaker, for the purpose of debate only,
I yield the customary 30 minutes to the gentleman from Florida (Mr.
Hastings), pending which I yield myself such time as I may consume.
During consideration of this resolution, all time yielded is for the
purpose of debate only.
General Leave
Mr. COLLINS of Georgia. Mr. Speaker, I ask unanimous consent that all
Members may have 5 legislative days to revise and extend their remarks
and include extraneous material on House Resolution 315, currently
under consideration.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Georgia?
There was no objection.
Mr. COLLINS of Georgia. Mr. Speaker, I am pleased to bring forward
today this rule on behalf of the Rules Committee. This rule provides
for a robust amendment debate on a wide variety of issues related to
the authorization of funds for 16 intelligence agencies.
This rule provides for the consideration of H.R. 2596, the
Intelligence Authorization Act for Fiscal Year 2016. The Rules
Committee met on this measure yesterday evening and heard testimony
from both the chairman of the committee and the ranking member, in
addition to receiving amendment testimony from multiple Members.
This rule brought forward by the committee is a structured rule.
There were 29 amendments in total submitted to the Rules Committee. Of
those 29, I am pleased that the full House will debate and vote on 16
of those amendments, over half that were submitted.
The majority of the amendments made in order are bipartisan, a fact
demonstrating the unity of this body in advancing funds that will go
directly to fighting against terrorism proliferation and weapons of
mass destruction.
``To provide for the common defense'' is a common phrase to us all,
and one that clearly sets forth the more basic responsibility of our
government, a responsibility that the members of the Rules Committee,
the Intelligence Committee, and, yes, I believe the entire House do not
take lightly.
This rule provides for 1 hour of general debate equally divided and
controlled by the chair and the ranking member of the Permanent Select
Committee on Intelligence.
As most of the intelligence budget involves highly classified
programs, all Members were given the opportunity to review the
classified annexes to the underlying legislation prior to Rules
Committee consideration.
Members should also be aware that section 2 of the rule provides that
the motion to reconsider the vote on Trade Adjustment Assistance, or
title II of the Senate amendment to H.R. 1314, may continue to be
postponed through Thursday, July 30, 2015.
This postponement was necessary to allow House and Senate leadership,
in addition to the President, sufficient time to consider legislative
options related to this action on trade promotion authority and Trade
Adjustment Assistance.
I am proud of the work undertaken by the Intelligence Committee to
advance this vitally important legislation whose consideration is
provided for by this rule.
There are a few key provisions that I want to ensure Members are
aware of because I believe they speak to the overwhelming awareness the
Intelligence Committee possesses of the responsibility of Congress to
protect this Nation from terrorism, and also of our unwavering fidelity
to the United States Constitution.
First, section 302 of the underlying legislation provides that the
authorization of appropriations by this act shall not be deemed to
constitute authority for the conduct of any intelligence activity that
is not otherwise authorized by the Constitution or the laws of the
United States.
Sections 303 and 304 require specific elements of the executive
branch to provide Congress with timely notifying requirements on key
intelligence activities. Congressional notification requirements
generally remain a vitally important mechanism to ensure that Congress
is able to conduct robust oversight.
Notification requirements specific to the intelligence community are
even more essential, given the classified and delicate nature of the
situations our intelligence agencies face every day.
The classification of documents and the decisionmaking factors that
go into such classification have historically been an area of great
interest and, at times, concerns by Members of this body and the
citizens that we represent.
In response to the valid concerns and interest by Members and the
public at large, in the Intelligence Committee's report on H.R. 2596,
they specifically state that the committee ``seeks to improve its
visibility into the classification process and better understand how
the intelligence community determines the classification level of
especially sensitive reporting and analysis.''
In the underlying legislation, the committee carries out this goal by
directing the Director of National Intelligence to provide, within 60
days of the enactment, a report to the congressional intelligence
committees outlining each instance in the past 5 years that the Office
of Director of National Intelligence or any other entity within the
executive branch directed an element of the intelligence community to
begin disseminating existing uncompartmented intelligence reporting or
analysis through a compartment or subcompartment.
This requirement is just one of several additional reporting
requirements in the legislation to serve to enhance Congress' role in
and understanding of the classification process, again, emphasizing
Congress' oversight role. The committee has done a good job in
clarifying that.
The underlying legislation also directs the Central Intelligence
Agency to provide the congressional intelligence committees with all
intelligence reports based on the documents collected in the May 1,
2011, raid that killed Osama bin Laden.
We live in a dangerous world and face constant and evolving threats
from terrorist groups like al Qaeda, Boko Haram, al Shabaab, and ISIS.
These groups successfully use the Internet to anonymously build their
resources, both human and financial.
The United States Government must maintain and enhance their ability
to counter extremists online. By understanding how and where terrorist
groups operate, we can more effectively fight for freedom at home and
abroad. I am pleased to see strong provisions in the legislation that
will further this goal.
These provisions that I have just spoken of are just a few examples
of the thoughtful and difficult work the Intelligence Committee
undertook to bring forward this legislation that authorizes critical
national security functions while staying within the funding
constraints of the Budget Control Act, or BCA.
I want to thank the Intelligence Committee and their staff for their
hard work on the authorization measure.
Mr. Speaker, I reserve the balance of my time.
Mr. HASTINGS. Mr. Speaker, I yield myself such time as I may consume,
and I thank the gentleman, my friend from Georgia, for yielding the
customary 30 minutes for debate.
Mr. Speaker, this rule provides for consideration of H.R. 2596, the
Intelligence Authorization Act for Fiscal Year 2016, as well as
provides that the
[[Page H4391]]
motion to reconsider the vote on passage of the Trade Adjustment
Assistance measure may continue to be postponed until the end of the
legislative day on July 30.
First, I commend the efforts of Chairman Nunes and Ranking Member
Schiff for their effort in crafting a bill with largely bipartisan
support that provides our Nation's intelligence community with the
resources they need to keep us safe. Our national security relies on
the continued strength of our intelligence community.
As we face ongoing security challenges both at home and abroad from
threats such as ISIL, lone wolf attacks, the emergence of cybercrime,
as well as the specter of unknown challenges that may be awaiting us, a
strong intelligence apparatus is of the utmost importance.
This legislation will do much to meet those challenges. Specifically,
this bill supports investments in cutting-edge technology like spy
satellites, enhances our Nation's human intelligence capabilities,
provides resources to safeguard valuable signals intelligence
collection, and partners with our foreign allies to maximize the reach
of our intelligence efforts.
This investment in our country's intelligence infrastructure comes at
a critically important time. As you know, the Office of Personnel
Management recently suffered a disastrous breach. Hackers were able to
target OPM and gain access to personnel data, including employees'
names, addresses, Social Security numbers, and numerous other personal
details.
Perhaps most disturbing, OPM houses the applications and files
submitted by those applying for security clearances, with data going
back until 1985. These files were compromised as well, leading some
experts to argue that the compromise of these files could have
tremendous negative effects for our human intelligence gathering
capabilities.
These cyber attacks represent a critical threat to our national
security. We all love the convenience that technology provides us, but
we must also be prepared to invest in technologies that will protect us
from those who wish to sabotage our security in the virtual world. It
is time for the OPM to implement and abide by best practices so that we
never face a data breach like the one we saw last week.
To the extent that Congress will play a role in securing our virtual
infrastructure, we should work as quickly as possible to ensure that
our employees and our most sensitive material are not needlessly
exposed to those who wish to do us harm.
Mr. Speaker, while I support the strong national security protections
this authorization provides, I am extremely disappointed yet again in
how my Republican colleagues have skirted the fiscal cuts imposed by
sequestration in order to fund the things that they care about, while
ignoring the effects such fool-headed cuts have on the vital domestic
programs that they don't seem to care about. We have people hurting all
over this Nation because of this irresponsible and senseless policy of
sequestration.
Republicans claim to be using this policy as an important tool to
rein in out-of-control government spending; yet, when sequestration
affects programs and areas of the budget they care about, they
magically get around this dilemma by using accounting gimmicks.
That is just what they have done here in this measure. The majority
has yet again used the overseas contingency operations account to evade
sequestration spending caps.
Wouldn't it be nice if Republicans wanted to evade spending caps for
the Department of Education so that we can get around sequestration and
properly educate our children? Or if they could use accounting tricks
to get around sequestration to fully fund and repair our crumbling
infrastructure? Or if they were also inclined to use their budgetary
magic to get around sequestration caps to properly fund critically
important agencies like the Environmental Protection Agency so that our
children and grandchildren can continue to have access to clean water
and clean air?
Alas, all we get from the majority is more of the same budgetary
double standard, using tricks to get around spending caps on things you
like to spend money on and then cry, ``sequester, sequester,'' on
things you don't like to spend money on.
{time} 1245
Let's stop pretending. That isn't a plan to rein in government
spending. That is just spending taxpayer money on things you deem
worthy of unfettered spending and ignoring programs, for political
reasons, that you don't even like, even though such programs remain
vital to our country's success.
Mr. Speaker, many on my side of the aisle have taken issue with the
detention facility in Guantanamo Bay since day one; I certainly have.
Once again, the Republicans look to continue the operation of this
prison, when we should be working to bring about its orderly closure.
We are better than this prison. As a country dedicated to the rule of
law, as a country that inspires people the world over to work for and
even die for the establishment of democratic rule, we are better than
this prison. This prison is an exercise in Kafkaesque justice, which
has long worked to undermine our standing with our allies and helped
terrorist organizations recruit more and more fighters.
Look, I don't think that anyone is arguing that, if we close the
prison, then the myriad terrorist groups who use it as a recruiting
tool will no longer have people joining their ranks, but it would be
one less arrow in their quiver.
For that reason, we need to work together to close the prison as
quickly as possible. In doing so, we will not jeopardize the safety of
our country, but will act more fully to reflect our commitment to
democracy and the rule of law.
We know and I know, having been in the judiciary, that our justice
system is more than capable of handling the prosecution of terrorists,
no matter where they are, including those held in Guantanamo Bay.
We have successfully tried Richard Reid, Umar Farouk Abdulmutallab,
Faisal Shahzad, and Dzhokhar Tsarnaev--the Boston bomber--and we have
either sentenced them to death or life imprisonment in our most secure
prisons.
At last night's Rules Committee meeting, my friends on the other side
of the aisle decided to make a last-minute change to today's rule--or,
I might add, to further pollute today's rule. That last-minute change
allows for the postponement of the motion to reconsider TAA.
Over the course of my tenure in Congress, I voted to support
thousands of pieces of legislation. In the 20-plus years that I have
served in this body, I can think of only three votes which I deeply
regret making, and one of those was in support of NAFTA.
In the years since, I have seen after NAFTA a decrease in American
jobs, a rollback of critical environmental protections here and in
Mexico, where I was promised that the environmental circumstances in
the maquiladoras would be cleaned up and they were not and a stagnation
of wages that has prevented the financial upward mobility of working
class and middle class Americans and has ground poor Americans into
poverty beyond belief.
If we are going to create trade policy that is worthy of future
generations, then we must ensure that that policy strengthens, not
weakens, labor rights. It must strengthen, not weaken, environmental
protections. It must ensure other countries' responsibility to adhere
to basic human rights. It must expand and strengthen our middle class,
not squeeze hard-working Americans in favor of corporate interests.
The legislation included in this rule today is part of a trade
package that does nothing to bolster these important priorities.
Finally, as I have stated time and again, I take issue with the
manner in which these important measures are being considered.
Legislation as important as the ones at hand deserve an open and
transparent process where Members of both parties and both Houses of
Congress may debate and offer amendments as they please.
This process, envisioned and designed by our Founding Fathers to
serve as a safeguard to democracy, continues to be eroded by the
majority's insistence on grouping multiple, unrelated bills together
under one rule and limiting the number of amendments that can be made
in order, as well as the time available for debate.
[[Page H4392]]
There were amendments offered last night. For example, Congresswoman
Speier offered whistleblower protection, not made in order. My
colleague Representative Schweikert from Arizona and I offered a very
sensible measure under the intelligence provision to allow for us, as a
sense of Congress only, to say that we will participate with Tunisia's
intelligence operation in a more pronounced manner--totally innocuous,
but at the very same time, helping a country that may very well make
the bridge to democracy and certainly has been an ally in
intelligence--and a needed one, in light of the number of people that
come up from north Africa through Tunisia and wind up fighting in the
Middle East.
If we are truly to operate as the deliberative body the U.S. House of
Representatives was created to function as, we must do more to ensure
that our Nation's most critical pieces of legislation are afforded the
time and consideration they rightly deserve.
Mr. Speaker, I reserve the balance of my time.
Mr. COLLINS of Georgia. Mr. Speaker, I yield myself such time as I
may consume.
Mr. Speaker, I appreciate the gentleman from Florida. One of the
things that I, coming on to the Rules Committee, have found is really
the vigorous debates that we do have--and the gentleman from Florida,
we have had many of those, and that is a good place for it.
It is a good place for it also here on the floor to discuss what
really, as was focused on very clearly, is a rule for a bill, and then
there is a procedural issue that we are extending the TAA
reconsideration until July 30. I am understanding what he is saying,
but I do want to make Members clear that is what is happening.
We are working on the majority side for a process that is open.
Sixteen amendments are going to be made in order, and they are going to
be debated right here on the floor of this House and voted. I think
that is what the Republican majority is focused on.
One of the things that came up--and I want it to be clear, Mr.
Speaker, is the gentleman brings up a point. It is about priorities. It
is about priorities. When we are dealing with authorizations and
spending bills, is what we are dealing with in the majority here, we
have made it very clear, I believe, from the Republican majority
standpoint, although I personally and others may have discussions on
how we use overseas contingency funds, and those have been debated on
this floor and should be continued to be debated on this floor.
However, one of the things that we are doing, and I believe, from our
perspective, is we are putting priorities first--priorities for
national defense; securing our national interest; and in light of this
bill, making sure that our country is safe, abroad and here, from
attacks from people who don't like us.
I don't buy the argument--and the debate on Guantanamo is a different
issue--but the argument that if we closed it up, it takes away one
recruiting piece. I am sorry. Boko Haram, al Qaeda, these others do not
hate us only because of a prison; they just hate us because we are
free. They hate us because we have a society that is open.
I understand the debate that we want to have, but let's make it
crystal clear. There was no Guantanamo when they rammed planes into our
World Trade Center. There was no Guantanamo at that time. They just
don't like us. Let's make that very clear.
Funding is appropriate. We will debate those entirely upon this House
and continue to. The Republicans will still look out for jobs and those
working in the middle class, and those that are trying to find their
families' priorities in their own economic sphere and looking at it in
a country that is in debt and trying to make sure we make good fiscal
decisions.
Our priorities are that we help businesses start, we encourage the
creation of jobs, not a government strangulation of jobs, and that is
what resources do.
With this bill, it is very focused, though. This is about our
intelligence community. This is a rule that supports an authorization
coming from a very difficult community that does a very difficult job.
We are supporting a rule that funds those agencies so that it keeps us
safe and does the things that keeps America free. That is the continued
argument that we will continue to have.
I appreciate, Mr. Speaker, the other debates that we want to have
here, but let's be focused. This rule is about that. It is also about a
policy decision or a procedural decision in this rule.
Mr. Speaker, I reserve the balance of my time.
Mr. HASTINGS. Mr. Speaker, at this time, I am very pleased to yield 2
minutes to the distinguished gentlewoman from Connecticut (Ms.
DeLauro).
Ms. DeLAURO. Mr. Speaker, the vote on Trade Adjustment Assistance
failed in the House of Representatives last Friday by a 3-1 margin; yet
this rule today would extend the revote on Trade Adjustment Assistance
through the end of July. This is one more attempt to play games with
the future of hard-working families.
American workers demand and they deserve respect. They deserve a
living wage and the right not to have their jobs shipped overseas. That
is what we are united in fighting for.
A vote for this rule is a vote for fast track. A vote for fast track
is a vote against jobs and against wages.
United States trade policy has been failing American workers, failing
American consumers and families for 20 years.
The U.S.-Korea Free Trade Agreement has already cost up to 75,000
jobs, and it was just passed 3 years ago. Up to 5 million jobs have
been destroyed by currency manipulation; and a number of the
signatories to this trade agreement, their policy is to manipulate
their currency to have their goods sold at a lower price than American
goods, putting American workers out of jobs and lowering their wages.
Joseph Stiglitz, the Nobel Laureate in Economics, has written:
``Inequality is not inevitable. It is a choice that we make with the
rules that we create to structure our economy.''
Trade policy is one of those choices. If we approve fast track, we
throw away our ability, our constitutional authority to represent the
people who sent us here in good faith. We throw away that ability to be
able to fix the flaws in the trade agreement, like the Trans-Pacific
Partnership, to the detriment of millions of American families.
I urge a ``no'' vote on this rule.
Mr. COLLINS of Georgia. Mr. Speaker, I reserve the balance of my
time.
Mr. HASTINGS. Mr. Speaker, at this time, I am very pleased to yield 2
minutes to the distinguished gentleman from Texas (Mr. Doggett).
Mr. DOGGETT. Friday, this House sent a strong message to the Fast-
Trackers: Not so fast.
Forty-eight hours ago, Republican leaders were telling the world
that, at this moment, we would be voting to approve Fast Track; but
now, the Fast-Trackers have become backtrackers, pushing back the vote.
The only reason that they seek this postponement in this rule of up
to 6 weeks is that they do not have the votes to approve Fast Track
today, and the only way they can get those votes today is to use this
strange shenanigan of connecting it and cloaking it in a rule for the
authorization of our intelligence agencies.
After Friday's Fast Track vote, one official said those who ``vote
against this Trade Adjustment Assistance are adding their names to the
death certificate for [it].'' Well, let's play it straight for a
change. TAA is not authorized now. It expired last year. Its future
depends, not upon this authorization, but upon an adequate level of
funding.
The Elementary and Secondary Education Act, the Juvenile Justice and
Delinquency Prevention Act, and many more have not been authorized for
years, but they continue to operate perfectly well, based upon
appropriated funds. This TAA argument is phony.
{time} 1300
Really, it doesn't take much intelligence to see what is happening
here. These Fast-Trackers are desperate, and this postponement vote for
this extent, of this nature, is unprecedented in the history of this
Congress. It has never happened before in American history that someone
has asked to postpone a vote for up to 6 weeks.
The SPEAKER pro tempore. The time of the gentleman has expired.
Mr. HASTINGS. I yield the gentleman an additional 30 seconds.
[[Page H4393]]
Mr. DOGGETT. And understand what that means. Understand that they are
looking for the ideal time--morning, noon, or night--to muscle through
a broken trade policy that a majority of this House and of the American
people do not want.
This rule provides that the Speaker at any time of day can come with
no notice, no debate, and say, we are voting to send this bill to the
President's desk.
What really needs adjusting is not trade assistance but the no-
compromise, no-amendment attitude on trade that gives us broken trade
policies.
This vote wouldn't be so close if this process hadn't been so closed.
Reject this rule. Vote for democracy. Don't change the precedents of
the House. Don't let this be muscled through.
Mr. COLLINS of Georgia. Mr. Speaker, I reserve the balance of my
time.
Mr. HASTINGS. Mr. Speaker, I am very pleased to yield 2 minutes to
the distinguished gentleman from Georgia (Mr. David Scott), my good
friend.
Mr. DAVID SCOTT of Georgia. Mr. Speaker, ladies and gentlemen, what
is about to happen on this floor with this rule is a direct violation
of the United States Constitution; for in the United States
Constitution, it clearly says that the United States Congress shall
have the power ``to regulate commerce with foreign nations.'' And in
this rule is a clear violation of that.
We already voted it down overwhelmingly 302-126, Republicans and
Democrats. It was the foremost bipartisan vote in this 21st century,
the very thing that the American people are crying for.
Now, why did Alexander Hamilton and Thomas Jefferson and James
Madison all agree? Very strong, very independent minds. Alexander
Hamilton and Thomas Jefferson could hardly bear to be in the same room
with each other, but they agreed on this because they knew that every
State had Representatives in Congress to look out for jobs that could
be shipped overseas. This is the primary reason, ladies and gentlemen.
Look at every trade agreement. This country has lost over 2 million
manufacturing jobs to China as a result of the China deal. Over 150,000
jobs to Mexico. Yes, it created jobs--not in the United States. And
what kind of jobs? These are jobs that impacted at the lower- and
middle-income levels of our economy. It is the middle class that is the
heart and the soul of America.
Let this Congress stand up and reject this rule.
We proved our mettle with that 302 vote. Congress, I am asking you,
the American people are asking you: Do what Alexander Hamilton and
Thomas Jefferson and James Madison asked us to do, and let it be the
Congress that regulates commerce with foreign nations.
Mr. COLLINS of Georgia. Mr. Speaker, I will continue to reserve the
balance of my time.
Mr. HASTINGS. Mr. Speaker, at this time, I yield 2 minutes to the
distinguished gentleman from California (Mr. Sherman).
Mr. SHERMAN. Mr. Speaker, intelligence is critical to our national
security. It should not be besmirched by a controversial and unrelated
procedural shenanigan, unprecedented in the annals of the House of
Representatives.
In the words of the President of the United States, It is time to
play it straight. TAA and TPA, that package was voted on. It was
defeated. We are done. Play it straight.
Write new legislation. Put together a new package. Bring it to the
floor of the House. See if it has a majority. That is playing it
straight.
Instead, in an unprecedented move, a vote we took last week is being
held in never-never land to be revoted on as late as the end of July.
That is right. Early June votes tabulated in late July.
If you are against unprecedented shenanigans, vote ``no'' on the
rule. If you are for playing it straight, vote ``no'' on the rule. If
you are against TAA, vote ``no'' on the rule. If you are against TPA,
if you are against fast track, vote ``no'' on the rule.
If you vote for an unprecedented procedural shenanigan, an
unprecedented procedural mutation today, you can be sure it will be
used against you and your district and your beliefs tomorrow. And if
you are not against fast track, you should be because it gives an
enormous gift to China, and we get nothing in return.
China's number one tactic for running up the largest trade surplus
against us in history is currency manipulation. This deal that is put
on the fast track enshrines the view that currency manipulation is just
fine. Go to it. A giant gift to China.
In addition, the rules of origin provisions say that goods that the
manufacturer admits are 50 or 60 percent made in China--which means
actually 70 or 80 percent made in China--get fast-tracked into the
United States.
Vote ``no'' on this procedural mutation.
Mr. COLLINS of Georgia. I yield myself such time as I may consume.
Mr. Speaker, just for a moment, let's focus back on the rule and the
underlying bill and the procedural issue that has been discussed. It is
out in the open. It was not snuck in or anything else. It has been
there and has been discussed.
But also, I want to get back to the fact of the rule, itself, which
is stand alone. We are going to be voting on an intelligence bill. We
are going to have a debate on an intelligence bill.
And, among other things, I will give us a reminder of what this
legislation does:
It sustains critical capabilities to fight terrorism and counter the
proliferation of weapons of mass destruction. That is a separate bill.
This is what we are going to be discussing. It has funds to assist our
efforts to recover unauthorized disclosures of intelligence
capabilities. It sustains activities in Afghanistan and Iraq to
continue the fight against ISIS, al Qaeda, and the Taliban. It invests
in the resiliency of our national security space architecture. It
provides policy discretion on sensitive intelligence operations. It
promotes intelligence integration and sharing through investment in
intelligence communitywide information technology enterprises. It
enhances investment in military intelligence, surveillance, and
reconnaissance aircraft. It funds initiatives to thwart cyber attacks
and insider threats. And it requires a report every 60 days on foreign
fighters in Syria and Iraq.
This is the bill, the underlying bill that we are discussing. And I
just wanted to make a reminder of that. As we have discussions on
different parts of this rule, let's be reminded also that we are
dealing with a stand-alone bill that we will work.
Mr. HASTINGS. Will the gentleman yield for just a question?
Mr. COLLINS of Georgia. I yield to the gentleman from Florida for
just a question.
Mr. HASTINGS. Mr. Speaker, all of the things that the gentleman from
Georgia said are in the measure are true. But does he also agree that
it is unprecedented that we have included a measure to delay an
already-voted-on rule? Never before has that been done.
Or to your knowledge, has it been?
Mr. COLLINS of Georgia. Well, I think it is a fact that it is a part
of this rule. The gentleman from Florida states it in whatever
adjectival terms he wants to give. But it is in the rule. We have not
made it secretive that it is part of this rule. And we can discuss
either part.
I will just simply focus on the intelligence part.
I reserve the balance of my time.
Mr. HASTINGS. Mr. Speaker, at this time, I am very pleased to yield 2
minutes to the distinguished gentlewoman from Texas (Ms. Jackson Lee),
my good friend.
Ms. JACKSON LEE. I thank the gentleman from Florida for yielding and
for the astute question that he asked, which is one that I would like
to follow up on.
Mr. Speaker, let me say to the gentleman from Georgia that he is
quite right. There are very serious and important components of the
intelligence bill covered by this rule.
As many of us have experienced over the last couple of days, we are
in and out of intelligence and security briefings because that is the
era in which we live. And in most instances, Members draw their concern
from the responsibility they have for protecting the American people.
I am on the Homeland Security Committee and have continued on that
committee since the tragedy, the heinous act of 9/11, and before, when
the
[[Page H4394]]
select committee was in place. So I have no quarrel with some of the
important elements of this legislation. But the gentleman from Georgia
should recognize that this is an aberration.
There are two or three points that I would like to make:
First of all, we are long overdue for getting rid of the sequester.
This joke was played on Members and the American people only because of
the supercommittee--not because of any individual Members, but there
was a supercommittee structure put in place, the time ran out, and they
could not come to a budget conclusion. So this was the ultimate end.
Members didn't vote on this. They voted on the supercommittee, and then
this was the hatchet that fell when the supercommittee did not work. So
sequester should be something that Speaker Boehner puts on the floor
and immediately gets rid of.
And the reason why I say that is because I am going to talk about the
shenanigans dealing with the trade bill. But what I am going to say is
that the overseas contingency fund is being used to bolster up this
bill, the intelligence bill. But I can't get those resources to be
utilized for infrastructure or summer jobs or fixing the education
system that we have responsibilities for or providing opportunities for
young people to finish their education or criminal justice reform. So
this is being 43 percent pumped up when used by funds that are not in
the stream.
The SPEAKER pro tempore. The time of the gentlewoman has expired.
Mr. HASTINGS. I yield the gentlewoman an additional 30 seconds.
Ms. JACKSON LEE. I thank the gentleman.
The funding is not in the stream of funding that other appropriators
have to utilize. That is wrong.
Then I might conclude on the shenanigans of the trade fix, if you
will. I am for TAA, the Trade Adjustment Assistance. I want it to be
voted on straight up or down, like many Members do, to provide for
workers and not have, unfortunately, the addition that was added coming
from the other body. So now we know that, whatever shenanigans that
will come up, it probably won't be in the way that will help American
workers.
Mr. Speaker, this rule should be voted down because we need an
opportunity to work on behalf of the American workers, to get rid of
sequester, and to find a way to move this country forward.
Mr. COLLINS of Georgia. Mr. Speaker, I reserve the balance of my
time.
Mr. HASTINGS. I yield myself such time as I may consume.
Mr. Speaker, perhaps I should say to the membership of this body that
if they vote against this rule, it doesn't mean that we would not have
an intelligence authorization. It simply would mean that those of us--
my friend from Georgia and myself--would have to go back to the Rules
Committee and fashion a rule that does not include an unprecedented
matter that should not be in this Intelligence Authorization Act for
Fiscal Year 2016 in the first place.
And toward that end, among the things that were sought to be
included, if we were going to include the TAA measure, then the ranking
member, Ms. Slaughter, proposed on behalf of the minority that we also
include a vote on the Trans-Pacific Partnership, TPP, for the reason,
one, TAA was overwhelmingly--3-1--defeated; TPP passed by a very thin
margin.
So if we are going to twist arms and find methodologies to employ to
try to change the minds of Members over a 6-week period of time, then
perhaps it would be those of us who are opposed to the measure would
have an opportunity to try to persuade some of those people who caused
the thin margin of it to pass on TPP. We felt that was a fairness
measure. At least if you were going to include it, that should have
been included as well.
Before proceeding, Mr. Speaker, perhaps I should learn how much time
each side has at this time.
The SPEAKER pro tempore. The gentleman from Florida has 4\1/2\
minutes remaining. The gentleman from Georgia has 19\1/2\ minutes
remaining.
{time} 1315
Mr. COLLINS of Georgia. Mr. Speaker, I am prepared to close.
Mr. HASTINGS. Mr. Speaker, at this time, I am waiting for one
additional speaker, but perhaps I can engage in a colloquy with my
colleague from Texas.
Mr. DOGGETT. Will the gentleman yield for a question?
Mr. HASTINGS. I yield to the gentleman from Texas.
Mr. DOGGETT. You served both on the Intelligence Committee and on the
Rules Committee. There is reason to authorize intelligence, but am I
correct it has nothing to do with this sneak attack to put in a
postponement that has never been done in American history, where never
has anyone sought to delay for 6 weeks the consideration of this bill
that we are doing today; isn't that correct?
Mr. HASTINGS. I think you are absolutely correct, and it is
unprecedented. At the very same time, as my friend from Georgia pointed
out, they have done so transparently by putting it here, but that does
not mean it would not be used at some point in the future.
Mr. DOGGETT. Does this rule provide any notice to Members of the
House, or can this be entirely a surprise attack? Can they come out
here on the floor at any time, perhaps when the floor is as empty as it
is now, and give no notice to the Members of the House that they are
about to move to send this bill to the President's desk, have
absolutely no debate on that rule, but then have a vote here, perhaps a
day when some Members are out on important business in their district,
basically picking the best time because they are so desperate to force
through a bill that they know a majority of this House does not support
and that the American people don't support because it will just foist
off on us a broken, failed trade policy that does not respect the
interests of the American people? Is that what is happening here?
Mr. HASTINGS. That is certainly allowed. Anytime before July 30, the
measure could be brought to the floor, and it could be brought to the
floor without any notice to the membership because it is a motion to
reconsider. It is a part of this particular rule sought by the Speaker
of the House, I might add, and therefore it could be brought at any
time under the aegis of the Speaker's authority.
Mr. DOGGETT. Was the gentleman present in the Rules Committee when
every single constructive improvement to this fast-track bill was
rejected by the Rules Committee--not with your vote, of course--but a
majority of the Rules Committee said ``no'' to telling the Members of
this Congress as much about this deal as the Vietnamese Politburo
already knows, saying ``no'' to at least meeting the standards on the
environment that the Bush administration agreed to, saying ``no'' to
putting the foreign corporations on the same level as our American
corporations and businesses so that foreign corporations wouldn't have
an advantage to come in and attack health, safety, and environmental
rules that might be established by the Congress or the State of Florida
or a city like San Antonio or Austin? Because under this fast-track
bill, we are headed toward jeopardizing those rules, those State laws,
and those Federal laws that deal with the needs of the American family
and letting these foreign corporations circumvent them as they did in
Canada, recently, to demand millions of dollars of taxpayer money for a
decision locally to just prevent the expansion of a quarry. We can't
have that happen. But the Rules Committee would not allow us to address
those problems.
Mr. HASTINGS. Many of those measures in a 5\1/2\-hour, into-the-night
session that the Rules Committee operated.
Mr. DOGGETT. I thank the gentleman.
Mr. HASTINGS. Mr. Speaker, I yield myself the balance of my time.
I would urge that Members understand that we have already voted on
this measure, and it was defeated, as I say, 3-1.
Robust funding for our intelligence infrastructure is clearly needed
and, indeed, welcomed, but enough is enough. It is time for Republicans
to stop squeezing important domestic programs through their arbitrary
implementation of sequester. We must invest in education in this
country; we must invest in our decaying infrastructure; we must invest
in a clean environment; and we must invest in a strong middle class.
Republicans want to make investments in our intelligence community.
[[Page H4395]]
Great. So do I. We all do. But at some point, we have to start asking:
What is it that that community is protecting? Without investments in
education, infrastructure, and our middle class, we risk undermining
what makes this country so exceptional and worth protecting in the
first place.
I urge a ``no'' vote on the rule, and I yield back the balance of my
time.
Mr. COLLINS of Georgia. Mr. Speaker, I yield myself the balance of my
time.
I appreciate the discussion we have had over the last little bit. I
appreciate the gentleman from Florida. Again, although we have some
differences--those have been evident today--the rule provides for ample
debate on the floor and the opportunity to debate and vote on up to 16
amendments offered by a largely bipartisan group of Members.
I look forward to those debates. I look forward to the debate on how
best to provide tools for our intelligence community and to combat the
dangerous threats that we face while still respecting both the
constitutional and budgetary restraints. Those are things that
sometimes, I think, in the midst of discussion today, got lost in that
this is a separate vote that we are going to be voting on our
intelligence bill. There is a procedural issue that is part of this
that is, again, not snuck in. It has been posted; it has been online;
and it is there for Members to see.
When we look at priorities, again, I think, for us, it goes back to,
again, in the overall budgetary and authorization process, the
Republican majority stands for protecting our national interests,
protecting and empowering the voters who actually send us here, not for
growing and empowering an ever-encroaching Federal Government. This is
what the budgets reflect. This is what the authorizations reflect.
These are the priorities of the American people, and these are the
priorities of the Republican majority.
Mr. Speaker, I yield back the balance of my time, and I move the
previous question on the resolution.
The previous question was ordered.
The SPEAKER pro tempore. The question is on the resolution.
The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
Mr. HASTINGS. Mr. Speaker, on that I demand the yeas and nays.
The yeas and nays were ordered.
The SPEAKER pro tempore. Pursuant to clause 8 of rule XX, this 15-
minute vote on adoption of House Resolution 315 will be followed by a
5-minute vote on agreeing to the Speaker's approval of the Journal, if
ordered.
The vote was taken by electronic device, and there were--yeas 236,
nays 189, not voting 8, as follows:
[Roll No. 366]
YEAS--236
Abraham
Aderholt
Allen
Amodei
Ashford
Babin
Barletta
Barr
Benishek
Bilirakis
Bishop (MI)
Bishop (UT)
Black
Blackburn
Blum
Bost
Boustany
Brady (TX)
Brat
Bridenstine
Brooks (IN)
Buchanan
Buck
Bucshon
Burgess
Calvert
Carter (GA)
Carter (TX)
Chabot
Clawson (FL)
Coffman
Cole
Collins (GA)
Collins (NY)
Comstock
Conaway
Cook
Cooper
Costa
Costello (PA)
Cramer
Crawford
Crenshaw
Culberson
Curbelo (FL)
Davis, Rodney
Denham
Dent
DeSantis
DesJarlais
Diaz-Balart
Dold
Donovan
Duffy
Duncan (SC)
Duncan (TN)
Ellmers (NC)
Emmer (MN)
Farenthold
Fincher
Fitzpatrick
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Garrett
Gibbs
Gibson
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (LA)
Graves (MO)
Griffith
Grothman
Guinta
Guthrie
Hanna
Hardy
Harper
Harris
Hartzler
Heck (NV)
Hensarling
Herrera Beutler
Hice, Jody B.
Hill
Holding
Hudson
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurd (TX)
Hurt (VA)
Issa
Jenkins (KS)
Jenkins (WV)
Johnson (OH)
Johnson, Sam
Jolly
Jordan
Joyce
Katko
Kelly (PA)
King (IA)
Kinzinger (IL)
Kline
Knight
Labrador
LaMalfa
Lamborn
Lance
Latta
LoBiondo
Long
Loudermilk
Love
Lucas
Luetkemeyer
Lummis
MacArthur
Marchant
Marino
McCarthy
McCaul
McClintock
McHenry
McKinley
McMorris Rodgers
McSally
Meadows
Meehan
Messer
Mica
Miller (FL)
Miller (MI)
Moolenaar
Mooney (WV)
Mullin
Mulvaney
Murphy (PA)
Neugebauer
Newhouse
Noem
Nugent
Nunes
Olson
Palazzo
Palmer
Paulsen
Pearce
Perry
Pittenger
Pitts
Poe (TX)
Poliquin
Pompeo
Price, Tom
Ratcliffe
Reichert
Renacci
Ribble
Rice (SC)
Rigell
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rohrabacher
Rokita
Rooney (FL)
Ros-Lehtinen
Roskam
Ross
Rothfus
Rouzer
Royce
Russell
Ryan (WI)
Salmon
Sanford
Scalise
Schweikert
Scott, Austin
Sensenbrenner
Sessions
Shimkus
Shuster
Simpson
Smith (MO)
Smith (NE)
Smith (NJ)
Smith (TX)
Stefanik
Stewart
Stivers
Stutzman
Thompson (PA)
Thornberry
Tiberi
Tipton
Trott
Turner
Upton
Valadao
Wagner
Walberg
Walden
Walker
Walorski
Walters, Mimi
Weber (TX)
Webster (FL)
Wenstrup
Westerman
Westmoreland
Whitfield
Williams
Wilson (SC)
Wittman
Womack
Woodall
Yoder
Yoho
Young (AK)
Young (IA)
Young (IN)
Zeldin
Zinke
NAYS--189
Adams
Aguilar
Amash
Bass
Beatty
Becerra
Bera
Beyer
Bishop (GA)
Blumenauer
Bonamici
Boyle, Brendan F.
Brady (PA)
Brooks (AL)
Brown (FL)
Brownley (CA)
Bustos
Butterfield
Capps
Capuano
Cardenas
Carney
Carson (IN)
Cartwright
Castor (FL)
Castro (TX)
Chu, Judy
Cicilline
Clark (MA)
Clarke (NY)
Clay
Cleaver
Clyburn
Cohen
Connolly
Conyers
Courtney
Crowley
Cuellar
Cummings
Davis (CA)
Davis, Danny
DeFazio
DeGette
Delaney
DeLauro
DelBene
DeSaulnier
Deutch
Dingell
Doggett
Doyle, Michael F.
Duckworth
Edwards
Ellison
Engel
Eshoo
Esty
Farr
Fattah
Foster
Frankel (FL)
Fudge
Gabbard
Gallego
Garamendi
Gohmert
Graham
Grayson
Green, Al
Green, Gene
Grijalva
Gutierrez
Hahn
Hastings
Heck (WA)
Higgins
Himes
Hinojosa
Honda
Hoyer
Huffman
Israel
Jackson Lee
Jeffries
Johnson (GA)
Johnson, E. B.
Jones
Kaptur
Keating
Kelly (IL)
Kennedy
Kildee
Kilmer
Kind
Kirkpatrick
Kuster
Langevin
Larsen (WA)
Larson (CT)
Lawrence
Lee
Levin
Lewis
Lieu, Ted
Lipinski
Loebsack
Lofgren
Lowenthal
Lowey
Lujan Grisham (NM)
Lujan, Ben Ray (NM)
Lynch
Maloney, Carolyn
Maloney, Sean
Massie
Matsui
McCollum
McDermott
McGovern
McNerney
Meeks
Meng
Moore
Moulton
Murphy (FL)
Nadler
Napolitano
Neal
Nolan
Norcross
O'Rourke
Pallone
Pascrell
Payne
Pelosi
Perlmutter
Peters
Peterson
Pingree
Pocan
Polis
Posey
Price (NC)
Quigley
Rangel
Rice (NY)
Richmond
Roybal-Allard
Ruiz
Ruppersberger
Rush
Ryan (OH)
Sanchez, Linda T.
Sarbanes
Schakowsky
Schiff
Schrader
Scott (VA)
Scott, David
Serrano
Sherman
Sinema
Sires
Slaughter
Smith (WA)
Speier
Swalwell (CA)
Takai
Takano
Thompson (CA)
Thompson (MS)
Titus
Tonko
Torres
Tsongas
Van Hollen
Vargas
Veasey
Vela
Velazquez
Visclosky
Walz
Wasserman Schultz
Waters, Maxine
Watson Coleman
Welch
Wilson (FL)
Yarmuth
NOT VOTING--8
Barton
Byrne
Chaffetz
Kelly (MS)
King (NY)
Reed
Sanchez, Loretta
Sewell (AL)
{time} 1356
Mr. BEN RAY LUJAN of New Mexico, Mses. EDDIE BERNICE JOHNSON of
Texas, and SINEMA changed their vote from ``yea'' to ``nay.''
Mr. ASHFORD changed his vote from ``nay'' to ``yea.''
So the resolution was agreed to.
The result of the vote was announced as above recorded.
A motion to reconsider was laid on the table.
____________________
[Congressional Record Volume 161, Number 96 (Tuesday, June 16, 2015)]
[House]
[Pages H4396-H4418]
INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2016
General Leave
Mr. NUNES. Mr. Speaker, I ask unanimous consent that all Members have
5 legislative days in which to revise and extend their remarks and
insert extraneous material on H.R. 2596, the Intelligence Authorization
Act for Fiscal Year 2016.
The SPEAKER pro tempore (Mr. Holding). Is there objection to the
request of the gentleman from California?
There was no objection.
The SPEAKER pro tempore. Pursuant to House Resolution 315 and rule
XVIII, the Chair declares the House in the Committee of the Whole House
on the state of the Union for the consideration of the bill, H.R. 2596.
The Chair appoints the gentleman from Utah (Mr. Bishop) to preside
over the Committee of the Whole.
{time} 1406
In the Committee of the Whole
Accordingly, the House resolved itself into the Committee of the
Whole House on the state of the Union for the consideration of the bill
(H.R. 2596) to authorize appropriations for fiscal year 2016 for
intelligence and intelligence-related activities of the United States
[[Page H4397]]
Government, the Community Management Account, and the Central
Intelligence Agency Retirement and Disability System, and for other
purposes, with Mr. Bishop of Utah in the chair.
The Clerk read the title of the bill.
The CHAIR. Pursuant to the rule, the bill is considered read the
first time.
The gentleman from California (Mr. Nunes) and the gentleman from
California (Mr. Schiff) each will control 30 minutes.
The Chair recognizes the gentleman from California (Mr. Nunes).
Mr. NUNES. Mr. Chair, I yield myself such time as I may consume.
The Intelligence Authorization Act is the annual blueprint for the
work of the intelligence community and America's military intelligence
efforts. The bill sets priorities for our critical intelligence efforts
and the legal framework of guidance and oversight for those efforts. As
you may recall, the House has passed intelligence authorization bills
with strong bipartisan support in the past several Congresses.
The ranking member, Mr. Schiff, and I worked in a bipartisan manner
to draft this legislation in front of you today. Passing annual
intelligence authorization legislation is the most effective way for
Congress to exercise oversight over the executive branch and helps
ensure that the country's intelligence agencies have the resources and
authorities necessary to keep Americans safe. This legislation passed
unanimously out of our committee.
As most of the intelligence budget involves highly classified
programs, the bulk of the committee's recommendations each year are
found in the classified annex of the bill, which has been available for
Members to review since June 4. Among other initiatives, the bill
provides authorization for critical national security functions,
including fighting terrorism, countering the proliferation of weapons
of mass destruction, funding efforts to recover from unauthorized
disclosures of intelligence capabilities, and investing in the
resiliency of our national security space architecture.
At an unclassified level, I can report that the annex for fiscal year
2016 authorizes funding that is slightly below the President's budget
request level. Its funding levels are in line with the House-passed
Defense Appropriations bill for the National Intelligence Program and
with the National Defense Authorization Act for the Military
Intelligence Program. Overall, this bill sustains today's intelligence
capabilities and provides for future capabilities while staying within
the funding constraints of the Budget Control Act and the budget
resolution.
Mr. Chair, we are currently facing one of the most challenging global
environments in our Nation's history. Nearly 14 years after the 9/11
attacks, the U.S. continues to hunt al Qaeda and its affiliates. We
have taken the fight to the enemy and achieved tremendous success. But
despite various strategies employed by two administrations to prevent
the spread of radical Islam, that threat remains. The Arab Spring civil
war in Syria and the emergence of the Islamic State of Iraq and the
Levant in places such as north Africa highlight only a few of the many
events in the past several years that now define U.S. policy failures
in the Middle East. In just over a year, ISIL has exploded from a
largely localized force in Iraq to seriously challenge al Qaeda as the
vanguard of global jihad.
Moreover, nation-states like Russia and China continue to expand
their spheres of influence and diminish U.S. clout worldwide. Russia
has taken advantage of indecisiveness in Europe and exploited uneven
leadership in the U.S. to pressure Ukraine and its neighbors on core
Russian interests. China bullies its neighbors in the South and East
China Sea and, if left unchecked, will likely exercise de facto control
over maritime trade in its perceived territorial waters in the next
decade. Meanwhile, North Korea and Iran continue to pose significant
proliferation risks and remain strategic threats to the U.S. and its
allies. State actors can bring a tremendous amount of resources to
counter U.S. policy, placing an immense burden on the intelligence
community to collect information on and to assess these activities
carefully and accurately.
Perhaps more troubling, state and nonstate actors alike are
developing new ways to project power, particularly in cyberspace. Cyber
attacks are becoming so pervasive that network defenders are
overwhelmed. Attackers seem to gain access to sensitive systems at
will. The most recent attacks on the Office of Personnel Management
servers, possibly one of the most significant national security
incidents in the past decade, highlight the continued threat to our
Nation's infrastructure.
Mr. Chair, in this year's intelligence authorization bill, the
committee has taken a great deal of care in addressing the wide range
of issues described above. This bill is an essential tool in supporting
our Nation's efforts to tackle today's challenges while also directing
the intelligence community to make strategic investments in the future.
In particular, I believe that the bill goes a long way toward
encouraging the intelligence community to make much-needed investments,
such as recovering from unauthorized disclosures of intelligence
capabilities.
Additionally, this year's authorization bill comes on the heels of
the committee's recent bipartisan successes on key national security
issues, like reauthorizing important provisions related to the Foreign
Intelligence Surveillance Act, and overwhelmingly passing bipartisan
legislation on cyber threat sharing information. I applaud Ranking
Member Schiff for his help on these issues, and I look forward to
working together in the future.
Finally, I want to thank all the Intelligence Committee staff on both
sides of the aisle for their support drafting this bill. The committee
staff spent countless hours assisting Members and finalizing the
legislation.
In particular, I would like to recognize our Sandia National Labs
fellow, Mr. Randy Smith. He has been with the committee for almost 2
years and will be leaving us soon to return to Sandia. He has been a
tremendous asset to this committee, and I would like to thank him for
all his hard work.
I would also like to thank the men and women of the intelligence
community for all their efforts to continue to protect this Nation.
I look forward to passing this legislation.
Mr. Chair, the intelligence authorization act is the annual blueprint
for the work of the intelligence community and America's military
intelligence efforts. The bill sets the priorities for our critical
intelligence efforts, and the legal framework of guidance and oversight
for those efforts. As you may recall, the House has passed intelligence
authorization bills with strong bipartisan support in the past several
Congresses.
The Ranking Member, Mr. Schiff, and I worked in a bipartisan manner
to draft the legislation in front of you today. Passing annual
intelligence authorization legislation is the most effective way for
Congress to exercise oversight over the executive branch and helps
ensure that the country's intelligence agencies have the resources and
authorities necessary to keep Americans safe. This legislation passed
unanimously out of our Committee.
As most of the intelligence budget involves highly classified
programs, the bulk of the Committee's recommendations each year are
found in the classified annex to the bill, which has been available for
Members to review since June 4th. Among other initiatives, the bill
provides authorization for critical national security functions,
including: fighting terrorism and countering the proliferation of
weapons of mass destruction, funding efforts to recover from
unauthorized disclosures of intelligence capabilities, and investing in
the resiliency of our national security space architecture.
At an unclassified level, I can report that the annex for Fiscal Year
2016 authorizes funding that is slightly below the President's budget
request level. Its funding levels are in line with the House-passed
Defense Appropriations bill for the National Intelligence Program and
with the National Defense Authorization Act for the Military
Intelligence Program. Overall, this bill sustains today's intelligence
capabilities and provides for future capabilities while staying within
the funding constraints of the Budget Control Act and the Budget
Resolution.
Mr. Chair, we are currently facing one of the most challenging global
environments in our nation's history. Nearly 14 years after the 9/11
attacks, the U.S. continues to hunt al-Qa'ida and its affiliates. We
have taken the fight to the enemy and achieved tremendous success, but
despite various strategies employed by two administrations to prevent
the spread of radical Islam, the threat remains. The Arab Spring, civil
war in Syria, and the emergence of the Islamic State of Iraq and the
Levant in places such as Northern Africa highlight only a few of the
many events in the past several years that now define U.S. policy
failures in the Middle East. In just over a year, ISIL has
[[Page H4398]]
exploded from a largely localized force in Iraq to seriously challenge
al-Qa'ida as the vanguard of the global jihad.
Moreover, nation states like Russia and China continue to expand
their spheres of influence and diminish U.S. clout worldwide. Russia
has taken advantage of indecisiveness in Europe and exploited uneven
leadership in the U.S. to pressure Ukraine and its neighbors on core
Russian interests. China bullies its neighbors in the South and East
China Sea, and if left unchecked, will likely exercise de facto control
over maritime trade in its perceived territorial waters in the next
decade. Meanwhile, North Korea and Iran continue to pose significant
proliferation risks and remain strategic threats to the U.S. and its
allies. State actors can bring a tremendous amount of resources to
counter U.S. policy, placing an immense burden on the Intelligence
Community to collect information on, and assess, these activities
carefully and accurately.
Perhaps more troubling, state and non-state actors alike are
developing new ways to project power, particularly in cyberspace. Cyber
attacks are becoming so pervasive that network defenders are
overwhelmed; attackers seem to gain access to sensitive systems at
will. The most recent attacks on the Office of Personnel Management
servers--possibly one of the most significant national security
incidents in the past decade--highlight the continued threat to our
nation's infrastructure.
Mr. Chair, in this year's intelligence authorization bill, this
Committee has taken a great deal of care in addressing the wide range
of issues described above. This bill is an essential tool in supporting
our nation's efforts to tackle today's challenges, while also directing
the Intelligence Community to make strategic investments in the future.
In particular, I believe that this bill goes a long way toward
encouraging the Intelligence Community to make much-needed investments,
such as recovering from unauthorized disclosures of intelligence
capabilities.
Additionally, this year's authorization bill comes on the heels of
the Committee's recent bipartisan successes on key national security
issues, including reauthorizing important provisions related to the
Foreign Intelligence Surveillance Act, and overwhelmingly passing
bipartisan legislation on cyber threat information sharing. I applaud
Ranking Member Schiff for his help on these issues and look forward to
working together in the future.
Finally, I want to thank all the Intelligence Committee staff on both
sides of the aisle for their support drafting this bill. The Committee
staff spent countless hours assisting Members and finalizing the
legislation. In particular, I would like to recognize our Sandia
National Labs fellow, Randy Smith. He has been with the Committee for
almost two years and will be leaving us soon to return to Sandia. He
has been a tremendous asset to this Committee and I thank him for all
his hard work. I would also like to thank the men and women of the
Intelligence Community for all their efforts protecting this nation. I
look forward to passing this legislation.
Mr. Chair, I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I yield myself such time as I may consume.
First, I want to say thank you to Chairman Nunes. This Intelligence
Authorization Act for Fiscal Year 2016 is our third major piece of
legislation together, and it once again demonstrates the fruits of our
commitment to bipartisanship.
We also have our difference of opinion from time to time, and on this
bill, we have some differences. But I know that as long as we continue
to work together, there is no end to the good that we can accomplish.
Through our cyber bill and our surveillance reform bill, we have been
guided by two core principles: first, that national security is truly
the security of the entire Nation and all Americans; second, that
national security can and must coexist with privacy and civil
liberties. I believe the bill today largely furthers these principles
as well.
The IAA funds, equips, and sets the priorities for the U.S.
intelligence community; and it is a crucial vehicle by which Congress
provides oversight of the IC and ensures that U.S. intelligence
professionals and intelligence programs have the funds and authorities
they need to keep us safe, as well as our allies and partners.
As the annual IAA provides hundreds of pages of detailed guidance,
strict authorizations, and precise limitations, it is also the single
most important means by which Congress conducts its oversight of the
intelligence community.
{time} 1415
As in past years, this year's IAA is a carefully considered bill and
the result of thoughtful oversight.
The Fiscal Year 2016 IAA funds the intelligence community at about 1
percent below the President's budget request and about 7 percent above
last year's enacted budget level.
The bill makes cuts to less-effective programs, adds money to
underfunded programs, and requires intelligence agencies to regularly
inform Congress of their activities, ensuring funds are spent
responsibly and lawfully.
Notably, the bill today holds, or ``fences,'' significant amounts of
money to make sure Congress' direction is followed to the letter and on
time.
I want to highlight just a few particular aspects of the bill. It
continues the committee's longstanding emphasis on counterintelligence
and security reforms. It also continues to support our overhead
architecture by funding our most critical space programs, investing in
space protection and resiliency, preserving investments in cutting-edge
technologies, and enhancing oversight of contracting and procurement
practices.
It also promotes enhancements to our foreign partner capabilities,
which are critical to multiplying the reach and impact of our own
intelligence efforts. It enhances human intelligence, or HUMINT,
capabilities, which are often the key to understanding and predicting
global events.
It provides resources to safeguard vulnerable signals intelligence,
or SIGINT, collection while enhancing oversight of these and other
sources of intelligence. It emphasizes collection to monitor and ensure
compliance with treaties and potential international agreements. It
greatly enhances oversight of Defense special operation forces
activities worldwide.
The bill also incorporates some excellent provisions championed by
the Democratic members of the Intelligence Committee, as well as the
Republican members.
In particular, I want to highlight Mr. Himes' provision to enhance
the quality of metrics we receive to enable more thorough oversight;
Ms. Sewell's multiple provisions to enhance diversity within the
intelligence community; Mr. Carson's provisions to better understand
FBI resource allocation against domestic and foreign threats and the
role of the FBI and DNI in countering violent extremism, particularly
in minors; Ms. Speier's provision to provide greater human rights
oversight of the IC's relationship with certain foreign partners; Mr.
Quigley's provision regarding intelligence support to Ukraine; and Mr.
Swalwell's provision to ensure that Department of Energy National Labs
can work with State and local government recipients of homeland
security grants.
All this said, while I believe the bill largely reflects sound
choices, I am concerned that it uses the overseas contingency
operations--or OCO--funding as a way to evade the sequestration levels
mandated by the ill-conceived Budget Control Act.
Again, I largely support the funding levels and the programs which
the IAA authorizes, but I cannot endorse how it has funded them. We
need to be serious and thoughtful about the budget and undo
sequestration--not just employ accounting tricks to evade its levels
only for defense and national security-related items.
Even some domestic programs and agencies that contribute to our
homeland security cannot qualify for OCO dollars, while vital programs
like our children's education and our social services are left to
languish.
Instead of arbitrary, across-the-board cuts, let's do what this bill
does substantively: make cuts to some areas and add money to others in
a deliberate, well thought out manner. It is time to forthrightly deal
with sequestration for all of our national priorities, not just for
defense.
I am also opposed to provisions in this bill which would tie the
hands of the administration and prevent the orderly transfer of
detainees from the detention center at Guantanamo Bay. These
restrictions have never been included in prior versions of the IAA, and
there is no reason to introduce them into the IAA process now.
The bill goes even further than restricting transfer of detainees to
the United States and includes a new provision which restricts
transfers to ``combat zones,'' a term that is so
[[Page H4399]]
broad as to include allies and partners such as Jordan.
As I have long said, keeping the Guantanamo prison serves as a
recruitment tool for militants, undercuts our relationships with our
allies, and undermines our international standing.
With that said, the bill, as a whole, is largely a strong product,
and I appreciate the close partnership we have enjoyed with the
chairman in working on it. But, unfortunately, I cannot support the
bill so long as it includes these Guantanamo restrictions and employs
the OCO budget gimmick at the expense of our domestic spending
priorities.
I look forward to a robust amendment process today, and I am
committed to working with the chairman, the Senate, the administration,
the other committees of jurisdiction, and all Members of Congress to
make critical improvements to the bill as it moves forward, and to
resolve the issues to keep alive the string of consecutive signed IAAs.
Mr. Chairman, I reserve the balance of my time.
Mr. NUNES. Mr. Chair, at this time I yield 2 minutes to the gentleman
from North Carolina (Mr. Pittenger).
Mr. PITTENGER. I thank the chairman for his vital leadership on the
Intelligence Committee.
I rise in support of this legislation providing the intelligence
community the authorization needed to protect and defend the United
States and support critical national security programs protecting
Americans from nation states and Islamic terrorists.
In December, NSA Director Admiral Rogers warned that China has the
capability of shutting down the U.S. electric grid through cyber
attack. Homeland security Secretary Johnson has warned about the threat
of attacks launched by sleeper cells in most of our States. ISIS
continues to expand into new territory, while Americans are more at
risk because President Obama has no strategy for defeating ISIS, whom
he initially referred to as the JV team.
This is not the time to impede our intelligence efforts. America
faces grave danger from those who wish to destroy our way of life.
Please join me in full bipartisan support of the Intelligence
Authorization Act. Let us be united in confronting the perilous threats
of our adversaries.
Mr. SCHIFF. Mr. Chairman, at this time I am pleased to yield 2
minutes to the gentleman from New York (Mr. Engel), the ranking member
on the House Foreign Affairs Committee.
Mr. ENGEL. I thank my friend for yielding.
I want to say that I appreciate the bipartisan, hard work of Chairman
Nunes and Ranking Member Schiff, but I want to bring to the House's
attention recent reports that this bill makes drastic cuts in our so-
called covert support to the moderate Syrian opposition.
A headline in the Saturday Washington Post read: ``Secret CIA effort
in Syria faces large funding cut.'' If these reports are true, just as
the moderate Syrian forces may be starting to make progress, especially
in the south, then I am afraid we may be making a big mistake.
Unfortunately, most Members of the House don't know for certain if
this legislation will reduce our support for the moderate opposition.
Those funding decisions are made behind closed doors. And that is why I
believe this bill is not the right place for us to be making decisions
that have a major impact on our Syria strategy.
I have no doubt that Chairman Nunes and Ranking Member Schiff are
determined to get the intelligence piece of our Syria response right,
but this is not merely an intelligence issue, and our overall strategy
in Syria goes far beyond what is included in any covert program. I
believe we shouldn't be dealing with this problem in a piecemeal way.
As we have been doing in the Foreign Affairs Committee on a
bipartisan basis, I urge my colleagues to take a step back, look at the
big picture, and address our Syria policy in a way that makes sense and
involves all the relevant players.
I am troubled if it is true that this bill makes drastic cuts in our
so-called covert support to the moderate Syria opposition. And I
commend the hard work of our chairman and ranking member.
Mr. NUNES. Mr. Chairman, I yield myself such time as I may consume.
I would urge my colleague, the ranking member on the Foreign Affairs
Committee, that we shouldn't always believe what is in the newspaper.
There have been lots of different reports about lots of different
things.
I would say that Mr. Schiff and I worked in a bipartisan manner to
look at all programs across the spectrum of the 17 agencies. And we
would be glad to spend some time with the gentleman from New York down
in the committee spaces to raise the concerns that he brought up about
a newspaper article. As I said, I think there are a lot of things that
we read in the newspaper.
I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I yield myself such time as I may consume.
The Intelligence Authorization Act is the vehicle by which we ensure
that U.S. intelligence professionals and programs have the funds and
the authorities that they need. It is the single most important means
by which Congress can conduct its oversight. We need to pass this
legislation, just as the committee has done over the last several
years.
It is my hope that as the legislation moves forward, we will be able
to dispose of the Guantanamo provisions--I will have an amendment to
address that in a few minutes--and that we can also resolve the issues
regarding the overseas contingency account. I look forward to working
with my colleague as the bill moves forward to address those issues.
I want to join the chairman in saluting the members of the
intelligence community--the men and women who do such an extraordinary
job for us each and every day. They have our sincerest gratitude and
full appreciation for their dedication, their patriotism, and their
unparalleled skills. I also want to thank again our chairman for his
leadership, his commitment to bipartisanship, and his determination to
do what is right. I want to thank our colleagues on the committee, who
have done an extraordinary job in helping to put this bill together.
I also want to join the chairman in thanking our wonderful staff on
our side of the aisle. I want to thank Carly Blake, Linda Cohen,
Allison Getty, Robert Minehart, Amanda Rogers Thorpe, Rheanne Wirkkala,
as well as Patrick Boland and our shared technical and security staff,
including Kristin Jepson, Brandon Smith, and Kevin Klein. We have an
extraordinary team on the committee. It is a great pleasure to serve
and work with each and every one of them.
I yield back the balance of my time.
Mr. NUNES. Mr. Chair, I yield myself such time as I may consume.
I want to thank the ranking member for his continued cooperation to
work in a bipartisan fashion. As I think most Americans know, the
threats continue to add up every day, and it is up to the men and women
in the intelligence community to help keep us safe. I know the ranking
member and I are committed to doing just that.
With that, I look forward to debate on the amendments and passage of
the final underlying bill, and I yield back the balance of my time.
The CHAIR. All time for general debate has expired.
Pursuant to the rule, the bill shall be considered for amendment
under the 5-minute rule.
In lieu of the amendment in the nature of a substitute recommended by
the Permanent Select Committee on Intelligence, printed in the bill, it
shall be in order to consider as an original bill for the purpose of
amendment under the 5-minute rule an amendment in the nature of a
substitute consisting of the text of Rules Committee Print 114-19. That
amendment in the nature of a substitute shall be considered as read.
The text of the amendment in the nature of a substitute is as
follows:
H.R. 2596
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. SHORT TITLE; TABLE OF CONTENTS.
(a) Short Title.--This Act may be cited as the
``Intelligence Authorization Act for Fiscal Year 2016''.
(b) Table of Contents.--The table of contents for this Act
is as follows:
Sec. 1. Short title; table of contents.
Sec. 2. Definitions.
[[Page H4400]]
TITLE I--INTELLIGENCE ACTIVITIES
Sec. 101. Authorization of appropriations.
Sec. 102. Classified schedule of authorizations.
Sec. 103. Personnel ceiling adjustments.
Sec. 104. Intelligence Community Management Account.
TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM
Sec. 201. Authorization of appropriations.
TITLE III--GENERAL PROVISIONS
Subtitle A--General Matters
Sec. 301. Increase in employee compensation and benefits authorized by
law.
Sec. 302. Restriction on conduct of intelligence activities.
Sec. 303. Prior congressional notification of initiations of certain
new special access programs.
Sec. 304. Prior congressional notification of transfers of funds for
certain intelligence activities.
Sec. 305. Designation of lead intelligence officer for tunnels.
Sec. 306. Clarification of authority of Privacy and Civil Liberties
Oversight Board.
Sec. 307. Reporting process required for tracking certain requests for
country clearance.
Sec. 308. Prohibition on sharing of certain information in response to
foreign government inquiries.
Sec. 309. National Cyber Threat Intelligence Integration Center.
Sec. 310. Intelligence community business system transformation.
Sec. 311. Inclusion of Inspector General of Intelligence Community in
Council of Inspectors General on Integrity and
Efficiency.
Sec. 312. Authorities of the Inspector General for the Central
Intelligence Agency.
Sec. 313. Provision of information and assistance to Inspector General
of the Intelligence Community.
Sec. 314. Clarification relating to information access by Comptroller
General.
Sec. 315. Use of homeland security grant funds in conjunction with
Department of Energy national laboratories.
Sec. 316. Technical amendments relating to pay under title 5, United
States Code.
Subtitle B--Matters Relating to United States Naval Station, Guantanamo
Bay, Cuba
Sec. 321. Prohibition on use of funds for transfer or release of
individuals detained at United States Naval Station,
Guantanamo Bay, Cuba.
Sec. 322. Prohibition on use of funds to construct or modify facilities
in United States to house detainees transferred from
United States Naval Station, Guantanamo Bay, Cuba.
Sec. 323. Prohibition on use of funds to transfer or release
individuals detained at United States Naval Station,
Guantanamo Bay, Cuba, to combat zones.
Subtitle C--Reports
Sec. 331. Reports to Congress on individuals formerly detained at
United States Naval Station, Guantanamo Bay, Cuba.
Sec. 332. Reports on foreign fighters.
Sec. 333. Reports on prisoner population at United States Naval
Station, Guantanamo Bay, Cuba.
Sec. 334. Report on use of certain business concerns.
Sec. 335. Repeal of certain reporting requirements.
SEC. 2. DEFINITIONS.
In this Act:
(a) Congressional Intelligence Committees.--The term
``congressional intelligence committees'' means--
(1) the Select Committee on Intelligence of the Senate; and
(2) the Permanent Select Committee on Intelligence of the
House of Representatives.
(b) Intelligence Community.--The term ``intelligence
community'' has the meaning given that term in section 3(4)
of the National Security Act of 1947 (50 U.S.C. 3003(4)).
TITLE I--INTELLIGENCE ACTIVITIES
SEC. 101. AUTHORIZATION OF APPROPRIATIONS.
Funds are hereby authorized to be appropriated for fiscal
year 2016 for the conduct of the intelligence and
intelligence-related activities of the following elements of
the United States Government:
(1) The Office of the Director of National Intelligence.
(2) The Central Intelligence Agency.
(3) The Department of Defense.
(4) The Defense Intelligence Agency.
(5) The National Security Agency.
(6) The Department of the Army, the Department of the Navy,
and the Department of the Air Force.
(7) The Coast Guard.
(8) The Department of State.
(9) The Department of the Treasury.
(10) The Department of Energy.
(11) The Department of Justice.
(12) The Federal Bureau of Investigation.
(13) The Drug Enforcement Administration.
(14) The National Reconnaissance Office.
(15) The National Geospatial-Intelligence Agency.
(16) The Department of Homeland Security.
SEC. 102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS.
(a) Specifications of Amounts and Personnel Levels.--The
amounts authorized to be appropriated under section 101 and,
subject to section 103, the authorized personnel ceilings as
of September 30, 2016, for the conduct of the intelligence
activities of the elements listed in paragraphs (1) through
(16) of section 101, are those specified in the classified
Schedule of Authorizations prepared to accompany the bill
H.R. 2596 of the One Hundred Fourteenth Congress.
(b) Availability of Classified Schedule of
Authorizations.--
(1) Availability.--The classified Schedule of
Authorizations referred to in subsection (a) shall be made
available to the Committee on Appropriations of the Senate,
the Committee on Appropriations of the House of
Representatives, and to the President.
(2) Distribution by the president.--Subject to paragraph
(3), the President shall provide for suitable distribution of
the classified Schedule of Authorizations, or of appropriate
portions of the Schedule, within the executive branch.
(3) Limits on disclosure.--The President shall not publicly
disclose the classified Schedule of Authorizations or any
portion of such Schedule except--
(A) as provided in section 601(a) of the Implementing
Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C.
3306(a));
(B) to the extent necessary to implement the budget; or
(C) as otherwise required by law.
SEC. 103. PERSONNEL CEILING ADJUSTMENTS.
(a) Authority for Increases.--The Director of National
Intelligence may authorize employment of civilian personnel
in excess of the number authorized for fiscal year 2016 by
the classified Schedule of Authorizations referred to in
section 102(a) if the Director of National Intelligence
determines that such action is necessary to the performance
of important intelligence functions, except that the number
of personnel employed in excess of the number authorized
under such section may not, for any element of the
intelligence community, exceed 3 percent of the number of
civilian personnel authorized under such schedule for such
element.
(b) Treatment of Certain Personnel.--The Director of
National Intelligence shall establish guidelines that govern,
for each element of the intelligence community, the treatment
under the personnel levels authorized under section 102(a),
including any exemption from such personnel levels, of
employment or assignment in--
(1) a student program, trainee program, or similar program;
(2) a reserve corps or as a reemployed annuitant; or
(3) details, joint duty, or long-term, full-time training.
(c) Notice to Congressional Intelligence Committees.--The
Director of National Intelligence shall notify the
congressional intelligence committees in writing at least 15
days prior to each exercise of an authority described in
subsection (a).
SEC. 104. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT.
(a) Authorization of Appropriations.--There is authorized
to be appropriated for the Intelligence Community Management
Account of the Director of National Intelligence for fiscal
year 2016 the sum of $501,850,000. Within such amount, funds
identified in the classified Schedule of Authorizations
referred to in section 102(a) for advanced research and
development shall remain available until September 30, 2017.
(b) Authorized Personnel Levels.--The elements within the
Intelligence Community Management Account of the Director of
National Intelligence are authorized 785 positions as of
September 30, 2016. Personnel serving in such elements may be
permanent employees of the Office of the Director of National
Intelligence or personnel detailed from other elements of the
United States Government.
(c) Classified Authorizations.--
(1) Authorization of appropriations.--In addition to
amounts authorized to be appropriated for the Intelligence
Community Management Account by subsection (a), there are
authorized to be appropriated for the Community Management
Account for fiscal year 2016 such additional amounts as are
specified in the classified Schedule of Authorizations
referred to in section 102(a). Such additional amounts for
advanced research and development shall remain available
until September 30, 2017.
(2) Authorization of personnel.--In addition to the
personnel authorized by subsection (b) for elements of the
Intelligence Community Management Account as of September 30,
2016, there are authorized such additional personnel for the
Community Management Account as of that date as are specified
in the classified Schedule of Authorizations referred to in
section 102(a).
TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM
SEC. 201. AUTHORIZATION OF APPROPRIATIONS.
There is authorized to be appropriated for the Central
Intelligence Agency Retirement and Disability Fund for fiscal
year 2016 the sum of $514,000,000.
TITLE III--GENERAL PROVISIONS
Subtitle A--General Matters
SEC. 301. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS
AUTHORIZED BY LAW.
Appropriations authorized by this Act for salary, pay,
retirement, and other benefits for Federal employees may be
increased by such additional or supplemental amounts as may
be necessary for increases in such compensation or benefits
authorized by law.
SEC. 302. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES.
The authorization of appropriations by this Act shall not
be deemed to constitute authority for the conduct of any
intelligence activity
[[Page H4401]]
which is not otherwise authorized by the Constitution or the
laws of the United States.
SEC. 303. PRIOR CONGRESSIONAL NOTIFICATION OF INITIATIONS OF
CERTAIN NEW SPECIAL ACCESS PROGRAMS.
(a) Limitation.--Except as provided in subsection (b), none
of the funds authorized to be appropriated by this Act or
otherwise made available for the intelligence community for
fiscal year 2016 may be used to initiate any new special
access program pertaining to any intelligence or
intelligence-related activity or covert action unless the
Director of National Intelligence or the Secretary of
Defense, as appropriate, submits to the congressional
intelligence committees and the Committees on Armed Services
of the House of Representatives and the Senate, by not later
than 30 days before initiating such a program, written
notification of the intention to initiate the program.
(b) Waiver.--
(1) In general.--The Director of National Intelligence or
the Secretary of Defense, as appropriate, may waive
subsection (a) with respect to the initiation of a new
special access program if the Director or Secretary, as the
case may be, determines that an emergency situation makes it
impossible or impractical to provide the notice required
under such subsection by the date that is 30 days before such
initiation.
(2) Notice.--If the Director or Secretary issues a waiver
under paragraph (1), the Director or Secretary, as the case
may be, shall submit to the congressional intelligence
committees and the Committees on Armed Services of the House
of Representatives and the Senate, by not later than 48 hours
after the initiation of the new special access program
covered by the waiver, written notice of the waiver and a
justification for the waiver, including a description of the
emergency situation that necessitated the waiver.
(c) Special Access Program Defined.--In this section, the
term ``special access program'' has the meaning given such
term in Executive Order 13526 as in effect on the date of the
enactment of this Act.
SEC. 304. PRIOR CONGRESSIONAL NOTIFICATION OF TRANSFERS OF
FUNDS FOR CERTAIN INTELLIGENCE ACTIVITIES.
(a) Limitation.--Except as provided in subsection (b), none
of the funds authorized to be appropriated by this Act or
otherwise made available for the intelligence community for
fiscal year 2016 may be used to initiate a transfer of funds
from the Joint Improvised Explosive Device Defeat Fund or the
Counterterrorism Partnerships Fund to be used for
intelligence activities unless the Director of National
Intelligence or the Secretary of Defense, as appropriate,
submits to the congressional intelligence committees, by not
later than 30 days before initiating such a transfer, written
notice of the transfer.
(b) Waiver.--
(1) In general.--The Director of National Intelligence or
the Secretary of Defense, as appropriate, may waive
subsection (a) with respect to the initiation of a transfer
of funds if the Director or Secretary, as the case may be,
determines that an emergency situation makes it impossible or
impractical to provide the notice required under such
subsection by the date that is 30 days before such
initiation.
(2) Notice.--If the Director or Secretary issues a waiver
under paragraph (1), the Director or Secretary, as the case
may be, shall submit to the congressional intelligence
committees, by not later than 48 hours after the initiation
of the transfer of funds covered by the waiver, written
notice of the waiver and a justification for the waiver,
including a description of the emergency situation that
necessitated the waiver.
SEC. 305. DESIGNATION OF LEAD INTELLIGENCE OFFICER FOR
TUNNELS.
The Director of National Intelligence shall designate an
official to manage the collection and analysis of
intelligence regarding the tactical use of tunnels by state
and nonstate actors.
SEC. 306. CLARIFICATION OF AUTHORITY OF PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD.
Section 1061(g) of the Intelligence Reform and Terrorism
Prevention Act of 2004 (42 U.S.C. 2000ee(g)) is amended by
adding at the end the following new paragraph:
``(5) Limitations.--Nothing in this section shall be
construed to authorize the Board, or any agent thereof, to
gain access to information that an executive branch agency
deems related to covert action, as such term is defined in
section 503(e) of the National Security Act of 1947 (50
U.S.C. 3093(e)).''.
SEC. 307. REPORTING PROCESS REQUIRED FOR TRACKING CERTAIN
REQUESTS FOR COUNTRY CLEARANCE.
(a) In General.--By not later than September 30, 2016, the
Director of National Intelligence shall establish a formal
internal reporting process for tracking requests for country
clearance submitted to overseas Director of National
Intelligence representatives by departments and agencies of
the United States. Such reporting process shall include a
mechanism for tracking the department or agency that submits
each such request and the date on which each such request is
submitted.
(b) Congressional Briefing.--By not later than December 31,
2016, the Director of National Intelligence shall brief the
congressional intelligence committees on the progress of the
Director in establishing the process required under
subsection (a).
SEC. 308. PROHIBITION ON SHARING OF CERTAIN INFORMATION IN
RESPONSE TO FOREIGN GOVERNMENT INQUIRIES.
(a) Prohibition.--None of the funds authorized to be
appropriated by this Act for any element of the intelligence
community may be used to respond to, share, or authorize the
sharing of any non-public information related to intelligence
activities carried out by the United States in response to a
legislative or judicial inquiry from a foreign government
into the intelligence activities of the United States.
(b) Congressional Notification.--Not later than 30 days
after an element of the intelligence community receives a
legislative or judicial inquiry from a foreign government
related to intelligence activities carried out by the United
States, the element shall submit to the congressional
intelligence committees written notification of the inquiry.
(c) Clarification Regarding Collaboration With Foreign
Partners.--The prohibition under subsection (a) shall not be
construed as limiting routine intelligence activities with
foreign partners, except in any case in which the central
focus of the collaboration with the foreign partner is to
obtain information for, or solicit a response to, a
legislative or judicial inquiry from a foreign government
related to intelligence activities carried out by the United
States.
SEC. 309. NATIONAL CYBER THREAT INTELLIGENCE INTEGRATION
CENTER.
(a) Establishment.--Title I of the National Security Act of
1947 (50 U.S.C. 3021 et seq.) is amended--
(1) by redesignating section 119B as section 119C; and
(2) by inserting after section 119A the following new
section:
``SEC. 119B. CYBER THREAT INTELLIGENCE INTEGRATION CENTER.
``(a) Establishment.--There is within the Office of the
Director of National Intelligence a Cyber Threat Intelligence
Integration Center.
``(b) Director.--There is a Director of the Cyber Threat
Intelligence Integration Center, who shall be the head of the
Cyber Threat Intelligence Integration Center, and who shall
be appointed by the Director of National Intelligence.
``(c) Primary Missions.--The Cyber Threat Intelligence
Integration Center shall--
``(1) serve as the primary organization within the Federal
Government for analyzing and integrating all intelligence
possessed or acquired by the United States pertaining to
cyber threats;
``(2) ensure that appropriate departments and agencies of
the Federal Government have full access to and receive all-
source intelligence support needed to execute the cyber
threat intelligence activities of such agencies and to
perform independent, alternative analyses;
``(3) disseminate cyber threat analysis to the President,
the appropriate departments and agencies of the Federal
Government, and the appropriate committees of Congress;
``(4) coordinate cyber threat intelligence activities of
the departments and agencies of the Federal Government; and
``(5) conduct strategic cyber threat intelligence planning
for the Federal Government.
``(d) Limitations.--The Cyber Threat Intelligence
Integration Center--
``(1) may not have more than 50 permanent positions;
``(2) in carrying out the primary missions of the Center
described in subsection (c), may not augment staffing through
detailees, assignees, or core contractor personnel or enter
into any personal services contracts to exceed the limitation
under paragraph (1); and
``(3) shall be located in a building owned or operated by
an element of the intelligence community as of the date of
the enactment of this section.''.
(b) Table of Contents Amendments.--The table of contents in
the first section of the National Security Act of 1947, as
amended by section 102 of this title, is further amended by
striking the item relating to section 119B and inserting the
following new items:
``Sec. 119B. Cyber Threat Intelligence Integration Center.
``Sec. 119C. National intelligence centers.''.
SEC. 310. INTELLIGENCE COMMUNITY BUSINESS SYSTEM
TRANSFORMATION.
Section 506D of the National Security Act of 1947 (50
U.S.C. 3100) is amended to read as follows:
``intelligence community business system transformation
``Sec. 506D. (a) Limitation on Obligation of Funds.--(1)
Subject to paragraph (3), no funds appropriated to any
element of the intelligence community may be obligated for an
intelligence community business system transformation that
will have a total cost in excess of $3,000,000 unless the
Chief Information Officer of the Intelligence Community makes
a certification described in paragraph (2) with respect to
such intelligence community business system transformation.
``(2) The certification described in this paragraph for an
intelligence community business system transformation is a
certification made by the Chief Information Officer of the
Intelligence Community that the intelligence community
business system transformation--
``(A) complies with the enterprise architecture under
subsection (b) and such other policies and standards that the
Chief Information Officer of the Intelligence Community
considers appropriate; or
``(B) is necessary--
``(i) to achieve a critical national security capability or
address a critical requirement; or
``(ii) to prevent a significant adverse effect on a project
that is needed to achieve an essential capability, taking
into consideration any alternative solutions for preventing
such adverse effect.
``(3) With respect to a fiscal year after fiscal year 2010,
the amount referred to in paragraph (1) in the matter
preceding subparagraph (A) shall be equal to the sum of--
``(A) the amount in effect under such paragraph (1) for the
preceding fiscal year (determined after application of this
paragraph), plus
[[Page H4402]]
``(B) such amount multiplied by the annual percentage
increase in the Consumer Price Index (all items; U.S. city
average) as of September of the previous fiscal year.
``(b) Enterprise Architecture for Intelligence Community
Business Systems.--(1) The Director of National Intelligence
shall develop and implement an enterprise architecture to
cover all intelligence community business systems, and the
functions and activities supported by such business systems.
The enterprise architecture shall be sufficiently defined to
effectively guide, constrain, and permit implementation of
interoperable intelligence community business system
solutions, consistent with applicable policies and procedures
established by the Director of the Office of Management and
Budget.
``(2) The enterprise architecture under paragraph (1) shall
include the following:
``(A) An information infrastructure that will enable the
intelligence community to--
``(i) comply with all Federal accounting, financial
management, and reporting requirements;
``(ii) routinely produce timely, accurate, and reliable
financial information for management purposes;
``(iii) integrate budget, accounting, and program
information and systems; and
``(iv) provide for the measurement of performance,
including the ability to produce timely, relevant, and
reliable cost information.
``(B) Policies, procedures, data standards, and system
interface requirements that apply uniformly throughout the
intelligence community.
``(c) Responsibilities for Intelligence Community Business
System Transformation.--The Director of National Intelligence
shall be responsible for the entire life cycle of an
intelligence community business system transformation,
including review, approval, and oversight of the planning,
design, acquisition, deployment, operation, and maintenance
of the business system transformation.
``(d) Intelligence Community Business System Investment
Review.--(1) The Chief Information Officer of the
Intelligence Community shall establish and implement, not
later than 60 days after October 7, 2010, an investment
review process for the intelligence community business
systems for which the Chief Information Officer of the
Intelligence Community is responsible.
``(2) The investment review process under paragraph (1)
shall--
``(A) meet the requirements of section 11312 of title 40,
United States Code; and
``(B) specifically set forth the responsibilities of the
Chief Information Office of the Intelligence Community under
such review process.
``(3) The investment review process under paragraph (1)
shall include the following elements:
``(A) Review and approval by an investment review board
(consisting of appropriate representatives of the
intelligence community) of each intelligence community
business system as an investment before the obligation of
funds for such system.
``(B) Periodic review, but not less often than annually, of
every intelligence community business system investment.
``(C) Thresholds for levels of review to ensure appropriate
review of intelligence community business system investments
depending on the scope, complexity, and cost of the system
involved.
``(D) Procedures for making certifications in accordance
with the requirements of subsection (a)(2).
``(e) Relation to Annual Registration Requirements.--
Nothing in this section shall be construed to alter the
requirements of section 8083 of the Department of Defense
Appropriations Act, 2005 (Public Law 108-287; 118 Stat. 989),
with regard to information technology systems (as defined in
subsection (d) of such section).
``(f) Relationship to Defense Business Enterprise
Architecture.--Intelligence community business system
transformations certified under this section shall be deemed
to be in compliance with section 2222 of title 10, United
States Code. Nothing in this section shall be construed to
exempt funds authorized to be appropriated to the Department
of Defense for activities other than an intelligence
community business system transformation from the
requirements of such section 2222, to the extent that such
requirements are otherwise applicable.
``(g) Relation to Clinger-Cohen Act.--(1) Executive agency
responsibilities in chapter 113 of title 40, United States
Code, for any intelligence community business system
transformation shall be exercised jointly by--
``(A) the Director of National Intelligence and the Chief
Information Officer of the Intelligence Community; and
``(B) the head of the executive agency that contains the
element of the intelligence community involved and the chief
information officer of that executive agency.
``(2) The Director of National Intelligence and the head of
the executive agency referred to in paragraph (1)(B) shall
enter into a memorandum of understanding to carry out the
requirements of this section in a manner that best meets the
needs of the intelligence community and the executive agency.
``(h) Definitions.--In this section:
``(1) The term `enterprise architecture' has the meaning
given that term in section 3601(4) of title 44, United States
Code.
``(2) The terms `information system' and `information
technology' have the meanings given those terms in section
11101 of title 40, United States Code.
``(3) The term `intelligence community business system'
means an information system, including a national security
system, that is operated by, for, or on behalf of an element
of the intelligence community, including a financial system,
mixed system, financial data feeder system, and the business
infrastructure capabilities shared by the systems of the
business enterprise architecture, including people, process,
and technology, that build upon the core infrastructure used
to support business activities, such as acquisition,
financial management, logistics, strategic planning and
budgeting, installations and environment, and human resource
management.
``(4) The term `intelligence community business system
transformation' means--
``(A) the acquisition or development of a new intelligence
community business system; or
``(B) any significant modification or enhancement of an
existing intelligence community business system (other than
necessary to maintain current services).
``(5) The term `national security system' has the meaning
given that term in section 3552(b) of title 44, United States
Code.''.
SEC. 311. INCLUSION OF INSPECTOR GENERAL OF INTELLIGENCE
COMMUNITY IN COUNCIL OF INSPECTORS GENERAL ON
INTEGRITY AND EFFICIENCY.
Section 11(b)(1)(B) of the Inspector General Act of 1978
(Public Law 95-452; 5 U.S.C. App.) is amended by striking
``the Office of the Director of National Intelligence'' and
inserting ``the Intelligence Community''.
SEC. 312. AUTHORITIES OF THE INSPECTOR GENERAL FOR THE
CENTRAL INTELLIGENCE AGENCY.
(a) Information and Assistance.--Paragraph (9) of section
17(e) of the Central Intelligence Agency Act of 1949 (50
U.S.C. 3517(e)(9)) is amended to read as follows:
``(9)(A) The Inspector General may request such information
or assistance as may be necessary for carrying out the duties
and responsibilities of the Inspector General provided by
this section from any Federal, State, or local governmental
agency or unit thereof.
``(B) Upon request of the Inspector General for information
or assistance from a department or agency of the Federal
Government, the head of the department or agency involved,
insofar as practicable and not in contravention of any
existing statutory restriction or regulation of such
department or agency, shall furnish to the Inspector General,
or to an authorized designee, such information or assistance.
``(C) Nothing in this paragraph may be construed to provide
any new authority to the Central Intelligence Agency to
conduct intelligence activity in the United States.
``(D) In this paragraph, the term `State' means each of the
several States, the District of Columbia, the Commonwealth of
Puerto Rico, the Commonwealth of the Northern Mariana
Islands, and any territory or possession of the United
States.''.
(b) Technical Amendments Relating to Selection of
Employees.--Paragraph (7) of such section (50 U.S.C.
3517(e)(7)) is amended--
(1) by inserting ``(A)'' before ``Subject to applicable
law''; and
(2) by adding at the end the following new subparagraph:
``(B) Consistent with budgetary and personnel resources
allocated by the Director, the Inspector General has final
approval of--
``(i) the selection of internal and external candidates for
employment with the Office of Inspector General; and
``(ii) all other personnel decisions concerning personnel
permanently assigned to the Office of Inspector General,
including selection and appointment to the Senior
Intelligence Service, but excluding all security-based
determinations that are not within the authority of a head of
other Central Intelligence Agency offices.''.
SEC. 313. PROVISION OF INFORMATION AND ASSISTANCE TO
INSPECTOR GENERAL OF THE INTELLIGENCE
COMMUNITY.
Section 103H(j)(4) of the National Security Act of 1947 (50
U.S.C. 3033) is amended--
(1) in subparagraph (A), by striking ``any department,
agency, or other element of the United States Government''
and inserting ``any Federal, State (as defined in section
804), or local governmental agency or unit thereof''; and
(2) in subparagraph (B), by inserting ``from a department,
agency, or element of the Federal Government'' before ``under
subparagraph (A)''.
SEC. 314. CLARIFICATION RELATING TO INFORMATION ACCESS BY
COMPTROLLER GENERAL.
Section 348(a) of the Intelligence Authorization Act for
Fiscal Year 2010 (Public Law 111-259; 124 Stat. 2700; 50
U.S.C. 3308) is amended by adding at the end the following
new paragraph:
``(4) Requests by certain congressional committees.--
Consistent with the protection of classified information, the
directive issued under paragraph (1) shall not prohibit the
Comptroller General from obtaining information necessary to
carry out the following audits or reviews:
``(A) An audit or review carried out--
``(i) at the request of the congressional intelligence
committees; or
``(ii) pursuant to--
``(I) an intelligence authorization Act;
``(II) a committee report or joint explanatory statement
accompanying an intelligence authorization Act; or
``(III) a classified annex to a committee report or joint
explanatory statement accompanying an intelligence
authorization Act.
``(B) An audit or review pertaining to intelligence
activities of the Department of Defense carried out--
``(i) at the request of the congressional defense
committees (as defined in section 101(a)(16) of title 10,
United States Code); or
``(ii) pursuant to a national defense authorization Act.''.
[[Page H4403]]
SEC. 315. USE OF HOMELAND SECURITY GRANT FUNDS IN CONJUNCTION
WITH DEPARTMENT OF ENERGY NATIONAL
LABORATORIES.
Section 2008(a) of the Homeland Security Act of 2002 (6
U.S.C. 609(a)) is amended in the matter preceding paragraph
(1) by inserting ``including by working in conjunction with a
National Laboratory (as defined in section 2(3) of the Energy
Policy Act of 2005 (42 U.S.C. 15801(3)),'' after ``plans,''.
SEC. 316. TECHNICAL AMENDMENTS RELATING TO PAY UNDER TITLE 5,
UNITED STATES CODE.
Section 5102(a)(1) of title 5, United States Code, is
amended--
(1) in clause (vii), by striking ``or'';
(2) by inserting after clause (vii) the following new
clause:
``(viii) the Office of the Director of National
Intelligence;''; and
(3) in clause (x), by striking the period and inserting a
semicolon.
Subtitle B--Matters Relating to United States Naval Station, Guantanamo
Bay, Cuba
SEC. 321. PROHIBITION ON USE OF FUNDS FOR TRANSFER OR RELEASE
OF INDIVIDUALS DETAINED AT UNITED STATES NAVAL
STATION, GUANTANAMO BAY, CUBA.
No amounts authorized to be appropriated or otherwise made
available to an element of the intelligence community may be
used during the period beginning on the date of the enactment
of this Act and ending on December 31, 2016, to transfer,
release, or assist in the transfer or release, to or within
the United States, its territories, or possessions, Khalid
Sheikh Mohammed or any other individual detained at
Guantanamo (as such term is defined in section 322(c)).
SEC. 322. PROHIBITION ON USE OF FUNDS TO CONSTRUCT OR MODIFY
FACILITIES IN UNITED STATES TO HOUSE DETAINEES
TRANSFERRED FROM UNITED STATES NAVAL STATION,
GUANTANAMO BAY, CUBA.
(a) In General.--No amounts authorized to be appropriated
or otherwise made available to an element of the intelligence
community may be used during the period beginning on the date
of the enactment of this Act and ending on December 31, 2016,
to construct or modify any facility in the United States, its
territories, or possessions to house any individual detained
at Guantanamo for the purposes of detention or imprisonment
in the custody or under the control of the Department of
Defense.
(b) Exception.--The prohibition in subsection (a) shall not
apply to any modification of facilities at United States
Naval Station, Guantanamo Bay, Cuba.
(c) Individual Detained at Guantanamo Defined.--In this
section, the term ``individual detained at Guantanamo'' means
any individual located at United States Naval Station,
Guantanamo Bay, Cuba, as of October 1, 2009, who--
(1) is not a citizen of the United States or a member of
the Armed Forces of the United States; and
(2) is--
(A) in the custody or under the control of the Department
of Defense; or
(B) otherwise under detention at United States Naval
Station, Guantanamo Bay, Cuba.
SEC. 323. PROHIBITION ON USE OF FUNDS TO TRANSFER OR RELEASE
INDIVIDUALS DETAINED AT UNITED STATES NAVAL
STATION, GUANTANAMO BAY, CUBA, TO COMBAT ZONES.
(a) In General.--No amounts authorized to be appropriated
or otherwise made available to an element of the intelligence
community may be used during the period beginning on the date
of the enactment of this Act and ending on December 31, 2016,
to transfer, release, or assist in the transfer or release of
any individual detained in the custody or under the control
of the Department of Defense at United States Naval Station,
Guantanamo Bay, Cuba, to a combat zone.
(b) Combat Zone Defined.--In this section, the term
``combat zone'' means any area designated as a combat zone
for purposes of section 112 of the Internal Revenue Code of
1986 for which the income of a member of the Armed Forces was
excluded during 2014, 2015, or 2016 by reason of the member's
service on active duty in such area.
Subtitle C--Reports
SEC. 331. REPORTS TO CONGRESS ON INDIVIDUALS FORMERLY
DETAINED AT UNITED STATES NAVAL STATION,
GUANTANAMO BAY, CUBA.
(a) Additional Matters for Inclusion in Reports.--
Subsection (c) of section 319 of the Supplemental
Appropriations Act, 2009 (Public Law 111-32; 123 Stat. 1874;
10 U.S.C. 801 note) is amended by adding after paragraph (5)
the following new paragraphs:
``(6) A summary of all contact by any means of
communication, including telecommunications, electronic or
technical means, in person, written communications, or any
other means of communication, regardless of content, between
any individual formerly detained at Naval Station, Guantanamo
Bay, Cuba, and any individual known or suspected to be
associated with a foreign terrorist group.
``(7) A description of whether any of the contact described
in the summary required by paragraph (6) included any
information or discussion about hostilities against the
United States or its allies or partners.
``(8) For each individual described in paragraph (4), the
period of time between the date on which the individual was
released or transferred from Naval Station, Guantanamo Bay,
Cuba, and the date on which it is confirmed that the
individual is suspected or confirmed of reengaging in
terrorist activities.
``(9) The average period of time described in paragraph (8)
for all the individuals described in paragraph (4).''.
(b) Form.--Subsection (a) of such section is amended by
adding at the end the following: ``The reports may be
submitted in classified form.''.
(c) Rule of Construction.--Nothing in this section or the
amendments made by this section shall be construed to
terminate, alter, modify, override, or otherwise affect any
reporting of information required under section 319(c) of the
Supplemental Appropriations Act, 2009 (Public Law 111-32; 123
Stat. 1874; 10 U.S.C. 801 note), as in effect immediately
before the enactment of this section.
SEC. 332. REPORTS ON FOREIGN FIGHTERS.
(a) Reports Required.--Not later than 60 days after the
date of the enactment of this Act, and every 60 days
thereafter, the Director of National Intelligence shall
submit to the congressional intelligence committees a report
on foreign fighter flows to and from Syria and to and from
Iraq. The Director shall define the term ``foreign fighter''
in such reports.
(b) Matters To Be Included.--Each report submitted under
subsection (a) shall include each of the following:
(1) The total number of foreign fighters who have traveled
to Syria or Iraq since January 1, 2011, the total number of
foreign fighters in Syria or Iraq as of the date of the
submittal of the report, the total number of foreign fighters
whose countries of origin have a visa waiver program
described in section 217 of the Immigration and Nationality
Act (8 U.S.C. 1187), the total number of foreign fighters who
have left Syria or Iraq, the total number of female foreign
fighters, and the total number of deceased foreign fighters.
(2) The total number of United States persons who have
traveled or attempted to travel to Syria or Iraq since
January 1, 2011, the total number of such persons who have
arrived in Syria or Iraq since such date, and the total
number of such persons who have returned to the United States
from Syria or Iraq since such date.
(3) The total number of foreign fighters in Terrorist
Identities Datamart Environment and the status of each such
foreign fighter in that database, the number of such foreign
fighters who are on a watchlist, and the number of such
foreign fighters who are not on a watchlist.
(4) The total number of foreign fighters who have been
processed with biometrics, including face images,
fingerprints, and iris scans.
(5) Any programmatic updates to the foreign fighter report
since the last report was issued, including updated analysis
on foreign country cooperation, as well as actions taken,
such as denying or revoking visas.
(6) A worldwide graphic that describes foreign fighters
flows to and from Syria, with points of origin by country.
(c) Form.--The reports submitted under subsection (a) may
be submitted in classified form.
(d) Termination.--The requirement to submit reports under
subsection (a) shall terminate on the date that is three
years after the date of the enactment of this Act.
SEC. 333. REPORTS ON PRISONER POPULATION AT UNITED STATES
NAVAL STATION, GUANTANAMO BAY, CUBA.
(a) Reports Required.--Not later than 60 days after the
date of the enactment of this Act, and every 30 days
thereafter, the Director of the Defense Intelligence Agency,
in coordination with the Director of National Intelligence,
shall submit to the Members of Congress specified in
subsection (b) a report on the prisoner population at the
detention facility at United States Naval Station, Guantanamo
Bay, Cuba.
(b) Specified Members and Committees of Congress.--The
Members of Congress specified in this subsection are the
following:
(1) The majority leader and minority leader of the Senate.
(2) The Chairman and Ranking Member of the Committee on
Armed Services of the Senate.
(3) The Chairman and Vice Chairman of the Select Committee
on Intelligence of the Senate.
(4) The Chairman and Vice Chairman of the Committee on
Appropriations of the Senate.
(5) The Speaker of the House of Representatives.
(6) The minority leader of the House of Representatives.
(7) The Chairman and Ranking Member of the Committee on
Armed Services of the House of Representatives.
(8) The Chairman and Ranking Member of the Permanent Select
Committee on Intelligence of the House of Representatives.
(9) The Chairman and Ranking Member of the Committee on
Appropriations of the House of Representatives.
(c) Matters To Be Included.--Each report submitted under
subsection (a) shall include each of the following:
(1) The name and country of origin of each prisoner
detained at the detention facility at United States Naval
Station Guantanamo Bay, Cuba, as of the date of such report.
(2) A current summary of the evidence, intelligence, and
information used to justify the detention of each prisoner
listed under paragraph (1) at United States Naval Station,
Guantanamo Bay, Cuba.
(3) A current accounting of all the measures taken to
transfer each prisoner listed under paragraph (1) to the
individual's country of citizenship or another country.
(4) A current description of the number of individuals
released or transferred from detention at United States Naval
Station, Guantanamo Bay, Cuba, who are confirmed or suspected
of returning to terrorist activities after such release or
transfer.
(5) An assessment of any efforts by foreign terrorist
organizations to recruit individuals released from detention
at United States Naval Station, Guantanamo Bay, Cuba.
(6) A summary of all contact by any means of communication,
including telecommunications, electronic or technical means,
in person, written
[[Page H4404]]
communications, or any other means of communication,
regardless of content, between any individual formerly
detained at United States Naval Station, Guantanamo Bay,
Cuba, and any individual known or suspected to be associated
with a foreign terrorist group.
(7) A description of whether any of the contact described
in the summary required by paragraph (6) included any
information or discussion about hostilities against the
United States or its allies or partners.
(8) For each individual described in paragraph (4), the
period of time between the date on which the individual was
released or transferred from United States Naval Station,
Guantanamo Bay, Cuba, and the date on which it is confirmed
that the individual is suspected or confirmed of reengaging
in terrorist activities.
(9) The average period of time described in paragraph (8)
for all the individuals described in paragraph (4).
SEC. 334. REPORT ON USE OF CERTAIN BUSINESS CONCERNS.
(a) In General.--Not later than 90 days after the date of
the enactment of this Act, the Director of National
Intelligence shall submit to the congressional intelligence
communities a report on the representation, as of the date of
the report, of covered business concerns among the
contractors that are awarded contracts by elements of the
intelligence community for goods, equipment, tools, and
services.
(b) Matters Included.--The report under subsection (a)
shall include the following:
(1) The representation of covered business concerns as
described in subsection (a), including such representation
by--
(A) each type of covered business concern; and
(B) each element of the intelligence community.
(2) If, as of the date of the enactment of this Act, the
Director does not record and monitor the statistics required
to carry out this section, a description of the actions taken
by the Director to ensure that such statistics are recorded
and monitored beginning in fiscal year 2016.
(3) The actions the Director plans to take during fiscal
year 2016 to enhance the awarding of contracts to covered
business concerns by elements of the intelligence community.
(c) Covered Business Concerns Defined.--In this section,
the term ``covered business concerns'' means the following:
(1) Minority-owned businesses.
(2) Women-owned businesses.
(3) Small disadvantaged businesses.
(4) Service-disabled veteran-owned businesses.
(5) Veteran-owned small businesses.
SEC. 335. REPEAL OF CERTAIN REPORTING REQUIREMENTS.
(a) Quadrennial Audit of Positions Requiring Security
Clearances.--Section 506H of the National Security Act of
1947 (50 U.S.C. 3104) is amended--
(1) by striking subsection (a); and
(2) by redesignating subsections (b) and (c) as subsections
(a) and (b), respectively.
(b) Reports on Role of Analysts at FBI and FBI Information
Sharing.--Section 2001(g) of the Intelligence Reform and
Terrorism Prevention Act of 2004 (Public Law 108-458; 118
Stat. 3700; 28 U.S.C. 532 note) is amended by striking
paragraphs (3) and (4).
(c) Report on Outside Employment by Officers and Employees
of Intelligence Community.--
(1) In general.--Section 102A(u) of the National Security
Act of 1947 (50 U.S.C. 3024) is amended--
(A) by striking ``(1) The Director'' and inserting ``The
Director''; and
(B) by striking paragraph (2).
(2) Conforming amendment.--Subsection (a) of section 507 of
such Act (50 U.S.C. 3106(a)) is amended--
(A) by striking paragraph (5); and
(B) by redesignating paragraph (6) as paragraph (5).
(3) Technical amendment.--Subsection (c)(1) of such section
507 is amended by striking ``subsection (a)(1)'' and
inserting ``subsection (a)''.
(d) Reports on Nuclear Aspirations of Non-state Entities.--
Section 1055 of the National Defense Authorization Act for
Fiscal Year 2010 (50 U.S.C. 2371) is repealed.
(e) Reports on Espionage by People's Republic of China.--
Section 3151 of the National Defense Authorization Act for
Fiscal Year 2000 (42 U.S.C. 7383e) is repealed.
(f) Reports on Security Vulnerabilities of National
Laboratory Computers.--Section 4508 of the Atomic Energy
Defense Act (50 U.S.C. 2659) is repealed.
The CHAIR. No amendment to the amendment in the nature of a
substitute shall be in order except those printed in House Report 114-
155. Each such amendment may be offered only in the order printed in
the report, by a Member designated in the report, shall be considered
read, shall be debatable for the time specified in the report equally
divided and controlled by the proponent and an opponent, shall not be
subject to amendment, and shall not be subject to a demand for division
of the question.
Amendment No. 1 Offered by Mr. Israel
The CHAIR. It is now in order to consider amendment No. 1 printed in
House Report 114-155.
Mr. ISRAEL. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 12, line 10, strike ``The Director'' and insert ``(a)
In General.--The Director''.
Page 12, after line 13, insert the following:
(b) Annual Report.--Not later than the date that is 10
months after the date of the enactment of this Act, and
biennially thereafter until the date that is four years after
the date of the enactment of this Act, the Director of
National Intelligence shall submit to the congressional
intelligence committees and the congressional defense
committees (as such term is defined in section 101(a)(16) of
title 10, United States Code) a report describing--
(1) trends in the use of tunnels by foreign state and
nonstate actors; and
(2) collaboration efforts between the United States and
partner countries to address the use of tunnels by
adversaries.
The CHAIR. Pursuant to House Resolution 315, the gentleman from New
York (Mr. Israel) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from New York.
Mr. ISRAEL. Mr. Chairman, I yield myself such time as I may consume.
Mr. Chairman, I rise to offer an amendment with my very good friend
from Colorado (Mr. Lamborn) and my very good friend from Florida (Ms.
Graham). This is a bipartisan amendment with respect to tunnels being
used as a military tactic, technology, and strategy in asymmetric
warfare.
Mr. Chairman, almost exactly a year ago, when war broke out in the
Middle East and Hamas attacked Israel, I visited Israel and saw for
myself the sophistication of the tunnels being dug from Gaza to Israel
through which terrorists traveled. They went to the other side of the
tunnels, popped up, and tried to kill innocent civilians.
These tunnels are not the tunnels that many of us characterize in our
own minds. These tunnels are sophisticated. These are expressways
underground. It is like the Queens-Midtown Tunnel going from Gaza to
Israel. They are ventilated. They are lit. They are massive. They are
deep. They are huge. They are impenetrable, and they are very difficult
to detect.
Mr. Chairman, the FY16 Intelligence Authorization bill properly says
that the Director of National Intelligence will designate an official
to manage the collection and analysis of intelligence regarding the
tactical use of tunnels by state and nonstate actors.
{time} 1430
This bipartisan amendment simply asks for accountability. It requires
a report from this new lead intelligence officer for tunnels describing
the trends in the use of tunnels by foreign state and nonstate actors
and collaborative efforts between the United States and partner nations
to address the use of tunnels by our adversaries.
Mr. Chairman, I talked about tunnels in the Middle East, but in fact,
these tunnels are dynamic force multipliers for our enemies and enemies
of our allies around the world. They are used for terrorist attacks,
but they are also used to smuggle arms and contraband.
We have learned that these tunnels are being used well beyond Israel.
Korea is another example. Tunnels have been found in North Korea. Here
at home, more than 150 tunnels have been found since 2009.
Mr. Chairman, we have plenty of enemies today looking for ways to
attack the United States and our interests around the globe. This bill
recognizes these threats and, very wisely, creates a lead intelligence
officer for tunnels.
This amendment simply encourages greater oversight by Congress. It
allows Congress to make informed decisions on how and where to spend
future funds in order to counter this threat and protect U.S. national
security interests.
Most importantly, Mr. Chairman, these reports will help shape the
efforts of the newly created position, making it clear that Congress
expects accountability and transparency, and that is something that the
American people require.
I ask my colleagues to support this bipartisan amendment, and I
reserve the balance of my time.
Mr. NUNES. Mr. Chair, I claim the time in opposition, although I do
not intend to oppose the amendment.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. NUNES. I yield 2 minutes to the gentleman from Colorado (Mr.
Lamborn).
[[Page H4405]]
Mr. LAMBORN. Mr. Chairman, I want to thank Congressman Steve Israel
and Congresswoman Gwen Graham for working together with me on this
bipartisan effort in the defense bills, as well as now in the
Intelligence Authorization Act. I would also like to thank Chairman
Nunes and his staff for working together with me on this important
issue.
Mr. Chairman, as Representative Israel just described, there is a
real and growing tunnel threat to American bases and embassies around
the world, to our southern border, as well as to our ally Israel, both
in Gaza, as well as Israel's northern border.
Language I offered in the base intelligence bill, combined with this
amendment, will ensure that our intelligence community stays focused on
this threat. There will be a dedicated person watching on this issue.
Going forward, partnership with Israel is the best way to address
this growing threat. As we have seen with Iron Dome and other missile
defense efforts, partnering with a vital ally like Israel enables both
countries to learn quickly, while sharing costs and new technologies.
It is a win-win situation for Israel and the U.S. and, hopefully, a
loss situation for the bad guys.
I urge my colleagues to support this amendment.
Mr. ISRAEL. Mr. Chairman, I thank my very good friend from Colorado
for his bipartisan support of this bill.
I yield 1 minute to the gentlewoman from Florida. (Ms. Graham).
Ms. GRAHAM. Mr. Chairman, I rise in support of Representative Steve
Israel's amendment to the Intelligence Authorization Act to provide
oversight for the joint U.S.-Israel antitunneling defense project.
The joint antitunneling project, which was added to the National
Defense Authorization Act in an amendment sponsored by my good friend
Representative Lamborn and myself, will help our closest ally in the
Middle East, Israel, protect its borders.
The terrorist group Hamas has spent years developing a complex
network of tunnels under the Gaza Strip and Israel to smuggle weapons,
kidnap Israelis, and launch mass murder attacks.
This project will develop new technology to detect and destroy these
tunnels, and it will send a clear message to our allies and enemies
alike. The United States is committed to protecting Israel and to
rooting out and destroying the terrorists who wish to do her harm.
Mr. NUNES. Mr. Chairman, I reserve the balance of my time.
Mr. ISRAEL. Mr. Chairman, I yield 1 minute to the gentleman from
California (Mr. Schiff), the distinguished ranking member of the
committee.
Mr. SCHIFF. I thank the gentleman for yielding, and I thank Mr.
Israel, Mr. Lamborn, and Ms. Graham for this very important amendment
and issue.
This will call for a report on our adversaries' use of tunnels and an
update on our collaboration with international partners in ways to
detect and defeat tunnels.
All of us remember the fear that set in, in much of southern Israel
last summer, as Hamas militants used a complex network of tunnels to
attack Israeli soldiers from the Gaza Strip. This was not the first use
of tunnels by Hamas. Cross-border tunnels were used in the capture of
IDF soldier Gilad Shalit in 2006.
In addition to using them against military targets, Israel has
uncovered evidence that the tunnels are being prepared for large-scale
attacks against Israeli civilians.
Tunnels are not just a problem for Israel. For decades, the North
Korean military has also been digging tunnels under the DMZ to
facilitate infiltration of South Korea.
According to press reports, four tunnels from the north have been
found in all, although none since 1990. The South Korean Defense
Ministry believes there may be 20 in all, and they could pose a mortal
threat to Koreans and American service personnel in the region.
I strongly support the amendment and urge my colleagues to do the
same.
Mr. NUNES. Mr. Chairman, I am prepared to support the amendment.
I yield back the balance of my time.
Mr. ISRAEL. Mr. Chairman, all that I can say is thank you.
I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from New York (Mr. Israel).
The amendment was agreed to.
Amendment No. 2 Offered by Mr. Israel
The CHAIR. It is now in order to consider amendment No. 2 printed in
House Report 114-155.
Mr. ISRAEL. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 16, after line 24, insert the following new
subsection:
``(e) Reports.--Not later than 10 months after the date of
the enactment of this subsection, and annually thereafter for
three years, the Director of the Cyber Threat Intelligence
Integration Center shall submit a report to Congress that
includes the following:
``(1) With respect to the year covered by the report, a
detailed description of cyber threat trends, as compiled by
the Cyber Threat Intelligence Integration Center.
``(2) With respect to the year covered by the report, a
detailed description of the coordination efforts by the Cyber
Threat Intelligence Integration Center between departments
and agencies of the Federal Government, including the
Department of Defense, the Department of Justice, and the
Department of Homeland Security.
``(3) Recommendations for better collaboration between such
departments and agencies of the Federal Government.''.
The CHAIR. Pursuant to House Resolution 315, the gentleman from New
York (Mr. Israel) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from New York.
Mr. ISRAEL. Mr. Chairman, I will attempt to continue my winning
streak on the floor this morning.
I rise to offer an amendment with my distinguished friend and partner
from New York (Mr. Hanna).
This bipartisan amendment addresses an issue that has concerned many
of us for some time, and that is the fact that, when it comes to cyber
defense and cyber war, many Federal agencies are doing something; it is
just that they may not be aware of what each of them is doing. We need
closer coordination and collaboration among all the Federal agencies
and entities dealing with cyber war.
Mr. Chairman, we recently found out that the United States Office of
Personnel Management suffered a cyber attack impacting millions of
Federal workers. This attack, in my view, highlights a disconnect
between agencies tasked to provide cyber defense, a foreign government
hacking into a Federal government system, taking the records of
millions of government employees, spanning the jurisdiction of several
Federal agencies.
It is clear that there is an obvious need for greater collaboration
between these agencies to create a credible defense and, if needed, a
deterrent to those wishing to attack through the cyber domain.
That is why I was very pleased in February of this year when the
President directed the DNI to establish the Cyber Threat Intelligence
Integration Center, CTIIC. This bill very properly authorizes that
position.
CTIIC will serve as the primary organization within the Federal
Government for analyzing and integrating all intelligence possessed or
acquired by the U.S. pertaining to cyber threats and coordinate cyber
threat intelligence activities.
This bipartisan amendment, Mr. Chairman, simply ensures congressional
oversight of CTIIC by requiring an annual report detailing three
things: number one, cyber attack trends identified by the CTIIC; number
two, an assessment of the collaborative efforts between the CTIIC and
various Federal agencies tasked to defend this country against cyber
attacks; and number three, recommendations for better collaboration
between these agencies.
Mr. Chairman, we have entered a new era of warfare. Our networks are
being attacked daily. We need to do a much better job of coordinating,
collaborating, and cooperating at the Federal level. This amendment
ensures oversight and accountability.
I want to thank my partner on this measure, Mr. Hanna, for his
bipartisan assistance and support.
I reserve the balance of my time.
Mr. NUNES. Mr. Chairman, I claim the time in opposition, although I
do not intend to oppose the amendment.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
[[Page H4406]]
There was no objection.
Mr. NUNES. Mr. Chair, over the last several years, cyber attacks have
become a pressing concern for the United States. The recent breach of
the Office of Personnel Management has put the personal information of
millions of current and former Federal employees, including many of the
men and women of our intelligence community, at risk.
Every day, cyber thieves attack private companies, stealing credit
card numbers, accessing medical records, leaking proprietary
information, and publishing confidential emails, affecting tens of
millions of Americans.
The intelligence community has worked to improve our cyber defenses
by improving information sharing between the private sector and the
Federal Government through the support of H.R. 1560, the Protecting
Cyber Networks Act.
While the Senate has yet to act on this bill, the legislation we
consider today will help improve the Federal Government's ability to
detect and defeat cyber attacks by creating the new Cyber Threat
Intelligence Integration Center.
This thoughtful amendment by Mr. Israel and Mr. Hanna will require
that the Center produce a report on cyber threat trends and
coordination on cyber threats between different government agencies.
I thank the gentlemen from New York for their work on this issue and
urge my colleagues to support this amendment.
I yield back the balance of my time.
Mr. ISRAEL. Mr. Chairman, I yield 1 minute to the gentleman from
California (Mr. Schiff), the ranking member of the committee.
Mr. SCHIFF. I thank the gentleman, and I thank him for his excellent
amendment and support in the intelligence process.
With each passing day, we are learning more about the cyber breach at
the Office of Personnel Management. The volume of personal information
lost during these events is of tremendous concern. Mr. Israel's
amendment will help us better inform Congress on the effectiveness of
the government's collaborative efforts to defend against future cyber
events.
I thank my colleagues for their work on it, and I urge support of Mr.
Israel's amendment.
Mr. ISRAEL. Mr. Chairman, I want to thank the distinguished chairman
for his bipartisan leadership and the distinguished ranking member. I
appreciate their support for this amendment.
I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from New York (Mr. Israel).
The amendment was agreed to.
Amendment No. 3 Offered by Mr. Crowley
The CHAIR. It is now in order to consider amendment No. 3 printed in
House Report 114-155.
Mr. CROWLEY. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 29, after line 17, insert the following:
SEC. 317. INCLUSION OF HISPANIC-SERVING INSTITUTIONS IN GRANT
PROGRAM TO ENHANCE RECRUITING OF INTELLIGENCE
COMMUNITY WORKFORCE.
Section 1024 of the National Security Act of 1947 (50
U.S.C. ) is amended--
(1) in subsection (c)--
(A) in paragraph (1), by inserting ``, Hispanic-serving
institutions, and'' after ``universities''; and
(B) in the subsection heading for such subsection, by
striking ``Historically Black'' and inserting ``Certain
Minority-serving''; and
(2) in subsection (g)--
(A) by redesignating paragraph (5) as paragraph (6); and
(B) by inserting after paragraph (4) the following new
paragraph (5):
``(5) Hispanic-serving institution.--The term `Hispanic-
serving institution' has the meaning given that term in
section 502(a)(5) of the Higher Education Act of 1965 (20
U.S.C. 1101a(a)(5)).''.
The CHAIR. Pursuant to House Resolution 315, the gentleman from New
York (Mr. Crowley) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from New York.
Mr. CROWLEY. Mr. Chairman, I yield myself as much time as I may
consume.
Mr. Chairman, like many of my colleagues, I am focused on growing
educational opportunities for young Hispanic Americans, particularly in
the areas that will be so critical to our Nation's success in the years
ahead.
Last month, the House approved a bipartisan amendment to the America
COMPETES Reauthorization Act designed to increase opportunities for
Latinos in the STEM fields.
The amendment I am offering today with my colleagues, Mr. Serrano and
Mr. Curbelo, builds upon that effort and would further expand
opportunities for Hispanic students.
Our proposal would allow the Director of National Intelligence to
offer grants to Hispanic-Serving Institutions of higher education for
advanced foreign language education programs that are in the immediate
interest of the intelligence community.
It would also promote study abroad and cultural immersion programs in
those areas, which we all know are crucial to truly understanding the
intricacies of other languages and other cultures. This is a time when
we need to be encouraging more of our young people to enter careers
aimed at making our Nation safer.
Of the nearly 2 million Latino students enrolled in college today,
the majority attend Hispanic-Serving Institutions. With these targeted
grants, HSIs would be able to help increase the ranks of Latinos going
into the intelligence community, where they are underrepresented today.
This amendment would not only promote diversity in national security
and intelligence communities, but it would also strengthen our youngest
and fastest growing minority, Hispanic Americans.
We must ensure that these young people are prepared with the
knowledge and skills that will contribute to our Nation's future
strength, security, and global leadership because, when education is
available to everyone, our entire Nation is a stronger nation.
I want to thank my colleagues who have worked with me on this issue,
Mr. Serrano and Mr. Curbelo, who have cosponsored this amendment.
Mr. Chairman, I reserve the balance of my time.
Mr. NUNES. Mr. Chair, I claim the time in opposition, although I do
not intend to oppose the amendment.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. NUNES. Mr. Chair, I thank Mr. Crowley, Mr. Serrano, and Mr.
Curbelo for offering this amendment to include Hispanic-Serving
Institutions in the grant program to improve recruitment efforts for
the intelligence community.
I yield 2 minutes to the gentleman from Florida (Mr. Curbelo).
{time} 1445
Mr. CURBELO of Florida. I thank the chairman for yielding.
Mr. Chairman, I rise today in strong support of this amendment and
thank my colleague from New York for allowing me to join in leading on
this important issue.
This amendment would allow the Director of National Intelligence to
provide grants to Hispanic-Serving Institutions of higher education to
offer advanced foreign language programs that are important to our
intelligence community. These students, in addition to the traditional
classroom setting, would also be able to travel and study abroad so
they can gain a firsthand perspective of the culture in which they are
immersing themselves.
Mr. Chairman, the study of Farsi, Middle Eastern, and South Asian
dialects is of the utmost importance in developing our country's
continued relationships abroad. I am proud to advocate for Hispanic-
Serving Institutions, like Florida International University and Miami
Dade College in my district, and will strive to provide them the
opportunity to train their students so that they can go on to serve our
country.
I am proud to be working with the gentleman from New York (Mr.
Crowley) and the gentleman from New York (Mr. Serrano) to provide more
opportunities for these young Hispanic students who want to serve their
country and to provide our intelligence community this special tool to
recruit those who could be useful in advancing the cause of building
the relationships that are so critical to our intelligence services
operating throughout the world.
[[Page H4407]]
Mr. CROWLEY. Mr. Chairman, I appreciate the gentleman from Florida's
comments on this bill and his support.
At this time, I yield 1 minute to the gentleman from California (Mr.
Schiff).
Mr. SCHIFF. I thank my colleague from New York (Mr. Crowley) for
yielding and for his work on this amendment. I am very happy to support
it.
Diversity and language skills are critical to national security.
Together, they allow the intelligence community to reach its potential
and expand its reach, its access, as well as its understanding.
This amendment would further both goals by providing better language-
learning opportunities to students of Hispanic-Serving Institutions. I
am very proud to support this amendment and urge my colleagues to do
the same.
Again, I thank my friend from New York (Mr. Crowley) as well as my
other colleagues who worked with him on this amendment. I urge passage.
Mr. NUNES. Mr. Chairman, I support the amendment, and I yield back
the balance of my time.
Mr. CROWLEY. Mr. Chairman, I thank the chairman for his support of
this amendment as well as the ranking member, Mr. Schiff, for his
support of this amendment, and all the Members who have worked on this
amendment.
I think the amendment speaks for itself. It is providing a great
opportunity for a growing minority community within our country who
want to serve our country in this capacity.
With that, I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from New York (Mr. Crowley).
The amendment was agreed to.
Amendment No. 4 Offered by Mr. Keating
The CHAIR. It is now in order to consider amendment No. 4 printed in
House Report 114-155.
Mr. KEATING. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 35, after line 17, insert the following new subsection
(and redesignate the subsequent subsections accordingly):
(c) Additional Report.--Not later than 180 days after the
date of the enactment of this Act, the Director of National
Intelligence shall submit to the congressional intelligence
committees a report that includes--
(1) with respect to the travel of foreign fighters to and
from Iraq and Syria, a description of the intelligence
sharing relationships between the United States and member
states of the European Union and member states of the North
Atlantic Treaty Organization; and
(2) an analysis of the challenges impeding such
intelligence sharing relationships.
Page 35, line 19, insert ``and (c)'' after ``(a)''.
The CHAIR. Pursuant to House Resolution 315, the gentleman from
Massachusetts (Mr. Keating) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Massachusetts.
Mr. KEATING. Mr. Chairman, I offer this bipartisan amendment with the
support of Homeland Security Chairman Michael McCaul and
Representatives Katko and Loudermilk to help Congress identify ways to
improve intelligence sharing on the flow of foreign fighters around the
world--with particular attention to their travel to and from Iraq and
Syria.
Already, this legislation that we are considering today makes
substantial strides in ensuring that intelligence surrounding the flow
of foreign fighters is shared with Congress. These continuous reports
will shed light on the total number of attempted and successful
fighters since the beginning of 2011.
My amendment would require the Director of National Intelligence to
report to Congress on the intelligence community's progress in forging
information-sharing agreements with foreign partners and help Congress
identify the challenges impeding coordinated intelligence efforts.
Over 20,000 foreign fighters have traveled to join rebel and
terrorist groups in Iraq and Syria, including ISIS and al Qaeda
affiliates like al-Nusrah. Their movements are proving increasingly
difficult to track in our globalized world, particularly given the
uneven or nonexistent tracking efforts from some of our foreign
partners.
As the ranking member of the Foreign Affairs Subcommittee on
Terrorism, Nonproliferation, and Trade and as a member of the Homeland
Security Subcommittee on Counterterrorism and Intelligence, I have
engaged on the issue of intelligence sharing from two perspectives--
from our efforts to improve the intelligence community's coordination
with State, local, and other Federal agencies and from our work to
better improve our information-sharing practices with our overseas
allies to prevent terrorist attacks and the flow of foreign fighters
here at home.
While the intelligence community has made improvements to the
processes of sharing pertinent information with the relevant Federal,
State, and local agencies, there still exists a blind spot in our
intelligence-gathering efforts on foreign fighters. That blind spot
stems from the failure of some foreign governments to take commonsense
information-sharing steps, and it has made the task of tracking foreign
fighters even more challenging.
The inability or unwillingness of some foreign governments to pass
along even the most basic information about these individuals
represents a major risk to the safety of the American people.
An additional threat looms when some of these individuals return to
their homelands from Iraq and Syria, battle-hardened and radicalized.
Once back home, some can travel between international borders with
relative ease, which makes tracking them a truly difficult feat.
This amendment will also provide insight into our current
intelligence-sharing relationships and will give Congress the
opportunity to highlight best practices while also revealing areas for
improvement.
I thank Chairman Nunes and Ranking Member Schiff for their
cooperation.
I yield such time as he may consume to the gentleman from Texas (Mr.
McCaul).
Mr. McCAUL. I thank the gentleman for yielding.
Mr. Chair, I rise in strong support of the Keating-McCaul amendment
in the Intelligence Authorization Act. If adopted, our amendment would
require the Director of National Intelligence to report to Congress on
the state of intelligence information sharing with overseas partners to
help us identify security gaps so that we can improve international
monitoring of foreign fighter travel both in and out of Syria and Iraq.
Islamist fanatics from more than 100 countries have traveled overseas
to fight with groups like ISIS and al Qaeda. Thousands of the jihadists
carry Western passports and can exploit security gaps in places like
Europe to return to the West, where they can plot attacks against
America and our allies.
Last month, I led a congressional delegation to the Middle East to
investigate the flow of these foreign fighters. And while progress is
being made, I am still troubled by intelligence and screening gaps,
especially with our foreign partners. We need to make sure our allies
not only share the identities of terrorists and foreign fighters with
us but also with each other so that these extremists can be stopped
before they cross our borders into the United States.
This amendment will provide Congress critical information needed to
close these security gaps and improve intelligence information sharing
to defend our homeland.
I applaud the gentleman from Massachusetts (Mr. Keating) for his hard
work on the amendment and for his strong participation in our
delegation overseas, where we learned quite a bit. It is not very often
you can pass something you think can save American lives, and I think
this is one of them. I thank the gentleman again.
Mr. KEATING. Mr. Chairman, I thank the chairman of Homeland Security
for his leadership on this issue. We really have established a very
strong bipartisan effort, putting our national security first and
realizing what holes there are in our system, in our security for our
country.
Mr. Chairman, I yield 15 seconds to the gentleman from California
(Mr. Schiff).
Mr. SCHIFF. I thank the gentleman.
Mr. Chairman, I rise in strong support of the work of my colleagues
from Massachusetts and from Texas. This is a superb amendment that will
help us track foreign fighters, and I am proud to support it.
[[Page H4408]]
Mr. KEATING. Mr. Chairman, I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Massachusetts (Mr. Keating).
The amendment was agreed to.
Amendment No. 5 Offered by Mr. Keating
The CHAIR. It is now in order to consider amendment No. 5 printed in
House Report 114-155.
Mr. KEATING. Mr. Chairman, I have another amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 41, line 8, strike ``paragraphs (3) and (4)'' and
insert ``paragraph (3) and redesignating paragraph (4) as
paragraph (3)''.
The CHAIR. Pursuant to House Resolution 315, the gentleman from
Massachusetts (Mr. Keating) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Massachusetts.
Mr. KEATING. Mr. Chairman, the recent events involving the plan of
radicalized individuals in Massachusetts to target law enforcement
officials--police, in particular--underscore the truth that protecting
America will require the efforts of local, State, and Federal law
enforcement.
Since the Boston Marathon bombings, the FBI has made great efforts to
improve their information-sharing efforts with the Joint Terrorism Task
Force and other Federal agencies.
With my work and the work of my colleagues on the congressional
investigation of the Boston Marathon bombings through the Homeland
Security Committee, I can attest to the seriousness in which the
Federal Bureau of Investigation has set out to improve their
information-sharing practices.
However, the FBI's efforts to institutionalize sharing across law
enforcement and intelligence are still a work in progress.
The current version of this bill eliminates the requirement for the
FBI to report to Congress on their progress to implement information-
sharing principles. This is a reporting requirement that has kept
Congress aware of the FBI's information-sharing practices since 2004,
and it has been vital to understand what works and what can be
improved.
This amendment will reinstate that requirement, with the recognition
that the FBI has more work to do on information sharing to better
protect the American public.
These necessary reforms include re-executing FBI current memorandums
of understanding with local partners, improving training and
accessibility for the eGuardian platform, and formalizing methods for
disseminating intelligence to relevant consumers up- and downstream.
Without information on the progress the FBI is making in these
reforms, Congress is hindered in taking the critical steps needed to
protect the American public.
I would like to again thank Chairman Nunes and Ranking Member Schiff.
I yield such time as he may consume to the gentleman from California
(Mr. Schiff).
Mr. SCHIFF. I thank my colleague from Massachusetts, who has been an
active and important voice on national security since he joined the
Congress several years ago. In particular, he has worked to ensure that
we maintain a strong focus on information sharing across agencies.
One of the key lessons we learned from 9/11 is the need to tear down
stovepipes and to ensure that inappropriate barriers to information
sharing across agencies never reappear.
The gentleman from Massachusetts' amendment seeks to maintain our
vigilance on this issue and would require the FBI to report to Congress
on its information-sharing progress.
As a fellow native Bostonian, I am very pleased to see my colleague
do such great work. I want to thank him for his commitment to the
issue. And I am very happy to support the amendment.
Mr. KEATING. I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Massachusetts (Mr. Keating).
The amendment was agreed to.
Amendment No. 6 Offered by Mr. Schiff
The CHAIR. It is now in order to consider amendment No. 6 printed in
House Report 114-155.
Mr. SCHIFF. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Strike sections 321, 322, 323, and 331.
The CHAIR. Pursuant to House Resolution 315, the gentleman from
California (Mr. Schiff) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from California.
Mr. SCHIFF. Mr. Chairman, my amendment would strike the sections of
the bill which would undermine the administration's ability to close
the prison at Guantanamo by transferring the remaining detainees to the
United States for further disposition of their cases or to third
countries that agree to accept them, secure them, and monitor them.
I am grateful that my colleague from Washington, Adam Smith, ranking
member of the Armed Services Committee, has joined me in urging the
House to make this important change to the bill.
Every day that it remains open, the prison at Guantanamo Bay damages
the United States. Because there are other, better options for the
prosecution and detention of these inmates, we are not safer for
Guantanamo's existence. In fact, it makes us more vulnerable by drawing
new recruits to the jihad.
The Congress, the administration, and the military can work together
to find a solution that protects our people even as we maintain our
principles and devotion to the rule of law.
Under the provisions included in this bill, the administration would
be barred from transferring Guantanamo detainees to a ``war zone.''
While I agree that it would be foolhardy to seek to send a detainee
to Yemen while that country is immersed in civil war, the definition of
``war zone'' used here is derived from the U.S. Tax Code and is
extremely broad, ruling out countries like Jordan, for example, that
have either successfully resettled and monitored former detainees or
demonstrated a genuine commitment to doing so.
These provisions also prevent the administration from transferring
Guantanamo detainees to the United States for further proceedings under
the military commissions process or for trial in an article III court.
{time} 1500
The Department of Justice and our courts have proven themselves time
and time again to be more than capable of handling the toughest
terrorism cases and doing so in a way that ennobles us and sets an
example to the world that a great nation can both safeguard its people
and the rule of law.
As a practical matter, our civilian courts have proven much more
adept at handling these cases than the military commissions process
has. In fact, this past Friday, a three-judge panel of the Court of
Appeals for the D.C. Circuit, one of the most important appellate
courts in the Nation, further struck down the legality of commission
charges, so narrowing the jurisdiction of the military commissions
themselves that any utility as an alternative to article III courts has
been called into further question.
And while Khalid Sheikh Mohammed and his fellow Guantanamo terrorists
still await their date with justice, a host of others--including
Richard Reid, the shoe bomber; and Umar Farouk Abdulmutallab, the
underwear bomber; and Faisal Shahzad, the Times Square bomber--have
been tried, convicted, and sent to ADX Florence, the toughest prison in
America. They are gone, and they are not coming back.
The inclusion of these provisions is the first time that restrictions
related to Guantanamo have been included in the Intelligence
Authorization Act, and I believe that alone sets an unfortunate
precedent that could undermine what has been a largely bipartisan
effort. These provisions are unnecessary and unwise, and they do not
belong in this bill.
Mr. Chairman, I urge the House to reconsider these provisions, to
trust in American justice, diplomacy, and the best military advice, and
to give the administration a means to shutter a prison that both shames
us and perpetuates the threat to the Nation.
[[Page H4409]]
I reserve the balance of my time.
Mr. NUNES. Mr. Chairman, I rise in opposition to this amendment.
The CHAIR. The gentleman from California is recognized for 5 minutes.
Mr. NUNES. Mr. Chairman, I yield myself such time as I may consume.
Mr. Chairman, although I appreciate the ranking member's concerns
about these provisions, I do remain concerned that further releases
from Guantanamo will threaten our national security.
Press reports now indicate that the administration intends to
transfer up to 10 additional detainees this month. As the committee
learned through its many briefings and hearings, the five detainees
released to Qatar last May have participated in activities that
threaten the United States and its allies and are counter to U.S.
national security interests, not unlike their activities before they
were detained. No intelligence community element should enable any
future transfers that endanger national security.
Furthermore, I would note that these provisions are substantively
identical to the provisions passed by the House Armed Services
Committee as part of the National Defense Authorization Act. Mr.
Chairman, 26 of the 27 Democrats on that committee voted to advance an
NDAA that contained similar restrictions. The provisions in our bill
will complement those restrictions, as well as the restrictions put
forward in the defense appropriations bills for several years running
and this committee's previous intelligence authorization bills. The
ranking member may have forgotten, but in 2012, there were provisions
similar to this one that were included in the legislation.
In sum, these provisions represent a strong and enduring consensus in
Congress that Guantanamo should remain open and that detainees should
not be transferred to the U.S. for any reason. As everyone here is
aware, several detainees who have been released from Guantanamo have
gone back to the fight and killed and wounded Americans. Putting
detainees in U.S. prisons, as the administration originally proposed,
would be disruptive and potentially disastrous. The threat is real, and
Guantanamo is already equipped to handle the detention and military
trial of these individuals, as appropriate.
For those reasons, I would urge my colleagues to oppose this
amendment, and I reserve the balance of my time.
Mr. SCHIFF. I yield myself such time as I may consume.
I want to urge support for this amendment. This is one of the few
areas of disagreement between the chairman and myself. When we look at
how we are progressing or the lack of more progress in our struggle
against ISIS and al Qaeda in places like Syria and Iraq, we are often
tempted to consider those that we take off the battlefield as a metric
of our success--we have eliminated so many combatants from the
battlefield. But of course that number in isolation means very little.
And the challenge is that with every one we take off the battlefield,
there are new foreign fighters coming onto the battlefield.
The recruitment of those additional fighters uses a variety of images
and issues to attract people to join the jihad. One of the issues that
is continually used as recruiting propaganda is the presence of the
detention center at Guantanamo Bay. This is a recruitment vehicle for
the jihadis. It is a rallying cry for the jihadis.
The closure of this prison will not end the threat from ISIS or al
Qaeda. There will be other efforts to recruit. But why give them this
recruitment tool when there are other, better ways that these people
can be incarcerated? Why give them this recruitment vehicle when there
are ways that we can secure the people at Guantanamo Bay, prosecute the
people at Guantanamo Bay, uphold our highest standards and the rule of
law, and remove at least one part the jihadi social media and other
propaganda campaign?
Mr. Chairman, I think it is in our national security interest to do
so. I would urge support for the amendment.
I yield back the balance of my time.
Mr. NUNES. Mr. Chair, I yield myself such time as I may consume.
Mr. Chair, I know that the gentleman believes every word that he is
saying. We have had robust debate in the Intelligence Committee behind
closed doors, and we have had robust debate out in open session, and it
is a debate I think that will always continue.
However, the concern remains from the majority Members of Congress
that they would prefer to keep Guantanamo open because no one wants to
bring those terrorists to the United States, to their backyard, to try
them in their State or their county or their community.
So I respect the gentleman's concerns, and we will continue to debate
those, but I will continue to oppose closing Guantanamo or having our
intelligence community participate in the removal of detainees from
Guantanamo.
Mr. Chair, I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from California (Mr. Schiff).
The question was taken; and the Chair announced that the noes
appeared to have it.
Mr. SCHIFF. Mr. Chairman, I demand a recorded vote.
The CHAIR. Pursuant to clause 6 of rule XVIII, further proceedings on
the amendment offered by the gentleman from California will be
postponed.
Amendment No. 7 Offered by Mr. Rooney of Florida
The CHAIR. It is now in order to consider amendment No. 7 printed in
House Report 114-155.
Mr. ROONEY of Florida. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
At the end of subtitle C of title III, add the following
new section:
SEC. 3__. REPORT ON HIRING OF GRADUATES OF CYBER CORPS
SCHOLARSHIP PROGRAM BY INTELLIGENCE COMMUNITY.
(a) In General.--Not later than 90 days after the date of
the enactment of this Act, the Director of National
Intelligence, in coordination with the Director of the
National Science Foundation, shall submit to the
congressional intelligence committees a report on the
employment by the intelligence community of graduates of the
Cyber Corps Scholarship Program. The report shall include the
following:
(1) The number of graduates of the Cyber Corps Scholarship
Program hired by each element of the intelligence community.
(2) A description of how each element of the intelligence
community recruits graduates of the Cyber Corps Scholar
Program.
(3) A description of any processes available to the
intelligence community to expedite the hiring or processing
of security clearances for graduates of the Cyber Corps
Scholar Program.
(4) Recommendations by the Director to improve the hiring
by the intelligence community of graduates of the Cyber Corps
Scholarship Program, including any recommendations for
legislative action to carry out such improvements.
(b) Cyber Corps Scholarship Program Defined.--In this
section, the term ``Cyber Corps Scholarship Program'' means
the Federal Cyber Scholarship-for-Service Program under
section 302 of the Cybersecurity Enhancement Act of 2014 (15
U.S.C. 7442).
The CHAIR. Pursuant to House Resolution 315, the gentleman from
Florida (Mr. Rooney) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from Florida.
Mr. ROONEY of Florida. Mr. Chairman, I yield myself such time as I
may consume.
Mr. Chairman, as we debate this bill today, hackers across the world
are trying furiously to break into our cyber networks, as we all know.
And as we have seen in recent weeks, they are occasionally successful,
and the consequences are grave. These cracks in our cyber defense put
our security at risk. They also threaten American businesses and the
privacy and credit of individuals across this country.
For the sake of our national security and our economy, we must work
together to improve our cyber capabilities. This requires a stronger,
more capable cyber workforce, which our bipartisan amendment will help
facilitate.
The Federal CyberCorps Scholarship for Service program gives
scholarships to students who study in the cybersecurity field. In
exchange, those students commit to serving in government cybersecurity
positions after graduation. Leaders within the intelligence community
and DOD have told us that they need to expand their workforce and want
to hire graduates from this program. Unfortunately, outdated personnel
rules and insufficient direct hire authority make it extremely
difficult for them to do so. As a result, these
[[Page H4410]]
students aren't able to fulfill their work commitment and we are unable
to meet our workforce needs, and our cybersecurity suffers.
We believe Congress should help remove those obstacles and make it
easier to bring those graduates into the cyber workforce. Our amendment
starts that process by requiring a report back to us on how many
CyberCorps graduates go to work for the intelligence community and how
these agencies recruit them. This information will help us determine
how to streamline the hiring process so we are capitalizing on the best
cybersecurity talent available.
Mr. Chairman, this is a simple, bipartisan amendment, but it will pay
dividends to improve and expand our cyber workforce and strengthen our
national security.
I would like to thank Congresswoman Sewell from Alabama for her
assistance in this amendment.
With that, Mr. Chairman, I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I rise to claim the time in opposition,
even though I am not opposed.
The CHAIR. Without objection, the gentleman from California is
recognized.
There was no objection.
Mr. SCHIFF. Mr. Chairman, I yield myself such time as I may consume.
I want to thank the gentleman from Florida and the gentlewoman from
Alabama, both HPSCI colleagues, for their amendment, and I am happy to
support it.
This amendment furthers two important goals: first, to ensure that
academic programs that should serve as a resource to the government--in
this case, the National Science Foundation's CyberCorps Scholarship for
Service--actually do result in a good number of students choosing
employment within the intelligence community; and second, to deepen the
bench of our cyber defenders.
As a recent series of serious cyber breaches has demonstrated, it is
an imperative for the protection of this Nation's workforce, privacy,
and sensitive intelligence that we strengthen the IC's cyber cadre with
our best and brightest. Mr. Chairman, this amendment is a fine addition
to the gentleman's and the gentlewoman's other initiatives already
represented in the bill, particularly those that advance diversity in
the intelligence community.
Again, Mr. Chairman, I want to thank my colleagues for their work. I
urge support for this bipartisan amendment.
I yield back the balance of my time.
Mr. ROONEY of Florida. Mr. Chairman, I yield back the balance of my
time.
Ms. SEWELL of Alabama. Mr. Chair, I rise today in support of this
bipartisan, common sense amendment that seeks to streamline and
strengthen our Intelligence Community's (IC) cyber workforce. I am
pleased to join my fellow colleague, Rep. Rooney, who shares my deeply
held desire to help meet the incredible need to raise the number of
professionals in the critically important field of cybersecurity.
The recent breach of OPM which compromised the personal information
of nearly 4 million federal employees further illustrates our urgent
and immediate need to make substantial improvements to our cyber
databases and overall cyber infrastructure. Cyberattacks have become
increasingly common, and state sponsored bad actors pose a serious
threat to our national security. These types of attacks are one of the
most urgent modern challenges to our nation. Our government must be
poised to do more to prevent future attacks. We must position ourselves
to curtail any threat, no matter how great or small.
In December 2011, the National Science and Technology Council, in
cooperation with the National Science Foundation (NSF), advanced a
broad, coordinated federal strategic plan to enhance cybersecurity
research and education. As part of this plan, the NSF launched the
CyberCorps Scholarship for Service (SFS) program. In an effort to
bolster our federal workforce's capacity and advance the nation's
economic prosperity and national security, this program provides
funding for undergraduate and graduate level scholarships to students
interested in cybersecurity. In return, scholarship recipients are
required to work for a Federal, State, Local, or Tribal Government
organization in a position related to cybersecurity for a period equal
to the length of the scholarship. In essence, students receive a
scholarship in exchange for their commitment to federal civil service.
This program seeks to cultivate pipelines for applicants from
undergraduate and graduate programs into federal careers focusing on
combatting emerging cyber security threats.
Leaders within the Intelligence Community tell me, however, that
outdated policies and onerous clearance procedures are inhibiting their
ability to fill industry vacancies with young and diverse cybersecurity
professionals.
Our amendment simply requires the Intelligence Community to report to
Congress on how many CyberCorps graduates actually go to work for the
IC and how IC agencies recruit these CyberCorps graduates. This
information will help Congress determine how we can best improve the
hiring process.
I strongly believe that Congress should be facilitating ways to help
the Intelligence Community hire these critically important CyberCorps
graduates and create a pipeline directly into our cyber workforce.
I encourage my colleagues to vote yes on this amendment.
The CHAIR. The question is on the amendment offered by the gentleman
from Florida (Mr. Rooney).
The amendment was agreed to.
Amendment No. 8 Offered by Mr. Moulton
The CHAIR. It is now in order to consider amendment No. 8 printed in
House Report 114-155.
Mr. MOULTON. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
At the end of subtitle C of title III, add the following
new section:
SEC. 3__. REPORT ON EFFECTS OF DATA BREACH OF OFFICE OF
PERSONNEL MANAGEMENT.
(a) Report.--Not later than 120 days after the date of the
enactment of this Act, the President shall transmit to the
congressional intelligence committees a report on the data
breach of the Office of Personnel Management disclosed in
June 2015.
(b) Matters Included.--The report under subsection (a)
shall include the following:
(1) The effects, if any, of the data breach on the
operations of the intelligence community abroad, including
the types of operations, if any, that have been negatively
affected or entirely suspended or terminated as a result of
the data breach.
(2) An assessment of the effects of the data breach to each
element of the intelligence community.
(3) An assessment of how foreign persons, groups, or
countries may use the data collected by the data breach
(particularly regarding information included in background
investigations for security clearances), including with
respect to--
(A) recruiting intelligence assets;
(B) influencing decision-making processes within the
Federal Government, including regarding foreign policy
decisions; and
(C) compromising employees of the Federal Government and
friends and families of such employees for the purpose of
gaining access to sensitive national security and economic
information.
(4) An assessment of which departments or agencies of the
Federal Government use the best practices to protect
sensitive data, including a summary of any such best
practices that were not used by the Office of Personnel
Management.
(5) An assessment of the best practices used by the
departments or agencies identified under paragraph (4) to
identify and fix potential vulnerabilities in the systems of
the department or agency.
(c) Briefing.--The Director of National Intelligence shall
provide to the congressional intelligence committees an
interim briefing on the report under subsection (a),
including a discussion of proposals and options for
responding to cyber attacks.
(d) Form.--The report under subsection (a) shall be
submitted in unclassified form, but may include a classified
annex.
The CHAIR. Pursuant to House Resolution 315, the gentleman from
Massachusetts (Mr. Moulton) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Massachusetts.
Mr. MOULTON. Mr. Chairman, I yield myself such time as I may consume.
Mr. Chairman, recently, the Office of Personnel Management disclosed
a massive security breach that may have exposed personal information of
millions of current and former Federal employees, including those who
work in sensitive national security positions. Simply put, this cyber
breach is unacceptable and breaks faith with those dedicated military
and civilian personnel who commit their lives to keeping our country
safe.
Although responsibility has not yet been officially confirmed, many
observers believe that individuals in China, who may have been acting
on orders of the Chinese Government, were responsible for hacking into
OPM databases.
Two things are clear, Mr. Chairman. First, we must ensure this does
not
[[Page H4411]]
happen again; we must protect our Federal employees--our foreign
service officers, State Department staff, members of the intelligence
community, and many others. Second, we must make clear to the rest of
the world that these attacks will not be tolerated and that there will
be consequences.
Mr. Chairman, that is why my amendment takes the first of many
critical steps to respond to this breach. My amendment starts the
process of holding OPM accountable. It makes sure we leverage the best
data security practices that our intelligence agencies use to protect
sensitive personal information about our military and civilian
personnel who work day in and day out to keep our country safe.
Finally, my amendment ensures that the United States Congress can
play a constructive role in developing a meaningful, forceful response
to cyber attacks--especially attacks aimed at our Nation's security. We
must stop these attacks and protect those who commit their lives to our
safety. This amendment is an important first step in doing just that.
Mr. Chairman, I reserve the balance of my time.
Mr. NUNES. Mr. Chair, we are prepared to accept the amendment.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. NUNES. Mr. Chairman, the Intelligence Committee, I think, in a
bipartisan manner, has the same concerns as the gentleman.
I yield back the balance of my time.
Mr. MOULTON. Mr. Chairman, I yield 1 minute to the gentleman from
California (Mr. Schiff).
Mr. SCHIFF. I thank the gentleman for yielding.
We expect timely briefs on all major cyber attacks, but in this case,
I agree, we need to require specific reporting and briefing on the
impacts of the recent OPM breach. We need to learn far more about how
hackers accessed the systems, what they obtained, and how we can
prevent this from happening again. In addition, this will help us
understand the impact to the intelligence community.
Mr. Chairman, as I have said before, our public and private networks
are not sufficiently secure, and they are a regular target for cyber
attacks. We must do everything we can to shore them up, and we must do
so now.
I want to thank my colleague for his work, and I urge support of his
amendment.
Mr. MOULTON. Mr. Chairman, I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Massachusetts (Mr. Moulton).
The amendment was agreed to.
Amendment No. 9 Offered by Mr. Turner
The CHAIR. It is now in order to consider amendment No. 9 printed in
House Report 114-155.
Mr. TURNER. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
At the end of subtitle C of title III, add the following:
SEC. 3__. ASSESSMENT ON FUNDING OF POLITICAL PARTIES AND
NONGOVERNMENTAL ORGANIZATIONS BY THE RUSSIAN
FEDERATION.
(a) In General.--Not later than 180 days after the date of
the enactment of this Act, the Director of National
Intelligence shall submit to the appropriate congressional
committees an intelligence community assessment on the
funding of political parties and nongovernmental
organizations in former Soviet states and countries in Europe
by the Russian Federation and the security and intelligence
services of the Russian Federation since January 1, 2006.
Such assessment shall include the following:
(1) The country involved, the entity funded, the security
service involved, and the intended effect of the funding.
(2) An evaluation of such intended effects, including with
respect to--
(A) undermining the political cohesion of the country
involved;
(B) undermining the missile defense of the United States
and the North Atlantic Treaty Organization; and
(C) undermining energy projects that could provide an
alternative to Russian energy.
(b) Form.--The report under subsection (a) shall be
submitted in unclassified form, but may include a classified
annex.
(c) Appropriate Congressional Committees Defined.--In this
section, the term ``appropriate congressional committees''
means the following:
(1) The congressional intelligence communities.
(2) The Committees on Armed Services of the House of
Representatives and the Senate.
(3) The Committee on Foreign Affairs of the House of
Representatives and the Committee on Foreign Relations of the
Senate.
The CHAIR. Pursuant to House Resolution 315, the gentleman from Ohio
(Mr. Turner) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from Ohio.
{time} 1515
Mr. TURNER. Mr. Chairman, my bipartisan amendment requires the
Director of National Intelligence to submit a report to Congress on the
funding of political parties and NGOs in former Soviet states by the
Russian Federation and its associated security and intelligence
services.
As Congress well knows, a resurgent Russia, led by President Vladimir
Putin, is once again determined to destabilize the West and various
Euro-Atlantic institutions such as NATO.
While we have seen the blatant use of military force both in Georgia
and Ukraine, Russia has employed a variety of nontraditional methods to
disrupt the West. These methods include the use of propaganda through
state-owned media outlets such as Russia Today, manipulation of
European natural gas markets, and the use of money to influence
political parties and nongovernmental organizations throughout Europe.
In a recent New York Times article, authors Peter Baker and Steven
Erlanger highlight a series of instances in which the Russian
Federation covertly funneled money to political organizations in Europe
in order to influence various decisionmakers and parties.
While their ultimate goal remains the fragmentation of institutions
such as the EU and NATO, Russia hopes to achieve incremental victories
like influencing the EU's upcoming decision on whether or not to renew
sanctions against them.
As president of the NATO Parliamentary Assembly and chair of the
Assembly's U.S. delegation, I have had the opportunity to meet
frequently with my European counterparts to discuss this issue. In all
instances, Assembly members continue to validate and echo the concerns
discussed here today. Only through an increased understanding can we
begin to effectively plan and combat President Putin and a resurging
Russia.
I ask all of my colleagues to rise in support of this bipartisan
amendment, and I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I rise in opposition, even though I am not
opposed.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. SCHIFF. Mr. Chairman, I want to thank the gentlemen from Ohio,
Alabama, and New York for their amendment, which I am proud to support.
This amendment requires the Director of National Intelligence to
provide an assessment on funding of political parties and NGOs in the
former Soviet states and countries in Europe by the Russian Federation
and its security and intelligence services.
Over the past few years, we have witnessed a number of highly
visible, aggressive actions by Russia, particularly in Ukraine; but
Moscow's efforts to destabilize its neighbors are also subtler and more
nefarious. Russia is sponsoring and funding political parties to groom
the next generation of puppets which they can control from Moscow.
We must better understand what they are doing, even if what they are
doing is very deep behind the scenes; so long as sources and methods
are properly protected, I support this effort.
Again, I want to thank my colleagues for their work, and I urge
support of the amendment.
I yield back the balance of my time.
Mr. TURNER. Mr. Chairman, as the chairman well remembers, with the
cold war, there was a time when the conflict between the United States
and Russia was very tense. This amendment will help us bring to bear
light on the actions of Russia so that we can make certain our policies
reflect the new aggressiveness of the Russian Federation.
Mr. NUNES. Will the gentleman yield?
Mr. TURNER. I yield to the gentleman from California.
[[Page H4412]]
Mr. NUNES. I really appreciate the gentleman. He is one of the most
involved Members of Congress with NATO, so I know that his concerns are
valid. I, too, share those concerns and would urge my colleagues to
support the amendment.
Mr. TURNER. Mr. Chairman, I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Ohio (Mr. Turner).
The amendment was agreed to.
Amendment No. 10 Offered by Mr. Farr
The CHAIR. It is now in order to consider amendment No. 10 printed in
House Report 114-155.
Mr. FARR. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
At the end of subtitle C of title III, add the following
new section:
SEC. 3__. REPORT ON CONTINUOUS EVALUATION OF SECURITY
CLEARANCES.
Not later than 120 days after the date of the enactment of
this Act, the Director of National Intelligence shall submit
to the congressional intelligence committees and the
congressional defense committees (as defined in section
101(a)(16) of title 10, United States Code) a report on the
continuous evaluation of security clearances of employees,
officers, and contractors of the intelligence community. The
report shall include the following:
(1) The status of the continuous evaluation program of the
intelligence community, including a timeline for the
implementation of such program.
(2) A comparison of such program to the automated
continuous evaluation system of the Department of Defense.
(3) Identification of any possible efficiencies that could
be achieved by the intelligence community leveraging the
automated continuous evaluation system of the Department of
Defense.
The CHAIR. Pursuant to House Resolution 315, the gentleman from
California (Mr. Farr) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from California.
Mr. FARR. Mr. Chairman, today, I rise to offer an amendment which
strengthens the process for granting security clearances to those
working in the intelligence community through a continuous evaluation
process.
This amendment directs the National Intelligence Director to provide
the intelligence and defense committees a report on the status of its
current efforts for continuous evaluation of security clearance
holders, including a timeline for its rollout. The report will also
provide a cost-benefit analysis of DNI's efforts to similar efforts
that are being carried on in the Department of Defense.
We learned, after the tragic shooting in the Navy Yard in September
2013, the DOD should continuously evaluate these personnel, rather than
do it every once every 5 years.
Clearance starts by an initial vetting that determines a person's
suitability and eligibility to have access to classified material by
examining the person's past and making a judgment on future
reliability. Now, once cleared, a continuous evaluation process is
designed to examine a person's behavior to ensure its continued
reliability.
Congress directed the DOD to create a process that would be a
governmentwide solution for continuous personnel security evaluations.
This solution is called ACES, Automated Continuous Evaluation System.
Now, the Director of National Intelligence is also seeking its own
capability for continuous evaluation. While I support the intelligence
community's requirement, their efforts may be redundant.
DOD's system already has measurable successes. Their system is also
flexible enough to be tailored to meet any specific requirements that
the intelligence community may need.
My amendment simply assures that the DNI does not work towards a
continuous evaluation system in a vacuum. By working together to share
lessons learned or build a common evaluation system, the DNI and the
DOD can build a better program that ensures our national security and
uses taxpayer dollars effectively.
As we have all seen recently, the insider threat to our national
security is real. We must continue to ensure that we remain secure by
only granting security clearances to those who are suitable and
reliable.
I ask for an ``aye'' vote on the amendment, and I reserve the balance
of my time.
Mr. NUNES. Mr. Chairman, I claim the time in opposition, although I
am not opposed.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. NUNES. Mr. Chairman, I am prepared to accept the amendment.
I yield back the balance of my time.
Mr. FARR. Mr. Chairman, I yield 1 minute to the gentleman from
California (Mr. Schiff), my colleague, the ranking member of the
Intelligence Committee.
Mr. SCHIFF. Mr. Chairman, I want to thank the gentleman and my good
friend from California for his amendment, which I am very happy to
support.
An important role of Congress and of this bill is to ensure that our
intelligence agencies protect sensitive information and protect
taxpayer dollars.
This amendment supports both of these goals by requiring that the
Office of the Director of National Intelligence report to Congress on
its continuous evaluation process for security clearances and to
compare those processes to those the Department of Defense uses. This
comparative study will help identify places where we may be able to
make improvements and save money.
I want to thank Mr. Farr for his amendment and his diligence.
Mr. FARR. Mr. Chairman, I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from California (Mr. Farr).
The amendment was agreed to.
amendment no. 11 offered by ms. sinema
The CHAIR. It is now in order to consider amendment No. 11 printed in
House Report 114-155.
Ms. SINEMA. Mr. Chairman, I have an amendment at the desk, and I
offer that amendment at this time.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 42, after line 12, insert the following:
SEC. 336. REPORT ON STRATEGY, EFFORTS, AND RESOURCES TO
DETECT, DETER, AND DEGRADE ISLAMIC STATE
REVENUE MECHANISMS.
(a) Sense of Congress.--It is the sense of Congress that
the intelligence community should dedicate necessary
resources to defeating the revenue mechanisms of the Islamic
State.
(b) Report.--Not later than 90 days after the date of the
enactment of this Act, the Director of National Intelligence
shall submit to the intelligence committees a report on the
strategy, efforts, and resources of the intelligence
community that are necessary to detect, deter, and degrade
the revenue mechanisms of the Islamic State.
The CHAIR. Pursuant to House Resolution 315, the gentlewoman from
Arizona (Ms. Sinema) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentlewoman from Arizona.
Ms. SINEMA. Mr. Chairman, I yield myself such time as I may consume.
I want to say thank you to Mr. Fitzpatrick for cosponsoring this
amendment and for his leadership as the chairman of the Task Force to
Investigate Terrorism Financing. Thank you also to Chairman Nunes and
Ranking Member Schiff for supporting this important amendment.
The purpose of the bipartisan Sinema-Fitzpatrick amendment is to
choke off the Islamic State's revenue stream. Our amendment directs the
intelligence community to detect, deter, and degrade Islamic State's
revenue sources and to report on the strategy and resources needed for
success.
The Islamic State is one of the world's most violent and dangerous
terrorist groups. Its goals to build a caliphate in the Middle East and
encourage attacks in Europe and the United States represent a new
threat to our country and to global stability.
ISIL is also believed to be the richest terrorist organization in
history, controlling a huge territory in Iraq and Syria containing
significant oil resources. In 2014, the Islamic State generated
approximately $1 million per day through the sale of smuggled oil,
extortion, and kidnapping for ransom.
U.S. strikes have reportedly diminished ISIL's oil revenues, but the
breadth of this terrorist organization's
[[Page H4413]]
funding sources represents a serious challenge to our national
security.
A February report by the Financial Action Task Force estimated that
ISIL now largely finances itself through extortion in the territory it
controls, and another study places this extortion revenue at $360
million per year. In Iraq, ISIL levies a 5 percent tax on all
withdrawals from banks, and the organization also gains tens of
millions of dollars from kidnapping on an annual basis.
To defeat ISIL and protect our country, we must cut off the Islamic
State's diverse and substantial sources of revenue.
I encourage my colleagues to support this commonsense bipartisan
amendment.
Mr. Chairman, I reserve the balance of my time.
Mr. NUNES. Mr. Chairman, I claim the time in opposition, although I
do not intend to oppose the amendment.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. NUNES. Mr. Chairman, at this time, I yield 3 minutes to the
gentleman from Pennsylvania (Mr. Fitzpatrick).
Mr. FITZPATRICK. Mr. Chairman, I thank the chairman, and I thank my
colleague Ms. Sinema for her work on this important amendment and for
her work as well on the task force established to investigate terrorism
financing.
Today, the terror threat faced by our Nation and our intelligence
community is more diverse and sophisticated than it has ever been
before. Organizations like Hezbollah, ISIS, and Boko Haram can no
longer simply be considered terrorist groups.
They have grown into much more dangerous entities, ones with the
abilities to self-finance their actions through means far beyond
traditional methods, from illicit oil sales and human trafficking to
regional taxation and antiquity dealing.
In order to effectively combat such evolved threats, U.S. policy must
also evolve. As chair of the bipartisan Task Force to Investigate
Terrorism Financing, established by the Committee on Financial
Services, I have worked with lawmakers and policy experts to guarantee
the U.S. response to terror's new revenue streams are quickly and
effectively choked out.
This amendment is important to ensure each level of our government,
from Congress to the intelligence community, has identified the
problem, as well as potential weaknesses, and is ready to address the
threats that we face.
By both expressing the sense of Congress that our intelligence
agencies must dedicate resources to eradicate terror revenue
mechanisms, as well as report to relevant committees on their
strategies, this amendment strengthens the underlying bill and
Congress' understanding of our global response to terrorism.
The threat to freedom and democracy posed by the Islamic State and
groups like it circles the globe, and the United States can ill afford
to combat these enemies on the battlefield alone. Any strategy against
terror groups worldwide must attack not only militarily, but at their
funding source. Organizations, no matter how complex, cannot
effectively function without requisite resources.
Mr. Chairman, our intelligence community is second to none, and I am
certain that, together, we can formulate and carry out long-term
solutions to combat terror financing.
I thank the chairman for his leadership on this issue and Ms. Sinema
for offering this amendment.
Ms. SINEMA. Mr. Chairman, I yield 1 minute to the gentleman from
California, Ranking Member Schiff, and thank him for his leadership on
national security issues.
Mr. SCHIFF. Mr. Chairman, I want to thank the gentlewoman from
Arizona for her amendment, as well as the gentleman from Pennsylvania.
I am proud to support it.
Behind ISIL's rapid and dangerous rise are its many sources of
illicit funding. This amendment expresses the conviction of Congress
that the intelligence community should dedicate resources to finding
and eliminating those revenue sources and that the IC must report on
its effort to do so.
Again, I want to thank both of my colleagues for their leadership on
this issue, and I urge strong support of their amendment.
Mr. NUNES. Mr. Chairman, at this time, I yield 1 minute to the
gentleman from North Carolina (Mr. Pittenger).
Mr. PITTENGER. Mr. Chairman, I rise in support of this amendment and
congratulate Ms. Sinema and Mr. Fitzpatrick, the chairman of the
committee. This will help our terrorism task force efforts undermine
the funding of ISIS.
Terrorism experts concur that ISIS is the most well-funded terrorist
threat that we have ever faced. Through the illicit sale of stolen oil
and antiquities, kidnapping for ransom, extortion, bank robberies, and
usurious taxation, ISIS continues to amass tens of millions of dollars.
Stopping this flow of money to terrorists must be a top priority if
we are to defeat ISIS. Unfortunately, earlier this month, the President
admitted he does not have a comprehensive strategy to defeat ISIS.
This amendment will require the Director of National Intelligence to
submit to Congress the current efforts they use to undermine the
funding of ISIS, increasing our ability to ensure these efforts are a
priority.
I urge my colleagues to support this amendment. I will look forward
to the continued bipartisan support of the Financial Services Task
Force to Investigate Terrorism Financing.
{time} 1530
Ms. SINEMA. Mr. Chair, as a member of the Task Force to Investigate
Terrorism Financing, I am working with my colleagues on both sides of
the aisle to keep money out of the hands of terrorists and to find
solutions like this amendment, which strengthens America's security.
Again, I would like to thank Mr. Fitzpatrick for his partnership and
leadership on this issue. I also thank Chairman Nunes, Ranking Member
Schiff, and Mr. Pittenger for their work on this important legislation.
I yield back the balance of my time.
Mr. NUNES. Mr. Chair, we are prepared to support the amendment.
I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the
gentlewoman from Arizona (Ms. Sinema).
The amendment was agreed to.
Amendment No. 12 Offered by Mr. Crowley
The CHAIR. It is now in order to consider amendment No. 12 printed in
House Report 114-155.
Mr. CROWLEY. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 42, after line 12, insert the following:
SEC. 336. REPORT ON NATIONAL SECURITY COOPERATION BETWEEN
UNITED STATES, INDIA, AND ISRAEL.
Not later than 180 days after the date of the enactment of
this Act, the Director of National Intelligence shall submit
to the congressional intelligence committees a report on
possibilities for growing national security cooperation
between the United States, India, and Israel.
The CHAIR. Pursuant to House Resolution 315, the gentleman from New
York (Mr. Crowley) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from New York.
Mr. CROWLEY. Mr. Chairman, I yield myself such time as I may consume.
I rise today to urge my colleagues to support this bipartisan
amendment.
I appreciate the support of my colleagues from California, Ohio,
North Carolina, Arizona, and New York, who are coleaders on this
effort. They are Mr. Bera, Mr. Engel, Mr. Nadler, Mr. Chabot, Mr.
Schweikert, and Mr. Holding. I also thank the chairman and ranking
member of the Intelligence Committee for their support of this
amendment.
This amendment is about expanding the cooperation between the world's
oldest democracy, the world's largest democracy, and a true democracy
within the Middle East. That is the United States, India, and Israel.
In recent years, the United States has expanded relations with Israel,
as well as with India, in a number of areas.
We have also seen India and Israel work more and more together on a
bilateral basis. Of course, that is because a lot of their interests
overlap, but it is
[[Page H4414]]
also because many of our values overlap.
There is so much that our three countries can be doing together in
the realm of scientific cooperation, research, best practices, national
security implementation, defense, and much, much more.
There is also a lot that we can learn from each other, whether it is
about drip irrigation to build food supplies, desalinization to address
water shortages, or refrigeration practices to prevent the kind of food
spoilage that leads to hunger, not to mention how much potential there
is in technological research and economic development.
This amendment, of course, just deals with a narrow portion of these
areas because the underlying bill is limited to security issues, but it
is a needed start.
I truly believe that the United States-India relationship has the
potential to be the world's most important ``big country'' relationship
in the 21st century. As our ties with India grow, it is important to
see the India-Israel ties increasing as well.
Here in the United States, as a former co-chair of the Congressional
Caucus on India and Indian Americans, I have met with many members of
the Indian American community, and I have consistently heard from
visiting members of India's Government that there is a genuine desire
to expand relations between India and Israel now and in the future.
In fact, it has already been reported that, in the coming months,
India's Prime Minister will become the first-ever Indian Prime Minister
to travel to Israel. We are going to see the leader of what will be the
world's most populous nation visiting and engaging with one of the
smallest nations.
The sky is really the limit on this effort going forward, and that is
why the amendment asks the Director of National Intelligence to submit
to Congress a plan on how to grow the U.S.-India-Israel national
security relationship. This is a real possibility, and I hope the DNI
can identify a solid number of ways to work together even more in the
future.
I reserve the balance of my time.
Mr. NUNES. Mr. Chair, I claim the time in opposition, although I do
not intend to oppose the amendment.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. NUNES. Mr. Chair, Mr. Holding was just here, but unfortunately,
he got called away to another meeting because I know he worked closely
with Mr. Crowley and others as chair of the India Caucus, and he wanted
me to express his strong support for this amendment. I also urge my
colleagues to support the amendment.
I yield back the balance of my time.
Mr. CROWLEY. Mr. Chair, I yield 1 minute to the gentleman from
California (Mr. Schiff).
Mr. SCHIFF. I thank the gentleman for yielding.
Mr. Chair, working with international partners is an essential
element of the IC's mission to understand the global threat
environment, as well as the political, social, and economic trends
around the world.
For nearly 70 years, Israel has been a close friend and ally, as well
as a vital source of intelligence about the world's most volatile
region. In recent years, India, the world's largest democracy, has
upgraded its bilateral relationships with both the United States and
Israel. Given India's complex relationship with both Pakistan and
China, exploring the potential for enhanced trilateral intelligence
cooperation is very much in our interest.
Mr. Crowley's amendment to direct the DNI to report to Congress on
the potential for intelligence sharing is timely, and I urge the House
to support it.
Mr. CROWLEY. Mr. Chairman, again, let me thank Mr. Nunes, the chair
of the committee, as well as the ranking member, Mr. Schiff, for their
support of this valuable amendment.
I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from New York (Mr. Crowley).
The amendment was agreed to.
Amendment No. 13 Offered by Mr. Wilson of South Carolina
The CHAIR. It is now in order to consider amendment No. 13 printed in
House Report 114-155.
Mr. WILSON of South Carolina. Mr. Chairman, I have an amendment at
the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 42, after line 12, insert the following:
SEC. 336. CYBER ATTACK STANDARDS OF MEASUREMENT STUDY.
(a) Study Required.--The Director of National Intelligence,
in consultation with the Secretary of Homeland Security, the
Director of the Federal Bureau of Investigation, and the
Secretary of Defense, shall carry out a study to determine
appropriate standards that--
(1) can be used to measure the damage of cyber incidents
for the purposes of determining the response to such
incidents; and
(2) include a method for quantifying the damage caused to
affected computers, systems, and devices.
(b) Reports to Congress.--
(1) Preliminary findings.--Not later than 180 days after
the date of the enactment of this Act, the Director of
National Intelligence shall provide to the Committee on Armed
Services, the Committee on Homeland Security and Governmental
Affairs, and the Select Committee on Intelligence of the
Senate and the Committee on Armed Services, the Committee on
Homeland Security, and the Permanent Select Committee on
Intelligence of the House of Representatives the initial
findings of the study required under subsection (a).
(2) Report.--Not later than 360 days after the date of the
enactment of this Act, the Director of National Intelligence
shall submit to the Committee on Armed Services, the
Committee on Homeland Security and Governmental Affairs, and
the Select Committee on Intelligence of the Senate and the
Committee on Armed Services, the Committee on Homeland
Security, and the Permanent Select Committee on Intelligence
of the House of Representatives a report containing the
complete findings of such study.
(3) Form of report.--The report required by paragraph (2)
shall be submitted in unclassified form, but may contain a
classified annex.
The CHAIR. Pursuant to House Resolution 315, the gentleman from South
Carolina (Mr. Wilson) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from South Carolina.
Mr. WILSON of South Carolina. Mr. Chairman, I am grateful for
Chairman Nunes and the House Permanent Select Committee on Intelligence
for their leadership on this important legislation.
I am particularly grateful that I was here to hear the presentation
by Congressman Joe Crowley relative to promoting a better relationship
with the world's largest democracy, India, by the world's oldest
democracy, the United States.
He and I have served as the past co-chairs of the Caucus of India and
Indian Americans, and I know of his commitment to promoting a better
relationship between India and the United States.
Last week, the Office of Personnel Management revealed they were the
targets of an extended cyber attack on Federal employee personnel
records. These attacks stole personal data, such as Social Security
numbers, financial information, and security clearance documents,
putting the personal and financial security of our citizens at risk.
This cyber attack was not a novelty. Recently, we have seen a growing
number of cyber attacks on government Web sites, national retailers,
and small businesses. Indeed, according to Symantec, most businesses
reported a completed or an attempted cyber attack in the last year, and
60 percent of those facing an attack were small- or medium-sized
businesses. These cyber attacks are a sober reminder to Congress that
all government agencies need to work together to better protect their
public and private networks.
After each of these attacks, we have had a number of questions: Who
is behind it? Is it an agent of a foreign government or a nonstate
actor? How many records were affected? What kind of information was
accessed?
As of now, we gather this information through various government
agencies, and each uses a different measure to assess and quantify the
damage of the attack, so we waste valuable time and resources when
trying to piece together a response.
We need a clear, unified system of measurement for cyber attacks that
can be used across all government agencies and military branches. By
putting government agencies and branches of the military on the same
[[Page H4415]]
page, we can have an effective and rapid response.
This amendment directs the Director of National Intelligence, in
consultation with the Secretary of Homeland Security, the Director of
the FBI, and the Secretary of Defense, to conduct a study to define a
method of measuring a cyber incident so we can determine an appropriate
response.
As chairman of the House Armed Services Subcommittee on Emerging
Threats and Capabilities, it is apparent that cyber is a new domain of
warfare. This amendment is a critical first step in building a more
comprehensive cyber defense system.
I yield back the balance of my time.
Mr. SCHIFF. Mr. Chairman, I rise in opposition even though I am not
opposed.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. SCHIFF. Mr. Chairman, I would like to thank the gentleman from
South Carolina for his important amendment.
There is a limit to how effective a defensive cyber strategy can be
because, while we have to defend everything at all times, our
adversaries get to attack everywhere and need to be successful only
once, so we need to create a more effective deterrent, which this
amendment will help further.
It would require that the Office of the Director of National
Intelligence report to Congress on how we measure cyber attacks so that
we can know how best to respond once we are attacked or to communicate
in advance how we would respond if we were attacked. Measuring the
scale and effects of cyber attacks is no easy task, especially as we
must factor in second and third order effects.
I want to thank Mr. Wilson for his amendment. I am proud to support
it.
I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from South Carolina (Mr. Wilson).
The amendment was agreed to.
Amendment No. 14 Offered by Mr. Poe of Texas
The CHAIR. It is now in order to consider amendment No. 14 printed in
House Report 114-155.
Mr. POE of Texas. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 42, after line 12, insert the following:
SEC. 336. REPORT ON WILDLIFE TRAFFICKING.
(a) Reports Required.--Not later than 365 days after the
date of the enactment of this Act, the Director of National
Intelligence shall submit to the congressional committees
specified in subsection (b) a report on wildlife trafficking.
(b) Specified Members and Committees of Congress.--The
congressional committees specified in this subsection are the
following:
(1) Select Committee on Intelligence of the Senate.
(2) Committee on Foreign Relations of the Senate.
(3) Committee on Environment and Public Works of the
Senate.
(4) Permanent Select Committee on Intelligence of the House
of Representatives.
(5) Committee on Foreign Affairs of the House of
Representatives.
(6) Committee on Natural Resources of the House of
Representatives.
(c) Matters to Be Included.--The report submitted under
subsection (a) shall include each of the following:
(1) An assessment of the major source, transit, and
destination countries for wildlife trafficking products or
their derivatives and how such products or derivatives are
trafficked.
(2) An assessment of the efforts of those countries
identified as major source, transit, and destination
countries to counter wildlife trafficking and to adhere to
their international treaty obligations relating to endangered
or threatened species.
(3) An assessment of critical vulnerabilities that can be
used to counter wildlife trafficking.
(4) An assessment of the extent of involvement of
designated foreign terrorist organizations and transnational
criminal organizations in wildlife trafficking.
(5) An assessment of key actors and facilitators, including
government officials, that are supporting wildlife
trafficking.
(6) An assessment of the annual net worth of wildlife
trafficking globally and the financial flows that enables
wildlife trafficking.
(7) An assessment of the impact of wildlife trafficking on
key wildlife populations.
(8) An assessment of the effectiveness of efforts taken to
date to counter wildlife trafficking.
(9) An assessment of the effectiveness of capacity-building
efforts by the United States Government.
(10) An assessment of the impact of wildlife trafficking on
the national security of the United States.
(11) An assessment of the level of coordination between
United States intelligence and law enforcement agencies on
intelligence related to wildlife trafficking, the capacity of
those agencies to process and act on that intelligence
effectively, existing barriers to effective coordination, and
the degree to which relevant intelligence is shared with and
acted upon by bilateral and multilateral law enforcement
partners.
(12) An assessment of the gaps in intelligence capabilities
to assess transnational wildlife trafficking networks and
steps currently being taken, in line with the Implementation
Plan to the National Strategy for Combating Wildlife
Trafficking, to remedy such information gaps.
(d) Form.--The report required by subsection (a) shall be
submitted in unclassified form, but may include a classified
annex.
The CHAIR. Pursuant to House Resolution 315, the gentleman from Texas
(Mr. Poe) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from Texas.
Mr. POE of Texas. Mr. Chairman, I yield myself such time as I may
consume.
This amendment, cosponsored by the ranking member on the Terrorism,
Nonproliferation, and Trade Subcommittee, Mr. Keating from
Massachusetts, requires the Director of National Intelligence to
produce a report on wildlife trafficking, how terrorist organizations
are involved, how they are making money off of wildlife trafficking,
and the impact it has on U.S. national security.
During our Terrorism, Nonproliferation, and Trade Subcommittee
hearing on this very issue in February, we learned that rhinos and
elephants are on the path to extinction.
For example, back in the seventies, there were approximately 65,000
rhinos in Africa. Since then, about 1,000 a year have been killed, and
now, there are only 5,000 left in Africa. That is a 94 percent drop in
those rhinos. There are only five white rhinos in the whole world.
Elephants are not faring much better. From 2002 to 2010, the elephant
population across Africa dropped 66 percent. Back in the thirties and
forties, Mr. Chairman, there were approximately 5 million African
elephants. Now there are about a half a million African elephants.
One of the most famous was Satao in this photograph that was taken
last year. He was, presumably, the oldest elephant that was in
existence in Africa. He was killed last year for his tusks, which
almost touched the ground. In fact, National Geographic, a year ago
today, did an article on him and how he was killed for his tusks and
how other elephants are being killed for their tusks. He was about 46
years old when he was killed for those tusks.
The reason that poaching seems to be on the increase over the last
few years is that there is a low risk of apprehension, and it is easy
to commit these crimes. Also, even when someone is captured, penalties
for wildlife trafficking are far less than for drug trafficking.
Who uses these tusks? Who uses these rhino horns? The number one
country in the world that is the consumer of the illegal ivory trade is
China. Vietnam is the number one country in the world that uses the
illegal trade of rhino horns. This is where these tusks and these rhino
horns go, and it brings in a lot of money.
For example, a kilogram of rhino horns--if I remember my math
correctly, that is 2.2 pounds--sells for $60,000. So there is a lot
more money involved in the sale of rhino horns and of elephant tusks
than even of gold and platinum.
Overall, the illegal wildlife trade is about $10 billion to $20
billion a year. It should come as no surprise that terrorist
organizations are also involved in this criminal enterprise, like al
Qaeda's affiliate al Shabaab and like Joseph Kony's Lord's Resistance
Army. They are cashing in on the illegal wildlife trafficking.
It is getting so bad that the poachers have become very sophisticated
in the sense that they no longer just shoot elephants, for example,
because that makes a noise, that warns them. They are even being
poisoned. An elephant is poisoned, and the elephant dies.
Then, when people approach the elephant, they not only see the dead
elephant, but they see other animals that
[[Page H4416]]
were feeding on the carcass of the elephant, and they are all dead,
too, so that the poachers can get those tusks. They have become very
innovative.
{time} 1545
Local park rangers are underresourced; they are ill-equipped; and
some of them are corrupt as well. So we can't fight what we don't know.
There is a lot about this issue--and terrorist involvement in
wildlife trafficking--that is murky, so we need to find out, for
example: How much money do terrorists get from wildlife trafficking?
Who are the key facilitators of the trade? What government officials
are complicit? What impact does this have on the U.S. national
security?
This amendment requires the Director of National Intelligence to
report to Congress on these and other questions. The better we
understand the threat, the better we understand what is happening and
how terrorists are involved in the illegal killing of rhinos and
elephants, the more effective we can be against fighting those
terrorists. And that is just the way it is.
I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I claim the time in opposition, even though
I am not opposed.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. SCHIFF. Mr. Chairman, I want to thank the gentlemen from Texas
and Massachusetts for their amendment, which I am proud to support.
The trafficking of wildlife by terrorist organizations is an
important issue, not only because it threatens to wipe out elephants,
rhinos, and tigers, but also because it could threaten our national
security. The World Wildlife Fund estimates that the amount of money
generated by wildlife trafficking trade reaches into the hundreds of
millions of dollars, and much of this goes to fund terrorists,
including The Lord's Resistance Army, al-Shabaab, and Boko Haram. That
is money going into the coffers of those who every day seek to harm us
and others.
We must put our intelligence professionals to the task. We must
understand from beginning to end how terrorists acquire, transfer, and
profit from wildlife trafficking. This is the first step to putting an
end to it.
Again, I want to thank my colleagues for offering this amendment. I
urge support.
I yield back the balance of my time.
Mr. POE of Texas. I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Texas (Mr. Poe).
The amendment was agreed to.
Amendment No. 15 Offered by Mr. Poe of Texas
The CHAIR. It is now in order to consider amendment No. 15 printed in
House Report 114-155.
Mr. POE of Texas. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 42, after line 12, insert the following:
SEC. 336. REPORT ON TERRORIST USE OF SOCIAL MEDIA.
(a) Report Required.--Not later than 180 days after the
date of the enactment of this Act, the Director of National
Intelligence shall submit to the congressional committees
specified in subsection (b) a report that represents the
coordinated assessment of the intelligence community on
terrorist use of social media.
(b) Specified Members and Committees of Congress.--The
congressional committees specified in this subsection are the
following:
(1) Select Committee on Intelligence of the Senate.
(2) Committee on Foreign Relations of the Senate.
(3) Committee on Judiciary of the Senate.
(4) Committee on Homeland and Government Affairs of the
Senate.
(5) Permanent Select Committee on Intelligence of the House
of Representatives.
(6) Committee on Foreign Affairs of the House of
Representatives.
(7) Committee on Judiciary of the House of Representatives.
(8) Committee on Homeland Security of the House of
Representatives.
(c) Matters to Be Included.--The report submitted under
subsection (a) shall include each of the following:
(1) An assessment of what role social media plays in
radicalization in the United States and elsewhere.
(2) An assessment of how terrorists and terrorist
organizations are using social media, including trends.
(3) An assessment of the intelligence value of social media
posts by terrorists and terrorist organizations.
(4) An assessment of the impact on the national security of
the United States of the public availability of terrorist
content on social media for fundraising, radicalization, and
recruitment.
(d) Form.--The report required by subsection (a) shall be
submitted in unclassified form, but may include a classified
annex.
The CHAIR. Pursuant to House Resolution 315, the gentleman from Texas
(Mr. Poe) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from Texas.
Mr. POE of Texas. Mr. Chairman, I yield myself such time as I may
consume.
Mr. Chairman, terrorists' use of social media has exploded over the
past several years. A recent study by The Brookings Institution found
that ISIS had over 40,000 Twitter accounts. Terrorist groups from ISIS
to the Taliban use social media platforms to recruit, to radicalize, to
spread propaganda, and to raise money. I have seen fan pages for the
Khorasan Group, an online press conference held on Twitter by the al
Qaeda branch in Yemen, and we all remember al-Shabaab live tweeting the
murder of 72 people in Kenya. All terrorist groups.
The benefits of social media are clear. Social media is easy to use,
it is free, and it reaches huge audiences across the world. We need to
better understand why terrorists' use of social media is effective and
what impact it is having on the world.
This bipartisan amendment is cosponsored by the ranking member on our
Subcommittee on Terrorism, Nonproliferation, and Trade, Mr. Keating
from Massachusetts. This amendment requires the Director of National
Intelligence to assess four parts of the social media problem: First,
what role does social media play in radicalizing people in the United
States and abroad?
The rise of the lone wolf terrorism in recent years has been fueled,
in part, by terrorists' use of social media. Just recently, in Garland,
Texas, two individuals claiming ISIS connections were killed while they
were attacking an assembly on free speech and peaceable assembly of
religion. Evidence shows that they had some social connection, social
media connection with ISIS. The Boston bombers made two pressure cooker
bombs. The recipes for those bombs were published before the attack in
al Qaeda's Inspire magazine. That magazine was released and promoted on
social media.
Second, how exactly are terrorists using social media? Social media
is constantly evolving, just like terrorists' use of social media
platforms. Following online trends is an essential element in putting
resources where they have the most impact. We need to make fast-paced
improvements in this area as new trends and platforms emerge.
Third, what is the real intelligence value of terrorists' posts? In
2012, a number of my colleagues and I sent a letter to the FBI asking,
What intelligence value is terrorists' use of social media? The FBI has
not come up with an answer. We need a detailed understanding from the
whole intelligence community on just how valuable the intelligence is
that we are getting from terrorists' use of social media.
Finally, how does online fundraising, radicalization, and recruitment
by terrorists impact U.S. national security? We know social media is a
valuable tool to the terrorists just by how often they use it.
Unfortunately, the United States is way behind on countering
terrorists' use of social media, so we should do more. Terrorists like
ISIS are out to destroy us. We have to fight to defeat them on every
battlefield, and that includes in social media.
I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I claim the time in opposition, even though
I am not opposed.
The CHAIR. Without objection, the gentleman from California is
recognized for 5 minutes.
There was no objection.
Mr. SCHIFF. Mr. Chairman, social media, like any other form of
communication, can be exploited by bad actors for nefarious purposes.
While we are lucky to live in a time of remarkable innovation that
brings us closer to
[[Page H4417]]
one another no matter what our geographical distance may be, our
adversaries use the same tools to spread hateful and dangerous messages
across the globe.
I, therefore, support this amendment that calls on the intelligence
community to provide Congress with greater information about how
terrorist organizations use social media for fundraising,
radicalization, and recruitment. Armed with that knowledge, we are more
capable of stopping them.
I yield back the balance of my time.
Mr. POE of Texas. I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Texas (Mr. Poe).
The amendment was agreed to.
Amendment No. 16 Offered by Mr. Poe of Texas
The CHAIR. It is now in order to consider amendment No. 16 printed in
House Report 114-155.
Mr. POE of Texas. Mr. Chairman, I have an amendment at the desk.
The CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 42, after line 12, insert the following:
SEC. 336. REPORT ON UNITED STATES COUNTERTERRORISM STRATEGY
TO DISRUPT, DISMANTLE, AND DEFEAT ISIL, AL-
QAEDA, AND THEIR AFFILIATED GROUPS, ASSOCIATED
GROUPS, AND ADHERENTS.
(a) Report.--
(1) In general.--Not later than 180 days after the date of
the enactment of this Act, the Director of National
Intelligence shall submit to the appropriate committees of
Congress a comprehensive report on the United States
counterterrorism strategy to disrupt, dismantle, and defeat
the Islamic State of Iraq and the Levant (ISIL), al-Qaeda,
and their affiliated groups, associated groups, and
adherents.
(2) Coordination.--The report required by paragraph (1)
shall be prepared in coordination with the Secretary of
State, the Secretary of the Treasury, the Attorney General,
and the Secretary of Defense, and the head of any other
department or agency of the United States Government that has
responsibility for activities directed at combating ISIL, al-
Qaeda, and their affiliated groups, associated groups, and
adherents.
(3) Elements.--The report required by paragraph (1) shall
include each of the following:
(A) A definition of--
(i) al-Qaeda core, including a list of which known
individuals constitute al-Qaeda core;
(ii) ISIL, including a list of which known individuals
constitute ISIL leadership;
(iii) an affiliated group of ISIL or al-Qaeda, including a
list of which known groups constitute an affiliate group of
ISIL or al-Qaeda;
(iv) an associated group of ISIL or al-Qaeda, including a
list of which known groups constitute an associated group of
ISIL or al-Qaeda;
(v) an adherent of ISIL or al-Qaeda, including a list of
which known groups constitute an adherent of ISIL or al-
Qaeda; and
(vi) a group aligned with ISIL or al-Qaeda, including a
description of what actions a group takes or statements it
makes that qualify it as a group aligned with ISIL or al-
Qaeda.
(B) An assessment of the relationship between all
identified ISIL or al-Qaeda affiliated groups, associated
groups, and adherents with ISIL leadership or al-Qaeda core.
(C) An assessment of the strengthening or weakening of ISIL
or al-Qaeda, its affiliated groups, associated groups, and
adherents, from January 1, 2010, to the present, including a
description of the metrics that are used to assess
strengthening or weakening and an assessment of the relative
increase or decrease in violent attacks attributed to such
entities.
(D) An assessment of whether or not an individual can be a
member of al-Qaeda core if such individual is not located in
Afghanistan or Pakistan.
(E) An assessment of whether or not an individual can be a
member of al-Qaeda core as well as a member of an al-Qaeda
affiliated group, associated group, or adherent.
(F) A definition of defeat of ISIL or core al-Qaeda.
(G) An assessment of the extent or coordination, command,
and control between ISIL or core al-Qaeda and their
affiliated groups, associated groups, and adherents,
specifically addressing each such entity.
(H) An assessment of the effectiveness of counterterrorism
operations against ISIL or core al-Qaeda, their affiliated
groups, associated groups, and adherents, and whether such
operations have had a sustained impact on the capabilities
and effectiveness of ISIL or core al-Qaeda, their affiliated
groups, associated groups, and adherents.
(4) Form.--The report required by paragraph (1) shall be
submitted in unclassified form, but may include a classified
annex.
(b) Appropriate Committees of Congress Defined.--In this
section, the term ``appropriate committees of Congress''
means--
(1) the Permanent Select Committee on Intelligence, the
Committee on Foreign Affairs, and the Committee on Armed
Services of the House of Representatives; and
(2) the Select Committee on Intelligence, the Committee on
Foreign Relations, and the Committee on Armed Services of the
Senate.
The CHAIR. Pursuant to House Resolution 315, the gentleman from Texas
(Mr. Poe) and a Member opposed each will control 5 minutes.
The Chair recognizes the gentleman from Texas.
Mr. POE of Texas. Mr. Chairman, I yield myself such time as I may
consume.
Mr. Chairman, this amendment requires a strategy to defeat ISIS and
other like-minded groups. It is incredible that after 4 years of the
rise of ISIS, we still have to talk about needing a strategy, but here
we are.
Four years, Mr. Chairman, what is that? Well, in 4 years the United
States mobilized the whole country and had to fight two wars--one in
the Pacific and one in Europe--during World War II, and we were
successful in protecting the United States, but here after 4 years of
the rise of ISIS, we are not sure even what our strategy is.
One thing we do know: controlling land is a top priority for ISIS.
Its own credibility is wrapped up in the idea of establishing a
caliphate. Without land, ISIS has no caliphate. Without a caliphate,
ISIS loses its legitimacy among its hardcore fighters. Controlling land
is also how ISIS makes a lot of its money. See, ISIS extorts the people
that it controls. It also taxes them. ISIS is still bringing in
millions of dollars a day by other illegal activities.
The only way to stop that source of money is by taking back land that
ISIS controls. Because ISIS is embedded in civilian populations, U.S.
airstrikes are not enough to take the land back. The Iraqi Army is
still too unprofessional to show that they are up to the job, and we
have all seen ourselves how the Iraqis have dropped American weapons
and run. We have yet to give the Kurds the weapons they need to fight
for themselves, and we don't expect the dictator Assad to get the job
done.
The problem of ISIS is only getting bigger. Thousands of foreign
fighters are still streaming into Iraq and Syria from other countries.
Outside of Iraq and Syria, ISIS still has 10 networks, not including
Iraq and Syria. There are three in Libya, two in Saudi Arabia, and one
each in the Sinai, Nigeria, Yemen, Algeria, and one in Pakistan and
Afghanistan.
Saudi Arabia is known for its strong government control, but the ISIS
affiliate in Saudi Arabia recently pulled off two successful suicide
attack bombings in 2 weeks. Its affiliate in Yemen has taken advantage
of the fall of the government to take over more land. The ISIS
affiliate in Libya is running free in a lawless area throughout the
same country that killed our Ambassador and three other Americans. All
of ISIS' 10 networks are growing stronger, not weaker, by the day.
The President said last year that the United States would defeat and
dismantle ISIS. Well, here we are a year later; we still do not have
that strategy. That is at least according to the President himself last
week when he was meeting with the world leaders at the G7 summit. He
said: We do not yet have a complete strategy against ISIS.
This amendment requires the Director of National Intelligence to
report to Congress within 6 months a complete strategy to defeat ISIS
and other groups like it. The same amendment did pass unanimously last
year with this committee's support. So I ask Members to support it once
again this year and make it become the law of the land. Today's
terrorists control more land than they have at anytime since World War
II. We need a strategy; we need a plan; and we need it soon.
I reserve the balance of my time.
Mr. SCHIFF. Mr. Chairman, I rise in opposition to the amendment.
The CHAIR. The gentleman from California is recognized for 5 minutes.
Mr. SCHIFF. Mr. Chairman, it is critical that the United States
continue to refine and implement a comprehensive and aggressive
strategy to counter ISIL, al Qaeda, and their affiliates, but that
responsibility does not lie with the Director of National Intelligence.
The DNI's job is to ensure that our national leadership, who do
generate our counterterrorism strategy, have the timeliest, most
germane, and detailed information to be sure our strategy will be
successful.
Mr. Poe's amendment misclassifies that responsibility and
misconstrues
[[Page H4418]]
the important role of the Director of National Intelligence. Our
intelligence community must be free to collect and assess intelligence
outside of the scope of political decisions to be sure their analysis
remains impartial and objective.
So, reluctantly, I must oppose this amendment and urge my colleagues
to do the same.
I reserve the balance of my time.
Mr. POE of Texas. The amendment does state that the Director of
National Intelligence will work with other appropriate agencies.
Mr. Chairman, it is hard to fathom that this Nation does not have a
plan to deal with ISIS. This amendment says Congress will move forward
and expect and put into law that we will have a plan; we will have a
strategy; and if the Director of National Intelligence is not an
individual who is supposed to help form that plan, then I don't know
who would be.
I would ask that this amendment be adopted.
I yield back the balance of my time.
Mr. SCHIFF. Mr. Chairman, with respect to my colleague, we have a
strategy with respect to defeating al Qaeda and ISIL, with respect to
the war in Syria and Iraq. It is a comprehensive strategy and, frankly,
it is a difficult strategy to implement. It is a strategy that involves
cutting off terrorism financing. It is a strategy that involves cutting
off the flow of foreign fighters into Syria and Iraq. It is a strategy
that involves drying up the resources, the propaganda, the attacking of
the recruitment mechanism of ISIS. It is a strategy that involves
enlisting the support of our partners in the region and within the
Islamic world to combat the perversion of their faith that is used to
recruit people to this jihad. It is a strategy that is also military in
character, that employs our air assets, that seeks to train and assist
Iraqi forces. So we have a strategy. It is comprehensive, and it is
tough.
While I recognize that there is frustration that many of my
colleagues have that our strategy has thus far not borne more success--
and I share that frustration--I have yet to hear any of my colleagues
offer an alternative. It is one thing to bash the administration
because you don't like the strategy; it is another to ignore the fact
that we have a strategy or to propose improvements to it.
But the subject matter of this amendment is whether the top
intelligence official in the country should be charged with the
responsibility of developing the policy to defeat ISIS, and I think it
is rather his responsibility to make sure that the policymakers in
Congress and the administration have the very best intelligence to
inform those decisions.
We see, frankly, this misunderstanding of the role of the
intelligence community many times even in our committee when committee
members will ask witnesses from the intelligence community to state
policy positions on how they think certain policies should be
implemented when that is really not their responsibility.
Here, much as I concur with the need to perfect our strategy, improve
our strategy, and the execution of that strategy, I don't believe that
this is something that we should lay at the feet of the Director of
National Intelligence.
I urge a ``no'' vote on the amendment.
I yield back the balance of my time.
{time} 1600
Mr. POE of Texas. I don't have anything to say, believe it or not,
Mr. Chairman, so I yield back the balance of my time.
The CHAIR. The question is on the amendment offered by the gentleman
from Texas (Mr. Poe).
The amendment was agreed to.
Mr. NUNES. Mr. Chair, I move that the Committee do now rise.
The motion was agreed to.
Accordingly, the Committee rose; and the Speaker pro tempore (Mr. Poe
of Texas) having assumed the chair, Mr. Bishop of Utah, Chair of the
Committee of the Whole House on the state of the Union, reported that
that Committee, having had under consideration the bill (H.R. 2596) to
authorize appropriations for fiscal year 2016 for intelligence and
intelligence-related activities of the United States Government, the
Community Management Account, and the Central Intelligence Agency
Retirement and Disability System, and for other purposes, had come to
no resolution thereon.
____________________
[Congressional Record Volume 161, Number 96 (Tuesday, June 16, 2015)]
[House]
[Pages H4418-H4421]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]
INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2016
The SPEAKER pro tempore. Pursuant to House Resolution 315 and rule
XVIII, the Chair declares the House in the Committee of the Whole House
on the state of the Union for the further consideration of the bill,
H.R. 2596.
Will the gentleman from Texas (Mr. Poe) kindly take the chair.
{time} 1701
In the Committee of the Whole
Accordingly, the House resolved itself into the Committee of the
Whole House on the state of the Union for the further consideration of
the bill (H.R. 2596) to authorize appropriations for fiscal year 2016
for intelligence and intelligence-related activities of the United
States Government, the Community Management Account, and the Central
Intelligence Agency Retirement and Disability System, and for other
purposes, with Mr. Poe of Texas (Acting Chair) in the chair.
The Clerk read the title of the bill.
The Acting CHAIR. When the Committee of the Whole rose earlier today,
amendment No. 16 printed in House Report 114-155 offered by the
gentleman from Texas (Mr. Poe) had been disposed of.
Amendment No. 6 Offered by Mr. Schiff
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, the unfinished
business is the demand for a recorded vote on the amendment offered by
the gentleman from California (Mr. Schiff) on which further proceedings
were postponed and on which the noes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The vote was taken by electronic device, and there were--ayes 176,
noes 246, not voting 11, as follows:
[Roll No. 367]
AYES--176
Adams
Amash
Ashford
Bass
Beatty
Becerra
Bera
Beyer
Bishop (GA)
Blumenauer
Bonamici
Brady (PA)
Brown (FL)
Bustos
Butterfield
Capps
Capuano
Cardenas
Carney
Carson (IN)
Cartwright
Castor (FL)
Castro (TX)
Chu, Judy
Cicilline
Clark (MA)
Clarke (NY)
Clay
Cleaver
Clyburn
Cohen
Connolly
Conyers
Cooper
Costa
Courtney
Crowley
Cummings
Davis (CA)
Davis, Danny
DeFazio
DeGette
Delaney
DeLauro
DelBene
Deutch
Dingell
Doggett
Doyle, Michael F.
Duckworth
Duncan (TN)
Edwards
Ellison
Engel
Eshoo
Esty
Farr
Foster
Frankel (FL)
Fudge
Gabbard
Gallego
Garamendi
Grayson
Green, Al
Grijalva
Gutierrez
Hahn
Hastings
Heck (WA)
Higgins
Himes
Hinojosa
Honda
Hoyer
Huffman
Israel
Jackson Lee
Jeffries
Johnson (GA)
Johnson, E. B.
Jones
Kaptur
Keating
Kelly (IL)
Kennedy
Kildee
Kilmer
Kind
Kuster
Langevin
Larsen (WA)
Larson (CT)
Lawrence
Lee
Levin
Lewis
Lieu, Ted
Loebsack
Lofgren
Lowenthal
Lowey
Lujan Grisham (NM)
Lujan, Ben Ray (NM)
Lynch
Maloney, Carolyn
Massie
Matsui
McCollum
McDermott
McGovern
McNerney
Meeks
Meng
Moore
Moulton
Murphy (FL)
Nadler
Napolitano
Neal
Nolan
Norcross
O'Rourke
Pallone
Pascrell
Payne
Pelosi
Perlmutter
Peters
Peterson
Pingree
Pocan
Polis
Price (NC)
Quigley
Rangel
Rice (NY)
Richmond
Roybal-Allard
Rush
[[Page H4419]]
Ryan (OH)
Sanchez, Linda T.
Sanford
Sarbanes
Schakowsky
Schiff
Schrader
Scott (VA)
Scott, David
Serrano
Sherman
Sires
Slaughter
Smith (WA)
Speier
Swalwell (CA)
Takai
Takano
Thompson (CA)
Thompson (MS)
Titus
Tonko
Torres
Tsongas
Van Hollen
Vargas
Veasey
Vela
Velazquez
Visclosky
Walz
Wasserman Schultz
Waters, Maxine
Watson Coleman
Wilson (FL)
Yarmuth
NOES--246
Abraham
Aderholt
Aguilar
Allen
Amodei
Babin
Barletta
Barr
Barton
Benishek
Bilirakis
Bishop (MI)
Bishop (UT)
Black
Blackburn
Blum
Bost
Boustany
Brady (TX)
Brat
Bridenstine
Brooks (AL)
Brooks (IN)
Brownley (CA)
Buchanan
Buck
Bucshon
Burgess
Calvert
Carter (GA)
Carter (TX)
Chabot
Chaffetz
Clawson (FL)
Coffman
Cole
Collins (GA)
Collins (NY)
Comstock
Conaway
Cook
Costello (PA)
Cramer
Crawford
Crenshaw
Cuellar
Culberson
Curbelo (FL)
Davis, Rodney
Denham
Dent
DeSantis
DesJarlais
Diaz-Balart
Dold
Donovan
Duffy
Duncan (SC)
Ellmers (NC)
Emmer (MN)
Farenthold
Fincher
Fitzpatrick
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Garrett
Gibbs
Gibson
Gohmert
Goodlatte
Gosar
Gowdy
Graham
Granger
Graves (GA)
Graves (LA)
Graves (MO)
Green, Gene
Grothman
Guinta
Guthrie
Hanna
Hardy
Harper
Harris
Hartzler
Heck (NV)
Hensarling
Herrera Beutler
Hice, Jody B.
Hill
Holding
Hudson
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurd (TX)
Hurt (VA)
Issa
Jenkins (KS)
Jenkins (WV)
Johnson (OH)
Johnson, Sam
Jolly
Jordan
Joyce
Katko
Kelly (PA)
King (IA)
King (NY)
Kinzinger (IL)
Kirkpatrick
Kline
Knight
Labrador
LaMalfa
Lamborn
Lance
Latta
Lipinski
LoBiondo
Long
Loudermilk
Love
Lucas
Luetkemeyer
Lummis
MacArthur
Maloney, Sean
Marchant
Marino
McCarthy
McCaul
McClintock
McKinley
McMorris Rodgers
McSally
Meadows
Meehan
Messer
Mica
Miller (FL)
Miller (MI)
Moolenaar
Mooney (WV)
Mullin
Mulvaney
Murphy (PA)
Neugebauer
Newhouse
Noem
Nugent
Nunes
Olson
Palazzo
Palmer
Paulsen
Pearce
Perry
Pittenger
Pitts
Poe (TX)
Poliquin
Pompeo
Posey
Price, Tom
Ratcliffe
Reed
Reichert
Renacci
Ribble
Rice (SC)
Rigell
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rohrabacher
Rokita
Rooney (FL)
Ros-Lehtinen
Roskam
Ross
Rothfus
Rouzer
Royce
Ruiz
Ruppersberger
Russell
Ryan (WI)
Salmon
Scalise
Schweikert
Scott, Austin
Sensenbrenner
Shimkus
Shuster
Simpson
Sinema
Smith (MO)
Smith (NE)
Smith (NJ)
Smith (TX)
Stefanik
Stewart
Stivers
Stutzman
Thompson (PA)
Thornberry
Tiberi
Tipton
Trott
Turner
Upton
Valadao
Wagner
Walberg
Walden
Walker
Walorski
Walters, Mimi
Weber (TX)
Webster (FL)
Wenstrup
Westerman
Westmoreland
Whitfield
Williams
Wilson (SC)
Wittman
Womack
Woodall
Yoder
Yoho
Young (AK)
Young (IA)
Young (IN)
Zeldin
Zinke
NOT VOTING--11
Boyle, Brendan F.
Byrne
DeSaulnier
Fattah
Griffith
Kelly (MS)
McHenry
Sanchez, Loretta
Sessions
Sewell (AL)
Welch
{time} 1730
Mrs. NOEM, Messrs. POMPEO, WITTMAN, JOYCE, and DeSANTIS changed their
vote from ``aye'' to ``no.''
Mr. BEYER, Ms. McCOLLUM, Messrs. COHEN and MASSIE changed their vote
from ``no'' to ``aye.''
So the amendment was rejected.
The result of the vote was announced as above recorded.
The Acting CHAIR. The question is on the amendment in the nature of a
substitute, as amended.
The amendment was agreed to.
The Acting CHAIR. Under the rule, the Committee rises.
Accordingly, the Committee rose; and the Speaker pro tempore (Mr.
Collins of Georgia) having assumed the chair, Mr. Poe of Texas, Acting
Chair of the Committee of the Whole House on the state of the Union,
reported that that Committee, having had under consideration the bill
(H.R. 2596) to authorize appropriations for fiscal year 2016 for
intelligence and intelligence-related activities of the United States
Government, the Community Management Account, and the Central
Intelligence Agency Retirement and Disability System, and for other
purposes, and, pursuant to House Resolution 315, he reported the bill
back to the House with an amendment adopted in the Committee of the
Whole.
The SPEAKER pro tempore. Under the rule, the previous question is
ordered.
Is a separate vote demanded on any amendment to the amendment
reported from the Committee of the Whole?
If not, the question is on the amendment in the nature of a
substitute, as amended.
The amendment was agreed to.
The SPEAKER pro tempore. The question is on the engrossment and third
reading of the bill.
The bill was ordered to be engrossed and read a third time, and was
read the third time.
Motion to Recommit
Mrs. DINGELL. Mr. Speaker, I have a motion to recommit at the desk.
The SPEAKER pro tempore. Is the gentlewoman opposed to the bill?
Mrs. DINGELL. I am opposed to it in its current form.
The SPEAKER pro tempore. The Clerk will report the motion to
recommit.
The Clerk read as follows:
Mrs. Dingell moves to recommit the bill H.R. 2596 to the
Select Committee on Intelligence (Permanent Select) with
instructions to report the same back to the House forthwith,
with the following amendment:
Page 29, after line 11, insert the following:
SEC. 317. PROTECTING UNITED STATES PERSONS WHO TRAVEL.
To maximize the security of United States civilian
aviation, the Director of National Intelligence shall
identify and share with all appropriate Federal departments
and agencies, including the Transportation Security
Administration--
(1) all information on new and constantly changing threats
used by terrorists to evade airport screening operations; and
(2) updated terrorist watch list information for the
purpose of properly vetting employees at commercial airports.
SEC. 318. PROTECTING PRIVATE PERSONAL INFORMATION FROM CYBER
ATTACKS BY CHINA, RUSSIA, AND OTHER STATE-
SPONSORED COMPUTER HACKERS.
The Director of National Intelligence, in coordination with
the heads of each element of the intelligence community,
shall prioritize efforts and dedicate sufficient resources to
uncover and to foil attempts to steal the private personal
information of United States persons, including Social
Security numbers, dates of birth, employment information, and
health records, insofar as--
(1) up to 4,000,000 records of Federal employees under the
control of the Office of Personnel Management were stolen;
(2) the information of 80,000,000 Americans was compromised
by the attacks on Anthem Health Insurance and CareFirst
BlueCross BlueShield;
(3) the health records of more than 29,000,000 Americans
were compromised in data breaches between 2010 and 2013; and
(4) the personnel records of millions of Federal employees
were compromised by a series of recently discovered attacks
against the Office of Personnel Management, including records
related to the background investigations of current, former,
and prospective Federal employees.
Mrs. DINGELL (during the reading). Mr. Speaker, I ask unanimous
consent to dispense with the reading.
The SPEAKER pro tempore. Is there objection to the request of the
gentlewoman from Michigan?
There was no objection.
The SPEAKER pro tempore. The gentlewoman from Michigan is recognized
for 5 minutes.
Mrs. DINGELL. Mr. Speaker, this is the final amendment to the bill,
which will not kill the bill or send it back to committee. If adopted,
the bill will immediately proceed to final passage, as amended.
Mr. Speaker, it is very timely that we are considering the
intelligence authorization bill today, as there have been several
troubling incidents in the last few weeks that require an immediate
response by the Congress.
I know that Members on both sides of the aisle care deeply about
airport security and cybersecurity, and we agree that Congress must do
everything possible to keep the American people safe.
Last week, we learned that there were 73 people employed at airports
across the country that should have been disqualified for employment
because they are on a terrorist watch list. The American people deserve
the highest level of security at our airports, and, quite frankly, I
believe for all of us the status quo is unacceptable.
While it is easy for us to blame the TSA for this lapse in security,
it is shocking that the TSA does not have access and that the current
policy does not authorize them to have access to the information that
they need so that
[[Page H4420]]
they can keep us safe, nor do other appropriate agencies.
As much as we agree that reforms are needed at TSA, we should all
agree that they should have all the information they need to do their
jobs. It is critical that our intelligence and security agencies are
sharing information with each other because they have the same
mission--keeping the American people safe.
This motion to recommit simply states that the Director of National
Intelligence must provide all information on new and changing terrorist
threats and the updated terrorist watch list information to TSA and to
anybody else in the government that needs to have it.
In addition, to improve information sharing, I think everybody in
this Chamber knows that we must address cybersecurity. Cyber attacks
are becoming a routine event in the United States today, and it demands
an immediate response and investigation. Americans deserve the peace of
mind in knowing that their personal information is secure and not
vulnerable to hacking by cyber criminals, yet there is a growing list
of recent incidents that continues to put the privacy of everyday
Americans, our constituents, at risk.
The recent breach of over 4 million records of Federal employees at
the Office of Personnel Management and a hack of 80 million records at
Anthem Health Insurance and CareFirst BlueCross BlueShield are just a
few of the prominent examples of this growing threat. And who is paying
the price? Working families.
For each cyber attack that you read about in the newspapers, there
are many more that are going unreported or, worse, undetected. In fact,
some security experts are concerned that China is now building a
massive database with the personal information of many, many American
citizens.
Furthermore, American companies are increasingly becoming targets of
cyber attacks. With a recent report estimating that this is costing our
economy more than $445 billion, we simply cannot wait any longer to
protect the privacy of everyday Americans from hackers and cyber
criminals in Russia and China.
This motion to recommit simply requires the Director of National
Intelligence to prioritize efforts to uncover and foil attempts to
steal the private, personal information of Americans. This is the least
we can do to respond to the attacks on the privacy of the American
people. Let's show the American people that Congress is listening.
The SPEAKER pro tempore. The time of the gentlewoman has expired.
Mr. NUNES. Mr. Speaker, I rise to oppose the motion.
The SPEAKER pro tempore. The gentleman from California is recognized
for 5 minutes.
Mr. NUNES. Mr. Speaker, this motion to recommit is nothing more than
a poison pill designed to destroy the hard work that has gone into
crafting this legislation.
This bill already does exactly what the motion to recommit proposes.
It helps the Federal Government, including the patriotic men and women
of our intelligence community, address the critical national security
issues facing this country. As anyone who worked on it in the committee
or took the time to come down and read the annex knows, this bill
already funds intelligence community personnel who protect our
networks.
While we stand here, the intelligence community is wrestling with
some of the greatest national security threats in our country's
history. I urge my colleagues to vote ``no'' on the motion to recommit
and ``yes'' on final passage.
I yield back the balance of my time.
The SPEAKER pro tempore. Without objection, the previous question is
ordered on the motion to recommit.
There was no objection.
The SPEAKER pro tempore. The question is on the motion to recommit.
The question was taken; and the Speaker pro tempore announced that
the noes appeared to have it.
Recorded Vote
Mrs. DINGELL. Mr. Speaker, I demand a recorded vote.
A recorded vote was ordered.
The SPEAKER pro tempore. Pursuant to clause 9 of rule XX, this 5-
minute vote on the motion to recommit will be followed by a 5-minute
vote on the passage of the bill, if ordered.
The vote was taken by electronic device, and there were--ayes 183,
noes 240, not voting 10, as follows:
[Roll No. 368]
AYES--183
Adams
Aguilar
Ashford
Bass
Beatty
Becerra
Bera
Beyer
Bishop (GA)
Blumenauer
Bonamici
Boyle, Brendan F.
Brady (PA)
Brown (FL)
Brownley (CA)
Bustos
Butterfield
Capps
Capuano
Cardenas
Carney
Carson (IN)
Cartwright
Castor (FL)
Castro (TX)
Chu, Judy
Clark (MA)
Clarke (NY)
Clay
Cleaver
Clyburn
Cohen
Connolly
Conyers
Cooper
Costa
Courtney
Crowley
Cuellar
Cummings
Davis (CA)
Davis, Danny
DeFazio
DeGette
Delaney
DeLauro
DelBene
DeSaulnier
Deutch
Dingell
Doggett
Doyle, Michael F.
Duckworth
Edwards
Ellison
Engel
Eshoo
Esty
Farr
Foster
Frankel (FL)
Fudge
Gabbard
Gallego
Garamendi
Graham
Grayson
Green, Al
Green, Gene
Grijalva
Gutierrez
Hahn
Hastings
Heck (WA)
Higgins
Himes
Hinojosa
Honda
Hoyer
Huffman
Israel
Jackson Lee
Jeffries
Johnson (GA)
Johnson, E. B.
Kaptur
Keating
Kelly (IL)
Kennedy
Kildee
Kilmer
Kind
Kirkpatrick
Kuster
Langevin
Larsen (WA)
Larson (CT)
Lawrence
Lee
Levin
Lewis
Lieu, Ted
Lipinski
Loebsack
Lofgren
Lowenthal
Lowey
Lujan Grisham (NM)
Lujan, Ben Ray (NM)
Lynch
Maloney, Carolyn
Maloney, Sean
Matsui
McCollum
McDermott
McNerney
Meeks
Meng
Moore
Moulton
Murphy (FL)
Nadler
Napolitano
Neal
Nolan
Norcross
O'Rourke
Pallone
Pascrell
Payne
Pelosi
Perlmutter
Peters
Peterson
Pingree
Pocan
Polis
Price (NC)
Quigley
Rangel
Rice (NY)
Richmond
Roybal-Allard
Ruiz
Ruppersberger
Rush
Ryan (OH)
Sanchez, Linda T.
Sarbanes
Schakowsky
Schiff
Schrader
Scott (VA)
Scott, David
Serrano
Sherman
Sinema
Sires
Slaughter
Smith (WA)
Speier
Swalwell (CA)
Takai
Takano
Thompson (CA)
Thompson (MS)
Titus
Tonko
Torres
Tsongas
Van Hollen
Vargas
Veasey
Vela
Velazquez
Visclosky
Walz
Wasserman Schultz
Waters, Maxine
Watson Coleman
Welch
Wilson (FL)
Yarmuth
NOES--240
Abraham
Aderholt
Allen
Amash
Amodei
Babin
Barletta
Barr
Barton
Benishek
Bilirakis
Bishop (MI)
Bishop (UT)
Black
Blackburn
Blum
Bost
Boustany
Brady (TX)
Brat
Bridenstine
Brooks (AL)
Brooks (IN)
Buchanan
Buck
Bucshon
Burgess
Calvert
Carter (GA)
Carter (TX)
Chabot
Chaffetz
Clawson (FL)
Coffman
Cole
Collins (GA)
Collins (NY)
Comstock
Conaway
Cook
Costello (PA)
Cramer
Crawford
Crenshaw
Culberson
Curbelo (FL)
Davis, Rodney
Denham
Dent
DeSantis
DesJarlais
Diaz-Balart
Dold
Donovan
Duffy
Duncan (SC)
Duncan (TN)
Ellmers (NC)
Emmer (MN)
Farenthold
Fincher
Fitzpatrick
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Garrett
Gibbs
Gohmert
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (LA)
Graves (MO)
Griffith
Grothman
Guinta
Guthrie
Hanna
Hardy
Harper
Harris
Hartzler
Heck (NV)
Hensarling
Herrera Beutler
Hice, Jody B.
Hill
Holding
Hudson
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurd (TX)
Hurt (VA)
Issa
Jenkins (KS)
Jenkins (WV)
Johnson (OH)
Johnson, Sam
Jolly
Jones
Jordan
Joyce
Katko
Kelly (PA)
King (IA)
King (NY)
Kinzinger (IL)
Kline
Knight
Labrador
LaMalfa
Lamborn
Lance
Latta
LoBiondo
Long
Loudermilk
Love
Lucas
Luetkemeyer
Lummis
MacArthur
Marchant
Marino
Massie
McCarthy
McCaul
McClintock
McKinley
McMorris Rodgers
McSally
Meadows
Meehan
Messer
Mica
Miller (FL)
Miller (MI)
Moolenaar
Mooney (WV)
Mullin
Mulvaney
Murphy (PA)
Neugebauer
Newhouse
Noem
Nugent
Nunes
Olson
Palazzo
Palmer
Paulsen
Pearce
Perry
Pittenger
Pitts
Poe (TX)
Poliquin
Pompeo
Posey
Price, Tom
Ratcliffe
Reichert
Renacci
Ribble
Rice (SC)
Rigell
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rohrabacher
Rokita
Rooney (FL)
Ros-Lehtinen
Roskam
Ross
Rothfus
Rouzer
Royce
Russell
Ryan (WI)
Salmon
Sanford
Scalise
Schweikert
Scott, Austin
Sensenbrenner
Sessions
Shimkus
Shuster
Simpson
Smith (MO)
Smith (NE)
Smith (NJ)
Smith (TX)
Stefanik
Stewart
Stivers
Stutzman
Thompson (PA)
Thornberry
Tiberi
Tipton
Trott
Turner
Upton
Valadao
Wagner
Walberg
[[Page H4421]]
Walden
Walker
Walorski
Walters, Mimi
Weber (TX)
Webster (FL)
Wenstrup
Westerman
Westmoreland
Whitfield
Williams
Wilson (SC)
Wittman
Womack
Woodall
Yoder
Yoho
Young (AK)
Young (IA)
Young (IN)
Zeldin
Zinke
NOT VOTING--10
Byrne
Cicilline
Fattah
Gibson
Kelly (MS)
McGovern
McHenry
Reed
Sanchez, Loretta
Sewell (AL)
Announcement by the Speaker Pro Tempore
The SPEAKER pro tempore (during the vote). There are 2 minutes
remaining.
{time} 1746
So the motion to recommit was rejected.
The result of the vote was announced as above recorded.
The SPEAKER pro tempore. The question is on the passage of the bill.
The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
Recorded Vote
Mr. SCHIFF. Mr. Speaker, I demand a recorded vote.
A recorded vote was ordered.
The SPEAKER pro tempore. This is a 5-minute vote.
The vote was taken by electronic device, and there were--ayes 247,
noes 178, not voting 8, as follows:
[Roll No. 369]
AYES--247
Abraham
Aguilar
Allen
Amodei
Ashford
Babin
Barletta
Barr
Barton
Benishek
Bera
Bilirakis
Bishop (GA)
Bishop (MI)
Bishop (UT)
Black
Blackburn
Blum
Bost
Boustany
Brady (TX)
Brat
Bridenstine
Brooks (AL)
Brooks (IN)
Brownley (CA)
Buchanan
Buck
Bucshon
Burgess
Bustos
Calvert
Carter (GA)
Carter (TX)
Chabot
Chaffetz
Clay
Coffman
Cole
Collins (GA)
Collins (NY)
Comstock
Conaway
Cook
Cooper
Costa
Costello (PA)
Cramer
Crawford
Crenshaw
Cuellar
Culberson
Curbelo (FL)
Davis, Rodney
Delaney
Denham
Dent
DeSantis
Diaz-Balart
Dold
Donovan
Duckworth
Duffy
Ellmers (NC)
Emmer (MN)
Farenthold
Fincher
Fitzpatrick
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Gibbs
Goodlatte
Gowdy
Graham
Granger
Graves (GA)
Graves (LA)
Graves (MO)
Grothman
Guinta
Guthrie
Hanna
Hardy
Harper
Hartzler
Heck (NV)
Heck (WA)
Hensarling
Herrera Beutler
Hice, Jody B.
Hill
Holding
Hudson
Huizenga (MI)
Hultgren
Hunter
Hurd (TX)
Hurt (VA)
Jenkins (KS)
Jenkins (WV)
Johnson (OH)
Johnson, Sam
Jolly
Joyce
Katko
Keating
Kelly (PA)
King (IA)
King (NY)
Kinzinger (IL)
Kirkpatrick
Kline
Knight
Kuster
LaMalfa
Lamborn
Lance
Langevin
Latta
Lipinski
LoBiondo
Long
Loudermilk
Love
Lucas
Luetkemeyer
Lujan Grisham (NM)
MacArthur
Maloney, Sean
Marchant
Marino
McCarthy
McCaul
McClintock
McKinley
McMorris Rodgers
McSally
Meadows
Meehan
Messer
Mica
Miller (FL)
Miller (MI)
Moolenaar
Mullin
Murphy (FL)
Murphy (PA)
Neugebauer
Newhouse
Noem
Norcross
Nunes
Olson
Palazzo
Palmer
Paulsen
Pearce
Peters
Peterson
Pittenger
Pitts
Poe (TX)
Poliquin
Pompeo
Posey
Price, Tom
Ratcliffe
Reed
Reichert
Renacci
Ribble
Rice (NY)
Rice (SC)
Rigell
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rohrabacher
Rokita
Rooney (FL)
Ros-Lehtinen
Roskam
Ross
Rothfus
Rouzer
Royce
Ruiz
Ruppersberger
Russell
Ryan (WI)
Scalise
Schweikert
Scott, Austin
Sensenbrenner
Sessions
Shimkus
Shuster
Simpson
Sinema
Smith (MO)
Smith (NE)
Smith (NJ)
Smith (TX)
Stefanik
Stewart
Stivers
Stutzman
Thompson (PA)
Thornberry
Tiberi
Tipton
Trott
Turner
Upton
Valadao
Veasey
Wagner
Walberg
Walden
Walker
Walorski
Walters, Mimi
Walz
Weber (TX)
Webster (FL)
Wenstrup
Westerman
Westmoreland
Whitfield
Williams
Wilson (SC)
Wittman
Womack
Woodall
Yoder
Young (AK)
Young (IA)
Young (IN)
Zeldin
Zinke
NOES--178
Adams
Amash
Bass
Beatty
Becerra
Beyer
Blumenauer
Bonamici
Boyle, Brendan F.
Brady (PA)
Brown (FL)
Butterfield
Capps
Capuano
Cardenas
Carney
Carson (IN)
Cartwright
Castor (FL)
Castro (TX)
Chu, Judy
Cicilline
Clark (MA)
Clarke (NY)
Clawson (FL)
Cleaver
Clyburn
Cohen
Connolly
Conyers
Courtney
Crowley
Cummings
Davis (CA)
Davis, Danny
DeFazio
DeGette
DeLauro
DelBene
DeSaulnier
DesJarlais
Deutch
Dingell
Doggett
Doyle, Michael F.
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Engel
Eshoo
Esty
Farr
Foster
Frankel (FL)
Fudge
Gabbard
Gallego
Garamendi
Garrett
Gibson
Gohmert
Gosar
Grayson
Green, Al
Green, Gene
Griffith
Grijalva
Gutierrez
Hahn
Harris
Hastings
Higgins
Himes
Hinojosa
Honda
Hoyer
Huelskamp
Huffman
Israel
Issa
Jackson Lee
Jeffries
Johnson (GA)
Johnson, E. B.
Jones
Jordan
Kaptur
Kelly (IL)
Kennedy
Kildee
Kilmer
Kind
Labrador
Larsen (WA)
Larson (CT)
Lawrence
Lee
Levin
Lewis
Lieu, Ted
Loebsack
Lofgren
Lowenthal
Lowey
Lujan, Ben Ray (NM)
Lummis
Lynch
Maloney, Carolyn
Massie
Matsui
McCollum
McDermott
McNerney
Meeks
Meng
Mooney (WV)
Moore
Moulton
Mulvaney
Nadler
Napolitano
Neal
Nolan
Nugent
O'Rourke
Pallone
Pascrell
Payne
Pelosi
Perlmutter
Perry
Pingree
Pocan
Polis
Price (NC)
Quigley
Rangel
Richmond
Roybal-Allard
Rush
Ryan (OH)
Salmon
Sanchez, Linda T.
Sanford
Sarbanes
Schakowsky
Schiff
Schrader
Scott (VA)
Scott, David
Serrano
Sherman
Sires
Slaughter
Smith (WA)
Speier
Swalwell (CA)
Takai
Takano
Thompson (CA)
Thompson (MS)
Titus
Tonko
Torres
Tsongas
Van Hollen
Vargas
Vela
Velazquez
Visclosky
Wasserman Schultz
Waters, Maxine
Watson Coleman
Welch
Wilson (FL)
Yarmuth
Yoho
NOT VOTING--8
Aderholt
Byrne
Fattah
Kelly (MS)
McGovern
McHenry
Sanchez, Loretta
Sewell (AL)
{time} 1753
So the bill was passed.
The result of the vote was announced as above recorded.
A motion to reconsider was laid on the table.
personal explanation
Ms. SEWELL of Alabama. Madam Speaker, during the votes today I was
inescapably detained and away handling important matters related to my
District and the State of Alabama.
If I had been present, I would have voted: ``no'' on H. Res. 315;
``no'' on the Schiff/Smith (WA) Amendment to H.R. 2596; ``yes'' on the
Democratic Motion to Recommit H.R. 2596; and ``no'' on final passage of
H.R. 2596.
____________________