[Congressional Record Volume 165, Number 119 (Tuesday, July 16, 2019)] [House] [Pages H5858-H5910] DAMON PAUL NELSON AND MATTHEW YOUNG POLLARD INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2018, 2019, AND 2020 General Leave Mr. SCHIFF. Madam Speaker, I ask unanimous consent that all Members may have 5 legislative days within which to revise and extend their remarks and include extraneous material on the Intelligence Authorization Act. The SPEAKER pro tempore. Is there objection to the request of the gentleman from California? There was no objection. The SPEAKER pro tempore. Pursuant to House Resolution 491 and rule XVIII, the Chair declares the House in the Committee of the Whole House on the state of the Union for the consideration of the bill, H.R. 3494. The Chair appoints the gentleman from California (Mr. Huffman) to preside over the Committee of the Whole. {time} 1900 In the Committee of the Whole Accordingly, the House resolved itself into the Committee of the Whole House on the state of the Union for the consideration of the bill (H.R. 3494) to authorize appropriations for fiscal year 2020 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, with Mr. Huffman in the chair. The Clerk read the title of the bill. The CHAIR. Pursuant to the rule, the bill is considered read the first time. General debate shall be confined to the bill and amendments specified in the first section of House Resolution 491, and shall not exceed 1 hour equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence. The gentleman from California (Mr. Schiff) and the gentleman from California (Mr. Nunes) each will control 30 minutes. The Chair recognizes the gentleman from California (Mr. Schiff). Mr. SCHIFF. Mr. Chairman, I yield myself as much time as I may consume. Along the wall in the upper lobby of the CIA headquarters building is a large picture of the head and torch of the Statue of Liberty accompanied by the following words: ``We are the Nation's first line of defense. We accomplish what others cannot accomplish and go where others cannot go.'' These two sentences distill the essence of America's intelligence community and the quiet sense of mission that tens of thousands of our fellow citizens bring to their jobs every day. H.R. 3494, the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020, is our contribution to the work of the IC. This is a bipartisan bill, reported unanimously out of the Intelligence Committee and embodying the collective efforts of Democratic and Republican members. Though H.R. 3494 contains many new initiatives authored during my chairmanship, it also preserves provisions developed during Ranking Member Nunes' tenure as chairman as well. Despite disagreements over the Russia investigation, the committee has come together to support our intelligence community. HPSCI oversees highly sensitive, highly classified activities, and we collaborate with the IC to ensure that it has the resources and authorities necessary to collect vital intelligence. That won't work, however, unless the committee trusts the IC elements it oversees, and those same elements trust the committee. At the same time, HPSCI must ensure that legal and policy constraints are vigorously enforced. That requires us to maintain both a professional distance and a healthy skepticism about the activities we oversee. When warranted, the committee must impose additional checks and limitations, at times over intelligence community objections. It is a delicate balance, which HPSCI strikes through use of many different oversight tools. The most important by far is our annual Intelligence Authorization Act. H.R. 3494 gets the balance right. It authorizes funding for the IC at roughly 1.4 percent above the President's budget request for the coming year. It prioritizes the IC's collection and analytic capabilities against China, Russia, Iran, and North Korea, while sustaining critical intelligence capabilities that support counterterrorism and counterproliferation. The bill also ensures that the men and women of the IC have what they need to collect and analyze the intelligence that policymakers require. At the same time, H.R. 3494 ensures close oversight by Congress, rejecting the funding of legacy IC programs with overseas contingency operation resources, or OCO, funding; and requiring, for the first time, the submission to the intelligence committees of detailed information on unfunded IC programs. Another provision authored by Representative Welch calls for more information in the IC's budget for counterterrorism matters to be released to the public consistent with the protection of national security. Still another authorizes the Public Interest Declassification Board, which plays a vital role in ensuring that historical documents about IC programs are declassified appropriately. The legislation is especially strong in three other areas. The first has to do with foreign malign activities, including those by Russia. The bill calls for extensive IC reporting and creates new notification requirements regarding covert or overt efforts by foreign governments to undermine trusted institutions or to interfere in the democratic process, our own or those of other nations. This bill also strongly supports the IC workforce. H.R. 3494 obliges the IC elements to offer their employees 12 weeks of paid parental leave on top of the unpaid leave already guaranteed to them by law. Other language ensures that the families of CIA personnel who are killed or injured as a result of wars, hostile acts, or other incidents can be appropriately compensated. The bill also bolsters the IC's ability to recruit, hire, retain, and promote a workforce that represents the diversity of the Nation that it serves. Lastly, technology. Many have sounded alarms about the rise of so- called ``deep fake'' algorithms and the transition in our country and elsewhere to a fifth-generation telecommunications network. To help the IC address both challenges, H.R. 3494 instructs the DNI to hold competitions and to award prizes for cutting-edge research into deep fake and 5G technologies. H.R. 3494 is not perfect; it is the result of negotiation and compromise. I am pleased that, despite our public differences, we have once again been able to put those aside to focus on the important work of overseeing the intelligence community. The result is a strong, bipartisan bill, which I am proud to support. Mr. Chair, let me conclude by thanking Ranking Member Nunes, my committee colleagues, and the entire HPSCI staff for their collaborative efforts. Mr. Chair, I urge all Members of the House to join me in voting for H.R. 3494. Mr. Chair, I reserve the balance of my time. [[Page H5859]] Mr. NUNES. Mr. Chairman, I yield myself such time as I may consume. Mr. Chairman, I rise today in support of H.R. 3494, the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020. Passing an annual intelligence authorization bill is the most important tool Congress has to conduct effective oversight of the intelligence activities of the United States. Today, Chairman Schiff and I are bringing the tenth consecutive intelligence authorization bill to the floor. I am pleased that, as in years past, this bill is a bipartisan product that reflects the contributions of all the committee's members. It was reported out of the committee by a unanimous voice vote. This legislation is the product of bipartisan work by the majority and the minority and provides the intelligence community the necessary resources and authorities to ensure the IC remains capable of protecting and defending the United States. The bill folds in many priorities from fiscal year 2018 and 2019, including the defense of elections from foreign threats, enhanced injury benefits to CIA employees, and bolsters intelligence oversight by improving the IC accountability to Congress. Additionally, the bill protects all CIA covert intelligence officers' identities, establishes a paid parental leave program for the IC, and it mandates counterintelligence briefings and notifications to the intelligence committees by the FBI on a quarterly basis and prompt notification when an investigation is carried out regarding a counterintelligence risk related to a Federal election or campaign. This bill supports critical national security programs, particularly those focused on countering threats from hard targets, such as China. Lastly, the bill continues to ensure that the dedicated men and women of our intelligence community have the funding, authorities, and support they need to carry out their mission and to keep us safe. Mr. Chairman, I reserve the balance of my time. Mr. SCHIFF. Mr. Chairman, I am proud to yield 2 minutes to the gentleman from Illinois (Mr. Quigley). Mr. QUIGLEY. Mr. Chairman, I thank the gentleman for yielding. I rise in support of H.R. 3494. As the United States learned in 2016, there are few things more important to our democracy than ensuring that our electoral system is kept free from outside interference. We also have a responsibility to educate our partners and our allies about the threat from foreign interference, as well as share our best practices with those nations that face similar threats. Taiwan, one of Asia's most vibrant democracies, is acutely aware of the risks posed by foreign influence. The Chinese Communist Party, angry that another nation has the audacity to prove that a culturally Chinese democracy can thrive, will stop at nothing to degrade Taiwan's political independence. This year's Intelligence Authorization Act requires the Director of National Intelligence to report on influence operations China conducts to interfere in Taiwan's upcoming 2020 elections and find out what assistance the U.S. government provided to counter these operations and provide a comprehensive list of the specific organizations that conducted these influence operations. The U.S. is in a unique position to share the tools and techniques with others that we are implementing to safeguard our own democratic elections. In line with our obligations under the Taiwan Relations Act, we urge the administration to do all it can to assist Taipei with creating conditions for a free, fair, and secure election that is free from interference. This provision brings us one step closer to that goal. Mr. NUNES. Mr. Chairman, I yield as much time as she may consume to the gentlewoman from New York (Ms. Stefanik). Ms. STEFANIK. Mr. Chair, I am proud to rise in support of this year's Intelligence Authorization Act. After the recent partisan NDAA debate and vote, it is an accomplishment that this committee came together to produce a bipartisan bill that supports our intelligence community and provides the warfighter with the intelligence support needed to protect the United States and our allies. I am particularly pleased that this bill contains the Counterintelligence Accountability Act that I introduced earlier this year that I wanted to take a moment to highlight for the American public. This bill amends the National Security Act by requiring the FBI to provide quarterly counterintelligence briefings to the congressional intelligence committees, which is not only necessary for us to conduct meaningful oversight over the FBI's counterintelligence operations, but also provides the American people with the comfort that the FBI is subject to the same types of scrutiny as other intelligence agencies. Importantly, this bill also mandates that the FBI notify the congressional intelligence committees when the FBI has a counterintelligence investigation open related to a CI risk to an election or campaign for Federal office. Given former FBI Director Comey's testimony in 2017, I am still deeply concerned that the FBI failed to provide notification to the congressional intelligence committees regarding the investigation opened into the Trump campaign in 2016 until well after the election. This bill ensures that Congress is kept fully and currently informed of these types of counterintelligence activities. This is good, accountable governance. Mr. Chair, I appreciate the chair and ranking member's support in adding my legislation into this bill and urge my colleagues to vote ``yes'' on final passage. Mr. SCHIFF. Mr. Chairman, I am proud to yield 3 minutes to the gentleman from Washington State (Mr. Heck). Mr. HECK. Mr. Chairman, I thank the chair of the committee for yielding. Mr. Chair, I rise to strongly support the David Paul Nelson and Matthew Young Pollard Intelligence Authorization Act. In the last year we have made some pretty incredible progress in reducing the security clearance backlog, yet, frankly, after all the progress we have made, we are still--and you are hearing this number correctly--left with nearly a half a million people on the waiting list for security clearance. Earlier this year, the average wait time for top secret security clearance was reduced to 468 days, down from 534 days. So, in other words, when we are out there competing for young talent to come in and be a member of the intelligence community, say in a field such as cyber, we are told we have to tell them, ``Cool your jets. We will get back to you in a year, year and a half or so.'' Indeed, closer to home, my senior military adviser is a distinguished graduate of the United States Military Academy at West Point. He served not one, but two tours in Afghanistan, where he had a security clearance, and yet when he joined a staff in the House of Representatives, to again earn a security clearance, it took 20 months, nearly 2 years. We are losing good people when we subject them to that long of a wait time. This bill makes some progress. It will build on the progress we made this year by providing needed reform to this mission. It creates a system of accountability and clear goals for how the process should run. Furthermore, the bill allows for innovation on using digital tools, and reciprocity among agencies to improve our efficiencies when clearances are needed to be transferred from one agency to another. Our government can and must efficiently and effectively review security clearance applicants. We owe our national security workforce at least that much. This bill will help us to do that, to further reduce it, so that the intelligence community can compete for the best and the brightest in a timely fashion. Mr. Chair, for that reason, among many, I urge Members' support for the Intelligence Authorization Act. {time} 1915 Mr. NUNES. Mr. Chairman, I reserve the balance of my time. [[Page H5860]] Mr. SCHIFF. Mr. Chairman, I yield 3 minutes to the gentlewoman from Alabama (Ms. Sewell). Ms. SEWELL of Alabama. Mr. Chairman, I rise in support of H.R. 3494, the Intelligence Authorization Act. Mr. Chairman, as the chair of the Defense Intelligence and Warfighter Support Subcommittee, I believe this bill will ensure our warfighters retain the information and decisionmaking advantages to which we have grown accustomed and improve the intelligence community's ability to attract and retain a diverse workforce. The bill includes provisions that authorize increased intelligence funding for combatant commanders and our growing strategic competition with China, Russia, and other malign actors; supports the Defense Intelligence Agency's ongoing assessment of its roles and missions; and provides the Director of National Intelligence with the necessary authority to manage intelligence community-wide academic programs. This bill also includes language I authored which will improve Federal campaign election security. My provision will require the Director of National Intelligence to work with the FBI and the Department of Homeland Security to make available an advisory report on foreign counterintelligence and cybersecurity threats to those campaigns. Additionally, my language requires the Director to publish a summary of best practices and provide information to campaigns to help thwart these attacks. This legislation also continues the committee's longstanding and bipartisan work to promote increased diversity within the intelligence community's workforce. This bill contains language directing the intelligence community to expand its annual demographic hiring report by adding grade level, years of service, career categories, gender identity, and sexual orientation reporting categories. These changes will improve the IC's ability to track how well it retains and promotes persons of diverse backgrounds. Finally, for the first time in many years, the Intelligence Authorization Act will provide significant funding for programs that will improve the IC's ability to introduce students from diverse backgrounds to its mission. Mr. Chairman, I look forward to voting in support of this legislation. I commend the chairman and ranking member on working together to provide these important authorizations. I encourage my colleagues to do the same and vote for this bill. Mr. NUNES. Mr. Chairman, I continue to reserve the balance of my time. Mr. SCHIFF. Mr. Chairman, I yield 2 minutes to the gentleman from California (Mr. Swalwell). Mr. SWALWELL of California. Mr. Chairman, I thank the chairman of our committee for working with the minority to put together a bipartisan piece of legislation that serves our national security purposes. I also want to acknowledge both of the individuals for whom the bill is named, but particularly Damon Paul Nelson, the former staff director for the then-majority at the time, someone whom I and my colleagues saw put his heart and soul into the committee and someone who was able to keep many lines of communication that were necessary open during some of our most trying times. This is a fitting recognition of his service to our country. As chairman of the Intelligence Modernization and Readiness Subcommittee, I celebrate this bipartisan bill and the patriotic young people who enter service in the intelligence community, sometimes immediately after college, despite extraordinary student debt. For that reason, we have included measures to enhance intelligence community- wide student loan repayment and forgiveness programs. Reducing the financial burden on intelligence community workers helps us recruit and retain a talented and diverse workforce to remain competitive with the private sector. To that aim, we have also included a measure to authorize 12 weeks of paid parental leave for intelligence community employees in the event of a birth or adoption. This authority would supplement the 12 weeks of unpaid leave currently afforded to intelligence community employees and other government personnel under existing law, sending a strong message to the intelligence community workforce that they do not need to choose between their career, serving our country, and their family. These will help the intelligence community recruit and retain individuals capable of meeting the security goals of the United States and will set the example for other Federal agencies seeking pro-worker policies. Our goal on the subcommittee is to anticipate the needs of the intelligence community workforce. Reaching across the aisle for our intelligence community is how we will secure a next-generation intelligence community workforce. Mr. NUNES. Mr. Chairman, I continue to reserve the balance of my time. Mr. SCHIFF. Mr. Chairman, it is now a pleasure to yield 3 minutes to the gentleman from New York (Mr. Sean Patrick Maloney). Mr. SEAN PATRICK MALONEY of New York. Mr. Chairman, I thank the chairman for yielding. Mr. Chairman, I rise today to offer support for this bill, which includes my legislation, the Gregg Wenzel Clandestine Heroes Parity Act. Mr. Chairman, my bill honors an unsung son of the Hudson Valley, CIA Officer Gregg Wenzel, who died in Ethiopia on July 9, 2003. He was only 33 years old. Gregg was inspired to join the Clandestine Service after September 11 and dedicated his life to making the United States stronger in our fight against terrorism. That is what CIA officers do; they put their lives on the line for our freedoms. But because of the nature of their work, they rarely get the recognition they deserve. This bill simply ensures that the families of fallen CIA officers receive the death benefits their loved ones earned laying down their lives in service of our Nation. Gregg was born in the Bronx and graduated from Monroe-Woodbury High School in Orange County, New York. He went on to earn degrees from the State University of New York at Binghamton and then the University of Miami School of Law. After joining the CIA, he was assigned his first overseas tour as an operations officer in the Horn of Africa. The assignment was challenging, but Gregg was known for his grit and good spirit. After his death, Gregg was awarded the CIA's Intelligence Commendation Medal and the Exceptional Service Medallion. You can find his star, number 81, on the CIA Memorial Wall in Langley. And we even honored his service in 2015 by renaming the Monroe, New York, post office the Gregg David Wenzel Memorial Post Office, which is the first such honor ever to be bestowed on a CIA officer. But even with these distinctions, Gregg's family was never able to access the death benefits he had earned in life. A loophole currently blocks benefits for all CIA officers who don't have dependents or who are not killed by a known act of terrorism. My bill simply changes that and rights this wrong. I am so thankful to Gregg's parents, Gladys and Mitch Wenzel, for never giving up on this fight. This bill is an opportunity for us, as a grateful nation, to honor Gregg and his family and to honor all of our fallen CIA officers and the families they have left behind. Mr. Chairman, I urge all Members to vote ``yes'' on this bill. Mr. NUNES. Mr. Chairman, I yield myself such time as I may consume. Mr. Chairman, this year's IA is named after Damon Nelson and Matthew Pollard, two staffers who passed away unexpectedly last year. Matt Pollard was a staffer with the Senate Intelligence Committee, and he is remembered fondly by staff and members who had the pleasure of working with him. Damon Nelson was a former Republican staff director on the House Intelligence Committee and a personal friend. Damon would be happy with the bill today, and I am happy that this committee was able to produce a bipartisan product. In closing, I want to take a moment to thank the men and women who serve in our intelligence community. I am honored to get to know so many of them in the course of the committee's oversight work. I also thank my colleagues on the Intelligence Committee for their contributions to our oversight over the past year. [[Page H5861]] I also thank all of the staff on the committee for their hard work on the bill and their daily oversight of the intelligence community. In particular, I thank the professional oversight staff from the minority, especially Nick Ciarlante, Laura Casulli, Meghan Green, Andrew House, Lisa Major, Bill Flanigan, Steve Keith, Marissa Skaggs, Betsy Hulme, Jack Langer, and Allen Souza. I would also like to take just a moment to thank our fellow from Los Alamos National Laboratory, Scott Miller. Scott joined the committee in 2016 and, in a few weeks, will be finishing up his midcareer educational program with the House and will be returning to New Mexico. Mr. Chairman, I wish Scott all the best as he, his wife, Rebecca, and daughter, Sarah, return home. All the staff members spent long hours working on the legislative text and its classified annex, and the bill is stronger for it. Mr. Chairman, I thank Chairman Schiff and all of his staff for the bipartisan work product. Mr. Chairman, I urge passage of H.R. 3494, as amended, and I yield back the balance of my time. Mr. SCHIFF. Mr. Chairman, I yield myself such time as I may consume. Mr. Chairman, I wish to say only a few words of recognition before concluding my remarks on the Intelligence Authorization Act. First, my HPSCI colleagues and I remember HPSCI's Damon Nelson and SSCI's Matthew Pollard, two dedicated staffers and public servants who passed away last year. The legislation is named in their honor. I also express my tremendous thanks and support to the men and women of the intelligence community. They strive quietly and tirelessly every day, and their work helps keep the Nation safe. I greatly appreciate the work of Ranking Member Nunes, as well as my other HPSCI colleagues. And I would be remiss if I did not recognize these members of my staff who worked tirelessly together with their minority colleagues to produce this bipartisan legislation: Wells Bennett, Timothy Bergreen, Maher Bitar, Carly Blake, Patrick Boland, Kris Breaux, Linda Cohen, Thomas Eager, Will Evans, Patrick Fallon, Daniel Goldman, Abby Grace, Nicolas Mitchell, Daniel Noble, Diana Pilipenko, Lucian Sikorskyj, Conrad Stosz, Kathy Suber, Amanda Rogers Thorpe, Aaron Thurman, Rheanne Wirkkala, Raffaela Wakeman, and William Wu. One more personnel note: I want to recognize the exemplary contributions of Brandon Smith, who has been a member of HPSCI's staff for 18 years. Brandon has announced that he will be leaving HPSCI soon. We are deeply grateful for his work and his longstanding and continuing service to the Nation. Let me conclude by urging all Members of the House to join me in voting for H.R. 3494 and in supporting the measure as it proceeds to the Senate and, after that, to the President's desk. Mr. Chairman, I yield back the balance of my time. The CHAIR. All time for general debate has expired. Pursuant to the rule, the bill shall be considered for amendment under the 5-minute rule. In lieu of the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence, printed in the bill, the amendment in the nature of a substitute consisting of the text of Rules Committee Print 116-22, modified by the amendment printed in part A of House Report 116-154, shall be considered as adopted. The bill, as amended, shall be considered as an original bill for purpose of further amendment under the 5-minute rule and shall be considered as read. The text of the bill, as amended, is as follows: H.R. 3494 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ``Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020''. SEC. 2. DIVISIONS AND TABLE OF CONTENTS. (a) Divisions.--This Act is organized into two divisions as follows: (1) Division A--Intelligence Authorizations for Fiscal Year 2020. (2) Division B--Intelligence Authorizations for Fiscal Years 2018 and 2019. (b) Table of Contents.--The table of contents for this Act is as follows: Sec. 1. Short title. Sec. 2. Divisions and table of contents. Sec. 3. Definitions. DIVISION A--INTELLIGENCE AUTHORIZATIONS FOR FISCAL YEAR 2020 TITLE I--INTELLIGENCE ACTIVITIES Sec. 101. Authorization of appropriations. Sec. 102. Classified schedule of authorizations. Sec. 103. Intelligence community management account. TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 201. Authorization of appropriations. TITLE III--GENERAL INTELLIGENCE COMMUNITY MATTERS Sec. 301. Restriction on conduct of intelligence activities. Sec. 302. Increase in employee compensation and benefits authorized by law. Sec. 303. Paid parental leave. Sec. 304. Unfunded requirements of the intelligence community. Sec. 305. Extending the Intelligence Identities Protection Act of 1982. Sec. 306. Intelligence community public-private talent exchange. Sec. 307. Assessment of contracting practices to identify certain security and counterintelligence concerns. Sec. 308. Required counterintelligence briefings and notifications. TITLE IV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY Sec. 401. Establishment of Climate Security Advisory Council. Sec. 402. Transfer of National Intelligence University to the Office of the Director of National Intelligence. TITLE V--MATTERS RELATING TO FOREIGN COUNTRIES Sec. 501. Annual reports on influence operations and campaigns in the United States by the Communist Party of China. Sec. 502. Report on repression of ethnic Muslim minorities in the Xinjiang region of the People's Republic of China. Sec. 503. Report on efforts by People's Republic of China to influence election in Taiwan. Sec. 504. Assessment of legitimate and illegitimate financial and other assets of Vladimir Putin. Sec. 505. Assessments of intentions of political leadership of the Russian Federation. Sec. 506. Report on death of Jamal Khashoggi. TITLE VI--FEDERAL EFFORTS AGAINST DOMESTIC TERRORISM Sec. 601. Definitions. Sec. 602. Annual strategic intelligence assessment of and comprehensive report on domestic terrorism. TITLE VII--REPORTS AND OTHER MATTERS Sec. 701. Modification of requirements for submission to Congress of certain reports. Sec. 702. Increased transparency regarding counterterrorism budget of the United States. Sec. 703. Task force on illicit financing of espionage and foreign influence operations. Sec. 704. Study on role of retired and former personnel of intelligence community with respect to certain foreign intelligence operations. Sec. 705. Report by Director of National Intelligence on fifth- generation wireless network technology. Sec. 706. Establishment of 5G prize competition. Sec. 707. Establishment of deepfakes prize competition. DIVISION B--INTELLIGENCE AUTHORIZATIONS FOR FISCAL YEARS 2018 AND 2019 TITLE XXI--INTELLIGENCE ACTIVITIES Sec. 2101. Authorization of appropriations. Sec. 2102. Classified Schedule of Authorizations. Sec. 2103. Intelligence Community Management Account. TITLE XXII--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 2201. Authorization of appropriations. Sec. 2202. Computation of annuities for employees of the Central Intelligence Agency. TITLE XXIII--GENERAL INTELLIGENCE COMMUNITY MATTERS Sec. 2301. Restriction on conduct of intelligence activities. Sec. 2302. Increase in employee compensation and benefits authorized by law. Sec. 2303. Modification of special pay authority for science, technology, engineering, or mathematics positions and addition of special pay authority for cyber positions. Sec. 2304. Modification of appointment of Chief Information Officer of the Intelligence Community. Sec. 2305. Director of National Intelligence review of placement of positions within the intelligence community on the Executive Schedule. Sec. 2306. Supply Chain and Counterintelligence Risk Management Task Force. [[Page H5862]] Sec. 2307. Consideration of adversarial telecommunications and cybersecurity infrastructure when sharing intelligence with foreign governments and entities. Sec. 2308. Cyber protection support for the personnel of the intelligence community in positions highly vulnerable to cyber attack. Sec. 2309. Elimination of sunset of authority relating to management of supply-chain risk. Sec. 2310. Limitations on determinations regarding certain security classifications. Sec. 2311. Joint Intelligence Community Council. Sec. 2312. Intelligence community information technology environment. Sec. 2313. Report on development of secure mobile voice solution for intelligence community. Sec. 2314. Policy on minimum insider threat standards. Sec. 2315. Submission of intelligence community policies. Sec. 2316. Expansion of intelligence community recruitment efforts. TITLE XXIV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY Subtitle A--Office of the Director of National Intelligence Sec. 2401. Authority for protection of current and former employees of the Office of the Director of National Intelligence. Sec. 2402. Designation of the program manager-information sharing environment. Sec. 2403. Technical modification to the executive schedule. Sec. 2404. Chief Financial Officer of the Intelligence Community. Sec. 2405. Chief Information Officer of the Intelligence Community. Subtitle B--Central Intelligence Agency Sec. 2411. Central Intelligence Agency subsistence for personnel assigned to austere locations. Sec. 2412. Special rules for certain monthly workers' compensation payments and other payments for Central Intelligence Agency personnel. Sec. 2413. Expansion of security protective service jurisdiction of the Central Intelligence Agency. Sec. 2414. Repeal of foreign language proficiency requirement for certain senior level positions in the Central Intelligence Agency. Subtitle C--Office of Intelligence and Counterintelligence of Department of Energy Sec. 2421. Consolidation of Department of Energy Offices of Intelligence and Counterintelligence. Sec. 2422. Establishment of Energy Infrastructure Security Center. Sec. 2423. Repeal of Department of Energy Intelligence Executive Committee and budget reporting requirement. Subtitle D--Other Elements Sec. 2431. Plan for designation of counterintelligence component of Defense Security Service as an element of intelligence community. Sec. 2432. Notice not required for private entities. Sec. 2433. Establishment of advisory board for National Reconnaissance Office. Sec. 2434. Collocation of certain Department of Homeland Security personnel at field locations. TITLE XXV--ELECTION MATTERS Sec. 2501. Report on cyber attacks by foreign governments against United States election infrastructure. Sec. 2502. Review of intelligence community's posture to collect against and analyze Russian efforts to influence the Presidential election. Sec. 2503. Assessment of foreign intelligence threats to Federal elections. Sec. 2504. Strategy for countering Russian cyber threats to United States elections. Sec. 2505. Assessment of significant Russian influence campaigns directed at foreign elections and referenda. Sec. 2506. Information sharing with State election officials. Sec. 2507. Notification of significant foreign cyber intrusions and active measures campaigns directed at elections for Federal offices. Sec. 2508. Designation of counterintelligence officer to lead election security matters. TITLE XXVI--SECURITY CLEARANCES Sec. 2601. Definitions. Sec. 2602. Reports and plans relating to security clearances and background investigations. Sec. 2603. Improving the process for security clearances. Sec. 2604. Goals for promptness of determinations regarding security clearances. Sec. 2605. Security Executive Agent. Sec. 2606. Report on unified, simplified, Governmentwide standards for positions of trust and security clearances. Sec. 2607. Report on clearance in person concept. Sec. 2608. Reports on reciprocity for security clearances inside of departments and agencies. Sec. 2609. Intelligence community reports on security clearances. Sec. 2610. Periodic report on positions in the intelligence community that can be conducted without access to classified information, networks, or facilities. Sec. 2611. Information sharing program for positions of trust and security clearances. Sec. 2612. Report on protections for confidentiality of whistleblower- related communications. TITLE XXVII--REPORTS AND OTHER MATTERS Subtitle A--Matters Relating to Russia and Other Foreign Powers Sec. 2701. Limitation relating to establishment or support of cybersecurity unit with the Russian Federation. Sec. 2702. Report on returning Russian compounds. Sec. 2703. Assessment of threat finance relating to Russia. Sec. 2704. Notification of an active measures campaign. Sec. 2705. Notification of travel by accredited diplomatic and consular personnel of the Russian Federation in the United States. Sec. 2706. Report on outreach strategy addressing threats from United States adversaries to the United States technology sector. Sec. 2707. Report on Iranian support of proxy forces in Syria and Lebanon. Sec. 2708. Annual report on Iranian expenditures supporting foreign military and terrorist activities. Sec. 2709. Expansion of scope of committee to counter active measures and report on establishment of Foreign Malign Influence Center. Subtitle B--Reports Sec. 2711. Technical correction to Inspector General study. Sec. 2712. Reports on authorities of the Chief Intelligence Officer of the Department of Homeland Security. Sec. 2713. Review of intelligence community whistleblower matters. Sec. 2714. Report on role of Director of National Intelligence with respect to certain foreign investments. Sec. 2715. Report on surveillance by foreign governments against United States telecommunications networks. Sec. 2716. Biennial report on foreign investment risks. Sec. 2717. Modification of certain reporting requirement on travel of foreign diplomats. Sec. 2718. Semiannual reports on investigations of unauthorized disclosures of classified information. Sec. 2719. Congressional notification of designation of covered intelligence officer as persona non grata. Sec. 2720. Reports on intelligence community participation in vulnerabilities equities process of Federal Government. Sec. 2721. Inspectors General reports on classification. Sec. 2722. Reports on global water insecurity and national security implications and briefing on emerging infectious disease and pandemics. Sec. 2723. Annual report on memoranda of understanding between elements of intelligence community and other entities of the United States Government regarding significant operational activities or policy. Sec. 2724. Study on the feasibility of encrypting unclassified wireline and wireless telephone calls. Sec. 2725. Modification of requirement for annual report on hiring and retention of minority employees. Sec. 2726. Reports on intelligence community loan repayment and related programs. Sec. 2727. Repeal of certain reporting requirements. Sec. 2728. Inspector General of the Intelligence Community report on senior executives of the Office of the Director of National Intelligence. Sec. 2729. Briefing on Federal Bureau of Investigation offering permanent residence to sources and cooperators. Sec. 2730. Intelligence assessment of North Korea revenue sources. Sec. 2731. Report on possible exploitation of virtual currencies by terrorist actors. Subtitle C--Other Matters Sec. 2741. Public Interest Declassification Board. Sec. 2742. Technical and clerical amendments to the National Security Act of 1947. Sec. 2743. Technical amendments related to the Department of Energy. Sec. 2744. Sense of Congress on notification of certain disclosures of classified information. Sec. 2745. Sense of Congress on consideration of espionage activities when considering whether or not to provide visas to foreign individuals to be accredited to a United Nations mission in the United States. SEC. 3. DEFINITIONS. In this Act: (1) Congressional intelligence committees.--The term ``congressional intelligence committees'' has the meaning given such term in section 3 of the National Security Act of 1947 (50 U.S.C. 3003). (2) Intelligence community.--The term ``intelligence community'' has the meaning given such term in section 3 of the National Security Act of 1947 (50 U.S.C. 3003). [[Page H5863]] DIVISION A--INTELLIGENCE AUTHORIZATIONS FOR FISCAL YEAR 2020 TITLE I--INTELLIGENCE ACTIVITIES SEC. 101. AUTHORIZATION OF APPROPRIATIONS. Funds are hereby authorized to be appropriated for fiscal year 2020 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government: (1) The Office of the Director of National Intelligence. (2) The Central Intelligence Agency. (3) The Department of Defense. (4) The Defense Intelligence Agency. (5) The National Security Agency. (6) The Department of the Army, the Department of the Navy, and the Department of the Air Force. (7) The Coast Guard. (8) The Department of State. (9) The Department of the Treasury. (10) The Department of Energy. (11) The Department of Justice. (12) The Federal Bureau of Investigation. (13) The Drug Enforcement Administration. (14) The National Reconnaissance Office. (15) The National Geospatial-Intelligence Agency. (16) The Department of Homeland Security. SEC. 102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS. (a) Specifications of Amounts.--The amounts authorized to be appropriated under section 101 for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations prepared to accompany this Act. (b) Availability of Classified Schedule of Authorizations.-- (1) Availability.--The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President. (2) Distribution by the president.--Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations referred to in subsection (a), or of appropriate portions of such Schedule, within the executive branch. (3) Limits on disclosure.--The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except-- (A) as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C. 3306(a)); (B) to the extent necessary to implement the budget; or (C) as otherwise required by law. SEC. 103. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT. (a) Authorization of Appropriations.--There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2020 the sum of $565,637,000. (b) Classified Authorization of Appropriations.--In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Intelligence Community Management Account for fiscal year 2020 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM SEC. 201. AUTHORIZATION OF APPROPRIATIONS. There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability fund $514,000,000 for fiscal year 2020. TITLE III--GENERAL INTELLIGENCE COMMUNITY MATTERS SEC. 301. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES. The authorization of appropriations by this Act shall not be deemed to constitute authority for the conduct of any intelligence activity which is not otherwise authorized by the Constitution or the laws of the United States. SEC. 302. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS AUTHORIZED BY LAW. Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law. SEC. 303. PAID PARENTAL LEAVE. (a) Purpose.--The purpose of this section is to-- (1) help the intelligence community recruit and retain a dynamic, multi-talented, and diverse workforce capable of meeting the security goals of the United States; and (2) establish best practices and processes for other elements of the Federal Government seeking to pursue similar policies. (b) Authorization of Paid Parental Leave for Intelligence Community Employees.-- (1) In general.--Title III of the National Security Act of 1947 (50 U.S.C. 3071 et seq.) is amended by inserting after section 304 the following: ``SEC. 305. PAID PARENTAL LEAVE. ``(a) Paid Parental Leave.--Notwithstanding any other provision of law, a civilian employee of an element of the intelligence community shall have available a total of 12 administrative workweeks of paid parental leave in the event of the birth of a child of the employee, or placement of a child with the employee for adoption or foster care in order to care for such son or daughter. Such paid parental leave shall be used during the 12-month period beginning on the date of the birth or placement. Nothing in this section shall be construed to modify or otherwise affect the eligibility of an employee of an element of the intelligence community for benefits relating to leave under any other provision of law. ``(b) Treatment of Parental Leave Request.--Notwithstanding any other provision of law-- ``(1) an element of the intelligence community shall accommodate an employee's leave request under subsection (a), including a request to use such leave intermittently or to create a reduced work schedule, to the extent that the requested leave schedule does not unduly disrupt operations; and ``(2) to the extent that an employee's requested leave described in paragraph (1) arises out of medical necessity related to a serious health condition connected to the birth of a child, the employing element shall handle the scheduling consistent with the treatment of employees who are using leave under subparagraph (C) or (D) of section 6382(a)(1) of title 5, United States Code. ``(c) Rules Relating to Paid Leave.--Notwithstanding any other provision of law-- ``(1) an employee may not be required to first use all or any portion of any unpaid leave available to the employee before being allowed to use the paid parental leave described in subsection (a); and ``(2) paid parental leave under subsection (a)-- ``(A) shall be payable from any appropriation or fund available for salaries or expenses for positions within the employing element; ``(B) may not be considered to be annual or vacation leave for purposes of section 5551 or 5552 of title 5, United States Code, or for any other purpose; ``(C) if not used by the employee before the end of the 12- month period described in subsection (a) to which the leave relates, may not be available for any subsequent use and may not be converted into a cash payment; ``(D) may be granted only to the extent that the employee does not receive a total of more than 12 weeks of paid parental leave in any 12-month period beginning on the date of a birth or placement; ``(E) may not be granted-- ``(i) in excess of a lifetime aggregate total of 30 administrative workweeks based on placements of a foster child for any individual employee; or ``(ii) in connection with temporary foster care placements expected to last less than 1 year; ``(F) may not be granted for a child being placed for foster care or adoption if such leave was previously granted to the same employee when the same child was placed with the employee for foster care in the past; ``(G) shall be used in increments of hours (or fractions thereof), with 12 administrative workweeks equal to 480 hours for employees with a regular full-time work schedule and converted to a proportional number of hours for employees with part-time, seasonal, or uncommon tours of duty; and ``(H) may not be used during off-season (nonpay status) periods for employees with seasonal work schedules. ``(d) Implementation Plan.--Not later than 1 year after the date of the enactment of this section, the Director of National Intelligence shall submit to the congressional intelligence committees an implementation plan that includes-- ``(1) processes and procedures for implementing the paid parental leave policies under subsections (a) through (c); ``(2) an explanation of how the implementation of subsections (a) through (c) will be reconciled with policies of other elements of the Federal Government, including the impact on elements funded by the National Intelligence Program that are housed within agencies outside the intelligence community; and ``(3) all costs or operational expenses associated with the implementation of subsections (a) through (c). ``(e) Directive.--Not later than 180 days after the Director of National Intelligence submits the implementation plan under subsection (d), the Director of National Intelligence shall issue a written directive to implement this section, which directive shall take effect on the date of issuance. ``(f) Annual Report.--The Director of National Intelligence shall submit to the congressional intelligence committees an annual report that-- ``(1) details the number of employees of each element of the intelligence community who applied for and took paid parental leave under subsection (a) during the year covered by the report; ``(2) details the number of-- ``(A) employees of each element of the intelligence community stationed abroad who applied for and took paid parental leave under subsection (a) during the year covered by the report; and ``(B) employees of each element of the intelligence community stationed abroad who applied for paid parental leave but such application was not granted because of an undue impact on operations as specified in subsection (b)(1); and ``(3) includes updates on major implementation challenges or costs associated with paid parental leave. ``(g) Definition of Child.--For purposes of this section, the term `child' means a biological, adopted, or foster child, a stepchild, a legal ward, or a child of a person in loco parentis, who is-- ``(1) under 18 years of age; or ``(2) 18 years of age or older and incapable of self-care because of a mental or physical disability.''. (2) Clerical amendment.--The table of contents in the matter preceding section 2 of the [[Page H5864]] National Security Act of 1947 (50 U.S.C. 3002) is amended by inserting after the item relating to section 304 the following: ``Sec. 305. Paid parental leave.''. (c) Applicability.--Section 305 of the National Security Act of 1947, as added by subsection (b), shall apply with respect to leave taken in connection with the birth or placement of a child that occurs on or after the date on which the Director of National Intelligence issues the written directive under subsection (e) of such section 305. SEC. 304. UNFUNDED REQUIREMENTS OF THE INTELLIGENCE COMMUNITY. (a) In General.--Title V of the National Security Act of 1947 (50 U.S.C. 3091 et seq.) is amended by adding at the end the following new section: ``SEC. 512. UNFUNDED PRIORITIES OF THE INTELLIGENCE COMMUNITY. ``(a) Briefings.--Upon the request of an appropriate congressional committee, the Director of National Intelligence shall provide to the committee a briefing on the unfunded priorities of an element of the intelligence community. ``(b) Definitions.--In this section: ``(1) Appropriate congressional committees.--The term `appropriate congressional committees' means-- ``(A) the congressional intelligence committees; and ``(B) the Committees on Appropriations of the House of Representatives and the Senate. ``(2) Unfunded priority.--The term `unfunded priority', in the case of a fiscal year, means a program, activity, or other initiative of an element of the intelligence community that-- ``(A) was submitted by the head of the element to the Director of National Intelligence in the budget proposal for the element for that fiscal year, but was not included by the Director in the consolidated budget proposal submitted to the President for that fiscal year; or ``(B) was submitted by the Director in the consolidated budget proposal submitted to the President for that fiscal year, but was not included in the budget of the President submitted to Congress for that fiscal year pursuant to section 1105 of title 31, United States Code.''. (b) Clerical Amendment.--The table of sections in the first section of such Act is amended by inserting after the item relating to section 511 the following new item: ``Sec. 512. Unfunded priorities of the intelligence community.''. SEC. 305. EXTENDING THE INTELLIGENCE IDENTITIES PROTECTION ACT OF 1982. Section 605(4) of the National Security Act of 1947 (50 U.S.C. 3126(4)) is amended-- (1) in subparagraph (A)-- (A) by striking clause (ii); (B) in clause (i), by striking ``, and'' and inserting ``;''; and (C) by striking ``agency--'' and all that follows through ``whose identity'' and inserting ``agency whose identity''; and (2) in subparagraph (B)(i), by striking ``resides and acts outside the United States'' and inserting ``acts''. SEC. 306. INTELLIGENCE COMMUNITY PUBLIC-PRIVATE TALENT EXCHANGE. (a) Policies, Processes, and Procedures Required.--Not later than 270 days after the date of the enactment of this Act, the Director of National Intelligence shall develop policies, processes, and procedures to facilitate the rotation of personnel of the intelligence community to the private sector, and personnel from the private sector to the intelligence community. (b) Detail Authority.--Under policies developed by the Director pursuant to subsection (a), pursuant to a written agreement with a private-sector organization, and with the consent of the employee, a head of an element of the intelligence community may arrange for the temporary detail of an employee of such element to such private-sector organization, or from such private-sector organization to such element under this section. (c) Agreements.-- (1) In general.--A head of an element of the intelligence community exercising the authority of the head under subsection (a) shall provide for a written agreement among the element of the intelligence community, the private-sector organization, and the employee concerned regarding the terms and conditions of the employee's detail under this section. The agreement-- (A) shall require that the employee of the element, upon completion of the detail, serve in the element, or elsewhere in the civil service if approved by the head of the element, for a period that is at least equal to the length of the detail; (B) shall provide that if the employee of the element fails to carry out the agreement, such employee shall be liable to the United States for payment of all non-salary and benefit expenses of the detail, unless that failure was for good and sufficient reason, as determined by the head of the element; (C) shall contain language informing such employee of the prohibition on sharing, using, or otherwise improperly handling classified of unclassified non-public information for the benefit or advantage of the private-sector organization; (D) shall contain language governing the handling of classified information by such employee during the detail; and (E) shall contain language requiring the employee to acknowledge the obligations of the employee under section 1905 of title 18, United States Code. (2) Amount of liability.--An amount for which an employee is liable under paragraph (1) shall be treated as a debt due the United States. (3) Waiver.--The head of an element of the intelligence community may waive, in whole or in part, collection of a debt described in paragraph (2) based on a determination that the collection would be against equity and good conscience and not in the best interests of the United States, after taking into account any indication of fraud, misrepresentation, fault, or lack of good faith on the part of the employee. (d) Termination.--A detail under this section may, at any time and for any reason, be terminated by the head of the element of the intelligence community concerned or the private-sector organization concerned. (e) Duration.-- (1) In general.--A detail under this section shall be for a period of not less than 3 months and not more than 2 years, renewable up to a total of 3 years. (2) Longer periods.--A detail under this section may be for a period in excess of 2 years, but not more than 3 years, if the head of the element making the detail determines that such detail is necessary to meet critical mission or program requirements. (3) Limitation.--No employee of an element of the intelligence community may be detailed under this section for more than a total of 5 years, inclusive of all such details. (f) Status of Federal Employees Detailed to Private-sector Organizations.-- (1) In general.--An employee of an element of the intelligence community who is detailed to a private-sector organization under this section shall be considered, during the period of detail, to be on a regular work assignment in the element. The written agreement established under subsection (c)(1) shall address the specific terms and conditions related to the employee's continued status as a Federal employee. (2) Requirements.--In establishing a temporary detail of an employee of an element of the intelligence community to a private-sector organization, the head of the element shall-- (A) certify that the temporary detail of such employee shall not have an adverse or negative impact on mission attainment or organizational capabilities associated with the detail; and (B) in the case of an element of the intelligence community in the Department of Defense, ensure that the normal duties and functions of such employees are not, as a result of and during the course of such temporary detail, performed or augmented by contractor personnel in violation of the provisions of section 2461 of title 10, United States Code. (g) Terms and Conditions for Private-sector Employees.--An employee of a private-sector organization who is detailed to an element of the intelligence community under this section-- (1) shall continue to receive pay and benefits from the private-sector organization from which such employee is detailed and shall not receive pay or benefits from the element, except as provided in paragraph (2); (2) is deemed to be an employee of the element for the purposes of-- (A) chapters 73 and 81 of title 5, United States Code; (B) sections 201, 203, 205, 207, 208, 209, 603, 606, 607, 643, 654, 1905, and 1913 of title 18, United States Code; (C) sections 1343, 1344, and 1349(b) of title 31, United States Code; (D) chapter 171 of title 28, United States Code (commonly known as the ``Federal Tort Claims Act'') and any other Federal tort liability statute; (E) the Ethics in Government Act of 1978 (5 U.S.C. App.); and (F) chapter 21 of title 41, United States Code; (3) may perform work that is considered inherently governmental in nature only when requested in writing by the head of the element; (4) may not be used to circumvent any limitation or restriction on the size of the workforce of the element; (5) shall be subject to the same requirements applicable to an employee performing the same functions and duties proposed for performance by the private sector employee; and (6) in the case of an element of the intelligence community in the Department of Defense, may not be used to circumvent the provisions of section 2461 of title 10, United States Code. (h) Prohibition Against Charging Certain Costs to the Federal Government.--A private-sector organization may not charge an element of the intelligence community or any other agency of the Federal Government, as direct costs under a Federal contract, the costs of pay or benefits paid by the organization to an employee detailed to an element of the intelligence community under this section for the period of the detail and any subsequent renewal periods. (i) Additional Administrative Matters.--In carrying out this section, the Director, pursuant to procedures developed under subsection (a)-- (1) shall, to the degree practicable, ensure that small business concerns are represented with respect to details authorized by this section; (2) may, notwithstanding any other provision of law, establish criteria for elements of the intelligence community to use appropriated funds to reimburse small business concerns for the salaries and benefits of its employees during the periods when the small business concern agrees to detail its employees to the intelligence community under this section; (3) shall take into consideration the question of how details under this section might best be used to help meet the needs of the intelligence community, including with respect to the training of employees; (4) shall take into consideration areas of private-sector expertise that are critical to the intelligence community; and (5) shall establish oversight mechanisms to determine whether the public-private exchange authorized by this section improves the efficiency and effectiveness of the intelligence community. (j) Definitions.--In this section: (1) Detail.--The term ``detail'' means, as appropriate in the context in which such term is used-- [[Page H5865]] (A) the assignment or loan of an employee of an element of the intelligence community to a private-sector organization without a change of position from the intelligence community element that employs the individual; or (B) the assignment or loan of an employee of a private- sector organization to an element of the intelligence community without a change of position from the private- sector organization that employs the individual. (2) Private-sector organization.--The term ``private-sector organization'' means-- (A) a for-profit organization; or (B) a not-for-profit organization. (3) Small business concern.--The term ``small business concern'' has the meaning given such term in section 3703(e)(2) of title 5, United States Code. SEC. 307. ASSESSMENT OF CONTRACTING PRACTICES TO IDENTIFY CERTAIN SECURITY AND COUNTERINTELLIGENCE CONCERNS. (a) Assessment.-- (1) Contracting practices.--The Director of National Intelligence shall conduct an assessment of the authorities, policies, processes, and standards used by the elements of the intelligence community to ensure that the elements appropriately weigh security and counterintelligence risks in awarding a contract to a contractor that-- (A) carries out any joint research and development activities with a covered foreign country; or (B) performs any contract or other agreement entered into with a covered foreign country. (2) Elements.--The assessment under paragraph (1) shall include the following: (A) An assessment of whether the authorities, policies, processes, and standards specified in paragraph (1) sufficiently identify security and counterintelligence concerns. (B) Identification of any authority gaps in such authorities, policies, processes, and standards that prevent the intelligence community from considering the activities specified in subparagraphs (A) and (B) of paragraph (1) when evaluating offers for a contract. (3) Consultation.--In carrying out paragraph (1), the Director shall consult with each head of an element of the intelligence community. (b) Report.-- (1) Requirement.--Not later than 180 days after the date of the enactment of this Act, the Director shall submit to the congressional intelligence committees a report on the assessment under subsection (a)(1). (2) Matters included.--The report under paragraph (1) shall include the following: (A) The assessment under subsection (a)(1). (B) An identification of any known contractors that have-- (i) carried out activities specified in subparagraphs (A) and (B) of subsection (a)(1); and (ii) submitted an offer for a contract with an element of the intelligence community. (C) A description of the steps that the Director and the heads of the elements of the intelligence community took to identify contractors under subparagraph (B). (3) Form.--The report under paragraph (1) shall be submitted in unclassified form, but may include a classified annex. (c) Covered Foreign Country Defined.--In this section, the term ``covered foreign country'' means the government, or any entity affiliated with the military or intelligence services of, the following foreign countries: (1) The People's Republic of China. (2) The Russian Federation. (3) The Democratic People's Republic of Korea. (4) The Islamic Republic of Iran. SEC. 308. REQUIRED COUNTERINTELLIGENCE BRIEFINGS AND NOTIFICATIONS. (a) Foreign Counterintelligence and Cybersecurity Threats to Federal Election Campaigns.-- (1) Reports required.-- (A) In general.--As provided in subparagraph (B), for each Federal election, the Director of National Intelligence, in coordination with the Under Secretary of Homeland Security for Intelligence and Analysis and the Director of the Federal Bureau of Investigation, shall make publicly available on an Internet website an advisory report on foreign counterintelligence and cybersecurity threats to election campaigns for Federal offices. Each such report shall include, consistent with the protection of sources and methods, each of the following: (i) A description of foreign counterintelligence and cybersecurity threats to election campaigns for Federal offices. (ii) A summary of best practices that election campaigns for Federal offices can employ in seeking to counter such threats. (iii) An identification of any publicly available resources, including United States Government resources, for countering such threats. (B) Schedule for submittal.--A report under this subsection shall be made available as follows: (i) In the case of a report regarding an election held for the office of Senator or Member of the House of Representatives during 2018, not later than the date that is 60 days after the date of the enactment of this Act. (ii) In the case of a report regarding an election for a Federal office during any subsequent year, not later than the date that is 1 year before the date of the election. (C) Information to be included.--A report under this subsection shall reflect the most current information available to the Director of National Intelligence regarding foreign counterintelligence and cybersecurity threats. (2) Treatment of campaigns subject to heightened threats.-- If the Director of the Federal Bureau of Investigation and the Under Secretary of Homeland Security for Intelligence and Analysis jointly determine that an election campaign for Federal office is subject to a heightened foreign counterintelligence or cybersecurity threat, the Director and the Under Secretary, consistent with the protection of sources and methods, may make available additional information to the appropriate representatives of such campaign. (b) Briefings on Counterintelligence Activities of the Federal Bureau of Investigation.-- (1) In general.--Title V of the National Security Act of 1947 (50 U.S.C. 3091 et seq.), as amended by section 304, is further amended by adding at the end the following new section: ``SEC. 513. BRIEFINGS AND NOTIFICATIONS ON COUNTERINTELLIGENCE ACTIVITIES OF THE FEDERAL BUREAU OF INVESTIGATION. ``(a) Quarterly Briefings.--In addition to, and without any derogation of, the requirement under section 501 to keep the congressional intelligence committees fully and currently informed of the intelligence and counterintelligence activities of the United States, not less frequently than once each quarter, the Director of the Federal Bureau of Investigation shall provide to the congressional intelligence committees a briefing on the counterintelligence activities of the Federal Bureau of Investigation. Such briefings shall include, at a minimum, an overview and update of-- ``(1) the counterintelligence posture of the Bureau; ``(2) counterintelligence investigations; and ``(3) any other information relating to the counterintelligence activities of the Bureau that the Director determines necessary. ``(b) Notifications.--In addition to the quarterly briefings under subsection (a), the Director of the Federal Bureau of Investigation shall promptly notify the congressional intelligence committees of any counterintelligence investigation carried out by the Bureau with respect to any counterintelligence risk or threat that is related to an election or campaign for Federal office. ``(c) Guidelines.-- ``(1) Development and consultation.--The Director shall develop guidelines governing the scope of the briefings provided under subsection (a), the notifications provided under subsection (b), and the information required by section 308(a)(2) of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020. The Director shall consult the congressional intelligence committees during such development. ``(2) Submission.--The Director shall submit to the congressional intelligence committees-- ``(A) the guidelines under paragraph (1) upon issuance; and ``(B) any updates to such guidelines by not later than 15 days after making such update.''. (2) Clerical amendment.--The table of contents at the beginning of such Act, as amended by section 304, is further amended by inserting after the item relating to section 512 the following new item: ``Sec. 513. Briefings and notifications on counterintelligence activities of the Federal Bureau of Investigation.''. TITLE IV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY SEC. 401. ESTABLISHMENT OF CLIMATE SECURITY ADVISORY COUNCIL. (a) Establishment.--Title I of the National Security Act of 1947 (50 U.S.C. 3021 et seq.) is amended by adding at the end the following new section: ``SEC. 120. CLIMATE SECURITY ADVISORY COUNCIL. ``(a) Establishment.--The Director of National Intelligence shall establish a Climate Security Advisory Council for the purpose of-- ``(1) assisting intelligence analysts of various elements of the intelligence community with respect to analysis of climate security and its impact on the areas of focus of such analysts; ``(2) facilitating coordination between the elements of the intelligence community and elements of the Federal Government that are not elements of the intelligence community in collecting data on, and conducting analysis of, climate change and climate security; and ``(3) ensuring that the intelligence community is adequately prioritizing climate change in carrying out its activities. ``(b) Composition of Council.-- ``(1) Members.--The Council shall be composed of the following individuals appointed by the Director of National Intelligence: ``(A) An appropriate official from the National Intelligence Council, who shall chair the Council. ``(B) The lead official with respect to climate and environmental security analysis from-- ``(i) the Central Intelligence Agency; ``(ii) the Bureau of Intelligence and Research of the Department of State; ``(iii) the National Geospacial-Intelligence Agency; ``(iv) the Office of Intelligence and Counterintelligence of the Department of Energy; ``(v) the Office of the Under Secretary of Defense for Intelligence; and ``(vi) the Defense Intelligence Agency. ``(C) Three appropriate officials from elements of the Federal Government that are not elements of the intelligence community that are responsible for-- ``(i) providing decision-makers with a predictive understanding of the climate; ``(ii) making observations of our Earth system that can be used by the public, policymakers, and to support strategic decisions; or ``(iii) coordinating Federal research and investments in understanding the forces shaping the global environment, both human and natural, and their impacts on society. [[Page H5866]] ``(D) Any other officials as the Director of National Intelligence or the chair of the Council may determine appropriate. ``(2) Responsibilities of chair.--The chair of the Council shall have responsibility for-- ``(A) identifying agencies to supply individuals from elements of the Federal Government that are not elements of the intelligence community; ``(B) securing the permission of the relevant agency heads for the participation of such individuals on the Council; and ``(C) any other duties that the Director of National Intelligence may direct. ``(c) Duties and Responsibilities of Council.--The Council shall carry out the following duties and responsibilities: ``(1) To meet at least quarterly to-- ``(A) exchange appropriate data between elements of the intelligence community and elements of the Federal Government that are not elements of the intelligence community; ``(B) discuss processes for the routine exchange of such data and implementation of such processes; and ``(C) prepare summaries of the business conducted at each meeting. ``(2) To assess and determine best practices with respect to the analysis of climate security, including identifying publicly available information and intelligence acquired through clandestine means that enables such analysis. ``(3) To assess and identify best practices with respect to prior efforts of the intelligence community to analyze climate security. ``(4) To assess and describe best practices for identifying and disseminating climate security indicators and warnings; ``(5) To recommend methods of incorporating analysis of climate security and the best practices identified under paragraphs (2) through (4) into existing analytic training programs. ``(6) To consult, as appropriate, with other elements of the intelligence community that conduct analysis of climate change or climate security and elements of the Federal Government that are not elements of the intelligence community that conduct analysis of climate change or climate security, for the purpose of sharing information about ongoing efforts and avoiding duplication of existing efforts. ``(7) To work with elements of the intelligence community that conduct analysis of climate change or climate security and elements of the Federal Government that are not elements of the intelligence community that conduct analysis of climate change or climate security-- ``(A) to exchange appropriate data between such elements, establish processes, procedures and practices for the routine exchange of such data, discuss the implementation of such processes; and ``(B) to enable and facilitate the sharing of findings and analysis between such elements. ``(8) To assess whether the elements of the intelligence community that conduct analysis of climate change or climate security may inform the research direction of academic work and the sponsored work of the United States Government. ``(9) At the discretion of the chair of the Council, to convene conferences of analysts and non-intelligence community personnel working on climate change or climate security on subjects that the chair shall direct. ``(d) Sunset.--The Council shall terminate on the date that is 4 years after the date of the enactment of this section. ``(e) Definitions.--In this section: ``(1) Climate security.--The term `climate security' means the effects of climate change on the following: ``(A) The national security of the United States, including national security infrastructure. ``(B) Subnational, national, and regional political stability. ``(C) The security of allies and partners of the United States. ``(D) Ongoing or potential political violence, including unrest, rioting, guerrilla warfare, insurgency, terrorism, rebellion, revolution, civil war, and interstate war. ``(2) Climate intelligence indications and warnings.--The term `climate intelligence indications and warnings' means developments relating to climate security with the potential to-- ``(A) imminently and substantially alter the political stability or degree of human security in a country or region; or ``(B) imminently and substantially threaten-- ``(i) the national security of the United States; ``(ii) the military, political, or economic interests of allies and partners of the United States; or ``(iii) citizens of the United States abroad.''. (b) Clerical Amendment.--The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 119B the following new item: ``Sec. 120. Climate Security Advisory Council.''. (c) Initial Appointments.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall appoint the members of the Council under section 120 of the National Security Act of 1947, as added by subsection (a). SEC. 402. TRANSFER OF NATIONAL INTELLIGENCE UNIVERSITY TO THE OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE. (a) Transfer.--Not later than 90 days after the date of the enactment of this Act, the Director of the Defense Intelligence Agency shall transfer to the Director of National Intelligence the National Intelligence University, including the functions, personnel, assets, and liabilities of the University. (b) Degree-granting Authority.-- (1) Regulations.--Under regulations prescribed by the Director of National Intelligence, the President of the National Intelligence University may, upon the recommendation of the faculty of the University, confer appropriate degrees upon graduates who meet the degree requirements. (2) Limitation.--A degree may not be conferred under this section unless-- (A) the appropriate head of a Department of the Federal Government has recommended approval of the degree in accordance with any Federal policy applicable to the granting of academic degrees by departments and agencies of the Federal Government; and (B) the University is accredited by the appropriate civilian academic accrediting agency or organization to award the degree, as determined by such appropriate head of a Department. (c) Congressional Notification Requirements.-- (1) Notification.--When seeking to establish degree- granting authority under this section, the Director shall submit to the congressional intelligence committees-- (A) a copy of the self-assessment questionnaire required by the Federal policy specified in subsection (b)(2)(A); and (B) any subsequent recommendations and rationale of the appropriate head of a Department specified in such subsection regarding establishing such degree-granting authority. (2) Modification.--Upon any modification or redesignation of existing degree-granting authority, the Director shall submit to the congressional intelligence committees a report containing the rationale for the proposed modification or redesignation and any subsequent recommendation described in paragraph (1)(B) with respect to the proposed modification or redesignation. (3) Actions on nonaccreditation.--The Director shall submit to the congressional intelligence committees a report containing an explanation of any action by the appropriate academic accrediting agency or organization not to accredit the University to award any new or existing degree. (d) Conforming Repeal.--Effective 90 days after the date of the enactment of this Act, section 2161 of title 10, United States Code, is repealed, and the table of sections at the beginning of chapter 108 of such title is amended by striking the item relating to such section 2161. SEC. 403. DEATH BENEFITS FOR SURVIVORS OF CENTRAL INTELLIGENCE AGENCY PERSONNEL. (a) Sense of Congress.--It is the sense of Congress that-- (1) officers of the Central Intelligence Agency who die during a period of assignment to a duty station in a foreign country should receive death benefits, regardless of whether the officers-- (A) were killed on or off duty; (B) were killed due to an act of terrorism; or (C) have surviving dependents; (2) section 8 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3510) has provided the Agency an appropriate authority for compensating officers who die abroad who fall into any gaps in existing death benefit regulations of the Agency, even before the clarifying amendments made by this Act; (3) notwithstanding that the improved authority provided by section 11(c) of such Act (50 U.S.C. 3511(c)), as added by subsection (e) of this section, is permissive, the Director of the Agency should promptly use such authority to modify the regulations on death benefits of the Agency to implement such section 11(c); (4) the Director should not modify such regulations in a manner that limits or reduces the individuals covered by such regulations as in effect on the day before the date of the enactment of this Act; and (5) upon modifying such regulations, the Director should submit such regulations to the congressional intelligence committees pursuant to section 11(b) of such Act. (b) Clarification of Current Authority.--Section 8 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3510) is amended by inserting before ``rental of'' the following: ``payment of death benefits in cases in which the circumstances of the death of an employee of the Agency is not covered by section 11, other similar provisions of Federal law, or any regulation issued by the Director providing death benefits, but that the Director determines such payment appropriate;''. (c) Improvements to Benefits.-- (1) Requirements.--Section 11 of such Act (50 U.S.C. 3511) is amended by adding at the end the following new subsections. ``(C) Payments.--(1) In carrying out subsection (a), the Director may pay to the survivor of a deceased covered individual an amount equal to one year's salary 5313 of title 5, United States Code. ``(2) A covered individual may designate one or more persons to receive all or a portion of the amount payable to a survivor under paragraph (1). The designation of a person to receive a portion of the amount shall indicate the percentage of the amount, to be specified only in 10 percent increments, that the designated person may receive. The balance of the amount, if any, shall be paid in accordance with subsection (f)(2)(B). ``(d) Exception.--The Director may not make a payment under subsection (a) if the Director determines that the death was by reason of willful misconduct by the decedent. ``(e) Finality.--Any determination made by the Director under this section is final and may not be reviewed. ``(f) Definitions.--In this section: ``(1) The term `covered individual' means any of the following individuals who die during a period of assignment to a duty station in a foreign country, regardless of whether the death is the result of injuries sustained while in the performance of duty: ``(A) An employee of the Agency. ``(B) An employee of an element of the Federal Government other than the Agency who is detailed or assigned to the Agency at the time of death. [[Page H5867]] ``(C) An individual affiliated with the Agency, as determined by the Director. ``(2) The term `State' means each of the several States, the District of Columbia, the Commonwealth of Puerto Rico, the Commonwealth of the Northern Mariana Islands, and any territory or possession of the United States. ``(3) The term `survivor' means, with respect to the death of a covered individual-- ``(A) a person designated by the covered individual under subsection (c)(2); or ``(B) if a covered individual does not make such a designation-- ``(i) the surviving spouse of the covered individual, if any; ``(ii) if there is no surviving spouse, any surviving children of the covered individual and the descendants of any deceased children by representation; ``(iii) if there is none of the above, the surviving parents of the covered individual or the survivor of the parents. ``(iv) if there is none of the above, the duly-appointed executor or administrator of the estate of the covered individual; or ``(v) if there is none of the above, other next of kin of the covered individual entitled under the laws of the last State if which the covered individual was domiciled before the covered individual's death.''. (2) Application.--Section 11 of such Act, as amended by paragraph (1), shall apply with respect to the following: (A) Deaths occurring during the period beginning on September 11, 2001, and ending on the day before the date of the enactment of this Act for which the Director of the Central Intelligence Agency has not paid a death benefit to the survivors of the decedent equal to or greater than the amount specified in subsection (c)(1) of such section 11, except that the total of any such death benefits may not exceed such amount specified in subsection (c)(1) of such section 11. (B) Deaths occurring on or after the date of the enactment of this Act. (3) Designations.--If the Director carries out subsection (c) of section 11 of such Act, as added by paragraph (1), the Director shall-- (A) request all covered individuals (as defined in such section 11) to make a designation under paragraph (2) of such subsection (c); and (B) ensure that any new covered individual may make such a designation at the time at which the individual becomes a covered individual. (d) Briefing on Provision of VA and DOD Health Care Services to CIA Officers.-- (1) Findings.--Congress finds that officers of the Central Intelligence Agency-- (A) serve, and have served, overseas in dangerous areas or austere environments; (B) may be wounded, incur brain or psychological trauma, or suffer from other chronic injuries as a result of such service; and (C) face challenges in getting the expert medical and psychological care the officers need when the officers return to the United States. (2) Requirement.--Not later than 180 days after the date of the enactment of this Act, the General Counsel of the Central Intelligence Agency and the Deputy Director of the Agency for Operations, in coordination with the Under Secretary of Veterans Affairs for Health and the Director of the Defense Health Agency of the Department of the Defense, shall jointly provide to the appropriate congressional committees a briefing on-- (A) the extent to which the Director of the Agency believes that the officers of the Agency could benefit from health care services provided by the Secretary of Veterans Affairs, the Secretary of Defense, or both; (B) the legal and policy constraints with respect to providing such services to such officers; and (C) recommendations with respect to the legislative or regulatory actions that Congress, the Secretary of Veterans Affairs, and the Secretary of Defense could implement to facilitate the provision of such services. (3) Appropriate congressional committees defined.--In this subsection, the term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Armed Services and the Committee on Veterans' Affairs of the House of Representatives; and (C) the Committee on Armed Services and the Committee on Veterans' Affairs of the Senate. TITLE V--MATTERS RELATING TO FOREIGN COUNTRIES SEC. 501. ANNUAL REPORTS ON INFLUENCE OPERATIONS AND CAMPAIGNS IN THE UNITED STATES BY THE COMMUNIST PARTY OF CHINA. (a) Reports.--Title XI of the National Security Act of 1947 (50 U.S.C. 3231 et seq.), as amended by section 2718, is further amended by adding at the end the following new section: ``SEC. 1106. ANNUAL REPORTS ON INFLUENCE OPERATIONS AND CAMPAIGNS IN THE UNITED STATES BY THE COMMUNIST PARTY OF CHINA. ``(a) Requirement.--On an annual basis, consistent with the protection of intelligence sources and methods, the Director of the National Counterintelligence and Security Center shall submit to the congressional intelligence committees, the Committee on Foreign Affairs of the House of Representatives, and the Committee on Foreign Relations of the Senate a report on the influence operations and campaigns in the United States conducted by the Communist Party of China. ``(b) Contents.--Each report under subsection (a) shall include the following: ``(1) A description of the organization of the United Front Work Department of the People's Republic of China, or the successors of the United Front Work Department, and the links between the United Front Work Department and the Central Committee of the Communist Party of China. ``(2) An assessment of the degree to which organizations that are associated with or receive funding from the United Front Work Department, particularly such entities operating in the United States, are formally tasked by the Chinese Communist Party or the Government of China. ``(3) A description of the efforts by the United Front Work Department and subsidiary organizations of the United Front Work Department to target, coerce, and influence foreign populations, particularly those of ethnic Chinese descent. ``(4) An assessment of attempts by the Chinese Embassy, consulates, and organizations affiliated with the Chinese Communist Party (including, at a minimum, the United Front Work Department) to influence the United States-based Chinese Student Scholar Associations. ``(5) A description of the evolution of the role of the United Front Work Department under the leadership of the President of China. ``(6) An assessment of the activities of the United Front Work Department designed to influence the opinions of elected leaders of the United States, or candidates for elections in the United States, with respect to issues of importance to the Chinese Communist Party. ``(7) A listing of all known organizations affiliated with the United Front Work Department that are operating in the United States as of the date of the report. ``(8) With respect to reports submitted after the first report, an assessment of the change in goals, tactics, techniques, and procedures of the influence operations and campaigns conducted by the Chinese Communist Party. ``(c) Coordination.--In carrying out subsection (a), the Director shall coordinate with the Director of the Federal Bureau of Investigation, the Director of the Central Intelligence Agency, the Director of the National Security Agency, and any other relevant head of an element of the intelligence community. ``(d) Form.--Each report submitted under subsection (a) shall be submitted in unclassified form, but may include a classified annex.''. (b) Clerical Amendment.--The table of contents in the first section of the National Security Act of 1947, as amended by section 2718, is further amended by inserting after the item relating to section 1105 the following new item: ``Sec. 1106. Annual reports on influence operations and campaigns in the United States by the Communist Party of China.''. (c) Initial Report.--The Director of the National Counterintelligence and Security Center shall submit to the congressional intelligence committees, the Committee on Foreign Affairs of the House of Representatives, and the Committee on Foreign Relations of the Senate the first report under section 1106 of the National Security Act of 1947, as added by subsection (a), by not later than 180 days after the date of the enactment of this Act. SEC. 502. REPORT ON REPRESSION OF ETHNIC MUSLIM MINORITIES IN THE XINJIANG REGION OF THE PEOPLE'S REPUBLIC OF CHINA. (a) Report.--Not later than 150 days after the date of the enactment of this Act, consistent with the protection of intelligence sources and methods, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Foreign Affairs of the House of Representatives, and the Committee on Foreign Relations of the Senate a report on activity by the People's Republic of China to repress ethnic Muslim minorities in the Xinjiang region of China. (b) Contents.--The report under subsection (a) shall include the following: (1) An assessment of the number of individuals detained in ``political reeducation camps'', and the conditions in such camps for detainees, in the Xinjiang region of China, including whether detainees endure torture, forced renunciation of faith, or other mistreatment. (2) A description, as possible, of the geographic location of such camps. (3) A description, as possible, of the methods used by China to ``reeducate'' detainees and the elements of China responsible for such ``reeducation''. (4) A description of any forced labor in such camps, and any labor performed in regional factories for low wages under the threat of being sent back to ``political reeducation camps''. (5) An assessment of the level of access China grants to foreign persons observing the situation in Xinjiang and a description of measures used to impede efforts to monitor the conditions in Xinjiang. (6) An assessment of the surveillance, detection, and control methods used by China to target ethnic minorities, including new ``high-tech'' policing models and a description of any civil liberties or privacy protections provided under such models. (c) Coordination.--The Director of National Intelligence shall carry out subsection (a) in coordination with the Director of the Central Intelligence Agency, the Director of the National Security Agency, the Director of the National Geospatial-Intelligence Agency, and the head of any other agency of the Federal Government that the Director of National Intelligence determines appropriate. (d) Form.--The report submitted under subsection (a) shall be submitted in unclassified form, but may include a classified annex. SEC. 503. REPORT ON EFFORTS BY PEOPLE'S REPUBLIC OF CHINA TO INFLUENCE ELECTION IN TAIWAN. (a) Report.--Consistent with section 3(c) of the Taiwan Relations Act (Public Law 96-8; 22 U.S.C. 3302(c)), and consistent with the protection of intelligence sources and methods, not later than 45 days after the date of the election [[Page H5868]] for the President and Vice President of Taiwan in 2020, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Foreign Affairs of the House of Representatives, and the Committee on Foreign Relations of the Senate a report on any-- (1) influence operations conducted by China to interfere in or undermine such election; and (2) efforts by the United States to disrupt such operations. (b) Elements.--The report under subsection (a) shall include the following: (1) A description of any significant efforts by the intelligence community to coordinate technical and material support for Taiwan to identify, disrupt, and combat influence operations specified in subsection (a)(1). (2) A description of any efforts by the United States Government to build the capacity of Taiwan to disrupt external efforts that degrade a free and fair election process. (3) An assessment of whether and to what extent China conducted influence operations specified in subsection (a)(1), and, if such operations occurred-- (A) a comprehensive list of specific governmental and nongovernmental entities of China that were involved in supporting such operations and a description of the role of each such entity; and (B) an identification of any tactics, techniques, and procedures used in such operations. (c) Form.--The report under subsection (a) shall be submitted in unclassified form, but may include a classified annex. SEC. 504. ASSESSMENT OF LEGITIMATE AND ILLEGITIMATE FINANCIAL AND OTHER ASSETS OF VLADIMIR PUTIN. (a) Sense of Congress.--It is the sense of Congress that the United States should do more to expose the corruption of Vladimir Putin, whose ill-gotten wealth is perhaps the most powerful global symbol of his dishonesty and his persistent efforts to undermine the rule of law and democracy in the Russian Federation. (b) Assessment.--Not later than 180 days after the date of the enactment of this Act, consistent with the protection of intelligence sources and methods, the Director of National Intelligence shall submit to the appropriate congressional committees an assessment, based on all sources of intelligence, on the net worth and financial and other assets, legitimate as well as illegitimate, of Russian President Vladimir Putin and his family members, including-- (1) the estimated net worth of Vladimir Putin and his family members; (2) a description of their legitimately and illegitimately obtained assets, including all real, personal, and intellectual property, bank or investment or similar accounts, and any other financial or business interests or holdings, including those outside of Russia; (3) the details of the legitimately and illegitimately obtained assets, including real, personal, and intellectual property, bank or investment or similar accounts, and any other financial or business interests or holdings, including those outside of Russia, that are owned or controlled by, accessible to, or otherwise maintained for the benefit of Vladimir Putin, including their nature, location, manner of acquisition, value, and publicly named owner (if other than Vladimir Putin); (4) the methods used by Vladimir Putin or others acting at his direction, with his knowledge, or for his benefit, to conceal Putin's interest in his accounts, holdings, or other assets, including the establishment of ``front'' or shell companies and the use of intermediaries; and (5) an identification of the most significant senior Russian political figures, oligarchs, and any other persons who have engaged in activity intended to conceal the true financial condition of Vladimir Putin. (c) Form.--The assessment required under subsection (b) shall be submitted either-- (1) in unclassified form to the extent consistent with the protection of intelligence sources and methods, and may include a classified annex; or (2) simultaneously as both an unclassified version and a classified version. (d) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means-- (1) the Select Committee on Intelligence, the Committee on Foreign Relations, the Committee on Banking, Housing, and Urban Affairs, and the Committee on Finance of the Senate; and (2) the Permanent Select Committee on Intelligence, Committee on Foreign Affairs, the Committee on Financial Services, and the Committee on Ways and Means of the House of Representatives. SEC. 505. ASSESSMENTS OF INTENTIONS OF POLITICAL LEADERSHIP OF THE RUSSIAN FEDERATION. (a) In General.--Not later than 90 days after the date of the enactment of this Act, consistent with the protection of intelligence sources and methods, the Director of National Intelligence, and the head of any element of the intelligence community that the Director determines appropriate, shall submit to the appropriate congressional committees each of the assessments described in subsection (b). (b) Assessments Described.--The assessments described in this subsection are assessments based on intelligence obtained from all sources that assess the current intentions of the political leadership of the Russian Federation with respect to the following: (1) Potential military action against members of the North Atlantic Treaty Organization (NATO). (2) Potential responses to an enlarged United States or NATO military presence in eastern Europe or to increased United States military support for allies and partners in the region, such as the provision of additional lethal military equipment to Ukraine or Georgia. (3) Potential actions taken for the purpose of exploiting perceived divisions among the governments of Russia's Western adversaries. (c) Form.--Each assessment required under subsection (a) may be submitted in classified form but shall also include an unclassified executive summary, consistent with the protection of intelligence sources and methods. (d) Appropriate Congressional Committees.--In this section, the term ``appropriate congressional committees'' means-- (1) the Permanent Select Committee on Intelligence, the Committee on Foreign Affairs, and the Committee on Armed Services of the House of Representatives; and (2) the Select Committee on Intelligence, the Committee on Foreign Relations, and the Committee on Armed Services of the Senate. SEC. 506. REPORT ON DEATH OF JAMAL KHASHOGGI. (a) In General.--Not later than 30 days after the date of the enactment of this Act, consistent with the protection of intelligence sources and methods, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Foreign Affairs of the House of Representatives, and the Committee on Foreign Relations of the Senate a report on the death of Jamal Khashoggi. Such report shall include identification of those who carried out, participated in, ordered, or were otherwise complicit in or responsible for the death of Jamal Khashoggi, to the extent consistent with the protection of sources and methods. (b) Form.--The report submitted under subsection (a) shall be submitted in unclassified form. TITLE VI--FEDERAL EFFORTS AGAINST DOMESTIC TERRORISM SEC. 601. DEFINITIONS. In this title: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee on the Judiciary of the House of Representatives; and (B) the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee on the Judiciary of the Senate. (2) Domestic terrorism.--The term ``domestic terrorism'' has the meaning given that term in section 2331 of title 18, United States Code. (3) Hate crime.--The term ``hate crime'' means a criminal offense under-- (A) sections 241, 245, 247, and 249 of title 18, United States Code; and (B) section 3631 of title 42, United States Code. (4) International terrorism.--The term ``international terrorism'' has the meaning given that term in section 2331 of title 18, United States Code. (5) Terms in attorney general's guidelines for domestic fbi operations.--The terms ``assessments'', ``full investigations'', ``enterprise investigations'',``predicated investigations'', and ``preliminary investigations'' have the meanings given those terms in the most recent, approved version of the Attorney General's Guidelines for Domestic FBI Operations (or successor). (6) Terms in fbi budget materials.--The terms ``Consolidated Strategy Guide'', ``Field Office Strategic Plan'', ``Integrated Program Management Process'', and ``Threat Review and Prioritization'' have the meanings given those terms in the materials submitted to Congress by the Attorney General in support of the Federal Bureau of Investigation budget for fiscal year 2020. (7) Terrorism.--The term ``terrorism'' includes domestic terrorism and international terrorism. (8) Terrorism information.--The term ``terrorism information'' has the meaning given that term in section 1016(a) of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. 485). (9) Time utilization and recordkeeping data.--The term ``time utilization and recordkeeping data'' means data collected on resource utilization and workload activity of personnel of the Federal Bureau of Investigation in accordance with Federal law. SEC. 602. ANNUAL STRATEGIC INTELLIGENCE ASSESSMENT OF AND COMPREHENSIVE REPORT ON DOMESTIC TERRORISM. (a) Report Required.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, and annually thereafter through 2025, the Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Under Secretary of Homeland Security for Intelligence and Analysis shall jointly submit to the appropriate congressional committees a report on domestic terrorism containing the following: (A) Strategic intelligence assessment under subsection (b). (B) Discussion of activities under subsection (c). (C) Data on domestic terrorism under subsection (d). (2) Responsibilities.-- (A) Coordination of reports and integration of information.--The Director of National Intelligence, acting through the Director of the National Counterterrorism Center, shall be the lead official for coordinating the production of and integrating terrorism information into-- (i) each report under paragraph (1); and (ii) each strategic intelligence assessment under subsection (b). (B) Information sharing.--The Director of the Federal Bureau of Investigation and the Under Secretary of Homeland Security for Intelligence and Analysis shall provide to the Director of the National Counterterrorism Center all [[Page H5869]] appropriate information requested by the Director of the National Counterterrorism Center to carry out this section. (b) Strategic Intelligence Assessment.--The Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Under Secretary of Homeland Security for Intelligence and Analysis shall include-- (1) in the first report under subsection (a)(1), a strategic intelligence assessment of domestic terrorism in the United States during fiscal years 2017, 2018, and 2019; and (2) in each subsequent report under such subsection, a strategic intelligence assessment of domestic terrorism in the United States during the prior fiscal year. (c) Discussion of Activities.--Each report under subsection (a)(1) shall discuss and compare the following: (1) The criteria for opening, managing, and closing domestic and international terrorism investigations by the Federal Government. (2) Standards and procedures for the Federal Bureau of Investigation, the Office of Intelligence and Analysis of the Department of Homeland Security, and the National Counterterrorism Center, with respect to the review, prioritization, and mitigation of domestic and international terrorism threats in the United States. (3) The planning, development, production, analysis, and evaluation by the United States Government of intelligence products relating to terrorism, including both raw and finished intelligence. (4) The sharing of information relating to domestic and international terrorism by and between-- (A) the Federal Government; (B) State, local, Tribal, territorial, and foreign governments; (C) the appropriate congressional committees; (D) non-governmental organizations; and (E) the private sector. (5) The criteria and methodology used by the Federal Bureau of Investigation, the Office of Intelligence and Analysis of the Department of Homeland Security, and the National Counterterrorism Center, to identify or assign terrorism classifications to incidents of terrorism or investigations of terrorism, including-- (A) a comparison of the criteria and methodology used with respect to domestic terrorism and international terrorism; (B) the identification of any changes made to investigative classifications; and (C) a discussion of the rationale for any changes identified under subparagraph (B). (d) Data on Domestic Terrorism.-- (1) Data required.--The Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Under Secretary of Homeland Security for Intelligence and Analysis shall include in each report under subsection (a)(1) the following data: (A) For each completed or attempted incident of domestic terrorism that has occurred in the United States during the applicable period-- (i) a description of such incident; (ii) the number and type of completed and attempted Federal non-violent crimes committed during such incident; (iii) the number and type of completed and attempted Federal and State property crimes committed during such incident, including an estimate of economic damages resulting from such crimes; and (iv) the number and type of completed and attempted Federal violent crimes committed during such incident, including the number of people injured or killed as a result of such crimes. (B) For the applicable period-- (i) an identification of each assessment, preliminary investigation, full investigation, and enterprise investigation with a nexus to domestic terrorism opened, pending, or closed by the Federal Bureau of Investigation; (ii) the number of assessments or investigations identified under clause (i) associated with each domestic terrorism investigative classification (including subcategories); (iii) the number and domestic terrorism investigative classification (including subcategories) with respect to such investigations initiated as a result of a referral or investigation by a State, local, Tribal, territorial, or foreign government of a hate crime; (iv) the number of Federal criminal charges with a nexus to domestic terrorism, including the number of indictments and complaints associated with each domestic terrorism investigative classification (including subcategories), a summary of the allegations contained in each such indictment, the disposition of the prosecution, and, if applicable, the sentence imposed as a result of a conviction on such charges; (v) referrals of incidents of domestic terrorism by State, local, Tribal, or territorial governments to departments or agencies of the Federal Government for investigation or prosecution, including the number of such referrals associated with each domestic terrorism investigation classification (including any subcategories), and a summary of each such referral that includes the rationale for such referral and the disposition of the applicable Federal investigation or prosecution; (vi) intelligence products produced by the intelligence community relating to domestic terrorism, including-- (I) the number of such products associated with each domestic terrorism investigative classification (including any subcategories); and (II) with respect to the Federal Bureau of Investigation, at a minimum, all relevant data available through the Integrated Program Management Process; (vii) with respect to the National Counterterrorism Center, the number of staff (expressed in terms of full-time equivalents and positions) working on matters relating to domestic terrorism described in clauses (i) through (vi); and (viii) with respect to the Federal Bureau of Investigation-- (I) the number of staff (expressed in terms of full-time equivalents and positions) working on matters relating to domestic terrorism described in clauses (i) through (vi); and (II) a summary of time utilization and recordkeeping data for personnel working on such matters, including the number or percentage of such personnel associated with each domestic terrorism investigative classification (including any subcategories) in the FBI Headquarters Operational Divisions and Field Divisions. (2) Applicable period.--For purposes of this subsection, the applicable period is the following: (A) For the first report required under subsection (a)(1)-- (i) with respect to the data described in paragraph (1)(A) of this subsection, the period on or after April 19, 1995; and (ii) with respect to the data described in paragraph (1)(B) of this subsection, each of fiscal years 2017, 2018, and 2019. (B) For each subsequent report required under subsection (a)(1), the prior fiscal year. (e) Provision of Other Documents and Materials.-- (1) In general.--Together with each report under subsection (a)(1), the Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Under Secretary of Homeland Security for Intelligence and Analysis shall also submit to the appropriate congressional committees the following documents and materials: (A) With respect to the Federal Bureau of Investigation, at a minimum, the most recent, approved versions of-- (i) the Attorney General's Guidelines for Domestic FBI Operations (or any successor); (ii) the FBI Domestic Investigations and Operations Guide (or any successor); (iii) the FBI Counterterrorism Policy Guide (or any successor); (iv) materials relating to terrorism within the Threat Review and Prioritization process for the headquarters and field divisions of the Federal Bureau of Investigation; (v) the Consolidated Strategy Guide (or any successor); and (vi) the Field Office Strategic Plans (or any successor). (B) With respect to the intelligence community, each finished intelligence product described in subsection (d)(1)(B)(vi). (2) Nonduplication.--If any documents or materials required under paragraph (1) have been previously submitted to the appropriate congressional committees under such paragraph and have not been modified since such submission, the Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Under Secretary of Homeland Security for Intelligence and Analysis may provide a list of such documents or materials in lieu of making the submission under paragraph (1) for those documents or materials. (f) Format.--The information required under subsection (d) may be provided in a format that uses the marking associated with the Central Records System (or any successor system) of the Federal Bureau of Investigation. (g) Classification and Public Release.--Each report under subsection (a) shall be-- (1) unclassified, but may contain a classified annex; (2) with respect to the unclassified portion of the report, made available on the public internet website of the National Counterterrorism Center in an electronic format that is fully indexed and searchable; and (3) with respect to a classified annex, submitted to the appropriate congressional committees in an electronic format that is fully indexed and searchable. TITLE VII--REPORTS AND OTHER MATTERS SEC. 701. MODIFICATION OF REQUIREMENTS FOR SUBMISSION TO CONGRESS OF CERTAIN REPORTS. (a) Modification of Reports Relating to Guantanamo Bay.-- (1) Modification.--Section 506I(b) of the National Security Act of 1947 (50 U.S.C. 3105(b)) is amended by striking ``once every 6 months'' and inserting ``annually''. (2) Modification.--Section 319(a) of the Supplemental Appropriations Act, 2009 (10 U.S.C. 801 note) is amended by striking ``every 90 days'' and inserting ``annually''. (3) Repeal.--Section 601 of the Intelligence Authorization Act for Fiscal Year 2017 (division N of Public Law 115-31; 131 Stat. 827) is repealed. (b) Modification to Reports on Analytic Integrity.-- Subsection (c) of section 1019 of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 3364) is amended-- (1) in the heading, by striking ``Reports'' and inserting ``Briefings''; and (2) by striking ``submit to the congressional intelligence committees, the heads of the relevant elements of the intelligence community, and the heads of analytic training departments a report containing'' and inserting ``provide to the congressional intelligence committees, the heads of the relevant elements of the intelligence community, and the heads of analytic training departments a briefing with''. (c) Repeal of Reports Relating to Intelligence Functions.-- Section 506J of the National Security Act of 1947 (50 U.S.C. 3105a) is repealed and the table of contents in the first section of such Act is amended by striking the item relating to section 506J. (d) Repeal of Reports Relating to Cuba.--Section 108 of the Cuban Liberty and Democratic Solidarity (LIBERTAD) Act of 1996 (22 U.S.C. 6038) is repealed. (e) Repeal of Reports Relating to Entertainment Industry.-- Section 308 of the Intelligence Authorization Act for Fiscal Year 2017 (50 U.S.C. 3332) is amended-- [[Page H5870]] (1) in subsection (b)(2)-- (A) by striking ``paragraph (1) shall--'' and all that follows through ``permit an element'' and insert ``paragraph (1) shall permit an element''; (B) by striking ``approval; and'' and inserting ``approval.''; and (C) by striking subparagraph (B); and (2) by striking subsection (c). SEC. 702. INCREASED TRANSPARENCY REGARDING COUNTERTERRORISM BUDGET OF THE UNITED STATES. (a) Findings.--Congress finds the following: (1) Consistent with section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C. 3306(a)), the recent practice of the intelligence community has been to release to the public-- (A) around the date on which the President submits to Congress a budget for a fiscal year pursuant to section 1105 of title 31, United States Code, the ``top-line'' amount of total funding requested for the National Intelligence Program for such fiscal year; and (B) the amount of requested and appropriated funds for the National Intelligence Program and Military Intelligence Program for certain prior fiscal years, consistent with the protection of intelligence sources and methods. (2) The Directorate of Strategic Operational Planning of the National Counterterrorism Center is responsible for producing an annual National Counterterrorism Budget report, which examines the alignment of intelligence and other resources in the applicable fiscal year budget with the counterterrorism goals and areas of focus in the National Strategy for Counterterrorism. (b) Sense of Congress.--It is the sense of Congress that-- (1) despite the difficulty of compiling and releasing to the public comprehensive information on the resource commitments of the United States to counterterrorism activities and programs, including with respect to such activities and programs of the intelligence community, the United States Government could take additional steps to enhance the understanding of the public with respect to such resource commitments, in a manner consistent with the protection of intelligence sources and methods and other national security interests; and (2) the United States Government should release to the public as much information as possible regarding the funding of counterterrorism activities and programs, including activities and programs of the intelligence community, in a manner consistent with the protection of intelligence sources and methods and other national security interests. (c) Briefing on Public Release of Information.-- (1) Requirement.--Not later than 90 days after the date of the enactment of this Act, and not later than 90 days after the beginning of each fiscal year thereafter, the President shall ensure that the congressional intelligence committees receive a briefing from appropriate personnel of the United States Government on the feasibility of releasing to the public additional information relating to counterterrorism efforts of the intelligence community. (2) Elements.--Each briefing required by paragraph (1) shall include a discussion of the feasibility of-- (A) subject to paragraph (3), releasing to the public the National Counterterrorism Budget report described in subsection (a)(2) for the prior fiscal year; and (B) declassifying other reports, documents, or activities of the intelligence community relating to counterterrorism and releasing such information to the public in a manner consistent with the protection of intelligence sources and methods and other national security interests. (3) Release of national counterterrorism budget report.-- The President may satisfy the requirement under paragraph (2)(A) during a fiscal year by, not later than 90 days after the beginning of the fiscal year, releasing to the public the National Counterterrorism Budget report (with any redactions the Director determines necessary to protect intelligence sources and methods and other national security interests) for the prior fiscal year. SEC. 703. TASK FORCE ON ILLICIT FINANCING OF ESPIONAGE AND FOREIGN INFLUENCE OPERATIONS. (a) Establishment.--Not later than 30 days after the date of the enactment of this Act, the Director of National Intelligence shall establish a task force to study and assess the illicit financing of espionage and foreign influence operations directed at the United States. (b) Membership.--The task force shall be composed of the following individuals (or designees of the individual): (1) The Director of the Central Intelligence Agency. (2) The Director of the Federal Bureau of Investigation. (3) The Assistant Secretary of the Treasury for Intelligence and Analysis. (4) The Assistant Secretary of State for Intelligence and Research. (5) Such other heads of the elements of the intelligence community that the Director of National Intelligence determines appropriate. (c) Chairperson; Meetings.-- (1) Chairperson.--The Director of National Intelligence shall appoint a senior official within the Office of the Director of National Intelligence to serve as the chairperson of the task force. (2) Meetings.--The task force shall meet regularly but not less frequently than on a quarterly basis. (d) Reports.-- (1) Initial report.--Not later than 180 days after the date of the enactment of this Act, the task force shall submit to the appropriate congressional committees a report on the illicit financing of espionage and foreign influence operations directed at the United States. The report shall address the following: (A) The extent of the collection by the intelligence community, from all sources (including the governments of foreign countries), of intelligence and information relating to illicit financing of espionage and foreign influence operations directed at the United States, and any gaps in such collection. (B) Any specific legal, regulatory, policy, or other prohibitions, or financial, human, technical, or other resource limitations or constraints, that have affected the ability of the Director of National Intelligence or other heads of relevant elements of the intelligence community in collecting or analyzing intelligence or information relating to illicit financing of espionage and foreign influence operations directed at the United States. (C) The methods, as of the date of the report, by which hostile governments of foreign countries or foreign organizations, and any groups or persons acting on behalf of or with the support of such governments or organizations, seek to disguise or obscure relationships between such governments, organizations, groups, or persons and United States persons, for the purpose of conducting espionage or foreign influence operations directed at the United States, including by exploiting financial laws, systems, or instruments, of the United States. (D) The existing practices of the intelligence community for ensuring that intelligence and information relating to the illicit financing of espionage and foreign influence operations is analyzed and shared with other elements of the intelligence community, and any recommendations for improving such analysis and sharing. (2) Annual update.--Not later than November 1, 2020, and each year thereafter through the date specified in subsection (e), the task force shall submit to the appropriate congressional committees an update on the report under paragraph (1). (3) Form.--Each report submitted under this subsection may be submitted in classified form, but if submitted in such form, shall include an unclassified summary. (e) Termination.--The task force shall terminate on January 1, 2025. (f) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means the following: (1) The congressional intelligence committees. (2) The Committee on Foreign Affairs and the Committee on Financial Services of the House of Representatives. (3) The Committee on Foreign Relations and the Committee on Banking, Housing, and Urban Affairs of the Senate. SEC. 704. STUDY ON ROLE OF RETIRED AND FORMER PERSONNEL OF INTELLIGENCE COMMUNITY WITH RESPECT TO CERTAIN FOREIGN INTELLIGENCE OPERATIONS. (a) Study.--The Director of National Intelligence shall conduct a study on former intelligence personnel providing covered intelligence assistance. (b) Elements.--The study under subsection (a) shall include the following: (1) An identification of, and discussion of the effectiveness of, existing laws, policies, procedures, and other measures relevant to the ability of elements of the intelligence community to prevent former intelligence personnel from providing covered intelligence assistance-- (A) without proper authorization; or (B) in a manner that would violate legal or policy controls if the personnel performed such assistance while working for the United States Government; and (2) Make recommendations for such legislative, regulatory, policy, or other changes as may be necessary to ensure that the United States consistently meets the objectives described in paragraph (1). (c) Report and Plan.--Not later than 90 days after the date of the enactment of this Act, the Director shall submit to the congressional intelligence committees-- (1) a report on the findings of the Director with respect to each element of the study under subsection (a); and (2) a plan to implement any recommendations made by the Director that the Director may implement without changes to Federal law. (d) Form.--The report and plan under subsection (c) may be submitted in classified form. (e) Definitions.--In this section: (1) Covered intelligence assistance.--The term ``covered intelligence assistance'' means assistance-- (A) provided by former intelligence personnel directly to, or for the benefit of, the government of a foreign country or indirectly to, or for the benefit of, such a government through a company or other entity; and (B) that relates to intelligence or law enforcement activities of a foreign country, including with respect to operations that involve abuses of human rights, violations of the laws of the United States, or infringements on the privacy rights of United States persons. (2) Former intelligence personnel.--The term ``former intelligence personnel'' means retired or former personnel of the intelligence community, including civilian employees of elements of the intelligence community, members of the Armed Forces, and contractors of elements of the intelligence community. SEC. 705. REPORT BY DIRECTOR OF NATIONAL INTELLIGENCE ON FIFTH-GENERATION WIRELESS NETWORK TECHNOLOGY. (a) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report on-- (1) the threat to the national security of the United States posed by the global and regional adoption of fifth- generation wireless network [[Page H5871]] (in this section referred to as ``5G wireless network'') technology built by foreign companies; and (2) possible efforts to mitigate the threat. (b) Contents.--The report under subsection (a) shall include-- (1) the timeline and scale of global and regional adoption of foreign 5G wireless network technology; (2) the implications of such global and regional adoption on the cyber and espionage threat to the United States, the interests of the United States, and the cyber and collection capabilities of the United States; and (3) the effect of possible mitigation efforts, including with respect to-- (A) a policy of the United States Government promoting the use of strong, end-to-end encryption for data transmitted over 5G wireless networks; (B) a policy of the United States Government promoting or funding free, open-source implementation of 5G wireless network technology; (C) subsidies or incentives provided by the United States Government that could be used to promote the adoption of secure 5G wireless network technology developed by companies of the United States or companies of allies of the United States; and (D) a strategy by the United States Government to reduce foreign influence and political pressure in international standard-setting bodies. (c) Form.--The report submitted under subsection (a) shall be submitted in unclassified form, but may include a classified annex. SEC. 706. ESTABLISHMENT OF 5G PRIZE COMPETITION. (a) Prize Competition.--Pursuant to section 24 of the Stevenson-Wydler Technology Innovation Act of 1980 (15 U.S.C. 3719), the Director of National Intelligence, acting through the Director of the Intelligence Advanced Research Projects Agency, shall carry out a program to award prizes competitively to stimulate research and development relevant to 5G technology. (b) Prize Amount.--In carrying out the program under subsection (a), the Director may award not more than a total of $5,000,000 to one or more winners of the prize competition. (c) Consultation.--In carrying out the program under subsection (a), the Director may consult with the heads of relevant departments and agencies of the Federal Government. (d) 5G Technology Defined.--In this section, the term ``5G technology'' means hardware, software, or other technologies relating to fifth-generation wireless networks. SEC. 707. ESTABLISHMENT OF DEEPFAKES PRIZE COMPETITION. (a) Prize Competition.--Pursuant to section 24 of the Stevenson-Wydler Technology Innovation Act of 1980 (15 U.S.C. 3719), the Director of National Intelligence, acting through the Director of the Intelligence Advanced Research Projects Agency, shall carry out a program to award prizes competitively to stimulate the research, development, or commercialization of technologies to automatically detect machine-manipulated media. (b) Prize Amount.--In carrying out the program under subsection (a), the Director may award not more than a total of $5,000,000 to one or more winners of the prize competition. (c) Consultation.--In carrying out the program under subsection (a), the Director may consult with the heads of relevant departments and agencies of the Federal Government. (d) Machine-manipulated Media Defined.--In this section, the term ``machine-manipulated media'' means video, image, or audio recordings generated or substantially modified using machine-learning techniques in order to falsely depict events, to falsely depict the speech or conduct of an individual, or to depict individuals who do not exist. DIVISION B--INTELLIGENCE AUTHORIZATIONS FOR FISCAL YEARS 2018 AND 2019 TITLE XXI--INTELLIGENCE ACTIVITIES SEC. 2101. AUTHORIZATION OF APPROPRIATIONS. (a) Fiscal Year 2019.--Funds are hereby authorized to be appropriated for fiscal year 2019 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government: (1) The Office of the Director of National Intelligence. (2) The Central Intelligence Agency. (3) The Department of Defense. (4) The Defense Intelligence Agency. (5) The National Security Agency. (6) The Department of the Army, the Department of the Navy, and the Department of the Air Force. (7) The Coast Guard. (8) The Department of State. (9) The Department of the Treasury. (10) The Department of Energy. (11) The Department of Justice. (12) The Federal Bureau of Investigation. (13) The Drug Enforcement Administration. (14) The National Reconnaissance Office. (15) The National Geospatial-Intelligence Agency. (16) The Department of Homeland Security. (b) Fiscal Year 2018.--Funds that were appropriated for fiscal year 2018 for the conduct of the intelligence and intelligence-related activities of the elements of the United States set forth in subsection (a) are hereby authorized. SEC. 2102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS. (a) Specifications of Amounts.--The amounts authorized to be appropriated under section 2101 for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 2101, are those specified in the classified Schedule of Authorizations prepared to accompany this Act. (b) Availability of Classified Schedule of Authorizations.-- (1) Availability.--The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President. (2) Distribution by the president.--Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations referred to in subsection (a), or of appropriate portions of such Schedule, within the executive branch. (3) Limits on disclosure.--The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except-- (A) as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C. 3306(a)); (B) to the extent necessary to implement the budget; or (C) as otherwise required by law. SEC. 2103. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT. (a) Authorization of Appropriations.--There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2019 the sum of $522,424,000. (b) Classified Authorization of Appropriations.--In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Intelligence Community Management Account for fiscal year 2019 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 2102(a). TITLE XXII--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM SEC. 2201. AUTHORIZATION OF APPROPRIATIONS. There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund $514,000,000 for fiscal year 2019. SEC. 2202. COMPUTATION OF ANNUITIES FOR EMPLOYEES OF THE CENTRAL INTELLIGENCE AGENCY. (a) Computation of Annuities.-- (1) In general.--Section 221 of the Central Intelligence Agency Retirement Act (50 U.S.C. 2031) is amended-- (A) in subsection (a)(3)(B), by striking the period at the end and inserting ``, as determined by using the annual rate of basic pay that would be payable for full-time service in that position.''; (B) in subsection (b)(1)(C)(i), by striking ``12-month'' and inserting ``2-year''; (C) in subsection (f)(2), by striking ``one year'' and inserting ``two years''; (D) in subsection (g)(2), by striking ``one year'' each place such term appears and inserting ``two years''; (E) by redesignating subsections (h), (i), (j), (k), and (l) as subsections (i), (j), (k), (l), and (m), respectively; and (F) by inserting after subsection (g) the following: ``(h) Conditional Election of Insurable Interest Survivor Annuity by Participants Married at the Time of Retirement.-- ``(1) Authority to make designation.--Subject to the rights of former spouses under subsection (b) and section 222, at the time of retirement a married participant found by the Director to be in good health may elect to receive an annuity reduced in accordance with subsection (f)(1)(B) and designate in writing an individual having an insurable interest in the participant to receive an annuity under the system after the participant's death, except that any such election to provide an insurable interest survivor annuity to the participant's spouse shall only be effective if the participant's spouse waives the spousal right to a survivor annuity under this Act. The amount of the annuity shall be equal to 55 percent of the participant's reduced annuity. ``(2) Reduction in participant's annuity.--The annuity payable to the participant making such election shall be reduced by 10 percent of an annuity computed under subsection (a) and by an additional 5 percent for each full 5 years the designated individual is younger than the participant. The total reduction under this subparagraph may not exceed 40 percent. ``(3) Commencement of survivor annuity.--The annuity payable to the designated individual shall begin on the day after the retired participant dies and terminate on the last day of the month before the designated individual dies. ``(4) Recomputation of participant's annuity on death of designated individual.--An annuity that is reduced under this subsection shall, effective the first day of the month following the death of the designated individual, be recomputed and paid as if the annuity had not been so reduced.''. (2) Conforming amendments.-- (A) Central intelligence agency retirement act.--The Central Intelligence Agency Retirement Act (50 U.S.C. 2001 et seq.) is amended-- (i) in section 232(b)(1) (50 U.S.C. 2052(b)(1)), by striking ``221(h),'' and inserting ``221(i),''; and (ii) in section 252(h)(4) (50 U.S.C. 2082(h)(4)), by striking ``221(k)'' and inserting ``221(l)''. (B) Central intelligence agency act of 1949.--Subsection (a) of section 14 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3514(a)) is amended by striking ``221(h)(2), 221(i), 221(l),'' and inserting ``221(i)(2), 221(j), 221(m),''. [[Page H5872]] (b) Annuities for Former Spouses.--Subparagraph (B) of section 222(b)(5) of the Central Intelligence Agency Retirement Act (50 U.S.C. 2032(b)(5)(B)) is amended by striking ``one year'' and inserting ``two years''. (c) Prior Service Credit.--Subparagraph (A) of section 252(b)(3) of the Central Intelligence Agency Retirement Act (50 U.S.C. 2082(b)(3)(A)) is amended by striking ``October 1, 1990'' both places that term appears and inserting ``March 31, 1991''. (d) Reemployment Compensation.--Section 273 of the Central Intelligence Agency Retirement Act (50 U.S.C. 2113) is amended-- (1) by redesignating subsections (b) and (c) as subsections (c) and (d), respectively; and (2) by inserting after subsection (a) the following: ``(b) Part-Time Reemployed Annuitants.--The Director shall have the authority to reemploy an annuitant on a part-time basis in accordance with section 8344(l) of title 5, United States Code.''. (e) Effective Date and Application.--The amendments made by subsection (a)(1)(A) and subsection (c) shall take effect as if enacted on October 28, 2009, and shall apply to computations or participants, respectively, as of such date. TITLE XXIII--GENERAL INTELLIGENCE COMMUNITY MATTERS SEC. 2301. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES. The authorization of appropriations by this division shall not be deemed to constitute authority for the conduct of any intelligence activity which is not otherwise authorized by the Constitution or the laws of the United States. SEC. 2302. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS AUTHORIZED BY LAW. Appropriations authorized by this division for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law. SEC. 2303. MODIFICATION OF SPECIAL PAY AUTHORITY FOR SCIENCE, TECHNOLOGY, ENGINEERING, OR MATHEMATICS POSITIONS AND ADDITION OF SPECIAL PAY AUTHORITY FOR CYBER POSITIONS. Section 113B of the National Security Act of 1947 (50 U.S.C. 3049a) is amended-- (1) by amending subsection (a) to read as follows: ``(a) Special Rates of Pay for Positions Requiring Expertise in Science, Technology, Engineering, or Mathematics.-- ``(1) In general.--Notwithstanding part III of title 5, United States Code, the head of each element of the intelligence community may, for 1 or more categories of positions in such element that require expertise in science, technology, engineering, or mathematics-- ``(A) establish higher minimum rates of pay; and ``(B) make corresponding increases in all rates of pay of the pay range for each grade or level, subject to subsection (b) or (c), as applicable. ``(2) Treatment.--The special rate supplements resulting from the establishment of higher rates under paragraph (1) shall be basic pay for the same or similar purposes as those specified in section 5305(j) of title 5, United States Code.''; (2) by redesignating subsections (b) through (f) as subsections (c) through (g), respectively; (3) by inserting after subsection (a) the following: ``(b) Special Rates of Pay for Cyber Positions.-- ``(1) In general.--Notwithstanding subsection (c), the Director of the National Security Agency may establish a special rate of pay-- ``(A) not to exceed the rate of basic pay payable for level II of the Executive Schedule under section 5313 of title 5, United States Code, if the Director certifies to the Under Secretary of Defense for Intelligence, in consultation with the Under Secretary of Defense for Personnel and Readiness, that the rate of pay is for positions that perform functions that execute the cyber mission of the Agency; or ``(B) not to exceed the rate of basic pay payable for the Vice President of the United States under section 104 of title 3, United States Code, if the Director certifies to the Secretary of Defense, by name, individuals that have advanced skills and competencies and that perform critical functions that execute the cyber mission of the Agency. ``(2) Pay limitation.--Employees receiving a special rate under paragraph (1) shall be subject to an aggregate pay limitation that parallels the limitation established in section 5307 of title 5, United States Code, except that-- ``(A) any allowance, differential, bonus, award, or other similar cash payment in addition to basic pay that is authorized under title 10, United States Code, (or any other applicable law in addition to title 5 of such Code, excluding the Fair Labor Standards Act of 1938 (29 U.S.C. 201 et seq.)) shall also be counted as part of aggregate compensation; and ``(B) aggregate compensation may not exceed the rate established for the Vice President of the United States under section 104 of title 3, United States Code. ``(3) Limitation on number of recipients.--The number of individuals who receive basic pay established under paragraph (1)(B) may not exceed 100 at any time. ``(4) Limitation on use as comparative reference.-- Notwithstanding any other provision of law, special rates of pay and the limitation established under paragraph (1)(B) may not be used as comparative references for the purpose of fixing the rates of basic pay or maximum pay limitations of qualified positions under section 1599f of title 10, United States Code, or section 226 of the Homeland Security Act of 2002 (6 U.S.C. 147).''; (4) in subsection (c), as redesignated by paragraph (2), by striking ``A minimum'' and inserting ``Except as provided in subsection (b), a minimum''; (5) in subsection (d), as redesignated by paragraph (2), by inserting ``or (b)'' after ``by subsection (a)''; and (6) in subsection (g), as redesignated by paragraph (2)-- (A) in paragraph (1), by striking ``Not later than 90 days after the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2017'' and inserting ``Not later than 90 days after the date of the enactment of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018 and 2019''; and (B) in paragraph (2)(A), by inserting ``or (b)'' after ``subsection (a)''. SEC. 2304. MODIFICATION OF APPOINTMENT OF CHIEF INFORMATION OFFICER OF THE INTELLIGENCE COMMUNITY. Section 103G(a) of the National Security Act of 1947 (50 U.S.C. 3032(a)) is amended by striking ``President'' and inserting ``Director''. SEC. 2305. DIRECTOR OF NATIONAL INTELLIGENCE REVIEW OF PLACEMENT OF POSITIONS WITHIN THE INTELLIGENCE COMMUNITY ON THE EXECUTIVE SCHEDULE. (a) Review.--The Director of National Intelligence, in coordination with the Director of the Office of Personnel Management, shall conduct a review of positions within the intelligence community regarding the placement of such positions on the Executive Schedule under subchapter II of chapter 53 of title 5, United States Code. In carrying out such review, the Director of National Intelligence, in coordination with the Director of the Office of Personnel Management, shall determine-- (1) the standards under which such review will be conducted; (2) which positions should or should not be on the Executive Schedule; and (3) for those positions that should be on the Executive Schedule, the level of the Executive Schedule at which such positions should be placed. (b) Report.--Not later than 60 days after the date on which the review under subsection (a) is completed, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Oversight and Reform of the House of Representatives an unredacted report describing the standards by which the review was conducted and the outcome of the review. SEC. 2306. SUPPLY CHAIN AND COUNTERINTELLIGENCE RISK MANAGEMENT TASK FORCE. (a) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means the following: (1) The congressional intelligence committees. (2) The Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate. (3) The Committee on Armed Services, the Committee on Homeland Security, and the Committee on Oversight and Reform of the House of Representatives. (b) Requirement to Establish.--The Director of National Intelligence shall establish a Supply Chain and Counterintelligence Risk Management Task Force to standardize information sharing between the intelligence community and the acquisition community of the United States Government with respect to the supply chain and counterintelligence risks. (c) Members.--The Supply Chain and Counterintelligence Risk Management Task Force established under subsection (b) shall be composed of-- (1) a representative of the Defense Security Service of the Department of Defense; (2) a representative of the General Services Administration; (3) a representative of the Office of Federal Procurement Policy of the Office of Management and Budget; (4) a representative of the Department of Homeland Security; (5) a representative of the Federal Bureau of Investigation; (6) the Director of the National Counterintelligence and Security Center; and (7) any other members the Director of National Intelligence determines appropriate. (d) Security Clearances.--Each member of the Supply Chain and Counterintelligence Risk Management Task Force established under subsection (b) shall have a security clearance at the top secret level and be able to access sensitive compartmented information. (e) Annual Report.--The Supply Chain and Counterintelligence Risk Management Task Force established under subsection (b) shall submit to the appropriate congressional committees an annual report that describes the activities of the Task Force during the previous year, including identification of the supply chain and counterintelligence risks shared with the acquisition community of the United States Government by the intelligence community. SEC. 2307. CONSIDERATION OF ADVERSARIAL TELECOMMUNICATIONS AND CYBERSECURITY INFRASTRUCTURE WHEN SHARING INTELLIGENCE WITH FOREIGN GOVERNMENTS AND ENTITIES. Whenever the head of an element of the intelligence community enters into an intelligence sharing agreement with a foreign government or any other foreign entity, the head of the element shall consider the pervasiveness of telecommunications and cybersecurity infrastructure, equipment, and services provided by adversaries of the United States, particularly China [[Page H5873]] and Russia, or entities of such adversaries in the country or region of the foreign government or other foreign entity entering into the agreement. SEC. 2308. CYBER PROTECTION SUPPORT FOR THE PERSONNEL OF THE INTELLIGENCE COMMUNITY IN POSITIONS HIGHLY VULNERABLE TO CYBER ATTACK. (a) Definitions.--In this section: (1) Personal accounts.--The term ``personal accounts'' means accounts for online and telecommunications services, including telephone, residential Internet access, email, text and multimedia messaging, cloud computing, social media, health care, and financial services, used by personnel of the intelligence community outside of the scope of their employment with elements of the intelligence community. (2) Personal technology devices.--The term ``personal technology devices'' means technology devices used by personnel of the intelligence community outside of the scope of their employment with elements of the intelligence community, including networks to which such devices connect. (b) Authority to Provide Cyber Protection Support.-- (1) In general.--Subject to a determination by the Director of National Intelligence, the Director may provide cyber protection support for the personal technology devices and personal accounts of the personnel described in paragraph (2). (2) At-risk personnel.--The personnel described in this paragraph are personnel of the intelligence community-- (A) who the Director determines to be highly vulnerable to cyber attacks and hostile information collection activities because of the positions occupied by such personnel in the intelligence community; and (B) whose personal technology devices or personal accounts are highly vulnerable to cyber attacks and hostile information collection activities. (c) Nature of Cyber Protection Support.--Subject to the availability of resources, the cyber protection support provided to personnel under subsection (b) may include training, advice, assistance, and other services relating to cyber attacks and hostile information collection activities. (d) Limitation on Support.--Nothing in this section shall be construed-- (1) to encourage personnel of the intelligence community to use personal technology devices for official business; or (2) to authorize cyber protection support for senior intelligence community personnel using personal devices, networks, and personal accounts in an official capacity. (e) Report.--Not later than 180 days after the date of the enactment of this Act, the Director shall submit to the congressional intelligence committees a report on the provision of cyber protection support under subsection (b). The report shall include-- (1) a description of the methodology used to make the determination under subsection (b)(2); and (2) guidance for the use of cyber protection support and tracking of support requests for personnel receiving cyber protection support under subsection (b). SEC. 2309. ELIMINATION OF SUNSET OF AUTHORITY RELATING TO MANAGEMENT OF SUPPLY-CHAIN RISK. Section 309 of the Intelligence Authorization Act for Fiscal Year 2012 (Public Law 112-87; 50 U.S.C. 3329 note) is amended by striking subsection (g). SEC. 2310. LIMITATIONS ON DETERMINATIONS REGARDING CERTAIN SECURITY CLASSIFICATIONS. (a) Prohibition.--An officer of an element of the intelligence community who has been nominated by the President for a position that requires the advice and consent of the Senate may not make a classification decision with respect to information related to such officer's nomination. (b) Classification Determinations.-- (1) In general.--Except as provided in paragraph (2), in a case in which an officer described in subsection (a) has been nominated as described in such subsection and classification authority rests with the officer or another officer who reports directly to such officer, a classification decision with respect to information relating to the officer shall be made by the Director of National Intelligence. (2) Nominations of director of national intelligence.--In a case described in paragraph (1) in which the officer nominated is the Director of National Intelligence, the classification decision shall be made by the Principal Deputy Director of National Intelligence. (c) Reports.--Whenever the Director or the Principal Deputy Director makes a decision under subsection (b), the Director or the Principal Deputy Director, as the case may be, shall submit to the congressional intelligence committees a report detailing the reasons for the decision. SEC. 2311. JOINT INTELLIGENCE COMMUNITY COUNCIL. (a) Meetings.--Section 101A(d) of the National Security Act of 1947 (50 U.S.C. 3022(d)) is amended-- (1) by striking ``regular''; and (2) by inserting ``as the Director considers appropriate'' after ``Council''. (b) Report on Function and Utility of the Joint Intelligence Community Council.-- (1) In general.--No later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Executive Office of the President and members of the Joint Intelligence Community Council, shall submit to the congressional intelligence committees a report on the function and utility of the Joint Intelligence Community Council. (2) Contents.--The report required by paragraph (1) shall include the following: (A) The number of physical or virtual meetings held by the Council per year since the Council's inception. (B) A description of the effect and accomplishments of the Council. (C) An explanation of the unique role of the Council relative to other entities, including with respect to the National Security Council and the Executive Committee of the intelligence community. (D) Recommendations for the future role and operation of the Council. (E) Such other matters relating to the function and utility of the Council as the Director considers appropriate. (3) Form.--The report submitted under paragraph (1) shall be submitted in unclassified form, but may include a classified annex. SEC. 2312. INTELLIGENCE COMMUNITY INFORMATION TECHNOLOGY ENVIRONMENT. (a) Definitions.--In this section: (1) Core service.--The term ``core service'' means a capability that is available to multiple elements of the intelligence community and required for consistent operation of the intelligence community information technology environment. (2) Intelligence community information technology environment.--The term ``intelligence community information technology environment'' means all of the information technology services across the intelligence community, including the data sharing and protection environment across multiple classification domains. (b) Roles and Responsibilities.-- (1) Director of national intelligence.--The Director of National Intelligence shall be responsible for coordinating the performance by elements of the intelligence community of the intelligence community information technology environment, including each of the following: (A) Ensuring compliance with all applicable environment rules and regulations of such environment. (B) Ensuring measurable performance goals exist for such environment. (C) Documenting standards and practices of such environment. (D) Acting as an arbiter among elements of the intelligence community related to any disagreements arising out of the implementation of such environment. (E) Delegating responsibilities to the elements of the intelligence community and carrying out such other responsibilities as are necessary for the effective implementation of such environment. (2) Core service providers.--Providers of core services shall be responsible for-- (A) providing core services, in coordination with the Director of National Intelligence; and (B) providing the Director with information requested and required to fulfill the responsibilities of the Director under paragraph (1). (3) Use of core services.-- (A) In general.--Except as provided in subparagraph (B), each element of the intelligence community shall use core services when such services are available. (B) Exception.--The Director of National Intelligence may provide for a written exception to the requirement under subparagraph (A) if the Director determines there is a compelling financial or mission need for such exception. (c) Management Accountability.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall designate and maintain one or more accountable executives of the intelligence community information technology environment to be responsible for-- (1) management, financial control, and integration of such environment; (2) overseeing the performance of each core service, including establishing measurable service requirements and schedules; (3) to the degree feasible, ensuring testing of each core service of such environment, including testing by the intended users, to evaluate performance against measurable service requirements and to ensure the capability meets user requirements; and (4) coordinate transition or restructuring efforts of such environment, including phaseout of legacy systems. (d) Security Plan.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall develop and maintain a security plan for the intelligence community information technology environment. (e) Long-term Roadmap.--Not later than 180 days after the date of the enactment of this Act, and during each of the second and fourth fiscal quarters thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees a long-term roadmap that shall include each of the following: (1) A description of the minimum required and desired core service requirements, including-- (A) key performance parameters; and (B) an assessment of current, measured performance. (2) implementation milestones for the intelligence community information technology environment, including each of the following: (A) A schedule for expected deliveries of core service capabilities during each of the following phases: (i) Concept refinement and technology maturity demonstration. (ii) Development, integration, and demonstration. (iii) Production, deployment, and sustainment. (iv) System retirement. [[Page H5874]] (B) Dependencies of such core service capabilities. (C) Plans for the transition or restructuring necessary to incorporate core service capabilities. (D) A description of any legacy systems and discontinued capabilities to be phased out. (3) Such other matters as the Director determines appropriate. (f) Business Plan.--Not later than 180 days after the date of the enactment of this Act, and during each of the second and fourth fiscal quarters thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees a business plan that includes each of the following: (1) A systematic approach to identify core service funding requests for the intelligence community information technology environment within the proposed budget, including multiyear plans to implement the long-term roadmap required by subsection (e). (2) A uniform approach by which each element of the intelligence community shall identify the cost of legacy information technology or alternative capabilities where services of the intelligence community information technology environment will also be available. (3) A uniform effort by which each element of the intelligence community shall identify transition and restructuring costs for new, existing, and retiring services of the intelligence community information technology environment, as well as services of such environment that have changed designations as a core service. (g) Quarterly Presentations.--Beginning not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall provide to the congressional intelligence committees quarterly updates regarding ongoing implementation of the intelligence community information technology environment as compared to the requirements in the most recently submitted security plan required by subsection (d), long-term roadmap required by subsection (e), and business plan required by subsection (f). (h) Additional Notifications.--The Director of National Intelligence shall provide timely notification to the congressional intelligence committees regarding any policy changes related to or affecting the intelligence community information technology environment, new initiatives or strategies related to or impacting such environment, and changes or deficiencies in the execution of the security plan required by subsection (d), long-term roadmap required by subsection (e), and business plan required by subsection (f). (i) Sunset.--The section shall have no effect on or after September 30, 2024. SEC. 2313. REPORT ON DEVELOPMENT OF SECURE MOBILE VOICE SOLUTION FOR INTELLIGENCE COMMUNITY. (a) In General.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency and the Director of the National Security Agency, shall submit to the congressional intelligence committees a classified report on the feasibility, desirability, cost, and required schedule associated with the implementation of a secure mobile voice solution for the intelligence community. (b) Contents.--The report required by subsection (a) shall include, at a minimum, the following: (1) The benefits and disadvantages of a secure mobile voice solution. (2) Whether the intelligence community could leverage commercially available technology for classified voice communications that operates on commercial mobile networks in a secure manner and identifying the accompanying security risks to such networks. (3) A description of any policies or community guidance that would be necessary to govern the potential solution, such as a process for determining the appropriate use of a secure mobile telephone and any limitations associated with such use. SEC. 2314. POLICY ON MINIMUM INSIDER THREAT STANDARDS. (a) Policy Required.--Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence shall establish a policy for minimum insider threat standards that is consistent with the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs. (b) Implementation.--Not later than 180 days after the date of the enactment of this Act, the head of each element of the intelligence community shall implement the policy established under subsection (a). SEC. 2315. SUBMISSION OF INTELLIGENCE COMMUNITY POLICIES. (a) Definitions.--In this section: (1) Electronic repository.--The term ``electronic repository'' means the electronic distribution mechanism, in use as of the date of the enactment of this Act, or any successor electronic distribution mechanism, by which the Director of National Intelligence submits to the congressional intelligence committees information. (2) Policy.--The term ``policy'', with respect to the intelligence community, includes unclassified or classified-- (A) directives, policy guidance, and policy memoranda of the intelligence community; (B) executive correspondence of the Director of National Intelligence; and (C) any equivalent successor policy instruments. (b) Submission of Policies.-- (1) Current policy.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees using the electronic repository all nonpublicly available policies issued by the Director of National Intelligence for the intelligence community that are in effect as of the date of the submission. (2) Continuous updates.--Not later than 15 days after the date on which the Director of National Intelligence issues, modifies, or rescinds a policy of the intelligence community, the Director shall-- (A) notify the congressional intelligence committees of such addition, modification, or removal; and (B) update the electronic repository with respect to such addition, modification, or removal. SEC. 2316. EXPANSION OF INTELLIGENCE COMMUNITY RECRUITMENT EFFORTS. In order to further increase the diversity of the intelligence community workforce, not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with heads of elements of the Intelligence Community, shall create, implement, and submit to the congressional intelligence committees a written plan to ensure that rural and underrepresented regions are more fully and consistently represented in such elements' employment recruitment efforts. Upon receipt of the plan, the congressional committees shall have 60 days to submit comments to the Director of National Intelligence before such plan shall be implemented. TITLE XXIV--MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY Subtitle A--Office of the Director of National Intelligence SEC. 2401. AUTHORITY FOR PROTECTION OF CURRENT AND FORMER EMPLOYEES OF THE OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE. Section 5(a)(4) of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3506(a)(4)) is amended by striking ``such personnel of the Office of the Director of National Intelligence as the Director of National Intelligence may designate;'' and inserting ``current and former personnel of the Office of the Director of National Intelligence and their immediate families as the Director of National Intelligence may designate;''. SEC. 2402. DESIGNATION OF THE PROGRAM MANAGER-INFORMATION SHARING ENVIRONMENT. (a) Information Sharing Environment.--Section 1016(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. 485(b)) is amended-- (1) in paragraph (1), by striking ``President'' and inserting ``Director of National Intelligence''; and (2) in paragraph (2), by striking ``President'' both places that term appears and inserting ``Director of National Intelligence''. (b) Program Manager.--Section 1016(f)(1) of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. 485(f)(1)) is amended by striking ``The individual designated as the program manager shall serve as program manager until removed from service or replaced by the President (at the President's sole discretion).'' and inserting ``Beginning on the date of the enactment of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019 and 2020, each individual designated as the program manager shall be appointed by the Director of National Intelligence.''. SEC. 2403. TECHNICAL MODIFICATION TO THE EXECUTIVE SCHEDULE. Section 5315 of title 5, United States Code, is amended by adding at the end the following: ``Director of the National Counterintelligence and Security Center.''. SEC. 2404. CHIEF FINANCIAL OFFICER OF THE INTELLIGENCE COMMUNITY. Section 103I(a) of the National Security Act of 1947 (50 U.S.C. 3034(a)) is amended by adding at the end the following new sentence: ``The Chief Financial Officer shall report directly to the Director of National Intelligence.''. SEC. 2405. CHIEF INFORMATION OFFICER OF THE INTELLIGENCE COMMUNITY. Section 103G(a) of the National Security Act of 1947 (50 U.S.C. 3032(a)) is amended by adding at the end the following new sentence: ``The Chief Information Officer shall report directly to the Director of National Intelligence.''. Subtitle B--Central Intelligence Agency SEC. 2411. CENTRAL INTELLIGENCE AGENCY SUBSISTENCE FOR PERSONNEL ASSIGNED TO AUSTERE LOCATIONS. Subsection (a) of section 5 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3506) is amended-- (1) in paragraph (1), by striking ``(50 U.S.C. 403-4a).,'' and inserting ``(50 U.S.C. 403-4a),''; (2) in paragraph (6), by striking ``and'' at the end; (3) in paragraph (7), by striking the period at the end and inserting ``; and''; and (4) by adding at the end the following new paragraph (8): ``(8) Upon the approval of the Director, provide, during any fiscal year, with or without reimbursement, subsistence to any personnel assigned to an overseas location designated by the Agency as an austere location.''. SEC. 2412. SPECIAL RULES FOR CERTAIN MONTHLY WORKERS' COMPENSATION PAYMENTS AND OTHER PAYMENTS FOR CENTRAL INTELLIGENCE AGENCY PERSONNEL. (a) In General.--The Central Intelligence Agency Act of 1949 (50 U.S.C. 3501 et seq.) is amended by inserting after section 19 the following new section: ``SEC. 19A. SPECIAL RULES FOR CERTAIN INDIVIDUALS INJURED BY REASON OF WAR, INSURGENCY, HOSTILE ACT, OR TERRORIST ACTIVITIES. ``(a) Definitions.--In this section: ``(1) Covered dependent.--The term `covered dependent' means a family member (as defined [[Page H5875]] by the Director) of a covered employee who, on or after September 11, 2001-- ``(A) accompanies the covered employee to an assigned duty station in a foreign country; and ``(B) becomes injured by reason of a qualifying injury. ``(2) Covered employee.--The term `covered employee' means an officer or employee of the Central Intelligence Agency who, on or after September 11, 2001, becomes injured by reason of a qualifying injury. ``(3) Covered individual.--The term `covered individual' means an individual who-- ``(A)(i) is detailed to the Central Intelligence Agency from other agencies of the United States Government or from the Armed Forces; or ``(ii) is affiliated with the Central Intelligence Agency, as determined by the Director; and ``(B) who, on or after September 11, 2001, becomes injured by reason of a qualifying injury. ``(4) Qualifying injury.--The term `qualifying injury' means the following: ``(A) With respect to a covered dependent, an injury incurred-- ``(i) during a period in which the covered dependent is accompanying the covered employee to an assigned duty station in a foreign country; ``(ii) in connection with war, insurgency, hostile act, terrorist activity, or other incident designated by the Director; and ``(iii) that was not the result of the willful misconduct of the covered dependent. ``(B) With respect to a covered employee or a covered individual, an injury incurred-- ``(i) during a period of assignment to a duty station in a foreign country; ``(ii) in connection with a war, insurgency, hostile act, terrorist activity, or other incident designated by the Director; and ``(iii) that was not the result of the willful misconduct of the covered employee or the covered individual. ``(b) Adjustment of Compensation for Certain Injuries.-- ``(1) Increase.--The Director may increase the amount of monthly compensation paid to a covered employee under section 8105 of title 5, United States Code. Subject to paragraph (2), the Director may determine the amount of each such increase by taking into account-- ``(A) the severity of the qualifying injury; ``(B) the circumstances by which the covered employee became injured; and ``(C) the seniority of the covered employee. ``(2) Maximum.--Notwithstanding chapter 81 of title 5, United States Code, the total amount of monthly compensation increased under paragraph (1) may not exceed the monthly pay of the maximum rate of basic pay for GS-15 of the General Schedule under section 5332 of such title. ``(c) Costs for Treating Qualifying Injuries.--The Director may pay the costs of treating a qualifying injury of a covered employee, a covered individual, or a covered dependent, or may reimburse a covered employee, a covered individual, or a covered dependent for such costs, that are not otherwise covered by chapter 81 of title 5, United States Code, or other provision of Federal law. ``(d) Treatment of Amounts.--For purposes of section 104 of the Internal Revenue Code of 1986, amounts paid pursuant to this section shall be treated as amounts paid under chapter 81 of title 5, United States Code.''. (b) Regulations.--Not later than 120 days after the date of the enactment of this Act, the Director of the Central Intelligence Agency shall-- (1) prescribe regulations ensuring the fair and equitable implementation of section 19A of the Central Intelligence Agency Act of 1949, as added by subsection (a); and (2) submit to the congressional intelligence committees such regulations. (c) Application.--Section 19A of the Central Intelligence Agency Act of 1949, as added by subsection (a), shall apply with respect to-- (1) payments made to covered employees (as defined in such section) under section 8105 of title 5, United States Code, beginning on or after the date of the enactment of this Act; and (2) treatment described in subsection (b) of such section 19A occurring on or after the date of the enactment of this Act. SEC. 2413. EXPANSION OF SECURITY PROTECTIVE SERVICE JURISDICTION OF THE CENTRAL INTELLIGENCE AGENCY. Subsection (a)(1) of section 15 of the Central Intelligence Agency Act of 1949 (50 U.S.C. 3515(a)) is amended-- (1) in subparagraph (B), by striking ``500 feet;'' and inserting ``500 yards;''; and (2) in subparagraph (D), by striking ``500 feet.'' and inserting ``500 yards.''. SEC. 2414. REPEAL OF FOREIGN LANGUAGE PROFICIENCY REQUIREMENT FOR CERTAIN SENIOR LEVEL POSITIONS IN THE CENTRAL INTELLIGENCE AGENCY. (a) Repeal of Foreign Language Proficiency Requirement.-- Section 104A of the National Security Act of 1947 (50 U.S.C. 3036) is amended by striking subsection (g). (b) Conforming Repeal of Report Requirement.--Section 611 of the Intelligence Authorization Act for Fiscal Year 2005 (Public Law 108-487) is amended by striking subsection (c). Subtitle C--Office of Intelligence and Counterintelligence of Department of Energy SEC. 2421. CONSOLIDATION OF DEPARTMENT OF ENERGY OFFICES OF INTELLIGENCE AND COUNTERINTELLIGENCE. (a) In General.--Section 215 of the Department of Energy Organization Act (42 U.S.C. 7144b) is amended to read as follows: ``office of intelligence and counterintelligence ``Sec. 215. (a) Definitions.--In this section, the terms `intelligence community' and `National Intelligence Program' have the meanings given such terms in section 3 of the National Security Act of 1947 (50 U.S.C. 3003). ``(b) In General.--There is in the Department an Office of Intelligence and Counterintelligence. Such office shall be under the National Intelligence Program. ``(c) Director.--(1) The head of the Office shall be the Director of the Office of Intelligence and Counterintelligence, who shall be an employee in the Senior Executive Service, the Senior Intelligence Service, the Senior National Intelligence Service, or any other Service that the Secretary, in coordination with the Director of National Intelligence, considers appropriate. The Director of the Office shall report directly to the Secretary. ``(2) The Secretary shall select an individual to serve as the Director from among individuals who have substantial expertise in matters relating to the intelligence community, including foreign intelligence and counterintelligence. ``(d) Duties.--(1) Subject to the authority, direction, and control of the Secretary, the Director shall perform such duties and exercise such powers as the Secretary may prescribe. ``(2) The Director shall be responsible for establishing policy for intelligence and counterintelligence programs and activities at the Department.''. (b) Conforming Repeal.--Section 216 of the Department of Energy Organization Act (42 U.S.C. 7144c) is hereby repealed. (c) Clerical Amendment.--The table of contents at the beginning of the Department of Energy Organization Act is amended by striking the items relating to sections 215 and 216 and inserting the following new item: ``Sec. 215. Office of Intelligence and Counterintelligence.''. SEC. 2422. ESTABLISHMENT OF ENERGY INFRASTRUCTURE SECURITY CENTER. Section 215 of the Department of Energy Organization Act (42 U.S.C. 7144b), as amended by section 2421, is further amended by adding at the end the following: ``(e) Energy Infrastructure Security Center.--(1)(A) The President shall establish an Energy Infrastructure Security Center, taking into account all appropriate government tools to analyze and disseminate intelligence relating to the security of the energy infrastructure of the United States. ``(B) The Director of Intelligence and Counterintelligence shall appoint the head of the Energy Infrastructure Security Center. ``(C) The Energy Infrastructure Security Center shall be located within the Office of Intelligence and Counterintelligence. ``(2) In establishing the Energy Infrastructure Security Center, the Director of the Office of Intelligence and Counterintelligence shall address the following missions and objectives to coordinate and disseminate intelligence relating to the security of the energy infrastructure of the United States: ``(A) Establishing a primary organization within the United States Government for analyzing and integrating all intelligence possessed or acquired by the United States pertaining to the security of the energy infrastructure of the United States. ``(B) Ensuring that appropriate departments and agencies have full access to and receive intelligence support needed to execute the plans or activities of the agencies, and perform independent, alternative analyses. ``(C) Establishing a central repository on known and suspected foreign threats to the energy infrastructure of the United States, including with respect to any individuals, groups, or entities engaged in activities targeting such infrastructure, and the goals, strategies, capabilities, and networks of such individuals, groups, or entities. ``(D) Disseminating intelligence information relating to the security of the energy infrastructure of the United States, including threats and analyses, to the President, to the appropriate departments and agencies, and to the appropriate committees of Congress. ``(3) The President may waive the requirements of this subsection, and any parts thereof, if the President determines that such requirements do not materially improve the ability of the United States Government to prevent and halt attacks against the energy infrastructure of the United States. Such waiver shall be made in writing to Congress and shall include a description of how the missions and objectives in paragraph (2) are being met. ``(4) If the President decides not to exercise the waiver authority granted by paragraph (3), the President shall submit to Congress from time to time updates and plans regarding the establishment of an Energy Infrastructure Security Center.''. SEC. 2423. REPEAL OF DEPARTMENT OF ENERGY INTELLIGENCE EXECUTIVE COMMITTEE AND BUDGET REPORTING REQUIREMENT. Section 214 of the Department of Energy Organization Act (42 U.S.C. 7144a) is amended-- (1) by striking ``(a)''; and (2) by striking subsections (b) and (c). Subtitle D--Other Elements SEC. 2431. PLAN FOR DESIGNATION OF COUNTERINTELLIGENCE COMPONENT OF DEFENSE SECURITY SERVICE AS AN ELEMENT OF INTELLIGENCE COMMUNITY. Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence and Under Secretary of Defense for Intelligence, in coordination with the Director of the National Counterintelligence and Security Center, shall submit to the congressional intelligence committees, the Committee on Armed Services of the Senate, and the Committee on Armed Services of the House of Representatives a plan to designate the counterintelligence component of the Defense Security Service of the Department of Defense as an element of the intelligence community by not later than January 1, 2021. Such plan shall-- [[Page H5876]] (1) address the implications of such designation on the authorities, governance, personnel, resources, information technology, collection, analytic products, information sharing, and business processes of the Defense Security Service and the intelligence community; and (2) not address the personnel security functions of the Defense Security Service. SEC. 2432. NOTICE NOT REQUIRED FOR PRIVATE ENTITIES. Section 3553 of title 44, United States Code, is amended-- (1) by redesignating subsection (j) as subsection (k); and (2) by inserting after subsection (i) the following: ``(j) Rule of Construction.--Nothing in this section shall be construed to require the Secretary to provide notice to any private entity before the Secretary issues a binding operational directive under subsection (b)(2).''. SEC. 2433. ESTABLISHMENT OF ADVISORY BOARD FOR NATIONAL RECONNAISSANCE OFFICE. (a) Establishment.--Section 106A of the National Security Act of 1947 (50 U.S.C. 3041a) is amended by adding at the end the following new subsection: ``(d) Advisory Board.-- ``(1) Establishment.--There is established in the National Reconnaissance Office an advisory board (in this section referred to as the `Board'). ``(2) Duties.--The Board shall-- ``(A) study matters relating to the mission of the National Reconnaissance Office, including with respect to promoting innovation, competition, and resilience in space, overhead reconnaissance, acquisition, and other matters; and ``(B) advise and report directly to the Director with respect to such matters. ``(3) Members.-- ``(A) Number and appointment.-- ``(i) In general.--The Board shall be composed of 5 members appointed by the Director from among individuals with demonstrated academic, government, business, or other expertise relevant to the mission and functions of the National Reconnaissance Office. ``(ii) Notification.--Not later than 30 days after the date on which the Director appoints a member to the Board, the Director shall notify the congressional intelligence committees and the congressional defense committees (as defined in section 101(a) of title 10, United States Code) of such appointment. ``(B) Terms.--Each member shall be appointed for a term of 2 years. Except as provided by subparagraph (C), a member may not serve more than 3 terms. ``(C) Vacancy.--Any member appointed to fill a vacancy occurring before the expiration of the term for which the member's predecessor was appointed shall be appointed only for the remainder of that term. A member may serve after the expiration of that member's term until a successor has taken office. ``(D) Chair.--The Board shall have a Chair, who shall be appointed by the Director from among the members. ``(E) Travel expenses.--Each member shall receive travel expenses, including per diem in lieu of subsistence, in accordance with applicable provisions under subchapter I of chapter 57 of title 5, United States Code. ``(F) Executive secretary.--The Director may appoint an executive secretary, who shall be an employee of the National Reconnaissance Office, to support the Board. ``(4) Meetings.--The Board shall meet not less than quarterly, but may meet more frequently at the call of the Director. ``(5) Reports.--Not later than March 31 of each year, the Board shall submit to the Director and to the congressional intelligence committees a report on the activities and significant findings of the Board during the preceding year. ``(6) Nonapplicability of certain requirements.--The Federal Advisory Committee Act (5 U.S.C. App.) shall not apply to the Board. ``(7) Termination.--The Board shall terminate on the date that is 3 years after the date of the first meeting of the Board.''. (b) Initial Appointments.--Not later than 180 days after the date of the enactment of this Act, the Director of the National Reconnaissance Office shall appoint the initial 5 members to the advisory board under subsection (d) of section 106A of the National Security Act of 1947 (50 U.S.C. 3041a), as added by subsection (a). SEC. 2434. COLLOCATION OF CERTAIN DEPARTMENT OF HOMELAND SECURITY PERSONNEL AT FIELD LOCATIONS. (a) Identification of Opportunities for Collocation.--Not later than 60 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis shall identify, in consultation with the Commissioner of U.S. Customs and Border Protection, the Administrator of the Transportation Security Administration, the Director of U.S. Immigration and Customs Enforcement, and the heads of such other elements of the Department of Homeland Security as the Under Secretary considers appropriate, opportunities for collocation of officers of the Office of Intelligence and Analysis in the field outside of the greater Washington, District of Columbia, area in order to support operational units from U.S. Customs and Border Protection, the Transportation Security Administration, U.S. Immigration and Customs Enforcement, and other elements of the Department of Homeland Security. (b) Plan for Collocation.--Not later than 120 days after the date of the enactment of this Act, the Under Secretary shall submit to the congressional intelligence committees a report that includes a plan for collocation as described in subsection (a). TITLE XXV--ELECTION MATTERS SEC. 2501. REPORT ON CYBER ATTACKS BY FOREIGN GOVERNMENTS AGAINST UNITED STATES ELECTION INFRASTRUCTURE. (a) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Homeland Security and Governmental Affairs of the Senate; (C) the Committee on Homeland Security of the House of Representatives; (D) the Committee on Foreign Relations of the Senate; and (E) the Committee on Foreign Affairs of the House of Representatives. (2) Congressional leadership.--The term ``congressional leadership'' includes the following: (A) The majority leader of the Senate. (B) The minority leader of the Senate. (C) The Speaker of the House of Representatives. (D) The minority leader of the House of Representatives. (3) State.--The term ``State'' means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any territory or possession of the United States. (b) Report Required.--Not later than 60 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis shall submit to congressional leadership and the appropriate congressional committees a report on cyber attacks and attempted cyber attacks by foreign governments on United States election infrastructure in States and localities in connection with the 2016 Presidential election in the United States and such cyber attacks or attempted cyber attacks as the Under Secretary anticipates against such infrastructure. Such report shall identify the States and localities affected and shall include cyber attacks and attempted cyber attacks against voter registration databases, voting machines, voting-related computer networks, and the networks of Secretaries of State and other election officials of the various States. (c) Form.--The report submitted under subsection (b) shall be submitted in unclassified form, but may include a classified annex. SEC. 2502. REVIEW OF INTELLIGENCE COMMUNITY'S POSTURE TO COLLECT AGAINST AND ANALYZE RUSSIAN EFFORTS TO INFLUENCE THE PRESIDENTIAL ELECTION. (a) Review Required.--Not later than 1 year after the date of the enactment of this Act, the Director of National Intelligence shall-- (1) complete an after action review of the posture of the intelligence community to collect against and analyze efforts of the Government of Russia to interfere in the 2016 Presidential election in the United States; and (2) submit to the congressional intelligence committees a report on the findings of the Director with respect to such review. (b) Elements.--The review required by subsection (a) shall include, with respect to the posture and efforts described in paragraph (1) of such subsection, the following: (1) An assessment of whether the resources of the intelligence community were properly aligned to detect and respond to the efforts described in subsection (a)(1). (2) An assessment of the information sharing that occurred within elements of the intelligence community. (3) An assessment of the information sharing that occurred between elements of the intelligence community. (4) An assessment of applicable authorities necessary to collect on any such efforts and any deficiencies in those authorities. (5) A review of the use of open source material to inform analysis and warning of such efforts. (6) A review of the use of alternative and predictive analysis. (c) Form of Report.--The report required by subsection (a)(2) shall be submitted to the congressional intelligence committees in a classified form. SEC. 2503. ASSESSMENT OF FOREIGN INTELLIGENCE THREATS TO FEDERAL ELECTIONS. (a) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Homeland Security and Governmental Affairs of the Senate; and (C) the Committee on Homeland Security of the House of Representatives. (2) Congressional leadership.--The term ``congressional leadership'' includes the following: (A) The majority leader of the Senate. (B) The minority leader of the Senate. (C) The Speaker of the House of Representatives. (D) The minority leader of the House of Representatives. (3) Security vulnerability.--The term ``security vulnerability'' has the meaning given such term in section 102 of the Cybersecurity Information Sharing Act of 2015 (6 U.S.C. 1501). (b) In General.--The Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency, the Director of the National Security Agency, the Director of the Federal Bureau of Investigation, the Secretary of Homeland Security, and the heads of other relevant elements of the intelligence community, shall-- (1) commence not later than 1 year before any regularly scheduled Federal election occurring after December 31, 2018, and complete not later than 180 days before such election, an assessment of security vulnerabilities of State election systems; and (2) not later than 180 days before any regularly scheduled Federal election occurring after [[Page H5877]] December 31, 2018, submit a report on such security vulnerabilities and an assessment of foreign intelligence threats to the election to-- (A) congressional leadership; and (B) the appropriate congressional committees. (c) Update.--Not later than 90 days before any regularly scheduled Federal election occurring after December 31, 2018, the Director of National Intelligence shall-- (1) update the assessment of foreign intelligence threats to that election; and (2) submit the updated assessment to-- (A) congressional leadership; and (B) the appropriate congressional committees. SEC. 2504. STRATEGY FOR COUNTERING RUSSIAN CYBER THREATS TO UNITED STATES ELECTIONS. (a) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means the following: (1) The congressional intelligence committees. (2) The Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate. (3) The Committee on Armed Services and the Committee on Homeland Security of the House of Representatives. (4) The Committee on Foreign Relations of the Senate. (5) The Committee on Foreign Affairs of the House of Representatives. (b) Requirement for a Strategy.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Secretary of Homeland Security, the Director of the Federal Bureau of Investigation, the Director of the Central Intelligence Agency, the Secretary of State, the Secretary of Defense, and the Secretary of the Treasury, shall develop a whole-of- government strategy for countering the threat of Russian cyber attacks and attempted cyber attacks against electoral systems and processes in the United States, including Federal, State, and local election systems, voter registration databases, voting tabulation equipment, and equipment and processes for the secure transmission of election results. (c) Elements of the Strategy.--The strategy required by subsection (b) shall include the following elements: (1) A whole-of-government approach to protecting United States electoral systems and processes that includes the agencies and departments indicated in subsection (b) as well as any other agencies and departments of the United States, as determined appropriate by the Director of National Intelligence and the Secretary of Homeland Security. (2) Input solicited from Secretaries of State of the various States and the chief election officials of the States. (3) Technical security measures, including auditable paper trails for voting machines, securing wireless and Internet connections, and other technical safeguards. (4) Detection of cyber threats, including attacks and attempted attacks by Russian government or nongovernment cyber threat actors. (5) Improvements in the identification and attribution of Russian government or nongovernment cyber threat actors. (6) Deterrence, including actions and measures that could or should be undertaken against or communicated to the Government of Russia or other entities to deter attacks against, or interference with, United States election systems and processes. (7) Improvements in Federal Government communications with State and local election officials. (8) Public education and communication efforts. (9) Benchmarks and milestones to enable the measurement of concrete steps taken and progress made in the implementation of the strategy. (d) Congressional Briefing.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence and the Secretary of Homeland Security shall jointly brief the appropriate congressional committees on the strategy developed under subsection (b). SEC. 2505. ASSESSMENT OF SIGNIFICANT RUSSIAN INFLUENCE CAMPAIGNS DIRECTED AT FOREIGN ELECTIONS AND REFERENDA. (a) Russian Influence Campaign Defined.--In this section, the term ``Russian influence campaign'' means any effort, covert or overt, and by any means, attributable to the Russian Federation directed at an election, referendum, or similar process in a country other than the Russian Federation or the United States. (b) Assessment Required.--Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report containing an analytical assessment of the most significant Russian influence campaigns, if any, conducted during the 3-year period preceding the date of the enactment of this Act, as well as the most significant current or planned such Russian influence campaigns, if any. Such assessment shall include-- (1) a summary of such significant Russian influence campaigns, including, at a minimum, the specific means by which such campaigns were conducted, are being conducted, or likely will be conducted, as appropriate, and the specific goal of each such campaign; (2) a summary of any defenses against or responses to such Russian influence campaigns by the foreign state holding the elections or referenda; (3) a summary of any relevant activities by elements of the intelligence community undertaken for the purpose of assisting the government of such foreign state in defending against or responding to such Russian influence campaigns; and (4) an assessment of the effectiveness of such defenses and responses described in paragraphs (2) and (3). (c) Form.--The report required by subsection (b) may be submitted in classified form, but if so submitted, shall contain an unclassified summary. SEC. 2506. INFORMATION SHARING WITH STATE ELECTION OFFICIALS. (a) State Defined.--In this section, the term ``State'' means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any territory or possession of the United States. (b) Security Clearances.-- (1) In general.--Not later than 30 days after the date of the enactment of this Act, the Director of National Intelligence shall support the Under Secretary of Homeland Security for Intelligence and Analysis, and any other official of the Department of Homeland Security designated by the Secretary of Homeland Security, in sponsoring a security clearance up to the top secret level for each eligible chief election official of a State or the District of Columbia, and additional eligible designees of such election official as appropriate, at the time that such election official assumes such position. (2) Interim clearances.--Consistent with applicable policies and directives, the Director of National Intelligence may issue interim clearances, for a period to be determined by the Director, to a chief election official as described in paragraph (1) and up to 1 designee of such official under such paragraph. (c) Information Sharing.-- (1) In general.--The Director of National Intelligence shall assist the Under Secretary of Homeland Security for Intelligence and Analysis and the Under Secretary responsible for overseeing critical infrastructure protection, cybersecurity, and other related programs of the Department (as specified in section 103(a)(1)(H) of the Homeland Security Act of 2002 (6 U.S.C. 113(a)(1)(H))) with sharing any appropriate classified information related to threats to election systems and to the integrity of the election process with chief election officials and such designees who have received a security clearance under subsection (b). (2) Coordination.--The Under Secretary of Homeland Security for Intelligence and Analysis shall coordinate with the Director of National Intelligence and the Under Secretary responsible for overseeing critical infrastructure protection, cybersecurity, and other related programs of the Department (as specified in section 103(a)(1)(H) of the Homeland Security Act of 2002 (6 U.S.C. 113(a)(1)(H))) to facilitate the sharing of information to the affected Secretaries of State or States. SEC. 2507. NOTIFICATION OF SIGNIFICANT FOREIGN CYBER INTRUSIONS AND ACTIVE MEASURES CAMPAIGNS DIRECTED AT ELECTIONS FOR FEDERAL OFFICES. (a) Definitions.--In this section: (1) Active measures campaign.--The term ``active measures campaign'' means a foreign semi-covert or covert intelligence operation. (2) Candidate, election, and political party.--The terms ``candidate'', ``election'', and ``political party'' have the meanings given those terms in section 301 of the Federal Election Campaign Act of 1971 (52 U.S.C. 30101). (3) Congressional leadership.--The term ``congressional leadership'' includes the following: (A) The majority leader of the Senate. (B) The minority leader of the Senate. (C) The Speaker of the House of Representatives. (D) The minority leader of the House of Representatives. (4) Cyber intrusion.--The term ``cyber intrusion'' means an electronic occurrence that actually or imminently jeopardizes, without lawful authority, electronic election infrastructure, or the integrity, confidentiality, or availability of information within such infrastructure. (5) Electronic election infrastructure.--The term ``electronic election infrastructure'' means an electronic information system of any of the following that is related to an election for Federal office: (A) The Federal Government. (B) A State or local government. (C) A political party. (D) The election campaign of a candidate. (6) Federal office.--The term ``Federal office'' has the meaning given that term in section 301 of the Federal Election Campaign Act of 1971 (52 U.S.C. 30101). (7) High confidence.--The term ``high confidence'', with respect to a determination, means that the determination is based on high-quality information from multiple sources. (8) Moderate confidence.--The term ``moderate confidence'', with respect to a determination, means that a determination is credibly sourced and plausible but not of sufficient quality or corroborated sufficiently to warrant a higher level of confidence. (9) Other appropriate congressional committees.--The term ``other appropriate congressional committees'' means-- (A) the Committee on Armed Services, the Committee on Homeland Security and Governmental Affairs, and the Committee on Appropriations of the Senate; and (B) the Committee on Armed Services, the Committee on Homeland Security, and the Committee on Appropriations of the House of Representatives. (b) Determinations of Significant Foreign Cyber Intrusions and Active Measures Campaigns.--The Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Secretary of Homeland Security shall jointly carry out subsection (c) if such Directors and the Secretary jointly determine-- (1) that on or after the date of the enactment of this Act, a significant foreign cyber intrusion [[Page H5878]] or active measures campaign intended to influence an upcoming election for any Federal office has occurred or is occurring; and (2) with moderate or high confidence, that such intrusion or campaign can be attributed to a foreign state or to a foreign nonstate person, group, or other entity. (c) Briefing.-- (1) In general.--Not later than 14 days after making a determination under subsection (b), the Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Secretary of Homeland Security shall jointly provide a briefing to the congressional leadership, the congressional intelligence committees and, consistent with the protection of sources and methods, the other appropriate congressional committees. The briefing shall be classified and address, at a minimum, the following: (A) A description of the significant foreign cyber intrusion or active measures campaign, as the case may be, covered by the determination. (B) An identification of the foreign state or foreign nonstate person, group, or other entity, to which such intrusion or campaign has been attributed. (C) The desirability and feasibility of the public release of information about the cyber intrusion or active measures campaign. (D) Any other information such Directors and the Secretary jointly determine appropriate. (2) Electronic election infrastructure briefings.--With respect to a significant foreign cyber intrusion covered by a determination under subsection (b), the Secretary of Homeland Security, in consultation with the Director of National Intelligence and the Director of the Federal Bureau of Investigation, shall offer to the owner or operator of any electronic election infrastructure directly affected by such intrusion, a briefing on such intrusion, including steps that may be taken to mitigate such intrusion. Such briefing may be classified and made available only to individuals with appropriate security clearances. (3) Protection of sources and methods.--This subsection shall be carried out in a manner that is consistent with the protection of sources and methods. SEC. 2508. DESIGNATION OF COUNTERINTELLIGENCE OFFICER TO LEAD ELECTION SECURITY MATTERS. (a) In General.--The Director of National Intelligence shall designate a national counterintelligence officer within the National Counterintelligence and Security Center to lead, manage, and coordinate counterintelligence matters relating to election security. (b) Additional Responsibilities.--The person designated under subsection (a) shall also lead, manage, and coordinate counterintelligence matters relating to risks posed by interference from foreign powers (as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801)) to the following: (1) The Federal Government election security supply chain. (2) Election voting systems and software. (3) Voter registration databases. (4) Critical infrastructure related to elections. (5) Such other Government goods and services as the Director of National Intelligence considers appropriate. TITLE XXVI--SECURITY CLEARANCES SEC. 2601. DEFINITIONS. In this title: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Armed Services of the Senate; (C) the Committee on Appropriations of the Senate; (D) the Committee on Homeland Security and Governmental Affairs of the Senate; (E) the Committee on Armed Services of the House of Representatives; (F) the Committee on Appropriations of the House of Representatives; (G) the Committee on Homeland Security of the House of Representatives; and (H) the Committee on Oversight and Reform of the House of Representatives. (2) Appropriate industry partners.--The term ``appropriate industry partner'' means a contractor, licensee, or grantee (as defined in section 101(a) of Executive Order 12829 (50 U.S.C. 3161 note; relating to National Industrial Security Program)) that is participating in the National Industrial Security Program established by such Executive Order. (3) Continuous vetting.--The term ``continuous vetting'' has the meaning given such term in Executive Order 13467 (50 U.S.C. 3161 note; relating to reforming processes related to suitability for government employment, fitness for contractor employees, and eligibility for access to classified national security information). (4) Council.--The term ``Council'' means the Security, Suitability, and Credentialing Performance Accountability Council established pursuant to such Executive Order, or any successor entity. (5) Security executive agent.--The term ``Security Executive Agent'' means the officer serving as the Security Executive Agent pursuant to section 803 of the National Security Act of 1947, as added by section 2605. (6) Suitability and credentialing executive agent.--The term ``Suitability and Credentialing Executive Agent'' means the Director of the Office of Personnel Management acting as the Suitability and Credentialing Executive Agent in accordance with Executive Order 13467 (50 U.S.C. 3161 note; relating to reforming processes related to suitability for government employment, fitness for contractor employees, and eligibility for access to classified national security information), or any successor entity. SEC. 2602. REPORTS AND PLANS RELATING TO SECURITY CLEARANCES AND BACKGROUND INVESTIGATIONS. (a) Sense of Congress.--It is the sense of Congress that-- (1) ensuring the trustworthiness and security of the workforce, facilities, and information of the Federal Government is of the highest priority to national security and public safety; (2) the President and Congress should prioritize the modernization of the personnel security framework to improve its efficiency, effectiveness, and accountability; (3) the current system for security clearance, suitability and fitness for employment, and credentialing lacks efficiencies and capabilities to meet the current threat environment, recruit and retain a trusted workforce, and capitalize on modern technologies; and (4) changes to policies or processes to improve this system should be vetted through the Council to ensure standardization, portability, and reciprocity in security clearances across the Federal Government. (b) Accountability Plans and Reports.-- (1) Plans.--Not later than 90 days after the date of the enactment of this Act, the Council shall submit to the appropriate congressional committees and make available to appropriate industry partners the following: (A) A plan, with milestones, to reduce the background investigation inventory to 200,000, or an otherwise sustainable steady-level, by the end of year 2020. Such plan shall include notes of any required changes in investigative and adjudicative standards or resources. (B) A plan to consolidate the conduct of background investigations associated with the processing for security clearances in the most effective and efficient manner between the National Background Investigation Bureau and the Defense Security Service, or a successor organization. Such plan shall address required funding, personnel, contracts, information technology, field office structure, policy, governance, schedule, transition costs, and effects on stakeholders. (2) Report on the future of personnel security.-- (A) In general.--Not later than 180 days after the date of the enactment of this Act, the Chairman of the Council, in coordination with the members of the Council, shall submit to the appropriate congressional committees and make available to appropriate industry partners a report on the future of personnel security to reflect changes in threats, the workforce, and technology. (B) Contents.--The report submitted under subparagraph (A) shall include the following: (i) A risk framework for granting and renewing access to classified information. (ii) A discussion of the use of technologies to prevent, detect, and monitor threats. (iii) A discussion of efforts to address reciprocity and portability. (iv) A discussion of the characteristics of effective insider threat programs. (v) An analysis of how to integrate data from continuous evaluation, insider threat programs, and human resources data. (vi) Recommendations on interagency governance. (3) Plan for implementation.--Not later than 180 days after the date of the enactment of this Act, the Chairman of the Council, in coordination with the members of the Council, shall submit to the appropriate congressional committees and make available to appropriate industry partners a plan to implement the report's framework and recommendations submitted under paragraph (2)(A). (4) Congressional notifications.--Not less frequently than quarterly, the Security Executive Agent shall make available to the public a report regarding the status of the disposition of requests received from departments and agencies of the Federal Government for a change to, or approval under, the Federal investigative standards, the national adjudicative guidelines, continuous evaluation, or other national policy regarding personnel security. SEC. 2603. IMPROVING THE PROCESS FOR SECURITY CLEARANCES. (a) Reviews.--Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent, in coordination with the members of the Council, shall submit to the appropriate congressional committees and make available to appropriate industry partners a report that includes the following: (1) A review of whether the information requested on the Questionnaire for National Security Positions (Standard Form 86) and by the Federal Investigative Standards prescribed by the Office of Personnel Management and the Office of the Director of National Intelligence appropriately supports the adjudicative guidelines under Security Executive Agent Directive 4 (known as the ``National Security Adjudicative Guidelines''). Such review shall include identification of whether any such information currently collected is unnecessary to support the adjudicative guidelines. (2) An assessment of whether such Questionnaire, Standards, and guidelines should be revised to account for the prospect of a holder of a security clearance becoming an insider threat. (3) Recommendations to improve the background investigation process by-- (A) simplifying the Questionnaire for National Security Positions (Standard Form 86) and increasing customer support to applicants completing such Questionnaire; (B) using remote techniques and centralized locations to support or replace field investigation work; (C) using secure and reliable digitization of information obtained during the clearance process; (D) building the capacity of the background investigation labor sector; and (E) replacing periodic reinvestigations with continuous evaluation techniques in all appropriate circumstances. [[Page H5879]] (b) Policy, Strategy, and Implementation.--Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent shall, in coordination with the members of the Council, establish the following: (1) A policy and implementation plan for the issuance of interim security clearances. (2) A policy and implementation plan to ensure contractors are treated consistently in the security clearance process across agencies and departments of the United States as compared to employees of such agencies and departments. Such policy shall address-- (A) prioritization of processing security clearances based on the mission the contractors will be performing; (B) standardization in the forms that agencies issue to initiate the process for a security clearance; (C) digitization of background investigation-related forms; (D) use of the polygraph; (E) the application of the adjudicative guidelines under Security Executive Agent Directive 4 (known as the ``National Security Adjudicative Guidelines''); (F) reciprocal recognition of clearances across agencies and departments of the United States, regardless of status of periodic reinvestigation; (G) tracking of clearance files as individuals move from employment with an agency or department of the United States to employment in the private sector; (H) collection of timelines for movement of contractors across agencies and departments; (I) reporting on security incidents and job performance, consistent with section 552a of title 5, United States Code (commonly known as the ``Privacy Act of 1974''), that may affect the ability to hold a security clearance; (J) any recommended changes to the Federal Acquisition Regulations (FAR) necessary to ensure that information affecting contractor clearances or suitability is appropriately and expeditiously shared between and among agencies and contractors; and (K) portability of contractor security clearances between or among contracts at the same agency and between or among contracts at different agencies that require the same level of clearance. (3) A strategy and implementation plan that-- (A) provides for periodic reinvestigations as part of a security clearance determination only on an as-needed, risk- based basis; (B) includes actions to assess the extent to which automated records checks and other continuous evaluation methods may be used to expedite or focus reinvestigations; and (C) provides an exception for certain populations if the Security Executive Agent-- (i) determines such populations require reinvestigations at regular intervals; and (ii) provides written justification to the appropriate congressional committees for any such determination. (4) A policy and implementation plan for agencies and departments of the United States, as a part of the security clearance process, to accept automated records checks generated pursuant to a security clearance applicant's employment with a prior employer. (5) A policy for the use of certain background materials on individuals collected by the private sector for background investigation purposes. (6) Uniform standards for agency continuous evaluation programs to ensure quality and reciprocity in accepting enrollment in a continuous vetting program as a substitute for a periodic investigation for continued access to classified information. SEC. 2604. GOALS FOR PROMPTNESS OF DETERMINATIONS REGARDING SECURITY CLEARANCES. (a) Reciprocity Defined.--In this section, the term ``reciprocity'' means reciprocal recognition by Federal departments and agencies of eligibility for access to classified information. (b) In General.--The Council shall reform the security clearance process with the objective that, by December 31, 2021, 90 percent of all determinations, other than determinations regarding populations identified under section 2603(b)(3)(C), regarding-- (1) security clearances-- (A) at the secret level are issued in 30 days or fewer; and (B) at the top secret level are issued in 90 days or fewer; and (2) reciprocity of security clearances at the same level are recognized in 2 weeks or fewer. (c) Certain Reinvestigations.--The Council shall reform the security clearance process with the goal that by December 31, 2021, reinvestigation on a set periodicity is not required for more than 10 percent of the population that holds a security clearance. (d) Equivalent Metrics.-- (1) In general.--If the Council develops a set of performance metrics that it certifies to the appropriate congressional committees should achieve substantially equivalent outcomes as those outlined in subsections (b) and (c), the Council may use those metrics for purposes of compliance within this provision. (2) Notice.--If the Council uses the authority provided by paragraph (1) to use metrics as described in such paragraph, the Council shall, not later than 30 days after communicating such metrics to departments and agencies, notify the appropriate congressional committees that it is using such authority. (e) Plan.--Not later than 180 days after the date of the enactment of this Act, the Council shall submit to the appropriate congressional committees and make available to appropriate industry partners a plan to carry out this section. Such plan shall include recommended interim milestones for the goals set forth in subsections (b) and (c) for 2019, 2020, and 2021. SEC. 2605. SECURITY EXECUTIVE AGENT. (a) In General.--Title VIII of the National Security Act of 1947 (50 U.S.C. 3161 et seq.) is amended-- (1) by redesignating sections 803 and 804 as sections 804 and 805, respectively; and (2) by inserting after section 802 the following: ``SEC. 803. SECURITY EXECUTIVE AGENT. ``(a) In General.--The Director of National Intelligence, or such other officer of the United States as the President may designate, shall serve as the Security Executive Agent for all departments and agencies of the United States. ``(b) Duties.--The duties of the Security Executive Agent are as follows: ``(1) To direct the oversight of investigations, reinvestigations, adjudications, and, as applicable, polygraphs for eligibility for access to classified information or eligibility to hold a sensitive position made by any Federal agency. ``(2) To review the national security background investigation and adjudication programs of Federal agencies to determine whether such programs are being implemented in accordance with this section. ``(3) To develop and issue uniform and consistent policies and procedures to ensure the effective, efficient, timely, and secure completion of investigations, polygraphs, and adjudications relating to determinations of eligibility for access to classified information or eligibility to hold a sensitive position. ``(4) Unless otherwise designated by law, to serve as the final authority to designate a Federal agency or agencies to conduct investigations of persons who are proposed for access to classified information or for eligibility to hold a sensitive position to ascertain whether such persons satisfy the criteria for obtaining and retaining access to classified information or eligibility to hold a sensitive position, as applicable. ``(5) Unless otherwise designated by law, to serve as the final authority to designate a Federal agency or agencies to determine eligibility for access to classified information or eligibility to hold a sensitive position in accordance with Executive Order 12968 (50 U.S.C. 3161 note; relating to access to classified information). ``(6) To ensure reciprocal recognition of eligibility for access to classified information or eligibility to hold a sensitive position among Federal agencies, including acting as the final authority to arbitrate and resolve disputes among such agencies involving the reciprocity of investigations and adjudications of eligibility. ``(7) To execute all other duties assigned to the Security Executive Agent by law. ``(c) Authorities.--The Security Executive Agent shall-- ``(1) issue guidelines and instructions to the heads of Federal agencies to ensure appropriate uniformity, centralization, efficiency, effectiveness, timeliness, and security in processes relating to determinations by such agencies of eligibility for access to classified information or eligibility to hold a sensitive position, including such matters as investigations, polygraphs, adjudications, and reciprocity; ``(2) have the authority to grant exceptions to, or waivers of, national security investigative requirements, including issuing implementing or clarifying guidance, as necessary; ``(3) have the authority to assign, in whole or in part, to the head of any Federal agency (solely or jointly) any of the duties of the Security Executive Agent described in subsection (b) or the authorities described in paragraphs (1) and (2), provided that the exercise of such assigned duties or authorities is subject to the oversight of the Security Executive Agent, including such terms and conditions (including approval by the Security Executive Agent) as the Security Executive Agent determines appropriate; and ``(4) define and set standards for continuous evaluation for continued access to classified information and for eligibility to hold a sensitive position.''. (b) Report on Recommendations for Revising Authorities.-- Not later than 30 days after the date on which the Chairman of the Council submits to the appropriate congressional committees the report required by section 2602(b)(2)(A), the Chairman shall submit to the appropriate congressional committees such recommendations as the Chairman may have for revising the authorities of the Security Executive Agent. (c) Conforming Amendment.--Section 103H(j)(4)(A) of such Act (50 U.S.C. 3033(j)(4)(A)) is amended by striking ``in section 804'' and inserting ``in section 805''. (d) Clerical Amendment.--The table of contents in the matter preceding section 2 of such Act (50 U.S.C. 3002) is amended by striking the items relating to sections 803 and 804 and inserting the following: ``Sec. 803. Security Executive Agent. ``Sec. 804. Exceptions. ``Sec. 805. Definitions.''. SEC. 2606. REPORT ON UNIFIED, SIMPLIFIED, GOVERNMENTWIDE STANDARDS FOR POSITIONS OF TRUST AND SECURITY CLEARANCES. Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent and the Suitability and Credentialing Executive Agent, in coordination with the other members of the Council, shall jointly submit to the appropriate congressional committees and make available to appropriate industry partners a report regarding the advisability and the risks, benefits, and costs to the Government and to industry of consolidating to not more than 3 tiers for positions of trust and security clearances. SEC. 2607. REPORT ON CLEARANCE IN PERSON CONCEPT. (a) Sense of Congress.--It is the sense of Congress that to reflect the greater mobility of the modern workforce, alternative methodologies merit analysis to allow greater flexibility for individuals moving in and out of positions that require access to classified information, while still preserving security. [[Page H5880]] (b) Report Required.--Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent shall submit to the appropriate congressional committees and make available to appropriate industry partners a report that describes the requirements, feasibility, and advisability of implementing a clearance in person concept described in subsection (c). (c) Clearance in Person Concept.--The clearance in person concept-- (1) permits an individual who once held a security clearance to maintain his or her eligibility for access to classified information, networks, and facilities for up to 3 years after the individual's eligibility for access to classified information would otherwise lapse; and (2) recognizes, unless otherwise directed by the Security Executive Agent, an individual's security clearance and background investigation as current, regardless of employment status, contingent on enrollment in a continuous vetting program. (d) Contents.--The report required under subsection (b) shall address-- (1) requirements for an individual to voluntarily remain in a continuous evaluation program validated by the Security Executive Agent even if the individual is not in a position requiring access to classified information; (2) appropriate safeguards for privacy; (3) advantages to government and industry; (4) the costs and savings associated with implementation; (5) the risks of such implementation, including security and counterintelligence risks; (6) an appropriate funding model; and (7) fairness to small companies and independent contractors. SEC. 2608. REPORTS ON RECIPROCITY FOR SECURITY CLEARANCES INSIDE OF DEPARTMENTS AND AGENCIES. (a) Reciprocally Recognized Defined.--In this section, the term ``reciprocally recognized'' means reciprocal recognition by Federal departments and agencies of eligibility for access to classified information. (b) Reports to Security Executive Agent.--The head of each Federal department or agency shall submit an annual report to the Security Executive Agent that-- (1) identifies the number of individuals whose security clearances take more than 2 weeks to be reciprocally recognized after such individuals move to another part of such department or agency; and (2) breaks out the information described in paragraph (1) by type of clearance and the reasons for any delays. (c) Annual Report.--Not less frequently than once each year, the Security Executive Agent shall submit to the appropriate congressional committees and make available to industry partners an annual report that summarizes the information received pursuant to subsection (b) during the period covered by such report. SEC. 2609. INTELLIGENCE COMMUNITY REPORTS ON SECURITY CLEARANCES. (a) Sense of Congress.--It is the sense of Congress that-- (1) despite sustained efforts by Congress and the executive branch, an unacceptable backlog in processing and adjudicating security clearances persists, both within elements of the intelligence community and in other departments of the Federal Government, with some processing times exceeding a year or even more; (2) the protracted clearance timetable threatens the ability of elements of the intelligence community to hire and retain highly qualified individuals, and thus to fulfill the missions of such elements; (3) the prospect of a lengthy clearance process deters some such individuals from seeking employment with the intelligence community in the first place, and, when faced with a long wait time, those with conditional offers of employment may opt to discontinue the security clearance process and pursue different opportunities; (4) now more than ever, therefore, the broken security clearance process badly needs fundamental reform; and (5) in the meantime, to ensure the ability of elements of the intelligence community to hire and retain highly qualified personnel, elements should consider, to the extent possible and consistent with national security, permitting new employees to enter on duty immediately or nearly so, and to perform, on a temporary basis pending final adjudication of their security clearances, work that either does not require a security clearance or requires only a low-level interim clearance. (b) In General.--Section 506H of the National Security Act of 1947 (50 U.S.C. 3104) is amended-- (1) in subsection (a)(1)-- (A) in subparagraph (A)(ii), by inserting ``and'' after the semicolon; (B) in subparagraph (B)(ii), by striking ``; and'' and inserting a period; and (C) by striking subparagraph (C); (2) by redesignating subsection (b) as subsection (c); (3) by inserting after subsection (a) the following new subsection (b): ``(b) Intelligence Community Reports.--(1) Not later than March 1 of each year, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Homeland Security of the House of Representatives a report on the security clearances processed by each element of the intelligence community during the preceding fiscal year. Each such report shall separately identify security clearances processed for Federal employees and contractor employees sponsored by each such element. ``(2) Each report submitted under paragraph (1) shall include each of the following for each element of the intelligence community for the fiscal year covered by the report: ``(A) The total number of initial security clearance background investigations sponsored for new applicants. ``(B) The total number of security clearance periodic reinvestigations sponsored for existing employees. ``(C) The total number of initial security clearance background investigations for new applicants that were adjudicated with notice of a determination provided to the prospective applicant, including-- ``(i) the total number that were adjudicated favorably and granted access to classified information; and ``(ii) the total number that were adjudicated unfavorably and resulted in a denial or revocation of a security clearance. ``(D) The total number of security clearance periodic background investigations that were adjudicated with notice of a determination provided to the existing employee, including-- ``(i) the total number that were adjudicated favorably; and ``(ii) the total number that were adjudicated unfavorably and resulted in a denial or revocation of a security clearance. ``(E) The total number of pending security clearance background investigations, including initial applicant investigations and periodic reinvestigations, that were not adjudicated as of the last day of such year and that remained pending as follows: ``(i) For 180 days or less. ``(ii) For 180 days or longer, but less than 12 months. ``(iii) For 12 months or longer, but less than 18 months. ``(iv) For 18 months or longer, but less than 24 months. ``(v) For 24 months or longer. ``(F) In the case of security clearance determinations completed or pending during the year preceding the year for which the report is submitted that have taken longer than 12 months to complete-- ``(i) an explanation of the causes for the delays incurred during the period covered by the report; and ``(ii) the number of such delays involving a polygraph requirement. ``(G) The percentage of security clearance investigations, including initial and periodic reinvestigations, that resulted in a denial or revocation of a security clearance. ``(H) The percentage of security clearance investigations that resulted in incomplete information. ``(I) The percentage of security clearance investigations that did not result in enough information to make a decision on potentially adverse information. ``(3) The report required under this subsection shall be submitted in unclassified form, but may include a classified annex.''; and (4) in subsection (c), as redesignated by paragraph (2), by striking ``subsection (a)(1)'' and inserting ``subsections (a)(1) and (b)''. SEC. 2610. PERIODIC REPORT ON POSITIONS IN THE INTELLIGENCE COMMUNITY THAT CAN BE CONDUCTED WITHOUT ACCESS TO CLASSIFIED INFORMATION, NETWORKS, OR FACILITIES. Not later than 180 days after the date of the enactment of this Act and not less frequently than once every 5 years thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees a report that reviews the intelligence community for which positions can be conducted without access to classified information, networks, or facilities, or may only require a security clearance at the secret level. SEC. 2611. INFORMATION SHARING PROGRAM FOR POSITIONS OF TRUST AND SECURITY CLEARANCES. (a) Program Required.-- (1) In general.--Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent and the Suitability and Credentialing Executive Agent shall establish and implement a program to share between and among agencies of the Federal Government and industry partners of the Federal Government relevant background information regarding individuals applying for and currently occupying national security positions and positions of trust, in order to ensure the Federal Government maintains a trusted workforce. (2) Designation.--The program established under paragraph (1) shall be known as the ``Trusted Information Provider Program'' (in this section referred to as the ``Program''). (b) Privacy Safeguards.--The Security Executive Agent and the Suitability and Credentialing Executive Agent shall ensure that the Program includes such safeguards for privacy as the Security Executive Agent and the Suitability and Credentialing Executive Agent consider appropriate. (c) Provision of Information to the Federal Government.-- The Program shall include requirements that enable investigative service providers and agencies of the Federal Government to leverage certain pre-employment information gathered during the employment or military recruiting process, and other relevant security or human resources information obtained during employment with or for the Federal Government, that satisfy Federal investigative standards, while safeguarding personnel privacy. (d) Information and Records.--The information and records considered under the Program shall include the following: (1) Date and place of birth. (2) Citizenship or immigration and naturalization information. (3) Education records. (4) Employment records. (5) Employment or social references. (6) Military service records. [[Page H5881]] (7) State and local law enforcement checks. (8) Criminal history checks. (9) Financial records or information. (10) Foreign travel, relatives, or associations. (11) Social media checks. (12) Such other information or records as may be relevant to obtaining or maintaining national security, suitability, fitness, or credentialing eligibility. (e) Implementation Plan.-- (1) In general.--Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent and the Suitability and Credentialing Executive Agent shall jointly submit to the appropriate congressional committees and make available to appropriate industry partners a plan for the implementation of the Program. (2) Elements.--The plan required by paragraph (1) shall include the following: (A) Mechanisms that address privacy, national security, suitability or fitness, credentialing, and human resources or military recruitment processes. (B) Such recommendations for legislative or administrative action as the Security Executive Agent and the Suitability and Credentialing Executive Agent consider appropriate to carry out or improve the Program. (f) Plan for Pilot Program on Two-way Information Sharing.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent and the Suitability and Credentialing Executive Agent shall jointly submit to the appropriate congressional committees and make available to appropriate industry partners a plan for the implementation of a pilot program to assess the feasibility and advisability of expanding the Program to include the sharing of information held by the Federal Government related to contract personnel with the security office of the employers of those contractor personnel. (2) Elements.--The plan required by paragraph (1) shall include the following: (A) Mechanisms that address privacy, national security, suitability or fitness, credentialing, and human resources or military recruitment processes. (B) Such recommendations for legislative or administrative action as the Security Executive Agent and the Suitability and Credentialing Executive Agent consider appropriate to carry out or improve the pilot program. (g) Review.--Not later than 1 year after the date of the enactment of this Act, the Security Executive Agent and the Suitability and Credentialing Executive Agent shall jointly submit to the appropriate congressional committees and make available to appropriate industry partners a review of the plans submitted under subsections (e)(1) and (f)(1) and utility and effectiveness of the programs described in such plans. SEC. 2612. REPORT ON PROTECTIONS FOR CONFIDENTIALITY OF WHISTLEBLOWER-RELATED COMMUNICATIONS. Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent shall, in coordination with the Inspector General of the Intelligence Community, submit to the appropriate congressional committees a report detailing the controls employed by the intelligence community to ensure that continuous vetting programs, including those involving user activity monitoring, protect the confidentiality of whistleblower-related communications. TITLE XXVII--REPORTS AND OTHER MATTERS Subtitle A--Matters Relating to Russia and Other Foreign Powers SEC. 2701. LIMITATION RELATING TO ESTABLISHMENT OR SUPPORT OF CYBERSECURITY UNIT WITH THE RUSSIAN FEDERATION. (a) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means-- (1) the congressional intelligence committees; (2) the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives; and (3) the Committee on Foreign Relations of the Senate and the Committee on Foreign Affairs of the House of Representatives. (b) Limitation.-- (1) In general.--No amount may be expended by the Federal Government, other than the Department of Defense, to enter into or implement any bilateral agreement between the United States and the Russian Federation regarding cybersecurity, including the establishment or support of any cybersecurity unit, unless, at least 30 days prior to the conclusion of any such agreement, the Director of National Intelligence submits to the appropriate congressional committees a report on such agreement that includes the elements required by subsection (c). (2) Department of defense agreements.--Any agreement between the Department of Defense and the Russian Federation regarding cybersecurity shall be conducted in accordance with section 1232 of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114-328), as amended by section 1231 of the National Defense Authorization Act for Fiscal Year 2018 (Public Law 115-91). (c) Elements.--If the Director submits a report under subsection (b) with respect to an agreement, such report shall include a description of each of the following: (1) The purpose of the agreement. (2) The nature of any intelligence to be shared pursuant to the agreement. (3) The expected value to national security resulting from the implementation of the agreement. (4) Such counterintelligence concerns associated with the agreement as the Director may have and such measures as the Director expects to be taken to mitigate such concerns. (d) Rule of Construction.--This section shall not be construed to affect any existing authority of the Director of National Intelligence, the Director of the Central Intelligence Agency, or another head of an element of the intelligence community, to share or receive foreign intelligence on a case-by-case basis. SEC. 2702. REPORT ON RETURNING RUSSIAN COMPOUNDS. (a) Covered Compounds Defined.--In this section, the term ``covered compounds'' means the real property in New York, the real property in Maryland, and the real property in San Francisco, California, that were under the control of the Government of Russia in 2016 and were removed from such control in response to various transgressions by the Government of Russia, including the interference by the Government of Russia in the 2016 election in the United States. (b) Requirement for Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees, and the Committee on Foreign Relations of the Senate and the Committee on Foreign Affairs of the House of Representatives (only with respect to the unclassified report), a report on the intelligence risks of returning the covered compounds to Russian control. (c) Form of Report.--The report required by this section shall be submitted in classified and unclassified forms. SEC. 2703. ASSESSMENT OF THREAT FINANCE RELATING TO RUSSIA. (a) Threat Finance Defined.--In this section, the term ``threat finance'' means-- (1) the financing of cyber operations, global influence campaigns, intelligence service activities, proliferation, terrorism, or transnational crime and drug organizations; (2) the methods and entities used to spend, store, move, raise, conceal, or launder money or value, on behalf of threat actors; (3) sanctions evasion; and (4) other forms of threat finance activity domestically or internationally, as defined by the President. (b) Report Required.--Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Assistant Secretary of the Treasury for Intelligence and Analysis, shall submit to the congressional intelligence committees a report containing an assessment of Russian threat finance. The assessment shall be based on intelligence from all sources, including from the Office of Terrorism and Financial Intelligence of the Department of the Treasury. (c) Elements.--The report required by subsection (b) shall include each of the following: (1) A summary of leading examples from the 3-year period preceding the date of the submittal of the report of threat finance activities conducted by, for the benefit of, or at the behest of-- (A) officials of the Government of Russia; (B) persons subject to sanctions under any provision of law imposing sanctions with respect to Russia; (C) Russian nationals subject to sanctions under any other provision of law; or (D) Russian oligarchs or organized criminals. (2) An assessment with respect to any trends or patterns in threat finance activities relating to Russia, including common methods of conducting such activities and global nodes of money laundering used by Russian threat actors described in paragraph (1) and associated entities. (3) An assessment of any connections between Russian individuals involved in money laundering and the Government of Russia. (4) A summary of engagement and coordination with international partners on threat finance relating to Russia, especially in Europe, including examples of such engagement and coordination. (5) An identification of any resource and collection gaps. (6) An identification of-- (A) entry points of money laundering by Russian and associated entities into the United States; (B) any vulnerabilities within the United States legal and financial system, including specific sectors, which have been or could be exploited in connection with Russian threat finance activities; and (C) the counterintelligence threat posed by Russian money laundering and other forms of threat finance, as well as the threat to the United States financial system and United States efforts to enforce sanctions and combat organized crime. (7) Any other matters the Director determines appropriate. (d) Form of Report.--The report required under subsection (b) may be submitted in classified form. SEC. 2704. NOTIFICATION OF AN ACTIVE MEASURES CAMPAIGN. (a) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives; and (C) the Committee on Foreign Relations of the Senate and the Committee on Foreign Affairs of the House of Representatives. (2) Congressional leadership.--The term ``congressional leadership'' includes the following: (A) The majority leader of the Senate. (B) The minority leader of the Senate. (C) The Speaker of the House of Representatives. (D) The minority leader of the House of Representatives. [[Page H5882]] (b) Requirement for Notification.--The Director of National Intelligence, in cooperation with the Director of the Federal Bureau of Investigation and the head of any other relevant agency, shall notify the congressional leadership and the Chairman and Vice Chairman or Ranking Member of each of the appropriate congressional committees, and of other relevant committees of jurisdiction, each time the Director of National Intelligence determines there is credible information that a foreign power has, is, or will attempt to employ a covert influence or active measures campaign with regard to the modernization, employment, doctrine, or force posture of the nuclear deterrent or missile defense. (c) Content of Notification.--Each notification required by subsection (b) shall include information concerning actions taken by the United States to expose or halt an attempt referred to in subsection (b). SEC. 2705. NOTIFICATION OF TRAVEL BY ACCREDITED DIPLOMATIC AND CONSULAR PERSONNEL OF THE RUSSIAN FEDERATION IN THE UNITED STATES. In carrying out the advance notification requirements set out in section 502 of the Intelligence Authorization Act for Fiscal Year 2017 (division N of Public Law 115-31; 131 Stat. 825; 22 U.S.C. 254a note), the Secretary of State shall-- (1) ensure that the Russian Federation provides notification to the Secretary of State at least 2 business days in advance of all travel that is subject to such requirements by accredited diplomatic and consular personnel of the Russian Federation in the United States, and take necessary action to secure full compliance by Russian personnel and address any noncompliance; and (2) provide notice of travel described in paragraph (1) to the Director of National Intelligence and the Director of the Federal Bureau of Investigation within 1 hour of receiving notice of such travel. SEC. 2706. REPORT ON OUTREACH STRATEGY ADDRESSING THREATS FROM UNITED STATES ADVERSARIES TO THE UNITED STATES TECHNOLOGY SECTOR. (a) Appropriate Committees of Congress Defined.--In this section, the term ``appropriate committees of Congress'' means-- (1) the congressional intelligence committees; (2) the Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate; and (3) the Committee on Armed Services, Committee on Homeland Security, and the Committee on Oversight and Reform of the House of Representatives. (b) Report Required.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a report detailing outreach by the intelligence community and the Defense Intelligence Enterprise to United States industrial, commercial, scientific, technical, and academic communities on matters relating to the efforts of adversaries of the United States to acquire critical United States technology, intellectual property, and research and development information. (c) Contents.--The report required by subsection (b) shall include the following: (1) A review of the current outreach efforts of the intelligence community and the Defense Intelligence Enterprise described in subsection (b), including the type of information conveyed in the outreach. (2) A determination of the appropriate element of the intelligence community to lead such outreach efforts. (3) An assessment of potential methods for improving the effectiveness of such outreach, including an assessment of the following: (A) Those critical technologies, infrastructure, or related supply chains that are at risk from the efforts of adversaries described in subsection (b). (B) The necessity and advisability of granting security clearances to company or community leadership, when necessary and appropriate, to allow for tailored classified briefings on specific targeted threats. (C) The advisability of partnering with entities of the Federal Government that are not elements of the intelligence community and relevant regulatory and industry groups described in subsection (b), to convey key messages across sectors targeted by United States adversaries. (D) Strategies to assist affected elements of the communities described in subparagraph (C) in mitigating, deterring, and protecting against the broad range of threats from the efforts of adversaries described in subsection (b), with focus on producing information that enables private entities to justify business decisions related to national security concerns. (E) The advisability of the establishment of a United States Government-wide task force to coordinate outreach and activities to combat the threats from efforts of adversaries described in subsection (b). (F) Such other matters as the Director of National Intelligence may consider necessary. (d) Consultation Encouraged.--In preparing the report required by subsection (b), the Director is encouraged to consult with other government agencies, think tanks, academia, representatives of the financial industry, or such other entities as the Director considers appropriate. (e) Form.--The report required by subsection (b) shall be submitted in unclassified form, but may include a classified annex as necessary. SEC. 2707. REPORT ON IRANIAN SUPPORT OF PROXY FORCES IN SYRIA AND LEBANON. (a) Definitions.--In this section: (1) Appropriate committees of congress.--The term ``appropriate committees of Congress'' means-- (A) the Committee on Armed Services, the Committee on Foreign Relations, and the Select Committee on Intelligence of the Senate; and (B) the Committee on Armed Services, the Committee on Foreign Affairs, and the Permanent Select Committee on Intelligence of the House of Representatives. (2) Arms or related material.--The term ``arms or related material'' means-- (A) nuclear, biological, chemical, or radiological weapons or materials or components of such weapons; (B) ballistic or cruise missile weapons or materials or components of such weapons; (C) destabilizing numbers and types of advanced conventional weapons; (D) defense articles or defense services, as those terms are defined in paragraphs (3) and (4), respectively, of section 47 of the Arms Export Control Act (22 U.S.C. 2794); (E) defense information, as that term is defined in section 644 of the Foreign Assistance Act of 1961 (22 U.S.C. 2403); or (F) items designated by the President for purposes of the United States Munitions List under section 38(a)(1) of the Arms Export Control Act (22 U.S.C. 2778(a)(1)). (b) Report Required.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a report on Iranian support of proxy forces in Syria and Lebanon and the threat posed to Israel, other United States regional allies, and other specified interests of the United States as a result of such support. (c) Matters for Inclusion.--The report required under subsection (b) shall include information relating to the following matters with respect to both the strategic and tactical implications for the United States and its allies: (1) A description of arms or related materiel transferred by Iran to Hizballah since March 2011, including the number of such arms or related materiel and whether such transfer was by land, sea, or air, as well as financial and additional technological capabilities transferred by Iran to Hizballah. (2) A description of Iranian and Iranian-controlled personnel, including Hizballah, Shiite militias, and Iran's Revolutionary Guard Corps forces, operating within Syria, including the number and geographic distribution of such personnel operating within 30 kilometers of the Israeli borders with Syria and Lebanon. (3) An assessment of Hizballah's operational lessons learned based on its recent experiences in Syria. (4) A description of any rocket-producing facilities in Lebanon for nonstate actors, including whether such facilities were assessed to be built at the direction of Hizballah leadership, Iranian leadership, or in consultation between Iranian leadership and Hizballah leadership. (5) An analysis of the foreign and domestic supply chains that significantly facilitate, support, or otherwise aid Hizballah's acquisition or development of missile production facilities, including the geographic distribution of such foreign and domestic supply chains. (6) An assessment of the provision of goods, services, or technology transferred by Iran or its affiliates to Hizballah to indigenously manufacture or otherwise produce missiles. (7) An identification of foreign persons that are based on credible information, facilitating the transfer of significant financial support or arms or related materiel to Hizballah. (8) A description of the threat posed to Israel and other United States allies in the Middle East by the transfer of arms or related material or other support offered to Hizballah and other proxies from Iran. (d) Form of Report.--The report required under subsection (b) shall be submitted in unclassified form, but may include a classified annex. SEC. 2708. ANNUAL REPORT ON IRANIAN EXPENDITURES SUPPORTING FOREIGN MILITARY AND TERRORIST ACTIVITIES. (a) Annual Report Required.--Not later than 90 days after the date of the enactment of this Act and not less frequently than once each year thereafter, the Director of National Intelligence shall submit to Congress a report describing Iranian expenditures in the previous calendar year on military and terrorist activities outside the country, including each of the following: (1) The amount spent in such calendar year on activities by the Islamic Revolutionary Guard Corps, including activities providing support for-- (A) Hizballah; (B) Houthi rebels in Yemen; (C) Hamas; (D) proxy forces in Iraq and Syria; or (E) any other entity or country the Director determines to be relevant. (2) The amount spent in such calendar year for ballistic missile research and testing or other activities that the Director determines are destabilizing to the Middle East region. (b) Form.--The report required under subsection (a) shall be submitted in unclassified form, but may include a classified annex. SEC. 2709. EXPANSION OF SCOPE OF COMMITTEE TO COUNTER ACTIVE MEASURES AND REPORT ON ESTABLISHMENT OF FOREIGN MALIGN INFLUENCE CENTER. (a) Scope of Committee to Counter Active Measures.-- (1) In general.--Section 501 of the Intelligence Authorization Act for Fiscal Year 2017 (Public Law 115-31; 50 U.S.C. 3001 note) is amended-- (A) in subsections (a) through (h)-- (i) by inserting ``, the People's Republic of China, the Islamic Republic of Iran, the Democratic People's Republic of Korea, or other nation state'' after ``Russian Federation'' each place it appears; and [[Page H5883]] (ii) by inserting ``, China, Iran, North Korea, or other nation state'' after ``Russia'' each place it appears; and (B) in the section heading, by inserting ``, the people's republic of china, the islamic republic of iran, the democratic people's republic of korea, or other nation state'' after ``russian federation''. (2) Clerical amendment.--The table of contents in section 1(b) of such Act is amended by striking the item relating to section 501 and inserting the following new item: ``Sec. 501. Committee to counter active measures by the Russian Federation, the People's Republic of China, the Islamic Republic of Iran, the Democratic People's Republic of Korea, or other nation states to exert covert influence over peoples and governments.''. (b) Report Required.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with such elements of the intelligence community as the Director considers relevant, shall submit to the congressional intelligence committees a report on the feasibility and advisability of establishing a center, to be known as the ``Foreign Malign Influence Response Center'', that-- (A) is comprised of analysts from all appropriate elements of the intelligence community, including elements with related diplomatic and law enforcement functions; (B) has access to all intelligence and other reporting acquired by the United States Government on foreign efforts to influence, through overt and covert malign activities, United States political processes and elections; (C) provides comprehensive assessment, and indications and warning, of such activities; and (D) provides for enhanced dissemination of such assessment to United States policy makers. (2) Contents.--The report required by paragraph (1) shall include the following: (A) A discussion of the desirability of the establishment of such center and any barriers to such establishment. (B) Such recommendations and other matters as the Director considers appropriate. Subtitle B--Reports SEC. 2711. TECHNICAL CORRECTION TO INSPECTOR GENERAL STUDY. Section 11001(d) of title 5, United States Code, is amended-- (1) in the subsection heading, by striking ``Audit'' and inserting ``Review''; (2) in paragraph (1), by striking ``audit'' and inserting ``review''; and (3) in paragraph (2), by striking ``audit'' and inserting ``review''. SEC. 2712. REPORTS ON AUTHORITIES OF THE CHIEF INTELLIGENCE OFFICER OF THE DEPARTMENT OF HOMELAND SECURITY. (a) Definitions.--In this section: (1) Appropriate committees of congress.--The term ``appropriate committees of Congress'' means-- (A) the congressional intelligence committees; (B) the Committee on Homeland Security and Governmental Affairs of the Senate; and (C) the Committee on Homeland Security of the House of Representatives. (2) Homeland security intelligence enterprise.--The term ``Homeland Security Intelligence Enterprise'' has the meaning given such term in Department of Homeland Security Instruction Number 264-01-001, or successor authority. (b) Report Required.--Not later than 120 days after the date of the enactment of this Act, the Secretary of Homeland Security, in consultation with the Under Secretary of Homeland Security for Intelligence and Analysis, shall submit to the appropriate committees of Congress a report on the authorities of the Under Secretary. (c) Elements.--The report required by subsection (b) shall include each of the following: (1) An analysis of whether the Under Secretary has the legal and policy authority necessary to organize and lead the Homeland Security Intelligence Enterprise, with respect to intelligence, and, if not, a description of-- (A) the obstacles to exercising the authorities of the Chief Intelligence Officer of the Department and the Homeland Security Intelligence Council, of which the Chief Intelligence Officer is the chair; and (B) the legal and policy changes necessary to effectively coordinate, organize, and lead intelligence activities of the Department of Homeland Security. (2) A description of the actions that the Secretary has taken to address the inability of the Under Secretary to require components of the Department, other than the Office of Intelligence and Analysis of the Department to-- (A) coordinate intelligence programs; and (B) integrate and standardize intelligence products produced by such other components. SEC. 2713. REVIEW OF INTELLIGENCE COMMUNITY WHISTLEBLOWER MATTERS. (a) Review of Whistleblower Matters.--The Inspector General of the Intelligence Community, in consultation with the inspectors general for the Central Intelligence Agency, the National Security Agency, the National Geospatial- Intelligence Agency, the Defense Intelligence Agency, and the National Reconnaissance Office, shall conduct a review of the authorities, policies, investigatory standards, and other practices and procedures relating to intelligence community whistleblower matters, with respect to such inspectors general. (b) Objective of Review.--The objective of the review required under subsection (a) is to identify any discrepancies, inconsistencies, or other issues, which frustrate the timely and effective reporting of intelligence community whistleblower matters to appropriate inspectors general and to the congressional intelligence committees, and the fair and expeditious investigation and resolution of such matters. (c) Conduct of Review.--The Inspector General of the Intelligence Community shall take such measures as the Inspector General determines necessary in order to ensure that the review required by subsection (a) is conducted in an independent and objective fashion. (d) Report.--Not later than 270 days after the date of the enactment of this Act, the Inspector General of the Intelligence Community shall submit to the congressional intelligence committees a written report containing the results of the review required under subsection (a), along with recommendations to improve the timely and effective reporting of intelligence community whistleblower matters to inspectors general and to the congressional intelligence committees and the fair and expeditious investigation and resolution of such matters. SEC. 2714. REPORT ON ROLE OF DIRECTOR OF NATIONAL INTELLIGENCE WITH RESPECT TO CERTAIN FOREIGN INVESTMENTS. (a) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the heads of the elements of the intelligence community determined appropriate by the Director, shall submit to the congressional intelligence committees a report on the role of the Director in preparing analytic materials in connection with the evaluation by the Federal Government of national security risks associated with potential foreign investments into the United States. (b) Elements.--The report under subsection (a) shall include-- (1) a description of the current process for the provision of the analytic materials described in subsection (a); (2) an identification of the most significant benefits and drawbacks of such process with respect to the role of the Director, including the sufficiency of resources and personnel to prepare such materials; and (3) recommendations to improve such process. SEC. 2715. REPORT ON SURVEILLANCE BY FOREIGN GOVERNMENTS AGAINST UNITED STATES TELECOMMUNICATIONS NETWORKS. (a) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means the following: (1) The congressional intelligence committees. (2) The Committee on the Judiciary and the Committee on Homeland Security and Governmental Affairs of the Senate. (3) The Committee on the Judiciary and the Committee on Homeland Security of the House of Representatives. (b) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall, in coordination with the Director of the Central Intelligence Agency, the Director of the National Security Agency, the Director of the Federal Bureau of Investigation, and the Secretary of Homeland Security, submit to the appropriate congressional committees a report describing-- (1) any attempts known to the intelligence community by foreign governments to exploit cybersecurity vulnerabilities in United States telecommunications networks (including Signaling System No. 7) to target for surveillance United States persons, including employees of the Federal Government; and (2) any actions, as of the date of the enactment of this Act, taken by the intelligence community to protect agencies and personnel of the United States Government from surveillance conducted by foreign governments. SEC. 2716. BIENNIAL REPORT ON FOREIGN INVESTMENT RISKS. (a) Intelligence Community Interagency Working Group.-- (1) Requirement to establish.--The Director of National Intelligence shall establish an intelligence community interagency working group to prepare the biennial reports required by subsection (b). (2) Chairperson.--The Director of National Intelligence shall serve as the chairperson of such interagency working group. (3) Membership.--Such interagency working group shall be composed of representatives of each element of the intelligence community that the Director of National Intelligence determines appropriate. (b) Biennial Report on Foreign Investment Risks.-- (1) Report required.--Not later than 180 days after the date of the enactment of this Act and not less frequently than once every 2 years thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Homeland Security of the House of Representatives a report on foreign investment risks prepared by the interagency working group established under subsection (a). (2) Elements.--Each report required by paragraph (1) shall include identification, analysis, and explanation of the following: (A) Any current or projected major threats to the national security of the United States with respect to foreign investment. (B) Any strategy used by a foreign country that such interagency working group has identified to be a country of special concern to use foreign investment to target the acquisition of critical technologies, critical materials, or critical infrastructure. (C) Any economic espionage efforts directed at the United States by a foreign country, particularly such a country of special concern. [[Page H5884]] SEC. 2717. MODIFICATION OF CERTAIN REPORTING REQUIREMENT ON TRAVEL OF FOREIGN DIPLOMATS. Section 502(d)(2) of the Intelligence Authorization Act for Fiscal Year 2017 (Public Law 115-31) is amended by striking ``the number'' and inserting ``a best estimate''. SEC. 2718. SEMIANNUAL REPORTS ON INVESTIGATIONS OF UNAUTHORIZED DISCLOSURES OF CLASSIFIED INFORMATION. (a) In General.--Title XI of the National Security Act of 1947 (50 U.S.C. 3231 et seq.) is amended by adding at the end the following new section: ``SEC. 1105. SEMIANNUAL REPORTS ON INVESTIGATIONS OF UNAUTHORIZED DISCLOSURES OF CLASSIFIED INFORMATION. ``(a) Definitions.--In this section: ``(1) Covered official.--The term `covered official' means-- ``(A) the heads of each element of the intelligence community; and ``(B) the inspectors general with oversight responsibility for an element of the intelligence community. ``(2) Investigation.--The term `investigation' means any inquiry, whether formal or informal, into the existence of an unauthorized public disclosure of classified information. ``(3) Unauthorized disclosure of classified information.-- The term `unauthorized disclosure of classified information' means any unauthorized disclosure of classified information to any recipient. ``(4) Unauthorized public disclosure of classified information.--The term `unauthorized public disclosure of classified information' means the unauthorized disclosure of classified information to a journalist or media organization. ``(b) Intelligence Community Reporting.-- ``(1) In general.--Not less frequently than once every 6 months, each covered official shall submit to the congressional intelligence committees a report on investigations of unauthorized public disclosures of classified information. ``(2) Elements.--Each report submitted under paragraph (1) shall include, with respect to the preceding 6-month period, the following: ``(A) The number of investigations opened by the covered official regarding an unauthorized public disclosure of classified information. ``(B) The number of investigations completed by the covered official regarding an unauthorized public disclosure of classified information. ``(C) Of the number of such completed investigations identified under subparagraph (B), the number referred to the Attorney General for criminal investigation. ``(c) Department of Justice Reporting.-- ``(1) In general.--Not less frequently than once every 6 months, the Assistant Attorney General for National Security of the Department of Justice, in consultation with the Director of the Federal Bureau of Investigation, shall submit to the congressional intelligence committees, the Committee on the Judiciary of the Senate, and the Committee on the Judiciary of the House of Representatives a report on the status of each referral made to the Department of Justice from any element of the intelligence community regarding an unauthorized disclosure of classified information made during the most recent 365-day period or any referral that has not yet been closed, regardless of the date the referral was made. ``(2) Contents.--Each report submitted under paragraph (1) shall include, for each referral covered by the report, at a minimum, the following: ``(A) The date the referral was received. ``(B) A statement indicating whether the alleged unauthorized disclosure described in the referral was substantiated by the Department of Justice. ``(C) A statement indicating the highest level of classification of the information that was revealed in the unauthorized disclosure. ``(D) A statement indicating whether an open criminal investigation related to the referral is active. ``(E) A statement indicating whether any criminal charges have been filed related to the referral. ``(F) A statement indicating whether the Department of Justice has been able to attribute the unauthorized disclosure to a particular entity or individual. ``(d) Form of Reports.--Each report submitted under this section shall be submitted in unclassified form, but may have a classified annex.''. (b) Clerical Amendment.--The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 1104 the following new item: ``Sec. 1105. Semiannual reports on investigations of unauthorized disclosures of classified information.''. SEC. 2719. CONGRESSIONAL NOTIFICATION OF DESIGNATION OF COVERED INTELLIGENCE OFFICER AS PERSONA NON GRATA. (a) Covered Intelligence Officer Defined.--In this section, the term ``covered intelligence officer'' means-- (1) a United States intelligence officer serving in a post in a foreign country; or (2) a known or suspected foreign intelligence officer serving in a United States post. (b) Requirement for Reports.--Not later than 72 hours after a covered intelligence officer is designated as a persona non grata, the Director of National Intelligence, in consultation with the Secretary of State, shall submit to the congressional intelligence committees, the Committee on Foreign Relations of the Senate, and the Committee on Foreign Affairs of the House of Representatives a notification of that designation. Each such notification shall include-- (1) the date of the designation; (2) the basis for the designation; and (3) a justification for the expulsion. SEC. 2720. REPORTS ON INTELLIGENCE COMMUNITY PARTICIPATION IN VULNERABILITIES EQUITIES PROCESS OF FEDERAL GOVERNMENT. (a) Definitions.--In this section: (1) Vulnerabilities equities policy and process document.-- The term ``Vulnerabilities Equities Policy and Process document'' means the executive branch document entitled ``Vulnerabilities Equities Policy and Process'' dated November 15, 2017. (2) Vulnerabilities equities process.--The term ``Vulnerabilities Equities Process'' means the interagency review of vulnerabilities, pursuant to the Vulnerabilities Equities Policy and Process document or any successor document. (3) Vulnerability.--The term ``vulnerability'' means a weakness in an information system or its components (for example, system security procedures, hardware design, and internal controls) that could be exploited or could affect confidentiality, integrity, or availability of information. (b) Reports on Process and Criteria Under Vulnerabilities Equities Policy and Process.-- (1) In general.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a written report describing-- (A) with respect to each element of the intelligence community-- (i) the title of the official or officials responsible for determining whether, pursuant to criteria contained in the Vulnerabilities Equities Policy and Process document or any successor document, a vulnerability must be submitted for review under the Vulnerabilities Equities Process; and (ii) the process used by such element to make such determination; and (B) the roles or responsibilities of that element during a review of a vulnerability submitted to the Vulnerabilities Equities Process. (2) Changes to process or criteria.--Not later than 30 days after any significant change is made to the process and criteria used by any element of the intelligence community for determining whether to submit a vulnerability for review under the Vulnerabilities Equities Process, such element shall submit to the congressional intelligence committees a report describing such change. (3) Form of reports.--Each report submitted under this subsection shall be submitted in unclassified form, but may include a classified annex. (c) Annual Reports.-- (1) In general.--Not less frequently than once each calendar year, the Director of National Intelligence shall submit to the congressional intelligence committees a classified report containing, with respect to the previous year-- (A) the number of vulnerabilities submitted for review under the Vulnerabilities Equities Process; (B) the number of vulnerabilities described in subparagraph (A) disclosed to each vendor responsible for correcting the vulnerability, or to the public, pursuant to the Vulnerabilities Equities Process; and (C) the aggregate number, by category, of the vulnerabilities excluded from review under the Vulnerabilities Equities Process, as described in paragraph 5.4 of the Vulnerabilities Equities Policy and Process document. (2) Unclassified information.--Each report submitted under paragraph (1) shall include an unclassified appendix that contains-- (A) the aggregate number of vulnerabilities disclosed to vendors or the public pursuant to the Vulnerabilities Equities Process; and (B) the aggregate number of vulnerabilities disclosed to vendors or the public pursuant to the Vulnerabilities Equities Process known to have been patched. (3) Non-duplication.--The Director of National Intelligence may forgo submission of an annual report required under this subsection for a calendar year, if the Director notifies the intelligence committees in writing that, with respect to the same calendar year, an annual report required by paragraph 4.3 of the Vulnerabilities Equities Policy and Process document already has been submitted to Congress, and such annual report contains the information that would otherwise be required to be included in an annual report under this subsection. SEC. 2721. INSPECTORS GENERAL REPORTS ON CLASSIFICATION. (a) Reports Required.--Not later than October 1, 2019, each Inspector General listed in subsection (b) shall submit to the congressional intelligence committees a report that includes, with respect to the department or agency of the Inspector General, analyses of the following: (1) The accuracy of the application of classification and handling markers on a representative sample of finished reports, including such reports that are compartmented. (2) Compliance with declassification procedures. (3) The effectiveness of processes for identifying topics of public or historical importance that merit prioritization for a declassification review. (b) Inspectors General Listed.--The Inspectors General listed in this subsection are as follows: (1) The Inspector General of the Intelligence Community. (2) The Inspector General of the Central Intelligence Agency. (3) The Inspector General of the National Security Agency. (4) The Inspector General of the Defense Intelligence Agency. (5) The Inspector General of the National Reconnaissance Office. [[Page H5885]] (6) The Inspector General of the National Geospatial- Intelligence Agency. SEC. 2722. REPORTS ON GLOBAL WATER INSECURITY AND NATIONAL SECURITY IMPLICATIONS AND BRIEFING ON EMERGING INFECTIOUS DISEASE AND PANDEMICS. (a) Reports on Global Water Insecurity and National Security Implications.-- (1) Reports required.--Not later than 180 days after the date of the enactment of this Act and not less frequently than once every 5 years thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the implications of water insecurity on the national security interest of the United States, including consideration of social, economic, agricultural, and environmental factors. (2) Assessment scope and focus.--Each report submitted under paragraph (1) shall include an assessment of water insecurity described in such subsection with a global scope, but focus on areas of the world-- (A) of strategic, economic, or humanitarian interest to the United States-- (i) that are, as of the date of the report, at the greatest risk of instability, conflict, human insecurity, or mass displacement; or (ii) where challenges relating to water insecurity are likely to emerge and become significant during the 5-year or the 20-year period beginning on the date of the report; and (B) where challenges relating to water insecurity are likely to imperil the national security interests of the United States or allies of the United States. (3) Consultation.--In researching a report required by paragraph (1), the Director shall consult with-- (A) such stakeholders within the intelligence community, the Department of Defense, and the Department of State as the Director considers appropriate; and (B) such additional Federal agencies and persons in the private sector as the Director considers appropriate. (4) Form.--Each report submitted under paragraph (1) shall be submitted in unclassified form, but may include a classified annex. (b) Briefing on Emerging Infectious Disease and Pandemics.-- (1) Appropriate congressional committees defined.--In this subsection, the term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Foreign Affairs, the Committee on Armed Services, and the Committee on Appropriations of the House of Representatives; and (C) the Committee on Foreign Relations, the Committee on Armed Services, and the Committee on Appropriations of the Senate. (2) Briefing.--Not later than 120 days after the date of the enactment of this Act, the Director of National Intelligence shall provide to the appropriate congressional committees a briefing on the anticipated geopolitical effects of emerging infectious disease (including deliberate, accidental, and naturally occurring infectious disease threats) and pandemics, and their implications on the national security of the United States. (3) Content.--The briefing under paragraph (2) shall include an assessment of-- (A) the economic, social, political, and security risks, costs, and impacts of emerging infectious diseases on the United States and the international political and economic system; (B) the economic, social, political, and security risks, costs, and impacts of a major transnational pandemic on the United States and the international political and economic system; and (C) contributing trends and factors to the matters assessed under subparagraphs (A) and (B). (4) Examination of response capacity.--In examining the risks, costs, and impacts of emerging infectious disease and a possible transnational pandemic under paragraph (3), the Director of National Intelligence shall also examine in the briefing under paragraph (2) the response capacity within affected countries and the international system. In considering response capacity, the Director shall include-- (A) the ability of affected nations to effectively detect and manage emerging infectious diseases and a possible transnational pandemic; (B) the role and capacity of international organizations and nongovernmental organizations to respond to emerging infectious disease and a possible pandemic, and their ability to coordinate with affected and donor nations; and (C) the effectiveness of current international frameworks, agreements, and health systems to respond to emerging infectious diseases and a possible transnational pandemic. (5) Form.--The briefing under paragraph (2) may be classified. SEC. 2723. ANNUAL REPORT ON MEMORANDA OF UNDERSTANDING BETWEEN ELEMENTS OF INTELLIGENCE COMMUNITY AND OTHER ENTITIES OF THE UNITED STATES GOVERNMENT REGARDING SIGNIFICANT OPERATIONAL ACTIVITIES OR POLICY. Section 311 of the Intelligence Authorization Act for Fiscal Year 2017 (50 U.S.C. 3313) is amended-- (1) by redesignating subsection (b) as subsection (c); and (2) by striking subsection (a) and inserting the following: ``(a) In General.--Each year, concurrent with the annual budget request submitted by the President to Congress under section 1105 of title 31, United States Code, each head of an element of the intelligence community shall submit to the congressional intelligence committees a report that lists each memorandum of understanding or other agreement regarding significant operational activities or policy entered into during the most recently completed fiscal year between or among such element and any other entity of the United States Government. ``(b) Provision of Documents.--Each head of an element of an intelligence community who receives a request from the Select Committee on Intelligence of the Senate or the Permanent Select Committee on Intelligence of the House of Representatives for a copy of a memorandum of understanding or other document listed in a report submitted by the head under subsection (a) shall submit to such committee the requested copy as soon as practicable after receiving such request.''. SEC. 2724. STUDY ON THE FEASIBILITY OF ENCRYPTING UNCLASSIFIED WIRELINE AND WIRELESS TELEPHONE CALLS. (a) Study Required.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall complete a study on the feasibility of encrypting unclassified wireline and wireless telephone calls between personnel in the intelligence community. (b) Report.--Not later than 90 days after the date on which the Director completes the study required by subsection (a), the Director shall submit to the congressional intelligence committees a report on the Director's findings with respect to such study. SEC. 2725. MODIFICATION OF REQUIREMENT FOR ANNUAL REPORT ON HIRING AND RETENTION OF MINORITY EMPLOYEES. (a) Expansion of Period of Report.--Subsection (a) of section 114 of the National Security Act of 1947 (50 U.S.C. 3050) is amended by inserting ``and the preceding 5 fiscal years'' after ``fiscal year''. (b) Clarification on Disaggregation of Data.--Subsection (b) of such section is amended, in the matter before paragraph (1), by striking ``disaggregated data by category of covered person from each element of the intelligence community'' and inserting ``data, disaggregated by category of covered person and by element of the intelligence community,''. SEC. 2726. REPORTS ON INTELLIGENCE COMMUNITY LOAN REPAYMENT AND RELATED PROGRAMS. (a) Sense of Congress.--It is the sense of Congress that-- (1) there should be established, through the issuing of an Intelligence Community Directive or otherwise, an intelligence community-wide program for student loan repayment, student loan forgiveness, financial counseling, and related matters, for employees of the intelligence community; (2) creating such a program would enhance the ability of the elements of the intelligence community to recruit, hire, and retain highly qualified personnel, including with respect to mission-critical and hard-to-fill positions; (3) such a program, including with respect to eligibility requirements, should be designed so as to maximize the ability of the elements of the intelligence community to recruit, hire, and retain highly qualified personnel, including with respect to mission-critical and hard-to-fill positions; and (4) to the extent possible, such a program should be uniform throughout the intelligence community and publicly promoted by each element of the intelligence community to both current employees of the element as well as to prospective employees of the element. (b) Report on Potential Intelligence Community-wide Program.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in cooperation with the heads of the elements of the intelligence community and the heads of any other appropriate department or agency of the Federal Government, shall submit to the congressional intelligence committees a report on potentially establishing and carrying out an intelligence community-wide program for student loan repayment, student loan forgiveness, financial counseling, and related matters, as described in subsection (a). (2) Matters included.--The report under paragraph (1) shall include, at a minimum, the following: (A) A description of the financial resources that the elements of the intelligence community would require to establish and initially carry out the program specified in paragraph (1). (B) A description of the practical steps to establish and carry out such a program. (C) The identification of any legislative action the Director determines necessary to establish and carry out such a program. (c) Annual Reports on Established Programs.-- (1) Covered programs defined.--In this subsection, the term ``covered programs'' means any loan repayment program, loan forgiveness program, financial counseling program, or similar program, established pursuant to title X of the National Security Act of 1947 (50 U.S.C. 3191 et seq.) or any other provision of law that may be administered or used by an element of the intelligence community. (2) Annual reports required.--Not less frequently than once each year, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the covered programs. Each such report shall include, with respect to the period covered by the report, the following: (A) The number of personnel from each element of the intelligence community who used each covered program. (B) The total amount of funds each element expended for each such program. (C) A description of the efforts made by each element to promote each covered program pursuant to both the personnel of the element of the intelligence community and to prospective personnel. [[Page H5886]] SEC. 2727. REPEAL OF CERTAIN REPORTING REQUIREMENTS. (a) Correcting Long-standing Material Weaknesses.--Section 368 of the Intelligence Authorization Act for Fiscal Year 2010 (Public Law 110-259; 50 U.S.C. 3051 note) is hereby repealed. (b) Interagency Threat Assessment and Coordination Group.-- Section 210D of the Homeland Security Act of 2002 (6 U.S.C. 124k) is amended-- (1) by striking subsection (c); and (2) by redesignating subsections (d) through (i) as subsections (c) through (h), respectively; and (3) in subsection (c), as so redesignated-- (A) in paragraph (8), by striking ``; and'' and inserting a period; and (B) by striking paragraph (9). (c) Inspector General Report.--Section 8H of the Inspector General Act of 1978 (5 U.S.C. App.) is amended-- (1) by striking subsection (g); and (2) by redesignating subsections (h) and (i) as subsections (g) and (h), respectively. SEC. 2728. INSPECTOR GENERAL OF THE INTELLIGENCE COMMUNITY REPORT ON SENIOR EXECUTIVES OF THE OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE. (a) Senior Executive Service Position Defined.--In this section, the term ``Senior Executive Service position'' has the meaning given that term in section 3132(a)(2) of title 5, United States Code, and includes any position above the GS- 15, step 10, level of the General Schedule under section 5332 of such title. (b) Report.--Not later than 90 days after the date of the enactment of this Act, the Inspector General of the Intelligence Community shall submit to the congressional intelligence committees a report on the number of Senior Executive Service positions in the Office of the Director of National Intelligence. (c) Matters Included.--The report under subsection (b) shall include the following: (1) The number of required Senior Executive Service positions for the Office of the Director of National Intelligence. (2) Whether such requirements are reasonably based on the mission of the Office. (3) A discussion of how the number of the Senior Executive Service positions in the Office compare to the number of senior positions at comparable organizations. (d) Cooperation.--The Director of National Intelligence shall provide to the Inspector General of the Intelligence Community any information requested by the Inspector General of the Intelligence Community that is necessary to carry out this section by not later than 14 calendar days after the date on which the Inspector General of the Intelligence Community makes such request. SEC. 2729. BRIEFING ON FEDERAL BUREAU OF INVESTIGATION OFFERING PERMANENT RESIDENCE TO SOURCES AND COOPERATORS. Not later than 30 days after the date of the enactment of this Act, the Director of the Federal Bureau of Investigation shall provide to the congressional intelligence committees a briefing on the ability of the Federal Bureau of Investigation to offer, as an inducement to assisting the Bureau, permanent residence within the United States to foreign individuals who are sources or cooperators in counterintelligence or other national security-related investigations. The briefing shall address the following: (1) The extent to which the Bureau may make such offers, whether independently or in conjunction with other agencies and departments of the United States Government, including a discussion of the authorities provided by section 101(a)(15)(S) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(S)), section 7 of the Central Intelligence Agency Act (50 U.S.C. 3508), and any other provision of law under which the Bureau may make such offers. (2) An overview of the policies and operational practices of the Bureau with respect to making such offers. (3) The sufficiency of such policies and practices with respect to inducing individuals to cooperate with, serve as sources for such investigations, or both. (4) Whether the Director recommends any legislative actions to improve such policies and practices, particularly with respect to the counterintelligence efforts of the Bureau. SEC. 2730. INTELLIGENCE ASSESSMENT OF NORTH KOREA REVENUE SOURCES. (a) Assessment Required.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Assistant Secretary of State for Intelligence and Research and the Assistant Secretary of the Treasury for Intelligence and Analysis, shall produce an intelligence assessment of the revenue sources of the North Korean regime. Such assessment shall include revenue from the following sources: (1) Trade in coal, iron, and iron ore. (2) The provision of fishing rights to North Korean territorial waters. (3) Trade in gold, titanium ore, vanadium ore, copper, silver, nickel, zinc, or rare earth minerals, and other stores of value. (4) Trade in textiles. (5) Sales of conventional defense articles and services. (6) Sales of controlled goods, ballistic missiles, and other associated items. (7) Other types of manufacturing for export, as the Director of National Intelligence considers appropriate. (8) The exportation of workers from North Korea in a manner intended to generate significant revenue, directly or indirectly, for use by the government of North Korea. (9) The provision of nonhumanitarian goods (such as food, medicine, and medical devices) and services by other countries. (10) The provision of services, including banking and other support, including by entities located in the Russian Federation, China, and Iran. (11) Online commercial activities of the Government of North Korea, including online gambling. (12) Criminal activities, including cyber-enabled crime and counterfeit goods. (b) Elements.--The assessment required under subsection (a) shall include an identification of each of the following: (1) The sources of North Korea's funding. (2) Financial and non-financial networks, including supply chain management, transportation, and facilitation, through which North Korea accesses the United States and international financial systems and repatriates and exports capital, goods, and services; and (3) the global financial institutions, money services business, and payment systems that assist North Korea with financial transactions. (c) Submittal to Congress.--Upon completion of the assessment required under subsection (a), the Director of National Intelligence shall submit to the congressional intelligence committees a copy of such assessment. SEC. 2731. REPORT ON POSSIBLE EXPLOITATION OF VIRTUAL CURRENCIES BY TERRORIST ACTORS. (a) Short Title.--This section may be cited as the ``Stop Terrorist Use of Virtual Currencies Act''. (b) Report.--Not later than 1 year after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of the Treasury, shall submit to Congress a report on the possible exploitation of virtual currencies by terrorist actors. Such report shall include the following elements: (1) An assessment of the means and methods by which international terrorist organizations and State sponsors of terrorism use virtual currencies. (2) An assessment of the use by terrorist organizations and State sponsors of terrorism of virtual currencies compared to the use by such organizations and States of other forms of financing to support operations, including an assessment of the collection posture of the intelligence community on the use of virtual currencies by such organizations and States. (3) A description of any existing legal impediments that inhibit or prevent the intelligence community from collecting information on or helping prevent the use of virtual currencies by international terrorist organizations and State sponsors of terrorism and an identification of any gaps in existing law that could be exploited for illicit funding by such organizations and States. (c) Form of Report.--The report required by subsection (b) shall be submitted in unclassified form, but may include a classified annex. Subtitle C--Other Matters SEC. 2741. PUBLIC INTEREST DECLASSIFICATION BOARD. Section 710(b) of the Public Interest Declassification Act of 2000 (Public Law 106-567; 50 U.S.C. 3161 note) is amended by striking ``December 31, 2018'' and inserting ``December 31, 2028''. SEC. 2742. TECHNICAL AND CLERICAL AMENDMENTS TO THE NATIONAL SECURITY ACT OF 1947. (a) Table of Contents.--The table of contents at the beginning of the National Security Act of 1947 (50 U.S.C. 3001 et seq.) is amended-- (1) by inserting after the item relating to section 2 the following new item: ``Sec. 3. Definitions.''; (2) by striking the item relating to section 107; (3) by striking the item relating to section 113B and inserting the following new item: ``Sec. 113B. Special pay authority for science, technology, engineering, or mathematics positions.''; (4) by striking the items relating to sections 202, 203, 204, 208, 209, 210, 211, 212, 213, and 214; and (5) by inserting after the item relating to section 311 the following new item: ``Sec. 312. Repealing and saving provisions.''. (b) Other Technical Corrections.--Such Act is further amended-- (1) in section 102A-- (A) in subparagraph (G) of paragraph (1) of subsection (g), by moving the margins of such subparagraph 2 ems to the left; and (B) in paragraph (3) of subsection (v), by moving the margins of such paragraph 2 ems to the left; (2) in section 106-- (A) by inserting ``sec. 106.'' before ``(a)''; and (B) in subparagraph (I) of paragraph (2) of subsection (b), by moving the margins of such subparagraph 2 ems to the left; (3) by striking section 107; (4) in section 108(c), by striking ``in both a classified and an unclassified form'' and inserting ``to Congress in classified form, but may include an unclassified summary''; (5) in section 112(c)(1), by striking ``section 103(c)(7)'' and inserting ``section 102A(i)''; (6) by amending section 201 to read as follows: ``SEC. 201. DEPARTMENT OF DEFENSE. ``Except to the extent inconsistent with the provisions of this Act or other provisions of law, the provisions of title 5, United States Code, shall be applicable to the Department of Defense.''; (7) in section 205, by redesignating subsections (b) and (c) as subsections (a) and (b), respectively; (8) in section 206, by striking ``(a)''; (9) in section 207, by striking ``(c)''; (10) in section 308(a), by striking ``this Act'' and inserting ``sections 2, 101, 102, 103, and 303 of this Act''; (11) by redesignating section 411 as section 312; [[Page H5887]] (12) in section 503-- (A) in paragraph (5) of subsection (c)-- (i) by moving the margins of such paragraph 2 ems to the left; and (ii) by moving the margins of subparagraph (B) of such paragraph 2 ems to the left; and (B) in paragraph (2) of subsection (d), by moving the margins of such paragraph 2 ems to the left; and (13) in subparagraph (B) of paragraph (3) of subsection (a) of section 504, by moving the margins of such subparagraph 2 ems to the right. SEC. 2743. TECHNICAL AMENDMENTS RELATED TO THE DEPARTMENT OF ENERGY. (a) National Nuclear Security Administration Act.-- (1) Clarification of functions of the administrator for nuclear security.--Subsection (b) of section 3212 of the National Nuclear Security Administration Act (50 U.S.C. 2402(b)) is amended-- (A) by striking paragraphs (11) and (12); and (B) by redesignating paragraphs (13) through (19) as paragraphs (11) through (17), respectively. (2) Counterintelligence programs.--Section 3233(b) of the National Nuclear Security Administration Act (50 U.S.C. 2423(b)) is amended-- (A) by striking ``Administration'' and inserting ``Department''; and (B) by inserting ``Intelligence and'' after ``the Office of''. (b) Atomic Energy Defense Act.--Section 4524(b)(2) of the Atomic Energy Defense Act (50 U.S.C. 2674(b)(2)) is amended by inserting ``Intelligence and'' after ``The Director of''. (c) National Security Act of 1947.--Paragraph (2) of section 106(b) of the National Security Act of 1947 (50 U.S.C. 3041(b)(2)) is amended-- (1) in subparagraph (E), by inserting ``and Counterintelligence'' after ``Office of Intelligence''; (2) by striking subparagraph (F); and (3) by redesignating subparagraphs (G), (H), and (I) as subparagraphs (F), (G), and (H), respectively. SEC. 2744. SENSE OF CONGRESS ON NOTIFICATION OF CERTAIN DISCLOSURES OF CLASSIFIED INFORMATION. (a) Definitions.--In this section: (1) Adversary foreign government.--The term ``adversary foreign government'' means the government of any of the following foreign countries: (A) North Korea. (B) Iran. (C) China. (D) Russia. (E) Cuba. (2) Covered classified information.--The term ``covered classified information'' means classified information that was-- (A) collected by an element of the intelligence community; or (B) provided by the intelligence service or military of a foreign country to an element of the intelligence community. (3) Established intelligence channels.--The term ``established intelligence channels'' means methods to exchange intelligence to coordinate foreign intelligence relationships, as established pursuant to law by the Director of National Intelligence, the Director of the Central Intelligence Agency, the Director of the National Security Agency, or other head of an element of the intelligence community. (4) Individual in the executive branch.--The term ``individual in the executive branch'' means any officer or employee of the executive branch, including individuals-- (A) occupying a position specified in article II of the Constitution; (B) appointed to a position by an individual described in subparagraph (A); or (C) serving in the civil service or the Senior Executive Service (or similar service for senior executives of particular departments or agencies). (b) Findings.--Congress finds that section 502 of the National Security Act of 1947 (50 U.S.C. 3092) requires elements of the intelligence community to keep the congressional intelligence committees ``fully and currently informed'' about all ``intelligence activities'' of the United States, and to ``furnish to the congressional intelligence committees any information or material concerning intelligence activities * * * which is requested by either of the congressional intelligence committees in order to carry out its authorized responsibilities.''. (c) Sense of Congress.--It is the sense of Congress that-- (1) section 502 of the National Security Act of 1947 (50 U.S.C. 3092), together with other intelligence community authorities, obligates an element of the intelligence community to submit to the congressional intelligence committees written notification, by not later than 7 days after becoming aware, that an individual in the executive branch has disclosed covered classified information to an official of an adversary foreign government using methods other than established intelligence channels; and (2) each such notification should include-- (A) the date and place of the disclosure of classified information covered by the notification; (B) a description of such classified information; (C) identification of the individual who made such disclosure and the individual to whom such disclosure was made; and (D) a summary of the circumstances of such disclosure. SEC. 2745. SENSE OF CONGRESS ON CONSIDERATION OF ESPIONAGE ACTIVITIES WHEN CONSIDERING WHETHER OR NOT TO PROVIDE VISAS TO FOREIGN INDIVIDUALS TO BE ACCREDITED TO A UNITED NATIONS MISSION IN THE UNITED STATES. It is the sense of the Congress that the Secretary of State, in considering whether or not to provide a visa to a foreign individual to be accredited to a United Nations mission in the United States, should consider-- (1) known and suspected intelligence activities, espionage activities, including activities constituting precursors to espionage, carried out by the individual against the United States, foreign allies of the United States, or foreign partners of the United States; and (2) the status of an individual as a known or suspected intelligence officer for a foreign adversary. The CHAIR. No further amendment to the bill, as amended, shall be in order except those printed in part B of House Report 116-154. Each further amendment printed in part B of the report may be offered only in the order printed in the report, by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question. Amendment No. 1 Offered by Mr. Stewart The CHAIR. It is now in order to consider amendment No. 1 printed in part B of House Report 116-154. Mr. STEWART. Mr. Chairman, as the designee of the gentleman from Texas (Mr. Burgess), I have an amendment at the desk. The CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 224, line 15, insert ``the Committee on Energy and Commerce,'' after ``Armed Services,''. Page 224, line 19, insert ``the Committee on Health, Education, Labor, and Pensions,'' after ``Armed Services,''. The CHAIR. Pursuant to House Resolution 491, the gentleman from Utah (Mr. Stewart) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Utah. Mr. STEWART. Mr. Chairman, my amendment is very simple. It adds the House Energy and Commerce Committee and the Senate Health, Education, Labor, and Pensions Committee to the list of committees that will receive a briefing from the Director of National Intelligence on emerging infectious disease and pandemics. The Energy and Commerce Subcommittee on Health has jurisdiction over all public health and quarantine, as well as the Centers for Disease Control. Given the Energy and Commerce Committee's and the Senate Health, Education, Labor, and Pensions Committee's jurisdiction over the Assistant Secretary of Preparedness and Response, which plays an integral role in our Nation's public health and security, it is imperative that these committees be included in this briefing. Mr. Chairman, I reserve the balance of my time. {time} 1930 Mr. SCHIFF. Mr. Chair, I rise in opposition to the amendment, although I am not opposed. The Acting CHAIR (Mr. Thompson of Mississippi). Without objection, the gentleman from California is recognized for 5 minutes. There was no objection. Mr. SCHIFF. Mr. Chair, the gentleman from Texas' proposal would allow the congressional committees with jurisdiction over public health matters the opportunity to receive a briefing about the effects of emerging and infectious diseases and pandemics on national security and the international political and economic system, along with the Intelligence Committee and Armed Services Committee. It is critical that Congress be well-informed on the posture of the United States and, indeed, the rest of the world to address a public health crisis that might arise in the face of a particularly rapidly spreading, devastating disease. It is crucial that committees that oversee public health responses understand how prepared we may be to address such a crisis. I support this amendment, and I believe it will be helpful to our colleagues on the House Energy and Commerce Committee and the Senate Health, Education, Labor, and Pensions Committee to receive this briefing and information from the DNI, along with the Intelligence, Armed Services, Foreign Affairs, and Appropriations Committees that are already included in the bill text. [[Page H5888]] For that reason, I support the amendment, and I yield back the balance of my time. Mr. STEWART. Mr. Chair, I thank the chairman for supporting the amendment. I urge adoption of the amendment, and I yield back the balance of my time The Acting CHAIR. The question is on the amendment offered by the gentleman from Utah (Mr. Stewart). The amendment was agreed to. Amendment No. 2 Offered by Mr. Stewart The Acting CHAIR. It is now in order to consider amendment No. 2 printed in part B of House Report 116-154. Mr. STEWART. Mr. Chair, again I rise as the designee of Mr. Burgess, and I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7___. REMOVAL AND NEUTRALIZATION OF IMSI CATCHERS. (a) In General.--The Secretary of Homeland Security, in collaboration with the Director of National Intelligence, the Chairman of the Federal Communications Commission, and the heads of such other Federal agencies as the Secretary determines appropriate, and following consultation with appropriate private entities, shall-- (1) undertake an effort to remove or neutralize unauthorized IMSI catchers installed by foreign entities or that have an unknown attribution, with prioritization given to IMSI catchers identified in the National Capital Region; and (2) conduct further assessments, not less than once every 90 days, to identify new IMSI catchers for removal or neutralization. (b) IMSI Catcher Defined.--The term ``IMSI catcher'' means an international mobile subscriber identity-catcher or other device used for intercepting mobile phone identifying information and location data. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Utah (Mr. Stewart) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Utah. Mr. STEWART. Mr. Chair, once again, my amendment is simple. It directs the Secretary of Homeland Security, in collaboration with the Director of National Intelligence, Chairman of the Federal Communications Commission, and appropriate private entities, to undertake an effort to remove or neutralize unauthorized international mobile subscriber identity catchers, or cell-site simulators, installed by foreign entities or that have an unknown attribution. International mobile subscriber identities, IMSI, catchers, or cell- site simulators, are devices used for intercepting mobile traffic and location data. They appear to be legitimate cell phone towers that nearby phones may connect to. Once connected, phone locations can be tracked. Some advanced IMSI catchers can even read content, such as messages and cell phone data. Much remains unknown about the proliferation of these devices, particularly in the national capital region. However, we do know that foreign actors have access to and have used these devices. It is imperative that our intelligence community, with the relevant agencies and private industry partners, undertake an effort to neutralize unauthorized IMSI catchers. Mr. Chair, I urge support of this amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Utah (Mr. Stewart). The amendment was agreed to. Amendment No. 3 Offered by Mr. Carson of Indiana The Acting CHAIR. It is now in order to consider amendment No. 3 printed in part B of House Report 116-154. Mr. CARSON of Indiana. Mr. Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7__. PLAN FOR STRENGTHENING THE SUPPLY CHAIN INTELLIGENCE FUNCTION. (a) In General.--Not later than 180 days after the date of the enactment of this Act, the Director of the National Counterintelligence and Security Center, in coordination with the Director of the Defense Counterintelligence and Security Agency and other interagency partners, shall submit to Congress a plan for strengthening the supply chain intelligence function. (b) Elements.--The plan submitted under subsection (a) shall address the following: (1) The appropriate workforce model, including size, mix, and seniority, from the elements of the intelligence community and other interagency partners. (2) The budgetary resources necessary to implement the plan. (3) The appropriate governance structure within the intelligence community and with interagency partners. (4) The authorities necessary to implement the plan. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Indiana (Mr. Carson) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Indiana. Mr. CARSON of Indiana. Mr. Chair, first, I thank Chairman Schiff and Ranking Member Nunes for their work on the Intelligence Authorization Act this year. It is always a pleasure to serve under Chairman Schiff's leadership. Without it, the Intelligence Committee would not have been able to pass such a strong bill out of committee. I rise today, Mr. Chair, in support of an amendment that I have offered to the underlying bill text. This amendment will help the United States protect the integrity of its economic supply chain infrastructure. I am pleased that my good friend Representative Elise Stefanik has joined me in cosponsoring this amendment. Today, businesses and organizations in the United States face an array of distinct and stealthy threats. The American supply chain is under repeated attack from foreign intelligence services, cyber hackers, and sophisticated criminal enterprises. Unfortunately, experienced adversaries often exploit vulnerabilities in American companies' technological infrastructure or weak links in their organizational supply chain so that they can steal their intellectual property, co-opt equipment from suppliers, damage software, or conduct surveillance. Moving forward, we must be more vigilant to stop them. The Carson-Stefanik amendment, Mr. Chair, will guard against these grave concerns, and it will lead to stronger safeguards for the supply chain by mandating the National Counterintelligence and Security Center to produce a plan within 6 months to strengthen the supply chain intelligence function within the intelligence community. The plan, Mr. Chair, will identify personnel with the right expertise from the intelligence community workforce, outline budgetary and resource needs, and describe the necessary authorities and governance structure for future implementation of this plan. It will inform both the executive branch and Congress' efforts to enhance our defenses against exploitation of the supply chain. The United States remains one of the most technologically advanced economies in the world. Throughout the past century, America has enjoyed unprecedented economic growth because of the ingenuity of our people and the technological innovation that undergirds that entrepreneurial spirit. While that economic growth has not always been evenly distributed, and we are still wrestling with debates about economic inequality, surrendering our technological edge and innovative advantages to strategic rivals would pose a huge risk to America's future prosperity and security. I believe, Mr. Chair, it is very important to offer this amendment, recognizing the evolving and emerging threats to our Nation's supply chain infrastructure. In a very rapidly developing global economy, the intelligence community must work to safeguard the core of what America and her competitive strength is: economic, intellectual, and technological ingenuity. My amendment proactively works toward that goal, ensuring that we stay on top of those varying threats to our supply chain infrastructure that emanate from strategic rivals. In addition to this amendment, Mr. Chair, I would like to highlight another important part of the base bill. This year's Intelligence Authorization Act includes an entire section on domestic terrorism. It is important that we acknowledge domestic terrorism as a very serious threat, and we must do more than just talk about it as a societal problem. We must act. [[Page H5889]] Domestic terrorism incidents in the U.S. are on the rise, fueled by hatred, stoked by fear, and inspired by dangerous rhetoric. At a time when this President is ignoring the truth about domestic terrorism, and his administration is concealing and hiding the proliferation of white supremacist-inspired incidents, Congress and the public urgently need more information to better understand and prevent domestic terrorism. Specifically, Mr. Chair, this bill would require the FBI, Department of Homeland Security, and NCTC to produce an annual report on domestic terrorism. With the reporting that is mandated in the underlying intelligence authorization bill, we can better determine how to change the law and make the necessary adjustments to procedures and to adequately shift current practices in order to fully address the threat of domestic terrorism and its root causes. Much of the report, Mr. Chair, would be made available to the public, increasing transparency, while the full report would be provided to oversight committees in greater detail. It would be valuable information and would require an annual strategic assessment on trends and patterns. Ultimately, it will dramatically expand the information on domestic terrorism available to Congress and the public. I urge my colleagues to support the Carson-Stefanik amendment and the underlying bill, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Indiana (Mr. Carson). The amendment was agreed to. Amendment No. 4 Offered by Mr. Hurd of Texas The Acting CHAIR. It is now in order to consider amendment No. 4 printed in part B of House Report 116-154. Mr. HURD of Texas. Mr. Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title V, add the following: SEC. 5__. ASSESSMENTS REGARDING THE NORTHERN TRIANGLE AND MEXICO. (a) Assessments of Activities by Drug Trafficking Organizations in the Northern Triangle and Mexico.-- (1) Report.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Chief of Intelligence of the Drug Enforcement Administration and the Assistant Secretary of State for Intelligence and Research, shall submit to the appropriate congressional committees a report containing an analytical assessment of the activities of drug trafficking organizations in the Northern Triangle and Mexico. Such assessment shall include, at a minimum-- (A) an assessment of the effect of drug trafficking organizations on the security and economic situation in the Northern Triangle; (B) an assessment of the effect of the activities of drug trafficking organizations on the migration of persons from the Northern Triangle to the United States-Mexico border; (C) a summary of any relevant activities by elements of the intelligence community in relation to drug trafficking organizations in the Northern Triangle and Mexico; (D) a summary of key methods and routes used by drug trafficking organizations in the Northern Triangle and Mexico to the United States; (E) an assessment of the intersection between the activities of drug trafficking organizations, human traffickers and human smugglers, and other organized criminal groups in the Northern Triangle and Mexico; and (F) an assessment of the illicit funds and financial transactions that support the activities of drug trafficking organizations and connected criminal enterprises in the Northern Triangle and Mexico. (2) Form.--The report required by paragraph (2) may be submitted in classified form, but if so submitted, shall contain an unclassified summary. (3) Availability.--The report under paragraph (1), or the unclassified summary of the report described in paragraph (2), shall be made publicly available. (b) Assessment of Human Trafficking and Smuggling From the Northern Triangle to the United States-Mexico Border.-- (1) Report required.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Under Secretary of Homeland Security for Intelligence and Analysis and the Assistant Secretary of State for Intelligence and Research, shall submit to the appropriate congressional committees a report containing an analytical assessment of human trafficking and human smuggling by individuals and organizations in the Northern Triangle and Mexico. Such assessment shall include, at a minimum-- (A) an assessment of the effect of human trafficking and human smuggling on the security and economic situation in the Northern Triangle; (B) a summary of any relevant activities by elements of the intelligence community in relation to human trafficking and human smuggling in the Northern Triangle and Mexico; (C) an assessment of the methods and routes used by human traffickers and human smuggler organizations to move persons from the Northern Triangle to the United States-Mexico border; (D) an assessment of the intersection between the activities of human traffickers and human smugglers, drug trafficking organizations, and other organized criminal groups in the Northern Triangle and Mexico; and (E) an assessment of the illicit funds and financial transactions that support the activities of human traffickers and human smugglers and connected criminal enterprises in the Northern Triangle and Mexico. (2) Form.--The report required by paragraph (1) may be submitted in classified form, but if so submitted, shall contain an unclassified summary. (3) Availability.--The report under paragraph (1), or the unclassified summary of the report described in paragraph (2), shall be made publicly available. (c) Prioritization of Intelligence Resources for the Northern Triangle and Mexico.-- (1) Review of intelligence community efforts in northern triangle and mexico.--The Director of National Intelligence, in coordination with the Under Secretary of Homeland Security for Intelligence and Analysis, the Assistant Secretary of State for Intelligence and Research, the Chief of Intelligence of the Drug Enforcement Administration, and other appropriate officials in the intelligence community, shall carry out a comprehensive review of the current intelligence collection priorities of the intelligence community for the Northern Triangle and Mexico in order to identify whether such priorities are appropriate and sufficient in light of the threat posed by the activities of drug trafficking organizations and human traffickers and human smugglers to the security of the United States and the Western Hemisphere. (2) Report and briefings.-- (A) Report on initial review.--Not later than 120 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a comprehensive description of the results of the review required by paragraph (1), including whether the priorities described in that paragraph are appropriate and sufficient in light of the threat posed by the activities of drug trafficking organizations and human traffickers and human smugglers to the security of the United States and the Western Hemisphere. If the report concludes that such priorities are not so appropriate and sufficient, the report shall also include a description of the actions to be taken to modify such priorities in order to assure that such priorities are so appropriate and sufficient. (B) Quarterly briefings.--Not later than 90 days after the date on which the report under subparagraph (A) is submitted, and every 90 days thereafter for a 5-year period, the Director of National Intelligence shall provide to the congressional intelligence committees a briefing on the intelligence community's collection priorities and activities in the Northern Triangle and Mexico with a focus on the threat posed by the activities of drug trafficking organizations and human traffickers and human smugglers to the security of the United States and the Western Hemisphere. The first briefing under this subparagraph shall also include a description of the amount of funds expended by the intelligence community to the efforts described in paragraph (1) during each of fiscal years 2018 and 2019. (3) Form.--The report and briefings required by paragraph (2) may be submitted or provided in classified form, but if so submitted or provided, shall include an unclassified summary. (d) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the Committee on Foreign Affairs, the Committee on Homeland Security, and the Permanent Select Committee on Intelligence of the House of Representatives; and (B) the Committee on Foreign Relations, the Committee on Homeland Security and Governmental Affairs, and the Select Committee on Intelligence of the Senate. (2) Human trafficking.--The term ``human trafficking'' has the meaning given the term ``severe forms of trafficking in persons'' by section 103 of the Victims of Trafficking and Violence Protection Act of 2000 (22 U.S.C. 7102). (3) Northern triangle.--The term ``Northern Triangle'' means El Salvador, Guatemala, and Honduras. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Texas (Mr. Hurd) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Texas. Mr. HURD of Texas. Mr. Chair, I am proud to join my good friend and fellow [[Page H5890]] former CIA officer, the gentlewoman from the Commonwealth of Virginia, to offer this bipartisan amendment that would direct the intelligence community to prioritize resources to address the humanitarian crisis at the border, in the Northern Triangle, and also in Mexico. I represent more of the southern border than any other Member of Congress. The root causes of this current crisis are violence, extreme poverty, and lack of economic opportunity in the Northern Triangle--El Salvador, Guatemala, and Honduras. Drug cartels, human traffickers, and human smugglers are making this crisis worse and putting innocent lives at risk. They profit while people in Central America suffer and entire nations are destabilized. Our intelligence community is not maximizing the use of our intelligence to deny and disrupt these operations. In June, we all know that 104,000 people were detained at our border. Almost every one of them had a phone number of a smuggler, a license plate of a bus that brought them here, or a pickup location in their home country. Understanding and disabling these smuggling and trafficking networks should be a national intelligence priority. This amendment would require the Director of National Intelligence to conduct a review of intelligence collection priorities in the Northern Triangle and Mexico and then provide quarterly briefings to Congress regarding the intelligence community activities in this region. These individuals and organizations threaten the security of the United States and the Western Hemisphere, and we should be using intelligence to stop them. I urge my colleagues to support this amendment, and I reserve the balance of my time. Ms. SPANBERGER. Mr. Chair, I rise in opposition to the amendment, although I am not opposed. The Acting CHAIR. Without objection, the gentlewoman from Virginia is recognized for 5 minutes. There was no objection. Ms. SPANBERGER. Mr. Chair, I am proud to introduce this amendment alongside my colleague, Congressman Hurd from Texas, who is also a former CIA case officer. Our bipartisan amendment, the Trafficking and Smuggling Intelligence Act, comes at a time of great hardship, violence, and heartbreak across Mexico and the Northern Triangle countries and at a time of crisis at our southern border. The volatility in our backyard should be cause for serious concern. Here in the United States, we have experienced the devastating effects of the drug trade on the health of our citizens. On our southwest border, we have witnessed how ongoing violence and instability in Central America is a driving factor for increased migration toward the United States. Our bipartisan amendment would require intelligence assessments of drug trafficking organizations, human trafficking organizations, and human smugglers across Mexico and the Northern Triangle. {time} 1945 These would include reports that could be released publicly to the American people. Our amendment would direct our public servants to use their expertise to better understand the root causes of violence, instability, and migration. With these improved assessments from DNI, we would be able to strengthen our national security in the face of threats from traffickers, smugglers, and other criminal organizations. Like so many of our colleagues, Congressman Hurd and I recognize that if we are to keep Americans safe while also responsibly addressing the situation at the border, we must address the conditions at the core of the instability we are seeing in Central America. Mr. Chairman, I urge my colleagues on both sides of the aisle to join us in supporting this amendment, and I yield back the balance of my time. Mr. HURD of Texas. Mr. Chairman, I am looking forward to working on more pieces of legislation with my friend from the Commonwealth of Virginia, and I want to thank both of the gentlemen from California and their teams for helping us perfect this to get this important piece of legislation onto the floor. Again, Mr. Chairman, I urge my colleagues to support this amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Texas (Mr. Hurd). The amendment was agreed to. Amendment No. 5 offered by Mr. Thompson of Mississippi The Acting CHAIR (Ms. Spanberger). It is now in order to consider amendment No. 5 printed in part B of House Report 116-154. Mr. THOMPSON of Mississippi. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 62, after line 4 insert the following: (6) Applicable Federal requirements and compliance by the Federal Government with privacy, civil rights, and civil liberties policies and protections with respect to the production of the report, including protections against the public release of names or other personally identifiable information of individuals involved in incidents, investigations, indictments, prosecutions, or convictions for which data is reported under this section. Page 62, after line 16 insert the following (and redesignate the succeeding clauses): (ii) the date and location of such incident; Page 65, line 18, strike ``and'' at the end. Page 66, line 9, strike the period at the end and insert ``; and''. Page 66, after line 9 insert the following: (ix) with respect to the Office of Intelligence and Analysis of the Department of Homeland Security, the number of staff (expressed in terms of full-time equivalents and positions) working on matters relating to domestic terrorism described in clauses (i) through (vi). Page 69, after line 7 insert the following: (h) Information Quality.--Each report submitted under subsection (a), to the extent applicable, shall comply with the guidelines issued by the Director of the Office of Management and Budget pursuant to section 515 of title V of the Consolidated Appropriations Act, 2001 (Public Law 106- 554; 114 Stat. 2763A-154). The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Mississippi (Mr. Thompson) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Mississippi. Mr. THOMPSON of Mississippi. Madam Chair, I yield myself such time as I may consume. Madam Chair, I rise to offer an amendment to title VI of H.R. 3494 titled Federal Efforts Against Domestic Terrorism. I am pleased to see that this title was significantly informed by my bill, H.R. 3106, the Domestic Terrorism DATA Act which the Homeland Security Committee will be considering tomorrow. I am glad to have the opportunity to work with Chairman Schiff and the Permanent Select Committee on Intelligence on this text. My legislation, which requires the government to produce an annual domestic terrorism report, was the product of more than 5 months of engagement with outside stakeholders and experts. As a result of that consultation process, I included protections for civil rights, civil liberties, privacy, and data quality in my bill. These provisions made my bill stronger. My amendment to H.R. 3494 would require that these very protections are included. Madam Chair, my amendment also requires additional information be included in the government's domestic terrorism report. Requiring the date and location of each incident of terrorism or investigation of terrorism will help Congress and the public better understand the landscape of domestic terrorism. Madam Chair, I urge my colleagues to support my amendment, and I yield back the balance of my time. Mr. SCHIFF. Madam Chair, I was going to request the chairman yield me 1 minute of time. Mr. THOMPSON of Mississippi. Madam Chair, I yield 1 minute to the gentleman from California (Mr. Schiff). The Acting CHAIR (Mrs. Dingell). Does the gentleman seek unanimous consent to reclaim his time? Mr. THOMPSON of Mississippi. Yes. The Acting CHAIR. Without objection, the gentleman from Mississippi is recognized for the balance of his time. There was no objection. Mr. THOMPSON of Mississippi. Madam Chair, I yield such time as he may consume to the gentleman from California (Mr. Schiff). [[Page H5891]] Mr. SCHIFF. Madam Chair, this amendment clarifies section 602 of the bill dealing with domestic terrorism. This section would require the FBI, DHS, and the National Counterterrorism Center to produce an annual report and joint strategic intelligence assessment on domestic terrorism. Chairman Thompson's amendment would add safeguards to protect the civil liberties and privacy of individuals whose information would be contained in the report and mandate compliance with the Data Quality Act. It also would require DHS to disclose information on the allocation of personnel working domestic terrorism matters, enhancing oversight in this area. I would like to recognize Chairman Thompson for his work that the House Homeland Security Committee has done on the issue of domestic terrorism. Together we will continue our lines of effort to address this significant threat. Once again, Madam Chair, I thank my colleague for his work, and I urge support for the amendment. Mr. THOMPSON of Mississippi. Madam Chair, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Mississippi (Mr. Thompson). The amendment was agreed to. Amendment No. 6 Offered by Mr. Ruppersberger The Acting CHAIR. It is now in order to consider amendment No. 6 printed in part B of House Report 116-154. Mr. RUPPERSBERGER. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7___. SECURING ENERGY INFRASTRUCTURE. (a) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Homeland Security and Governmental Affairs and the Committee on Energy and Natural Resources of the Senate; and (C) the Committee on Homeland Security and the Committee on Energy and Commerce of the House of Representatives. (2) Covered entity.--The term ``covered entity'' means an entity identified pursuant to section 9(a) of Executive Order 13636 of February 12, 2013 (78 Fed. Reg. 11742), relating to identification of critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. (3) Exploit.--The term ``exploit'' means a software tool designed to take advantage of a security vulnerability. (4) Industrial control system.--The term ``industrial control system'' means an operational technology used to measure, control, or manage industrial functions, and includes supervisory control and data acquisition systems, distributed control systems, and programmable logic or embedded controllers. (5) National laboratory.--The term ``National Laboratory'' has the meaning given the term in section 2 of the Energy Policy Act of 2005 (42 U.S.C. 15801). (6) Program.--The term ``Program'' means the pilot program established under subsection (b). (7) Secretary.--Except as otherwise specifically provided, the term ``Secretary'' means the Secretary of Energy. (8) Security vulnerability.--The term ``security vulnerability'' means any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control. (b) Pilot Program for Securing Energy Infrastructure.--Not later than 180 days after the date of the enactment of this Act, the Secretary shall establish a 2-year control systems implementation pilot program within the National Laboratories for the purposes of-- (1) partnering with covered entities in the energy sector (including critical component manufacturers in the supply chain) that voluntarily participate in the Program to identify new classes of security vulnerabilities of the covered entities; and (2) evaluating technology and standards, in partnership with covered entities, to isolate and defend industrial control systems of covered entities from security vulnerabilities and exploits in the most critical systems of the covered entities, including-- (A) analog and nondigital control systems; (B) purpose-built control systems; and (C) physical controls. (c) Working Group to Evaluate Program Standards and Develop Strategy.-- (1) Establishment.--The Secretary shall establish a working group-- (A) to evaluate the technology and standards used in the Program under subsection (b)(2); and (B) to develop a national cyber-informed engineering strategy to isolate and defend covered entities from security vulnerabilities and exploits in the most critical systems of the covered entities. (2) Membership.--The working group established under paragraph (1) shall be composed of not fewer than 10 members, to be appointed by the Secretary, at least 1 member of which shall represent each of the following: (A) The Department of Energy. (B) The energy industry, including electric utilities and manufacturers recommended by the Energy Sector coordinating councils. (C)(i) The Department of Homeland Security; or (ii) the Industrial Control Systems Cyber Emergency Response Team. (D) The North American Electric Reliability Corporation. (E) The Nuclear Regulatory Commission. (F)(i) The Office of the Director of National Intelligence; or (ii) the intelligence community (as defined in section 3 of the National Security Act of 1947 (50 U.S.C. 3003)). (G)(i) The Department of Defense; or (ii) the Assistant Secretary of Defense for Homeland Security and America's Security Affairs. (H) A State or regional energy agency. (I) A national research body or academic institution. (J) The National Laboratories. (d) Reports on the Program.-- (1) Interim report.--Not later than 180 days after the date on which funds are first disbursed under the Program, the Secretary shall submit to the appropriate congressional committees an interim report that-- (A) describes the results of the Program; (B) includes an analysis of the feasibility of each method studied under the Program; and (C) describes the results of the evaluations conducted by the working group established under subsection (c)(1). (2) Final report.--Not later than 2 years after the date on which funds are first disbursed under the Program, the Secretary shall submit to the appropriate congressional committees a final report that-- (A) describes the results of the Program; (B) includes an analysis of the feasibility of each method studied under the Program; and (C) describes the results of the evaluations conducted by the working group established under subsection (c)(1). (e) Exemption From Disclosure.--Information shared by or with the Federal Government or a State, Tribal, or local government under this section-- (1) shall be deemed to be voluntarily shared information; (2) shall be exempt from disclosure under section 552 of title 5, United States Code, or any provision of any State, Tribal, or local freedom of information law, open government law, open meetings law, open records law, sunshine law, or similar law requiring the disclosure of information or records; and (3) shall be withheld from the public, without discretion, under section 552(b)(3) of title 5, United States Code, and any provision of any State, Tribal, or local law requiring the disclosure of information or records. (f) Protection From Liability.-- (1) In general.--A cause of action against a covered entity for engaging in the voluntary activities authorized under subsection (b)-- (A) shall not lie or be maintained in any court; and (B) shall be promptly dismissed by the applicable court. (2) Voluntary activities.--Nothing in this section subjects any covered entity to liability for not engaging in the voluntary activities authorized under subsection (b). (g) No New Regulatory Authority for Federal Agencies.-- Nothing in this section authorizes the Secretary or the head of any other department or agency of the Federal Government to issue new regulations. (h) Authorization of Appropriations.-- (1) Pilot program.--There is authorized to be appropriated $10,000,000 to carry out subsection (b). (2) Working group and report.--There is authorized to be appropriated $1,500,000 to carry out subsections (c) and (d). (3) Availability.--Amounts made available under paragraphs (1) and (2) shall remain available until expended. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Maryland (Mr. Ruppersberger) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Maryland. Mr. RUPPERSBERGER. Madam Chair, I yield myself such time as I may consume. Madam Chair, I rise today in strong support of my amendment to protect the energy grid from cybersecurity threats. In the 4 years since the Ukraine power grid attack, our enemies have doubled down on their effort to target cybersecurity vulnerabilities in our [[Page H5892]] Nation's energy infrastructure, especially within industrial control systems. The 2015 Ukraine grid intrusion orchestrated by the Russians was a turning point in industrial cybersecurity. For the first time, hackers penetrated industrial controls of a power plant with the goal of causing widespread disruption. Both the security and economic consequences of a destructive attack on our energy grid cannot be overstated. We can no longer wait to address these threats. My amendment will ensure we continue to develop the ability to both discover vulnerabilities and keep an eye on emerging threats that could disrupt electricity generation or even cost lives. I want to thank our government partners, including the Cybersecurity and Infrastructure Security Agency, CISA, the intelligence community, the Department of Energy, and national labs. I look forward to working with all these stakeholders to ensure that we are implementing grid security measures in a responsible way consistent with existing law and authorities. As a member of the Homeland Security Subcommittee on Appropriations, I fully intend to help leverage the authorization in this amendment to supplement the already great effort underway at CISA and other government agencies. Also I want to thank the many talented computer scientists, cybersecurity experts, and engineers from the private sector, especially the team at Dragos, a cybersecurity firm focused on industrial controls, located in my district in Hanover, Maryland, for all the hard work they do in this space to not only defend against threats but to educate others. Our amendment is simple and mirrors language already passed by the overwhelming bipartisan majority in the Senate's Intelligence Authorization Act. Senator King from Maine has been a stalwart force on this issue, and none of this would have happened without his determination and vision on this issue. The amendment sets up a 2-year pilot program to identify the classes of security vulnerabilities in the grid. It establishes a working group to evaluate the technology solutions proposed by the pilot program. The working group would include government agencies, the energy industry, and other experts. Lastly, it requires the Department of Energy to submit a report to the relevant congressional committees describing the results of the program. Finally, I want to thank Judge Carter from Texas who has led the charge on this issue with me in the House since last Congress. Judge Carter is a good friend, and I appreciate his help on this important issue. Madam Chair, this amendment will help the intelligence community and the government at large better understand the vulnerabilities to certain aspects of our energy grid. Madam Chair, I yield such time as he may consume to the gentleman from California (Mr. Schiff), who is the distinguished chairman of the Permanent Select Committee on Intelligence. Mr. SCHIFF. Madam Chairman, I thank the gentleman for yielding. I rise in strong support of the amendment offered by my colleagues from Maryland and Texas which mirrors language passed in the Senate's intelligence authorization bill last month. This provision would bring together government entities and the energy sector in a pilot program for purposes of evaluating and strengthening industrial control systems and related critical infrastructure elements against security vulnerabilities and exploits. The cyber threats faced by our critical infrastructure remain a persistent national security concern, as the former ranking member of our committee, the distinguished Mr. Ruppersberger, knows all too well. DNI Coats likewise warned in the most recent unclassified Worldwide Threat Assessment about the capabilities of our adversaries to hold U.S. critical infrastructure at risk. This measure is another line of effort toward securing that infrastructure against outside cyberattacks and disruptions, and I am very proud to support the work of my colleague and friend. Mr. RUPPERSBERGER. Madam Chair, I yield such time as he may consume to the gentleman from Texas (Mr. Carter). Mr. CARTER of Texas. Madam Chair, I thank my friend for yielding. Madam Chair, today I rise in strong support of the Ruppersberger- Carter amendment to help secure the energy infrastructure. Now is the time to address electrical grid security. Grid attacks are a powerful weapon in the cyber toolkit of really bad actors. As the two previous speakers said, a cyberattack in Ukraine wiped out their power grid, and over 225,000 people were without power. The Office of the Director of National Intelligence in their 2019 Worldwide Threat Assessment makes numerous mentions of our adversaries' mapping out grid systems, identifying our weaknesses, and developing the very real and deadly capacity to attack our grid system. A targeted attack on our Nation could be devastating. Securing our energy infrastructure is especially critical in Texas which maintains an independent electric grid. The Acting CHAIR. The time of the gentleman from Maryland has expired. Mr. CARTER of Texas. Madam Chair, I claim the time in opposition to the amendment, although I do not oppose the amendment. The Acting CHAIR. Without objection, the gentleman from Texas is recognized for 5 minutes. There was no objection. Mr. CARTER of Texas. Madam Chair, the Electric Reliability Council of Texas is located in Taylor, Texas, which is about 19 miles from my house, and it manages 90 percent of my home State's electrical load. Understanding where our system's weak spots are will enhance ERCOT's work to ensure that we have the most stable and secure energy network in the world. Our amendment addresses the serious topic of electrical grid security by leveraging the unique aspects of national laboratories to establish solutions to defend the United States energy grid from attacks and to ensure the resiliency of operation during and after an event. It establishes a 2-year pilot program to study and identify new classes of security vulnerabilities, and research and test technologies that could be used to isolate the most critical systems from cyberattacks. It creates working groups to develop a national cyber-informed strategy to protect our energy grids. This amendment is a commonsense approach to solving grid security. I am proud to work across the aisle with my good friend and colleague, Dutch Ruppersberger, on this important issue. Madam Chair, I urge support of this amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Maryland (Mr. Ruppersberger). The amendment was agreed to. {time} 2000 Amendment No. 7 Offered by Mr. Chabot The Acting CHAIR. It is now in order to consider amendment No. 7 printed in part B of House Report 116-154. Mr. CHABOT. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 35, strike line 4 through page 42, line 5. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Ohio (Mr. Chabot) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Ohio. Mr. CHABOT. Madam Chair, I rise this evening to offer a commonsense amendment to H.R. 3494. My amendment simply strikes Section 401, which creates the Climate Security Advisory Council. And I thank the gentleman from South Carolina (Mr. Duncan) for his leadership, and also cosponsoring this particular amendment. This council is not the most responsible use of the valuable manpower and funding of the intelligence community, especially since the Director of National Intelligence did not even request that we create such an organization. The Federal Government already has vast resources devoted to the climate issue. Any climate security intelligence work should be in the context of larger intelligence matters affecting major regions around the world and the U.S. national security infrastructure. [[Page H5893]] Additionally, many of the existing intelligence organizations already do much of this work on their own, including the CIA. Section 401 would just create unneeded redundancy across the intelligence community. If the goal is to ensure that we allocate our resources efficiently, we should instead require a report to Congress from the Office of the Director of National Intelligence outlining the necessity for the Climate Security Council before Congress establishes the organization or appropriates any funding. Madam Chair, I reserve the balance of my time. The Acting CHAIR. For what purpose does the gentleman-- Mr. DUNCAN. Madam Chair, I rise in favor of the Chabot amendment. Our country faces serious threats around the globe. We have cyber threats coming from China, Russia, and Iran, and others. Iran is also pursuing nuclear weapons that threaten our friends and our ally, Israel, and indeed the rest of the world. While ISIS is defeated and on the run, radical islamic terrorism remains one of our Nation's greatest threats, thanks in part to Iran's actions as a leading state sponsor of terrorism. It is, therefore, extremely irresponsible to take our attention and resources off of these known and proven threats to American national security and divert those funds and attention to climate change. The intelligence community, which is tasked with protecting Americans from fiscal and cyberattacks, should not bear the burden of silly, politically correct, left-wing social policy. But just as Democrats politicized military policy with the NDAA, here they go again with the intelligence policy. That is a mistake, it is irresponsible, and that is why I support this amendment to strip out this silly idea and refocus the intelligence community on the actual threats to our national security. Madam Chair, I yield back the balance of my time. Mr. CHABOT. Madam Chair, I reserve the balance of my time. The Acting CHAIR. The gentleman from Ohio has the only time remaining. Mr. SCHIFF. Madam Chair, I rise in opposition to the amendment and claim time in opposition, therefore. The Acting CHAIR. The time in opposition has already been claimed. Would the gentleman from Ohio yield to your colleague from-- Mr. CHABOT. Madam Chair, may I inquire as to how much time I have remaining? The Acting CHAIR. The gentleman from Ohio has 2\1/2\ minutes remaining. Mr. CHABOT. Madam Chair, I yield myself such time as I may consume. Madam Chair, I want to quote a great American President, Ronald Reagan. Parliamentary Inquiry Mr. SCHIFF. Madam Chair, may I make a parliamentary inquiry? The Acting CHAIR. The gentleman from California will state his parliamentary inquiry. Mr. SCHIFF. Did the Chair offer time in opposition to the amendment? The Acting CHAIR. The gentleman from South Carolina claimed the time. The Chair looked to see who was seeking recognition, and went to the gentleman who was standing. Mr. HECK. Madam Chair, I was standing when he was recognized. The gentleman from Ohio did not yield to him. And when he asked to claim time in opposition, he did not say ``although I am not opposed.'' And you did not, therefore, ask if there was no objection. He was not legitimately recognized. Mr. CHABOT. Madam Chair, I ask unanimous consent that the gentleman be granted 5 minutes in opposition, but I have a little time left. Madam Chair, I have no objection to the gentleman offering his opposition to this. The Acting CHAIR. That unanimous consent request cannot be entertained in the Committee of the Whole. Mr. SCHIFF. Madam Chair, I am sorry. I couldn't hear the ruling of the Chair. The gentleman asked for unanimous consent. The Acting CHAIR. The Parliamentarian advised that the request cannot be entertained in the Committee of the Whole. Mr. SCHIFF. Madam Chair, well, if my colleagues in the minority--I don't know how much time they have both on the amendment and on the time in opposition to the amendment--but if they can yield to my colleague to make sure that he has time for his remarks out of both of their time, I think we can resolve this. Mr. CHABOT. There is 2\1/2\ minutes left. Is that correct? The Acting CHAIR. The gentleman from Ohio has 2\1/2\ minutes remaining. Mr. SCHIFF. Madam Chair, the gentleman offering the amendment has how much time? Because they claimed both the time on the amendment-- The Acting CHAIR. The proponent of the amendment has 2\1/2\ minutes remaining. Mr. SCHIFF. So no one claimed the time in opposition? The Acting CHAIR. The gentleman from South Carolina claimed the time and yielded back. Mr. SCHIFF. Okay. So there should be 5 minutes. Mr. HECK. He asked for time in opposition but did not state that he was not opposed. You did not ask if, therefore, there was no objection. He was not legitimately recognized. The offerer of the amendment did not yield to him. The gentleman from South Carolina claimed time in opposition but did not say ``although I am not opposed.'' He supported the amendment. And you did not ask if there was no objection. The Acting CHAIR. The gentleman will suspend. The gentleman claimed the time, and then he yielded back his time. Mr. HECK. Madam Chair, you didn't ask if there was no objection, which is the customary practice. The Acting CHAIR. All time claimed by the gentleman from South Carolina has been yielded back. Mr. CHABOT. Madam Chair, I still have 2\1/2\ minutes, is that correct, because I reserved my time? The Acting CHAIR. The gentleman from Ohio has the only time remaining. Mr. CHABOT. Madam Chair, I would like to make a unanimous consent request that there be an opposition that gets 5 minutes and that I can close with my 2\1/2\ minutes. We are trying to be fair here, and we are happy to give our colleagues on the other side of the aisle 5 minutes to offer their opposition. The Acting CHAIR. The Parliamentarian advises that the request cannot be entertained in the Committee of the Whole. Mr. CHABOT. Madam Chair, I yield 1\1/2\ minutes to the gentleman from Washington (Mr. Heck). I will just take 1 minute to wrap up. The Acting CHAIR. The gentleman is recognized. Mr. CHABOT. Madam Chair, I have 2\1/2\ minutes. Is that right? The Acting CHAIR. Yes. The gentleman is recognized. Mr. CHABOT. Madam Chair, I yield 1\1/2\ minutes to the gentleman from Washington (Mr. Heck). The Acting CHAIR. The gentleman yields 1\1/2\ minutes to the gentleman from Washington? Mr. CHABOT. Madam Chair, 2 minutes in opposition. Mr. SCHIFF. If I could, Madam Chair, through the Chair to my colleague, I appreciate that. We will take you up on that. And on the next amendment that we have time, I will yield to my colleague, and your colleague may yield to you, if you have further comments you want to make on this issue. Mr. CHABOT. Madam Chair, I have 2\1/2\ minutes. I yield 1\1/2\ minutes to the gentleman from Washington (Mr. Heck). So I have 1 minute left. Mr. SCHIFF. Madam Chair, I thank the gentleman through the Chair. The Acting CHAIR. The gentleman from Washington is recognized for 1\1/2\ minutes. Mr. HECK. Madam Chair, I thank very much the graciousness of the gentleman from Ohio, although I think his amendment is wrongheaded. Here is what is real: Climate change is real, number one. Number two, it has significant national security implications. Number three, the only smart thing to do is to borrow the old motto from the Boy Scouts, ``Be prepared.'' Passage of this amendment, which would remove the Climate Security Advisory Council, renders us less prepared. [[Page H5894]] We all know that the intelligence community and the DOD have, time and again, assessed the measurable effects of climate change--rising sea levels, higher temperatures, more frequent extreme weather events, new stressors on natural resources and agriculture--have tangible impacts that exacerbate economic distress, human insecurity, political instability, and other humanitarian conditions detrimental to our national security. The smart thing to do is to be prepared, to have the advisory council that can work across the intelligence community, that can collect the information, coordinate the information, so that we know what is coming, we know what we are being presented with, and we can confront it in a smart way. Madam Chair, I urge my colleagues to please defeat this amendment and pass the underlying bill. Mr. CHABOT. Madam Chair, I think I have 1 minute left. I thought perhaps the gentleman wanted to support my amendment, but he called it wrongheaded. I am just shocked. Madam Chair, in closing, this council is a redundant, unnecessary use of manpower funding. We need our intelligence community focused on the most critical threats facing our Nation, specifically, counterterrorism, Iran, China, Russia, North Korea. If this council is something that the Director of National Intelligence believes is critical to our country, he should come to Congress and make such a request, and to my knowledge, that has not occurred. Madam Chair, until he does, I urge my colleagues to support this amendment and remove this provision from the bill. I yield back the balance of my time. The Acting CHAIR. All time for debate has expired. The question is on the amendment offered by the gentleman from Ohio (Mr. Chabot). The question was taken; and the Acting Chair announced that the noes appeared to have it. Mr. CHABOT. Madam Chair, I demand a recorded vote. The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further proceedings on the amendment offered by the gentleman from Ohio will be postponed. Amendment No. 8 Offered by Mr. Schiff The Acting CHAIR. It is now in order to consider amendment No. 8 printed in part B of House Report 116-154. Mr. SCHIFF. Madam Chair, I rise to offer this amendment as the designee of Representative Green of Texas and Representative Connolly. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7__. COLLECTION, ANALYSIS, AND DISSEMINATION OF WORKFORCE DATA. (a) Initial Reporting.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, and subject to paragraph (3), the Director of National Intelligence shall make available to the public, the appropriate congressional committees, and the workforce of the intelligence community a report which includes aggregate demographic data and other information regarding the diversity and inclusion efforts of the workforce of the intelligence community. (2) Contents.--A report made available under paragraph (1)-- (A) shall include unclassified reports and barrier analyses relating to diversity and inclusion efforts; (B) shall include aggregate demographic data-- (i) by segment of the workforce of the intelligence community and grade or rank; (ii) relating to attrition and promotion rates; (iii) that addresses the compliance of the intelligence community with validated inclusion metrics, such as the New Inclusion Quotient index score; and (iv) that provides demographic comparisons to the relevant nongovernmental labor force and the relevant civilian labor force; (C) shall include an analysis of applicant flow data, including the percentage and level of positions for which data are collected, and a discussion of any resulting policy changes or recommendations; (D) shall include demographic data relating to participants in professional development programs of the intelligence community and the rate of placement into senior positions for participants in such programs; (E) shall include any voluntarily collected demographic data relating to the membership of any external advisory committee or board to which individuals in senior positions in the intelligence community appoint members; and (F) may include data in proportions or percentages to account for concerns relating to the protection of classified information. (b) Updates.--After making available a report under subsection (a), the Director of National Intelligence shall annually provide a report (which may be provided as part of an annual report required under another provision of law) to the workforce of the intelligence community (including senior leadership), the public, and the appropriate congressional committees that includes-- (1) demographic data and information on the status of diversity and inclusion efforts of the intelligence community; (2) an analysis of applicant flow data, including the percentage and level of positions for which data are collected, and a discussion of any resulting policy changes or recommendations; and (3) demographic data relating to participants in professional development programs of the intelligence community and the rate of placement into senior positions for participants in such programs. (c) Expand the Collection and Analysis of Voluntary Applicant Flow Data.-- (1) In general.--The Director of National Intelligence shall develop a system to collect and analyze applicant flow data for as many positions within the intelligence community as practicable, in order to identify areas for improvement in attracting diverse talent, with particular attention to senior and management positions. (2) Phased implementation.--The collection of applicant flow data may be implemented by the Director of National Intelligence in a phased approach commensurate with the resources available to the intelligence community. (d) Identify Additional Categories for Voluntary Data Collection of Current Employees.-- (1) In general.--The Director of National Intelligence may submit to the Office of Management and Budget and to the appropriate congressional committees a recommendation regarding whether the intelligence community should voluntarily collect more detailed data on demographic categories in addition to the race and ethnicity categories specified in the statistical policy directive issued by the Office of Management and Budget entitled ``Standards for Maintaining, Collecting, and Presenting Federal Data on Race and Ethnicity''. (2) Process.--In making a recommendation under paragraph (1), the Director of National Intelligence shall-- (A) engage in close consultation with internal stakeholders, such as employee resource or affinity groups; (B) ensure that there is clear communication with the workforce of the intelligence community-- (i) to explain the purpose of the potential collection of such data; and (ii) regarding legal protections relating to any anticipated use of such data; and (C) ensure adherence to relevant standards and guidance issued by the Federal Government. (e) Definitions.--In this section: (1) Applicant flow data.--The term ``applicant flow data'' means data that tracks the rate of applications for job positions among demographic categories. (2) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the Committee on Foreign Relations, the Committee on Armed Services, the Committee on Homeland Security and Governmental Affairs, the Select Committee on Intelligence, and the Committee on Appropriations of the Senate; and (B) the Committee on Foreign Affairs, the Committee on Armed Services, the Committee on Homeland Security, the Permanent Select Committee on Intelligence, and the Committee on Appropriations of the House of Representatives. (3) Diversity.--The term ``diversity'' means diversity of persons based on gender, race, ethnicity, disability status, veteran status, sexual orientation, gender identity, national origin, and other demographic categories. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from California (Mr. Schiff) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from California. Mr. SCHIFF. Madam Chair, I am happy to support the amendment offered by Representative Green and Representative Connolly, which would require the Director of National Intelligence to make publicly available its annual report that aggregates demographic data and other information regarding the diversity and inclusion efforts within the intelligence community. The amendment would expand the elements that the DNI must report on to include grade-level attrition and promotion rates, as well as validated metrics, such as New Inclusion Quotient Index scores. The IQ initiative is designed to help employees and managers foster diversity and inclusion in the workplace. [[Page H5895]] This amendment is important as we strive to significantly improve hiring and retention in the IC such that the workforce mirrors the American population. It is imperative that we have better visibility into the demographics of our current workforce to legislate well- informed change. Again, I thank my colleagues for their work, and I am happy to support the amendment and urge my colleagues to do the same. Madam Chair, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from California (Mr. Schiff). The amendment was agreed to. Amendment No. 9 Offered by Mr. Case The Acting CHAIR. It is now in order to consider amendment No. 9 printed in part B of House Report 116-154. Mr. CASE. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows At the end of title VII, add the following new section: SEC. 708. REPORT ON BEST PRACTICES TO PROTECT PRIVACY AND CIVIL LIBERTIES OF CHINESE AMERICANS. (a) Sense of Congress.--It is the sense of Congress that-- (1) the People's Republic of China appears to be specifically targeting the Chinese-American community for intelligence purposes; (2) such targeting carries a substantial risk that the loyalty of such Americans may be generally questioned and lead to unacceptable stereotyping, targeting and racial profiling; (3) the United States Government has a duty to warn and protect all Americans including those of Chinese descent from these intelligence efforts by the People's Republic of China; (4) the broad stereotyping, targeting and racial profiling of Americans of Chinese descent is contrary to the values of the United States and reinforces the flawed narrative perpetuated by the People's Republic of China that ethnically Chinese individuals worldwide have a duty to support the People's Republic of China; and (5) the United States efforts to combat the People's Republic of China's intelligence activities should actively safeguard and promote the constitutional rights of all Chinese Americans. (b) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, acting through the Office of Civil Liberties, Privacy, and Transparency, in coordination with the civil liberties and privacy officers of the elements of the intelligence community, shall submit a report to the congressional intelligence committees containing-- (1) a review of how the policies, procedures, and practices of the intelligence community that govern the intelligence activities and operations targeting the People's Republic of China affect policies, procedures, and practices relating to the privacy and civil liberties of Americans of Chinese descent who may be targets of espionage and influence operations by China; and (2) recommendations to ensure that the privacy and civil liberties of Americans of Chinese descent are sufficiently protected. (c) Form.--The report under subsection (b) shall be submitted in unclassified form, but may include a classified annex. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Hawaii (Mr. Case) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Hawaii. Mr. CASE. Madam Chair, I yield myself such time as I may consume. Madam Chair, not far from here, on the slopes of Capitol Hill, is a small, serene, and unassuming memorial. On its walls are names not now known to too many Americans but indelibly etched in a dark chapter of our national story. Tule Lake, Poston, Manzanar--these are the internment camps where 120,000 ethnic Japanese, most of them American citizens, were locked up in the hysteria of the Second World War just because they were Japanese. This amendment, proudly sponsored by many of my colleagues in our Congressional Asian Pacific American Caucus, including our chair, the gentlewoman from California (Ms. Judy Chu), asked us a question that must be asked: Are we repeating history or in danger of doing so? {time} 2015 In these recent years of justifiably heightened scrutiny on the intelligence activities of the People's Republic of China, a disproportionate number of Americans of Chinese descent have been investigated and prosecuted for espionage. Those convicted have received disproportionately high sentences, and the too many exonerated have had their careers ruined nonetheless. No doubt, China seeks to recruit Chinese Americans to its goals, and no doubt, our government should and must review specific cases of potential espionage by China on specific facts. But have we fallen into the same trap all over again of justifying investigations and other actions toward the ends of national security by means of general profiling and targeting based solely on ethnic identity? The Committee of 100, a group of prominent Chinese Americans in diverse fields, reviewed the empirical evidence and concluded that ``Asian Americans, whether immigrant or native-born, may be facing unfair and increasing racial prejudice in this era of geopolitical competition.'' It stated, and I believe correctly: ``A definite line can be drawn between appropriate prosecution that is based on actual evidence and free of bias and overreaching persecution that is triggered by unfounded suspicions and tainted by racial prejudice. All Americans, regardless of ethnicity, depend on that line.'' This resolution is a flashing red light to our intelligence community: Stop, look, and listen. Take some time to think it through to be sure you are staying on the right side of that line, and then report back to us here in Congress that you have done so and have the procedures and mindset in place to ensure that we won't repeat history with Chinese Americans or any other broad ethnic or interest group. Madam Chair, I yield 2 minutes to the gentleman from California (Mr. Schiff), the committee chair. Mr. SCHIFF. Madam Chair, I thank the gentleman for yielding. I strongly support the amendment. This amendment expresses the sense of Congress that racial profiling of Americans of Chinese descent is contrary to the values of the United States and reinforces flawed narratives perpetuated by the People's Republic of China that ethnically Chinese individuals worldwide have a duty to support the People's Republic of China. Moreover, the amendment reaffirms that the United States Government has a duty to warn and protect all Americans, including those of Chinese descent, from intelligence operations executed by the People's Republic of China. Finally, the amendment requires the ODNI Office of Civil Liberties, Privacy, and Transparency, in coordination with civil liberties and privacy officers throughout the intelligence community, to submit a report to the congressional intelligence committees. This report would review how the intelligence community policies that govern counterintelligence operations against China impact the civil liberties of Americans of Chinese descent who are the targets of Chinese espionage and provide recommendations to preserve these liberties and privacy interests. Mr. Case's important amendment reaffirms that Americans of all backgrounds deserve equal protection under the law and reminds our intelligence community of its duty to protect the privacy and civil liberties of all persons. Madam Chair, again, I thank my colleague for his work, and I strongly support the amendment. Mr. CASE. Madam Chair, I strongly urge adoption of this amendment. It is the right amendment. We certainly want our intelligence community to do its job, but we also want them to be very conscious of the decisions that they are making and are in line with our basic civil liberties. Madam Chair, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Hawaii (Mr. Case). The amendment was agreed to. Amendment No. 10 Offered by Ms. Frankel The Acting CHAIR. It is now in order to consider amendment No. 10 printed in part B of House Report 116-154. Ms. FRANKEL. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows At the end of title VII, add the follow new section: [[Page H5896]] SEC. 708. INTELLIGENCE ASSESSMENT OF RELATIONSHIP BETWEEN WOMEN AND VIOLENT EXTREMISM. (a) In General.--Not later than 180 days after the date of the enactment of this Act, and annually thereafter, the Director of National Intelligence, in consultation with the Secretary of Defense, the Secretary of State, and the head of any element of the intelligence community the Director determines appropriate, shall submit to the appropriate congressional committees an intelligence assessment on the relationship between women and violent extremism and terrorism throughout the world, including an assessment of-- (1) the historical trends and current state of women's varied roles worldwide in all aspects of violent extremism and terrorism, including as recruiters, sympathizers, perpetrators, and combatants, as well as peace-builders and preventers; (2) how women's roles in all aspects of violent extremism and terrorism are likely to change in the near- and medium- term; (3) the extent to which the unequal status of women affects the ability of armed combatants and terrorist groups to enlist or conscript women as combatants and perpetrators of violence; (4) how terrorist groups violate the rights of women and girls, including child, early, and forced marriage, abduction, sexual violence, and human trafficking, and the extent to which such violations contribute to the spread of conflict and terrorist activities; and (5) opportunities to address the security risk posed by female extremists and leverage the roles of women in counterterrorism efforts. (b) Form.--The assessment required under subsection (a) shall be submitted in unclassified form, but may include a classified annex. (c) Appropriate Congressional Committees Defined.--In this section, the term ``appropriate congressional committees'' means-- (1) the Select Committee on Intelligence, the Committee on Foreign Relations, and the Committee on Armed Services, of the Senate; and (2) the Permanent Select Committee on Intelligence, the Committee on Foreign Affairs, and the Committee on Armed Services, of the House of Representatives. The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from Florida (Ms. Frankel) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from Florida. Ms. FRANKEL. Madam Chair, this amendment takes an important step toward fighting terrorism. It would require the Director of National Intelligence to submit an intelligence assessment on the relationship between women and violent extremism and terrorism. Madam Chair, to prevent ISIS 2.0 and to improve U.S. counterterrorism and peace-building efforts, we need to pay more attention to the roles that women play in violent extremism, including as victims, as perpetrators, and as preventers. First, as victims, women are often the first targets of terrorism. We have seen it with the abduction and rape of thousands of women and girls by ISIS, the kidnapping of hundreds of girls by Boko Haram in Nigeria, and the attack of girls just trying to go to school by the Taliban. Secondly, Madam Chair, women are not only the victims of terrorism. Some are perpetrators. Recent research shows that women are turning to terror organizations because of false promises of protection, escape from abuse at home, and even, believe it or not, for leadership opportunities. As a result, women-led attacks are rising. In fact, now, 20 to 30 percent of foreign terrorist fighters are women. In sub- Saharan Africa alone, three out of four child suicide bombers are girls. Madam Chair, women are not only victims and perpetrators of terrorism. They are also preventers, as mothers, wives, and daughters. They influence their spouses and children. They are on the front line of detecting early signs of radicalization in their families and communities. Madam Chair, because of gender inequality, their warnings are often ignored. Let me give you an example. Afghan women saw young men being recruited at a wedding, and they shared their concerns with law enforcement. They were dismissed. Later, those same recruits went on to kill 32 people in a bus attack. I conclude, Madam Chair, by saying that understanding women's unique roles in terrorism is important to creating more peaceful communities around the world, which results in more security for the United States of America. Madam Chair, I urge all of my colleagues to support this very important amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentlewoman from Florida (Ms. Frankel). The amendment was agreed to. Amendment No. 11 Offered by Mr. Kennedy The Acting CHAIR. It is now in order to consider amendment No. 11 printed in part B of House Report 116-154. Mr. KENNEDY. Madam Chair, I wish to speak on behalf of the amendment. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title IV add the following new section: SEC. 403. FOREIGN THREAT RESPONSE CENTER. (a) Establishment.--The National Security Act of 1947 (50 U.S.C. 3001 et seq.) is amended by inserting after section 119B the following new section: ``SEC. 119C. FOREIGN THREAT RESPONSE CENTER. ``(a) Establishment.--There is within the Office of the Director of National Intelligence a Foreign Threat Response Center (in this section referred to as the `Center'). ``(b) Mission.--The primary missions of the Center shall be as follows: ``(1) To serve as the primary organization in the United States Government for analyzing and integrating all intelligence possessed or acquired by the United States Government pertaining to foreign threats. ``(2) To synchronize the efforts of the intelligence community with respect to countering foreign efforts to undermine the national security, political sovereignty, and economic activity of the United States and the allies of the United States, including by-- ``(A) ensuring that each such element is aware of and coordinating on such efforts; and ``(B) overseeing the development and implementation of comprehensive and integrated policy responses to such efforts. ``(3) In coordination with the relevant elements of the Department of State, the Department of Defense, the Federal Bureau of Investigation, the intelligence community, and other departments and agencies of the United States-- ``(A) to develop policy recommendations for the President to detect, deter, and respond to foreign threats, including with respect to covert activities pursuant to section 503; and ``(B) to monitor and assess foreign efforts to carry out such threats. ``(4) In coordination with the head of the Global Engagement Center established by section 1287 of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114-328), to examine current and emerging foreign efforts to use propaganda and information operations relating to the threats described in paragraph (1). ``(5) To identify and close gaps across the departments and agencies of the Federal Government with respect to expertise, readiness, and planning to address foreign threats. ``(c) Director.-- ``(1) Appointment.--There is a Director of the Center, who shall be the head of the Center, and who shall be appointed by the Director of National Intelligence, with the concurrence of the Secretary of State. The Director may not simultaneously serve in any other capacity in the executive branch. ``(2) Reporting.--The Director of the Center shall directly report to the Director of National Intelligence. ``(3) Responsibilities.--The Director of the Center shall-- ``(A) ensure that the relevant departments and agencies of the Federal Government participate in the mission of the Center, including by recruiting detailees from such departments and agencies in accordance with subsection (e)(1); and ``(B) have primary responsibility within the United States Government, in coordination with the Director of National Intelligence, for establishing requirements for the collection of intelligence related to, or regarding, foreign threats, in accordance with applicable provisions of law and Executive orders. ``(d) Annual Reports.-- ``(1) In general.--At the direction of the Director of National Intelligence, but not less than once each year, the Director of the Center shall submit to the appropriate congressional committees a report on foreign threats. ``(2) Matters included.--Each report under paragraph (1) shall include, with respect to the period covered by the report, a discussion of the following: ``(A) The nature of the foreign threats. ``(B) The ability of the United States Government to address such threats. ``(C) The progress of the Center in achieving its missions. ``(D) Recommendations the Director determines necessary for legislative actions to improve the ability of the Center to achieve its missions. ``(3) Form.--Each report under paragraph (1) shall be submitted in unclassified form, but may include a classified annex. ``(e) Employees.-- [[Page H5897]] ``(1) Detailees.--Any Federal Government employee may be detailed to the Center on a reimbursable or nonreimbursable basis, and such detail shall be without interruption or loss of civil service status or privilege for a period of not more than 8 years. ``(2) Personal service contractors.--The Director of National Intelligence, in consultation with the Secretary of State, may hire United States citizens or aliens as personal services contractors for purposes of personnel resources of the Center, if-- ``(A) the Director of National Intelligence determines that existing personnel resources are insufficient; ``(B) the period in which services are provided by a personal services contractor, including options, does not exceed 3 years, unless the Director of National Intelligence determines that exceptional circumstances justify an extension of up to 1 additional year; ``(C) not more than 10 United States citizens or aliens are employed as personal services contractors under the authority of this paragraph at any time; and ``(D) the authority of this paragraph is only used to obtain specialized skills or experience or to respond to urgent needs. ``(3) Security clearances.--Each employee detailed to the Center and contractor of the Center shall have the security clearance appropriate for the assigned duties of the employee or contractor. ``(f) Board.-- ``(1) Establishment.--There is established a Board of the Foreign Threat Response Center (in this section referred to as the `Board'). ``(2) Functions.--The Board shall conduct oversight of the Center to ensure the Center is achieving the missions of the Center. In conducting such oversight, upon a majority vote of the members of the Board, the Board may recommend to the Director of National Intelligence that the Director of the Center should be removed for failing to achieve such missions. ``(3) Membership.-- ``(A) Appointment.--The Board shall consist of 7 members. The head of each department or agency of the Federal Government specified in subparagraph (B) shall appoint a senior official from that department or agency, who shall be a member of the Senior Executive Service, as a member. ``(B) Departments and agencies represented.--The department or agency of the Federal Government specified in this subparagraph are the following: ``(i) The Department of State. ``(ii) The Department of Defense. ``(iii) The Department of Justice. ``(iv) The Department of the Treasury. ``(v) The Department of Homeland Security. ``(vi) The Central Intelligence Agency. ``(vii) The Federal Bureau of Investigation. ``(4) Meetings.--The Board shall meet not less than biannually and shall be convened by the member appointed by the Secretary of State. ``(g) International Engagement.--The Director of the Center may convene biannual conferences to coordinate international efforts against foreign threats. ``(h) Termination.--The Center shall terminate on the date that is 8 years after the date of the enactment of this section. ``(i) Definitions.--In this section: ``(1) Appropriate congressional committees.--the term `appropriate congressional committees' means-- ``(A) the congressional intelligence committees; ``(B) the Committee on Foreign Affairs and the Committee on Armed Services of the House of Representatives; and ``(C) the Committee on Foreign Relations and the Committee on Armed Services of the Senate. ``(2) Foreign threats.--The term `foreign threats' means efforts to influence, through overt or covert malign activities, the national security, political sovereignty, or economic activity of the United States or the allies of the United States, made by the government of any of the following foreign countries: ``(A) Russia. ``(B) Iran. ``(C) North Korea. ``(D) China. ``(E) Any other foreign country that the Director determines appropriate for purposes of this section.''. (b) Clerical Amendment.--The table of contents at the beginning of such Act is amended by inserting after the item relating to section 119B the following new item: ``Sec. 119C. Foreign Threat Response Center.''. (c) Conforming Amendment.--Section 507(a) of such Act (50 U.S.C. 3106) is amended by adding at the end the following new paragraph: ``(6) An annual report submitted under section 119C(d)(1).''. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Massachusetts (Mr. Kennedy) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Massachusetts. Mr. KENNEDY. Madam Chair, I begin by thanking the chairman of the committee and his staff for their dedication to getting this amendment here today and for their long and strong defense of our electoral system from foreign interference. Madam Chair, a few weeks ago, Special Counsel Robert Mueller stood before the American people and issued a stern warning and an ominous challenge. In what he referred to as the central allegation of his 2- year-long investigation, he told us that there were ``multiple, systemic efforts to interfere in our election. That allegation deserves the attention of every American.'' Our democracy was attacked, our government undermined, and our election system weakened. We were manipulated. A foreign adversary exposed many of our worst impulses as they hacked, prodded, forged, stole, lied, and exploited in a coordinated and sustained effort to change the trajectory of this country. We cannot change what happened in 2016, but we can learn from it because our adversaries certainly did. They watched as politicians were all too eager to use hacked material. They took notes as social media networks were used to inflame racial, geographic, and demographic divisions. According to the ``Worldwide Threat Assessment'' by the Director of National Intelligence, Dan Coats, Russia, China, and Iran already have their eyes trained on 2020. That is why we must proactively create a foreign threat response center tasked with identifying and rejecting any attempts by any adversary to influence our political process because we cannot hold ourselves up as a beacon of democracy if we are not willing to defend the institutions upon which our democratic system rests. By removing politics from this response and coordinating it under one roof within the intelligence community, we can rebuild that faith in our system. In this body, we have no greater responsibility than to protect the sanctity of our elections, to protect the trust of our citizens, and to protect our faith in government. That is what this amendment codifies. Madam Chair, I encourage all of my colleagues to support this amendment, and I reserve the balance of my time. Mr. CONAWAY. Madam Chair, I claim the time in opposition to the amendment. The Acting CHAIR. The gentleman from Texas is recognized for 5 minutes. Mr. CONAWAY. Madam Chair, before I get to my objections to the amendment, I want to congratulate the chairman, the majority members of the committee, as well as the majority staff for the great work they did in helping us bring a fully bipartisan bill to the floor, which I fully intend to support. They also helped us navigate the intricacies of the Rules Committee so that what we are debating tonight, with the amendments that were put forward, we will be able to support this bill on the floor tomorrow or whenever they decide to bring it up. I thank the chairman for the good work that they put into it. Madam Chair, I do, though, rise in opposition to this amendment. For the past several years, the House Intelligence Committee has spent a significant amount of time overseeing the intelligence community's ongoing efforts to counter foreign malign influence targeting the United States. Although Russia gains significant and necessary attention given the events of 2016, the committee is also concerned about Chinese, Iranian, and other foreign powers that have designs on sowing discord in the United States or covertly influencing the American populace. The amendment today would establish a foreign threat response center within the Office of the Director of National Intelligence. While I believe my colleague from Massachusetts offers this amendment with the best of intentions, it is clearly redundant to existing efforts and creates an additional and potentially unnecessary bureaucracy within an organization that may not be best suited to take the lead on these actions. This issue is not new. Last Congress, we worked with the gentleman from Massachusetts in adding a report to the fiscal 2018 and 2019 IAAs that would examine the necessity of a foreign malign influence response center. This report remains in the bill, given that it is a 3-year bill. [[Page H5898]] I am not convinced of the necessity of such a center, given the ongoing efforts by our intelligence community to address this problem. However, even assuming its necessity, I am concerned that the ODNI may not be the best place for such a center. Based on our ongoing oversight efforts, we know that the interagency is taking the threat of foreign malign influences very seriously. Given the significant counterintelligence impact to the homeland, it may make more sense to house such an entity within the FBI. I don't believe in putting the cart before the horse. It is important for us to collect all the necessary information in order for Congress to make an informed decision after significant debate on the merits of such a center and whether the ODNI is the right home for it. This debate should happen within the Intelligence Committee. To date, that debate has not occurred. This amendment would also set up a board to oversee the work of the Foreign Intelligence Center, which would then be overseen by the House and Senate Intelligence Committees. Again, a redundancy that is, in my estimation, not necessary. Madam Chair, based on these foregoing reasons, I will oppose the gentleman's amendment and urge my colleagues on both sides of the aisle to vote against it, and I reserve the balance of my time. {time} 2030 Mr. KENNEDY. Madam Chair, may I inquire how much time I have remaining? The Acting CHAIR. The gentleman from Massachusetts has 2\1/2\ minutes remaining. Mr. KENNEDY. Madam Chair, I yield 1 minute to the distinguished gentleman from California (Mr. Schiff). Mr. SCHIFF. Madam Chair, I thank the gentleman for yielding. This amendment directs the intelligence community to expand upon its work in identifying and reporting foreign malign influence activity by establishing a center responsible for integrating all intelligence pertaining to foreign efforts to undermine our democratic institutions. The committee and the intelligence community has seen all too clearly over the last 3 years that the malign influence threats to U.S. sovereignty and security are emerging as a new normal, all the while becoming more sophisticated and diverse. Identifying and defending against these threats, particularly those committed by strategic adversaries of the U.S., requires a dedicated whole-of-intelligence-community effort in order to fully understand the nature of the threat and identify outstanding intelligence gaps that need to be filled. In establishing an interagency Foreign Threat Response Center, this amendment lays out a framework for accomplishing this challenging task. I thank my colleague for his work. I appreciate Mr. Kennedy's commitment to this area very much, and I support the amendment. Mr. CONAWAY. Madam Chair, I yield myself the balance of my time. In closing, I would like to reiterate that the establishment of such a center should be debated properly within the House Intelligence Committee. It should also be informed by the report that the gentleman was successful in adding to the fiscal 2018 and 2019 Intelligence Authorization Acts, and such debate should focus on the merits of the center, given existing efforts, as well as whether or not the ODNI should house the center. Until that report is finished, and then the debate happens, I would urge a ``no'' vote on the amendment. Madam Chair, I yield back the balance of my time. Mr. KENNEDY. Madam Chair, I yield myself the balance of my time. I would just say, in closing, that I appreciate the gentleman's words and the work that they did with us to get the report language into the version last year. I would point out that much of the intent behind this legislation and this amendment is directly related to what the gentleman indicated around an ongoing threat assessment from Russia, China, and Iran. The issue isn't so much, has that threat been identified? It is, what has the Intelligence Committee done to ensure the sanctity and the purity of those elections? I think this amendment speaks for itself. I urge my colleagues to adopt it. I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Massachusetts (Mr. Kennedy). The question was taken; and the Acting Chair announced that the ayes appeared to have it. Mr. CONAWAY. Madam Chair, I demand a recorded vote. The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further proceedings on the amendment offered by the gentleman from Massachusetts will be postponed. Amendment No. 12 Offered by Miss Rice of New York The Acting CHAIR. It is now in order to consider amendment No. 12 printed in part B of House Report 116-154. Miss RICE of New York. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 238, line 15, insert ``and the Under Secretary of Homeland Security for Intelligence and Analysis'' before ``, shall''. Page 239, after line 14, insert the following new subsection: (d) Dissemination to State and Local Partners.-- Consistent with the protection of classified and confidential unclassified information, the Under Secretary shall share the report required by subsection (b) with State, local, and regional officials who operate within State, local, and regional fusion centers through the Department of Homeland Security State, Local, and Regional Fusion Center Initiative established in section 210A of the Homeland Security Act of 2002 (6 U.S.C 124h). The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from New York (Miss Rice) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from New York. Miss RICE of New York. Madam Chair, I yield myself such time as I may consume. I was pleased to see that my bill, the Stop Terrorist Use of Virtual Currencies Act, was included in the base text of the Intelligence Authorization Act. This bill requires the Director of National Intelligence and the Secretary of the Treasury to develop and submit a threat assessment report on the use of virtual currencies by terrorist organizations. My amendment would simply include the DHS Under Secretary for Intelligence and Analysis into this report and require that this report be disseminated to State and local law enforcement officials. In the 18 years since the deadliest terrorist attack in American history, the United States has led the global campaign to combat terrorism, thwarting plots and preventing attacks on American soil, identifying and disrupting terrorist networks around the world, hunting down terrorists wherever they hide, and proving that they can and will be brought to justice. But we also know that the threat of terrorism is not the same as it was 18 years ago; it is a threat that constantly evolves, and we need to evolve with it. We need to evolve ahead of it. That is why I have offered this amendment. In recent years, we have seen instances in which members of terrorist groups have turned to virtual currencies to finance and support their operations. For example, in December of 2017, a woman in New York was arrested and pled guilty after she obtained $62,000 in bitcoin and other virtual currencies to send to ISIS. Using those virtual funds, she was able to send the money via shell entities in Pakistan, China, and Turkey that were fronts for ISIS. In early 2017, Indonesian authorities reported that a Syria-based Indonesian with ties to ISIS used bitcoin and other virtual currencies to fund attacks in Indonesia. The same things that make virtual currencies appealing to everyday consumers, speed and convenience, make these currencies appealing to those who want to finance illegal activities. And many forms of virtual currencies also offer their users anonymity, making them particularly attractive to those seeking to circumvent American law enforcement and financial institutions. [[Page H5899]] In order to effectively confront this threat, we need to fully understand it. We need a comprehensive assessment of how virtual currencies might be abused for illegal and nefarious ends. That is why it is critical that we act now to assess and understand this emerging threat. There is no denying it. Virtual currencies have exposed deep vulnerabilities in our counterterrorism efforts. And unfortunately, right now, our government lacks a comprehensive response and strategy to address this threat. Passing this amendment will give counterterrorism and law enforcement officials at all levels the information and strategies they desperately need to confront this threat head-on with 21st-century solutions. This is a commonsense, bipartisan priority, and I urge all my colleagues to support this amendment. Madam Chair, I yield 1 minute to the gentleman from California (Mr. Schiff). Mr. SCHIFF. Madam Chair, I thank the gentlewoman for yielding. This straightforward amendment adds the Under Secretary of Homeland Security for Intelligence and Analysis to the DNI's consultation requirement for its report on possible exploitation of virtual currencies by terrorist actors. It also requires the report's dissemination to State and local law enforcement, consistent with the protection of classified information. Ensuring that relevant counterterrorism information is distributed, as appropriate, to State and local law enforcement is a key priority and a major function of the Department of Homeland Security. Adding these entities as recipients of this report through the DHS fusion center mechanism improves the bill. I want to encourage all my colleagues to support the amendment, as well as the underlying bill. I thank my colleague for her work. Miss RICE of New York. Madam Chair, I want to thank Chairman Schiff and Ranking Member Nunes for supporting the amendment. I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentlewoman from New York (Miss Rice). The amendment was agreed to. Amendment No. 13 Offered by Ms. Jayapal The Acting CHAIR. It is now in order to consider amendment No. 13 printed in part B of House Report 116-154. Ms. JAYAPAL. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 3__. REPORT ON USE BY INTELLIGENCE COMMUNITY OF FACIAL RECOGNITION TECHNOLOGY. (a) Sense of Congress.--It is the sense of Congress that-- (1) the use of facial recognition technology for the purpose of suppressing or burdening criticism or dissent, or for disadvantaging persons based on their ethnicity, race, gender, sexual orientation, or religion, is contrary to the values of the United States; (2) the United States Government should not engage in the sale or transfer of facial recognition technology to any country that is using such technology for the suppression of human rights; and (3) it is incumbent upon the intelligence community to develop clear policies and procedures that prevent the abuse of facial recognition technology. (b) Report Required.--Not later than 1 year after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the use of facial recognition technology by the intelligence community. Such report shall include each of the following: (1) An analysis of the current use of facial recognition technology by the intelligence community. (2) An analysis of the accuracy of facial recognition technology, including a discussion of the appropriate threshold for use, and data disaggregated by race, gender, ethnicity, and age. (3) Whether the Government has adequate procedures in place to audit or test technology they purchase to assess its accuracy, including on the basis of race, gender, ethnicity, and age. (4) The extent to which the intelligence community has codified policies governing the use of facial recognition technology that adequately prevent adverse impacts on privacy, civil rights, and civil liberties. (5) An analysis of the ability of the intelligence community to use facial recognition technology to identify individuals in a way that respects constitutional rights, civil rights, civil liberties, and privacy of such individuals. (6) Identification of risks and safeguards to uphold the constitutional rights, civil rights, civil liberties, and privacy of individuals, including for communities of color and religious minorities. (7) Whether such technology is deployed in public areas or on photos of public areas in a manner that could raise First Amendment concerns. (8) An identification of existing policies, procedures, or practices that permit the sharing of facial recognition data and technology with foreign governments or other non-United States Government entities. (9) An identification of measures in place to protect data security. (10) An identification of any redress procedures to address complaints in cases where the use of facial recognition resulted in harm to an individual. (11) An analysis of existing transparency, oversight, and audits of the use of facial recognition to measure the efficacy of the technology on an ongoing basis, as measured against the cost and impact on individual rights. (c) Form.--The report under subsection (a) shall be submitted in unclassified form, but may include a classified annex. (d) Facial Recognition Data Defined.--In this section, the term ``facial recognition data'' means any unique attribute or feature of the face of an end user that is used by facial recognition technology to assign a unique, persistent identifier, or for the unique personal identification of a specific individual. The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from Washington (Ms. Jayapal) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from Washington. Ms. JAYAPAL. Madam Chair, I yield myself such time as I may consume. I want to start by recognizing the work of our chairman, Mr. Schiff, on this bill. Madam Chair, my amendment would require Congress to provide much- needed oversight to the intelligence community's use of face recognition technology. The amendment does three things. First, it requires the Director of National Intelligence to submit a report to the Intelligence Committees in both the House and the Senate on the use of this new technology. This is a critical step in ensuring that there is a deeper understanding of the technology here in Congress and also, appropriate transparency. Second, the amendment expresses the sense of Congress that using this technology to suppress dissent, or to target people based on ethnicity, race, gender, sexual orientation, or religion is contrary to our Nation's values. And finally, it makes clear that Congress believes that the government should not sell or transfer face recognition technology to any country that is using this technology to suppress human rights. I offered this amendment to the Intelligence Authorization Act because I am concerned that face recognition poses grave privacy concerns. As a Nation committed to democratic norms, including constitutionally-enshrined rights to freedom of speech and privacy, it is critical that we ensure that our national security activities do not come at the expense of our individual liberties and our right to privacy. And thus, it is critical that this body know exactly how this technology is being used. In addition to the civil liberties concerns of those in our country, the technology does disproportionately impact people of color. The technology, unfortunately, misidentifies people of color and women at higher rates than Whites and men, which undermines its usefulness to the intelligence community, and makes it potentially problematic for large-scale use. Finally, my amendment makes clear that the United States should not be providing this technology to countries who are using it to perpetuate human rights abuses. We should not be selling or transferring the technologies to countries like China, who are actively using this technology to suppress dissent and target minorities, like the Uighurs, a Muslim minority group. Although this sense of Congress lays down an important marker, we do need to continue to work to ensure that there are proper controls on the sale and the transfer of this technology, and I look forward to doing that with my colleagues. [[Page H5900]] Madam Chair, I yield 1 minute to the distinguished gentleman from California (Mr. Schiff), the chairman of the committee. Mr. SCHIFF. Madam Chair, I thank the gentlewoman for yielding. This amendment expresses a sense of Congress that conveys our firm opposition to any use of facial recognition technology to suppress criticism or dissent, as well as our opposition to the U.S. Government sale or transfer of facial recognition technology to countries using this technology to suppress human rights. Critically, the amendment also acknowledges the IC's unique responsibility to develop robust policies and procedures that prevent the abuse of this technology. To ensure that the intelligence community is held accountable, the amendment requires the submission of a comprehensive report analyzing any use of facial recognition technology by the IC, and the associated implications for privacy and civil liberties, especially among marginalized communities. Ms. Jayapal's amendment requires the intelligence community to establish clear policies and procedures, enhance transparency, and increase oversight concerning the applications of these new capabilities. Her amendment lays the groundwork for a thoughtful U.S. response to the emergence of divisive and disruptive technologies and how they would fit into existing civil liberties frameworks. Again, I want to thank my colleague for her work. I am pleased to support Ms. Jayapal's amendment. Ms. JAYAPAL. Madam Chair, I yield 1 minute to the gentleman from Illinois (Mr. Garcia). Mr. GARCIA of Illinois. Madam Chair, I rise in support of the amendment we have filed to study and limit the use of facial recognition technology. The intelligence community collects large amounts of data with limited oversight about how and from whom data is collected. Facial recognition technology has shown to be less accurate on nonwhite faces, and its use disproportionately hurts communities of color because of algorithmic bias. This amendment studies the potential for bias and expresses the sense that people should not be targeted for their ethnicity, race, or sexual orientation, or to suppress dissent. Given the U.S. Government's history of tracking protesters and activists, especially in minority communities, this is important. Congress can and should exercise Federal oversight of emerging surveillance technologies. For facial recognition technology, this means our work is only just beginning. I urge support for this amendment. {time} 2045 Ms. JAYAPAL. Madam Chair, I urge my colleagues to support this amendment, and I yield back the balance of my time. The Acting CHAIR (Ms. Omar). The question is on the amendment offered by the gentlewoman from Washington (Ms. Jayapal). The amendment was agreed to. Amendment No. 14 Offered by Mrs. Murphy The Acting CHAIR. It is now in order to consider amendment No. 14 printed in part B of House Report 116-154. Mrs. MURPHY. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following: SEC. 708. REPORT ON DEEPFAKE TECHNOLOGY, FOREIGN WEAPONIZATION OF DEEPFAKES, AND RELATED NOTIFICATIONS. (a) Report on Foreign Weaponization of Deepfakes and Deepfake Technology.-- (1) Report required.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the heads of the elements of the intelligence community determined appropriate by the Director, shall submit to the congressional intelligence committees a report on-- (A) the potential national security impacts of machine- manipulated media (commonly known as ``deepfakes''); and (B) the actual or potential use of machine-manipulated media by foreign governments to spread disinformation or engage in other malign activities. (2) Matters to be included.--The report under subsection (a) shall include the following: (A) An assessment of the technical capabilities of foreign governments, including foreign intelligence services, foreign government-affiliated entities, and foreign individuals, with respect to machine-manipulated media, machine-generated text, generative adversarial networks, and related machine-learning technologies, including-- (i) an assessment of the technical capabilities of the People's Republic of China and the Russian Federation with respect to the production and detection of machine- manipulated media; and (ii) an annex describing those governmental elements within China and Russia known to have supported or facilitated machine-manipulated media research, development, or dissemination, as well as any civil-military fusion, private- sector, academic, or non-governmental entities which have meaningfully participated in such activities. (B) An updated assessment of how foreign governments, including foreign intelligence services, foreign government- affiliated entities, and foreign individuals, could use or are using machine-manipulated media and machine-generated text to harm the national security interests of the United States, including an assessment of the historic, current, or potential future efforts of China and Russia to use machine- manipulated media, including with respect to-- (i) the overseas or domestic dissemination of misinformation; (ii) the attempted discrediting of political opponents or disfavored populations; and (iii) intelligence or influence operations directed against the United States, allies or partners of the United States, or other jurisdictions believed to be subject to Chinese or Russian interference. (C) An updated identification of the counter-technologies that have been or could be developed and deployed by the United States Government, or by the private sector with Government support, to deter, detect, and attribute the use of machine-manipulated media and machine-generated text by foreign governments, foreign-government affiliates, or foreign individuals, along with an analysis of the benefits, limitations and drawbacks of such identified counter- technologies, including any emerging concerns related to privacy. (D) An identification of the offices within the elements of the intelligence community that have, or should have, lead responsibility for monitoring the development of, use of, and response to machine-manipulated media and machine-generated text, including-- (i) a description of the coordination of such efforts across the intelligence community; (ii) a detailed description of the existing capabilities, tools, and relevant expertise of such elements to determine whether a piece of media has been machine manipulated or machine generated, including the speed at which such determination can be made, the confidence level of the element in the ability to make such a determination accurately, and how increasing volume and improved quality of machine-manipulated media or machine-generated text may negatively impact such capabilities; and (iii) a detailed description of planned or ongoing research and development efforts intended to improve the ability of the intelligence community to detect machine-manipulated media and machine-generated text. (E) A description of any research and development activities carried out or under consideration to be carried out by the intelligence community, including the Intelligence Advanced Research Projects Activity, relevant to machine- manipulated media and machine-generated text detection technologies. (F) Updated recommendations regarding whether the intelligence community requires additional legal authorities, financial resources, or specialized personnel to address the national security threat posed by machine-manipulated media and machine generated text. (G) Other additional information the Director determines appropriate. (b) Form.--The report under subsection (a) shall be submitted in unclassified form, but may include a classified annex. (c) Requirement for Notification.--The Director of National Intelligence, in cooperation with the heads of any other relevant departments or agencies of the Federal Government, shall notify the congressional intelligence committees each time the Director of National Intelligence determines-- (1) there is credible information or intelligence that a foreign entity has attempted, is attempting, or will attempt to deploy machine-manipulated media or machine-generated text aimed at the elections or domestic political processes of the United States; and (2) that such intrusion or campaign can be attributed to a foreign government, a foreign government-affiliated entity, or a foreign individual. (d) Annual Update.--Upon submission of the report in subsection (a), on an annual basis, the Director of National Intelligence, in consultation with the heads of the elements of the intelligence community determined appropriate by the Director, shall submit to the congressional intelligence committees any significant updates with respect to the matters described in subsection (a). (e) Definitions.-- (1) Machine-generated text.--The term ``machine-generated text'' means text generated using machine-learning techniques in [[Page H5901]] order to resemble writing in natural language. (2) Machine-manipulated media.--The term ``machine- manipulated media'' has the meaning given that term in section 707. The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from Florida (Mrs. Murphy) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from Florida. Mrs. MURPHY. Madam Chair, my amendment, which I am coleading with Congresswoman Yvette Clarke of New York, involves a looming threat to American security and American democracy from the use of deepfake technology by our Nation's adversaries. As policymakers, we must understand this challenge and put in place a whole-of-government strategy to address it in a way that protects our interests and is consistent with our values. The U.S. intelligence community has an important role to play in this effort. The House Intelligence Committee, led by Chairman Schiff, recently held an illuminating and alarming hearing on deepfakes. As the witnesses at that hearing testified, technology now enables anyone with a computer, internet access, and technical skills to create fabricated and relatively convincing video and audio recordings that depict individuals doing or saying things that they did not do or say. The technology behind deepfakes is rapidly evolving. Soon individuals will be able to create highly realistic and difficult to debunk video and audio content. At a time when Americans are already being inundated, especially online, by a flood of false or misleading information, deepfake technology has the potential to make it even harder for the American public to trust what it sees and hears. It is easy to imagine the different ways in which deepfake technology could be exploited by America's foes. Imagine a Russian intelligence service creating a video purporting to show an American Presidential candidate accepting a bribe or an audio recording purporting to reveal an American Secretary of State saying something inflammatory about an ally. Or imagine a Chinese-produced video that falsely depicts the commander of a U.S. military unit committing a war crime. Such efforts, if not quickly exposed as false by the United States, could create havoc. In today's world, perhaps the biggest national security threat we face is not the risk of direct military conflict between the United States and Russia, China, Iran, or another adversary. Instead, the threat lurks in the gray space short of kinetic action. It is illustrated by Russian efforts to intervene in the 2016 Presidential election, most notably in my home State of Florida. It is the threat from authoritarian governments using new technologies to spread disinformation, sow discord, create divisions, and cause the American people to lose faith in our democratic form of government. To address this threat, our amendment requires the DNI to prepare a report for Congress on how foreign countries are using or could use deepfake technology to harm the United States and to explain how the intelligence community is working to develop appropriate countermeasures. This report will help us to understand the problem and to combat it more effectively. We must get this right because the stakes couldn't be higher. I urge my colleagues to support this amendment. Madam Chair, I yield 1 minute to the gentleman from California (Chairman Schiff). Mr. SCHIFF. Madam Chair, I thank the gentlewoman for yielding, and I rise in strong support of this amendment offered by my colleagues from Florida and New York, who have both been leaders in this body focused on national security challenges posed by deepfake technologies. We in the Intelligence Committee held a hearing on this very topic last month, and the rate at which these capabilities are evolving is almost as breathtaking as what they can produce, high-quality video and other types of media that convincingly portray individuals saying or doing things that never happened. The potential for a foreign adversary to undermine an election, foment chaos, or create a national security crisis with a sophisticated digital forgery means that we need to ensure the intelligence community is fully considering the wide-ranging implications of deepfakes, including the capacity of foreign entities and adversaries to weaponize machine-generated media. This report will also give us a detailed picture about how the intelligence community is coordinating efforts, activities, and research surrounding this emerging technology and if there are lingering gaps in resources or assignments of responsibility, since we need to be clear-eyed about how disruptive and devastating a well-timed deep fake could be during an election or a tense diplomatic standoff. I want to thank my colleague for her work on this amendment, and I am very proud to support it. Mrs. MURPHY. Madam Chair, I urge support for this amendment, and I yield back the balance of my time The Acting CHAIR. The question is on the amendment offered by the gentlewoman from Florida (Mrs. Murphy). The amendment was agreed to. Amendment No. 15 Offered by Mrs. Murphy The Acting CHAIR. It is now in order to consider amendment No. 15 printed in part B of House Report 116-154. Mrs. MURPHY. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title V, add the following new section: SEC. 5__. SENSE OF CONGRESS AND REPORT ON IRANIAN EFFORTS IN SYRIA. (a) Sense of Congress.--It is the sense of Congress that, regardless of the ultimate number of United States military personnel deployed to Syria, it is a vital interest of the United States to prevent the Islamic Republic of Iran, Hizbollah, and other Iranian-backed forces from establishing a strong and enduring presence in Syria that can be used to project power in the region and threaten the United States and its allies, including Israel. (b) Report.-- (1) Report required.--Not later than 180 days after the date of enactment of this Act, the Director of National Intelligence, in coordination with the Secretary of State and the Secretary of Defense, shall submit to the appropriate congressional committees a report that assesses-- (A) efforts by Iran to establish long-term influence in Syria through military, political, economic, social, and cultural means; and (B) the threat posed by such efforts to United States interests and allies. (2) Elements.--The report under paragraph (1) shall include each of the following: (A) An assessment of-- (i) how Iran and Iranian-backed forces, including the Islamic Revolutionary Guard Corps and Hizbollah, have provided or are currently providing manpower, training, weapons, equipment, and funding to the Syrian government led by President Bashar al-Assad; (ii) the support provided by Iran and Hizbollah to Shia militias operating in Syria that are composed of domestic fighters from Syria and foreign fighters from countries like Afghanistan, Iraq, Lebanon, and Pakistan; (iii) the threat posed by Iran and Iranian-backed forces to the al-Tanf garrison and to areas of northeast Syria that are currently controlled by local partner forces of the United States; (iv) the degree to which efforts of the United States to sustain and strengthen Kurdish forces in Syria may undermine the influence of Iran and Iranian-backed forces in Syria; (v) how Iran and Iranian-backed forces seek to enhance the long-term influence of such entities in Syria through non- military means such as purchasing strategic real estate in Syria, constructing Shia religious centers and schools, securing loyalty from Sunni tribes in exchange for material assistance, and inducing the Assad government to open Farsi- language departments at Syrian universities; and (vi) whether the prominent role of Iran in Syria, including the influence of Iran over government institutions, may increase the likelihood of the reconstitution of the Islamic State of Iraq and Syria in Syria. (B) An analysis of-- (i) how Iran is working with the Russian Federation, Turkey, and other countries to increase the influence of Iran in Syria; and (ii) the goals of Iran in Syria, including, but not limited to, protecting the Assad government, increasing the regional influence of Iran, threatening Israel from a more proximate location, building weapon-production facilities and other military infrastructure, and securing a land bridge to connect Iran through Iraq and Syria to the stronghold of Hizbollah in southern Lebanon. (C) A description of-- (i) how the efforts of Iran to transfer advanced weapons to Hizbollah and to establish a military presence in Syria has led to direct and repeated confrontations with Israel; and (ii) the intelligence and military support that the United States provides to Israel to [[Page H5902]] help Israel identify and appropriately address specific threats to Israel from Iran and Iranian-backed forces in Syria. (3) Form.--The report under paragraph (1) shall be submitted in unclassified form, but may include a classified annex. (4) Appropriate congressional committees defined.--In this section, the term ``appropriate congressional committees'' means-- (A) the Committee on Armed Services, the Committee on Foreign Relations, and the Select Committee on Intelligence of the Senate; and (B) the Committee on Armed Services, the Committee on Foreign Affairs, and the Permanent Select Committee on Intelligence of the House of Representatives. The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from Florida (Mrs. Murphy) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from Florida. Mrs. MURPHY. Madam Chair, our amendment would require the Director of National Intelligence, in coordination with the Secretaries of State and Defense, to prepare a report for Congress on efforts by Iran to establish long-term influence in Syria using both hard and soft power and the threat that this proposes to U.S. interests and allies, including Israel. Syria's civil war, which began in 2011, has brought an influx of Iranian-backed forces into Syria. Iran and Syria are both designated by the United States as state sponsors of terrorism. Their military partnership dates back decades, and Iran regards Syria as one of its most important allies. Iran and Iranian-backed forces, including the Islamic Revolutionary Guard Corps and Hezbollah, have provided manpower, training, weapons, and funding to the Syrian Government, led by President Bashar al-Assad. This assistance, coupled with support from Russia, has enabled the Assad government to retain or regain territory in Syria, and the Assad government currently maintains control over roughly two-thirds of the country. Iran's goals in Syria include protecting the Assad government, increasing Iran's regional influence, threatening Israel from a closer location, building weapon production facilities and other military infrastructure, and securing a land bridge that would connect Iran to Hezbollah's stronghold in southern Lebanon via Iraq and Syria. It is clear that Iran is seeking long-term influence in Syria and is pursuing this objective through military, political, and social means. Iran's effort to establish a military presence in Syria has led to repeated confrontations with Israel. In February of 2018, Israel shot down an Iranian drone flying over Israeli territory and then targeted the base in Syria from which the drone was launched. In May 2018, Israel launched strikes against Iranian military installations in Syria. Iran responded by firing missiles at Israeli positions in the Golan Heights, and Israel then targeted nearly all of Iran's military infrastructure in Syria. Iranian and Iranian-backed forces also seek to enhance their influence in Syria through nonmilitary means, such as purchasing strategic real estate, constructing Shia religious centers and schools, securing loyalty from Sunni tribes, and inducing the Assad government to open Farsi language departments at Syrian universities. In a startling move, President Trump has proposed to withdraw all or most U.S. forces from Syria, a proposal I view as a profound mistake. But regardless of the number of U.S. troops deployed to Syria, I believe it is a vital U.S. interest to prevent Iran, Hezbollah, and other Iranian-backed forces from establishing an enduring presence in Syria. Our amendment would require the DNI to assess how Iran is using hard and soft power to gain long-term influence in Syria. Among other things, the IC would examine how U.S. efforts to strengthen Kurdish forces in Syria could undermine Iran, how the U.S. helps Israel identify threats from Iran and Syria, and how Iran's influence over Syrian institutions could increase the likelihood that the Islamic State will reconstitute itself inside Syria. I urge my colleagues to support this amendment, and I reserve the balance of my time. Mr. SCHNEIDER. Madam Chair, I claim the time in opposition to the amendment, though I am not opposed to it. The Acting CHAIR. Without objection, the gentleman from Illinois is recognized for 5 minutes. There was no objection. Mr. SCHNEIDER. Madam Chair, I rise in support of the Murphy-Schneider amendment that makes abundantly clear it is of the utmost importance to prevent Iran from establishing any enduring presence in Syria. The amendment also requires the Director of National Intelligence to report on Iran's efforts to establish a foothold in Syria on the threat this poses to the United States and our allies, in particular Israel. Madam Chair, I stood before Congress in the last Congress urging support for my amendment to require a report on Iran's support for proxy forces in Syria and Lebanon, and I am pleased that this report remains in this bill. Today we are building on this important effort with the Murphy-Schneider amendment. I thank my good friend from Florida, Stephanie Murphy, for her leadership on this issue. Iran is a bad actor that has spread its maligned influence and continued to engage in destabilizing activities throughout the Middle East region, as well as beyond. The Iranian regime has and continues to establish deep ties within Syria through military, political, economic, social, and cultural means. This is a dangerous behavior that must be checked. Iran must not be allowed to maintain a permanent foothold in Syria that threatens our allies and stability in the region. To stand up to Iran, we must first understand the full extent of Iran's activities in Syria, and that is what this amendment does. I look forward to seeing this report and engaging on how we can prevent Iran from maintaining a permanent presence in Syria. I hope my colleagues will join me in supporting this important amendment, and I yield back the balance of my time. Mrs. MURPHY. Madam Chair, I urge support for the amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentlewoman from Florida (Mrs. Murphy). The amendment was agreed to. Amendment No. 16 Offered by Mr. Brindisi The Acting CHAIR. It is now in order to consider amendment No. 16 printed in part B of House Report 116-154. Mr. BRINDISI. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 708. RULE OF CONSTRUCTION WITH RESPECT TO CERTAIN CRIMES RELATING TO TERRORISM. Nothing in this Act, or the amendments made by this Act, shall be construed to contradict chapter 113B of title 18, United States Code, including with respect to-- (1) section 2332b (relating to acts of terrorism transcending national boundaries); (2) section 2339 (relating to harboring or concealing terrorists); and (3) section 2339A (relating to providing material support to terrorists). The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from New York (Mr. Brindisi) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from New York. Mr. BRINDISI. Madam Chair, I yield myself such time as I may consume. Madam Chair, I rise today urging adoption of my amendment, which makes clear that nothing in the underlying bill contradicts existing Federal law regarding acts of international terrorism, providing support to terrorists, or aiding terrorists. The underlying bill helps keep our country safe by ensuring the intelligence community has the resources and authorities it needs to do its job. It also makes sure the intelligence community can improve and adapt to today's rapidly changing threats and technologies by improving the collection and analytic capabilities against our adversaries like China, Russia, Iran, and North Korea. My amendment makes it crystal clear that our country will remain tough on international terrorism. Terrorism continues to be a serious threat to our national security. This provision strengthens the underlying [[Page H5903]] bill by ensuring current law regarding terrorism is not changed, so terrorists and those who support them can be brought to justice. Madam Chair, again, I urge my colleagues to support this amendment. I urge adoption of the amendment, and I yield back the balance of my time {time} 2100 The Acting CHAIR. The question is on the amendment offered by the gentleman from New York (Mr. Brindisi). The amendment was agreed to. Amendment No. 17 Offered by Mr. Kinzinger The Acting CHAIR. It is now in order to consider amendment No. 17 printed in part B of House Report 116-154. Mr. KINZINGER. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7___ REPORT ON INTERNATIONAL MOBILE SUBSCRIBER IDENTITY- CATCHERS AND UNITED STATES NATIONAL SECURITY. (a) Report Required.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Homeland Security, the Director of the Federal Bureau of Investigation, and the heads of other agencies the Director of National Intelligence determines appropriate, shall submit to the congressional intelligence committees a report describing-- (1) the threats that international mobile subscriber identity-catchers pose to national security and, specifically, the safety and security of Government personnel; (2) the prevalence of international mobile subscriber identity-catchers used by both foreign actors and domestic law enforcement within the United States; (3) actions taken by Federal agencies, as of the date of the report, to remove or neutralize international mobile subscriber identity-catchers installed by foreign entities, with a primary focus on the National Capital Region (as defined in section 2674(f) of title 10, United States Code); (4) policy recommendations for Congress to consider that would empower law enforcement and the intelligence community to counter such foreign intelligence operations while minimizing interference with legitimate domestic law enforcement operations; (5) the extent to which private entities, as well as Federal entities not primarily responsible for national security or homeland security, are able to remove, neutralize, or otherwise render ineffective international mobile subscriber identity-catchers; and (6) recommendations for new software programs, or the hardening of existing software programs, to reduce mobile phone susceptibility to international mobile subscriber identity-catchers. (b) Form.--To the extent practicable, the report shall be submitted in an unclassified, law enforcement sensitive form for the purposes of distribution to other congressional committees, but may also include a classified annex. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Illinois (Mr. Kinzinger) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Illinois. Mr. KINZINGER. Madam Chair, my amendment is very simple. It would require that the Director of National Intelligence and other relevant agencies report to Congress on the threat that international mobile subscriber identity catchers, also referred to as ``cell-site simulators'' or under the brand name ``StingRay,'' pose to U.S. Government personnel and national security. In addition to providing this report, the DNI would need to provide recommendations to Congress regarding possible policy changes to counter these devices. IMSI catchers send signals to mobile phones that appear to be coming from legitimate mobile networks. Once connected, the phones are used to track the locations of the users, which can be seen by whoever is controlling the IMSI catcher. The more advanced versions of these cell devices allow their owners even to access messages and phone call data. Many of us were shocked when a report came out last year that the Department of Homeland Security had found these devices around the national capital region. Even more concerning was that many of these were located around sensitive government buildings. My amendment would help Congress understand the proliferation of these devices around our Nation, with a focus on their prevalence in the national capital region. We need to know which actors, foreign or domestic, are deploying them and what Congress can do to ensure the safekeeping of our national security apparatus. Madam Chair, I urge support for this amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Illinois (Mr. Kinzinger). The amendment was agreed to. Amendment No. 18 Offered by Ms. Hill of California The Acting CHAIR. It is now in order to consider amendment No. 18 printed in part B of House Report 116-154. Ms. HILL of California. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7__. WHISTLEBLOWER DISCLOSURES TO CONGRESS AND COMMITTEES OF CONGRESS. Section 2302 of title 5, United States Code, is amended-- (1) in subsection (b)(8)(B), by inserting ``Congress (including any committee of Congress),'' before ``the Special Counsel''; and (2) in subsection (c)(2)(C)(iii)(III), by inserting after ``Congress'' the following: ``(including any committee of Congress)''. The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from California (Ms. Hill) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from California. Ms. HILL of California. Madam Chair, I yield myself as much time as I may consume. I rise in support of an amendment to H.R. 3494. I believe strongly in the principle of government transparency. It is something I ran on and talk about. I have spent my time in Congress working to deliver on accountability and transparency as the vice chair of the Oversight and Reform Committee and through other legislation. Today, I am introducing this amendment to clarify what Congress already believes to be the law, that Federal whistleblowers have the ability to make protected disclosures to the appropriate congressional committee of jurisdiction, not just members of the Intelligence Committee. At a time like this, we cannot afford ambiguity. This technical change will allow congressional committees to conduct their business in a more timely and effective manner. This amendment is not my first effort to protect whistleblowers, nor will it be my last. Those with the courage to stand up and say something is not right should have every single protection that we, as Congress, can offer to them. Madam Chair, I urge all of my colleagues to support this amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentlewoman from California (Ms. Hill). The amendment was agreed to. Amendment No. 19 Offered by Mr. Levin of Michigan The Acting CHAIR. It is now in order to consider amendment No. 19 printed in part B of House Report 116-154. Mr. LEVIN of Michigan. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 68, strike line 24 through page 69, line 3, and insert the following: (2) with respect to the unclassified portion of the report, made available on the public internet websites of the National Counterterrorism Center, Federal Bureau of Investigation, and Department of Homeland Security-- (A) not later than 30 days after submission to the appropriate congressional committees; and (B) in an electronic format that is fully indexed and searchable; and The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Michigan (Mr. Levin) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Michigan. Mr. LEVIN of Michigan. Madam Chair, according to the Anti-Defamation League, domestic extremists killed at least 50 people in the United States in 2018, a sharp increase from [[Page H5904]] the 37 extremist-related murders documented in 2017. Indeed, that is a 26 percent jump in 1 year. Given the disturbing rise of plots and incidents of domestic terrorism nationwide, I am pleased with the provision in this bill requiring that a joint report on domestic terrorism be submitted to Congress each year by the DNI, the FBI Director, and the Under Secretary of Homeland Security for Intelligence and Analysis. My amendment requires that this comprehensive report on domestic terrorism be made available on the public websites not just of the National Counterterrorism Center but also of the Federal Bureau of Investigation and the Department of Homeland Security. The amendment also specifies that the report should be made publicly available no later than 30 days after submission to the appropriate congressional committees. We can't let something this important be delayed over and over again. We need to ensure that this report is accessible not just to promote transparency but also to help policymakers nationwide recognize the scope of the threat that domestic terrorism poses and to encourage academic research necessary to understand the scourge of domestic terrorism better so that we might bring it to an end once and for all. I am talking about policymakers on the local and the State level as well as the Federal level. Madam Chair, I thank, in particular, Chairman Schiff and his staff for their leadership on this bill and for working with me on this and other provisions. Madam Chair, I urge my colleagues to support this amendment, and I yield back the balance of my time The Acting CHAIR. The question is on the amendment offered by the gentleman from Michigan (Mr. Levin). The amendment was agreed to. Amendment No. 20 Offered by Mr. Schiff The Acting CHAIR. It is now in order to consider amendment No. 20 printed in part B of House Report 116-154. Mr. SCHIFF. Madam Chair, as the designee of the gentleman from New Jersey (Mr. Malinowski), I rise to offer an amendment. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 49, after line 13, insert the following new paragraph: (7) An assessment and identification of the technological and financial support provided by United States-based companies, including technological support for the development of facial recognition capabilities or technologies for digital surveillance, social control, or censorship, and financial support, including from financial institutions, investment vehicles, and pension funds, to China-based companies or Chinese government entities providing material support to the digital surveillance or repression of Uyghur and other ethnic minorities in Xinjiang by the Xinjiang authorities. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from California (Mr. Schiff) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from California. Mr. SCHIFF. Madam Chair, I rise to support this amendment, which adds an additional requirement to section 502, a report on the repression of ethnic Muslim minorities in the Xinjiang region of the People's Republic of China. The human rights crisis underway in Xinjiang is staggering in scale. Open-source analysis based on extensive reviews of satellite imagery and Chinese Government documents has concluded that as many as 1.5 million Muslims could be held in internment camps by the Chinese Government. Despite this body of evidence, the executive branch has rebuffed attempts to clearly describe the scope and scale of this crisis. H.R. 3494 calls for a comprehensive U.S. Government assessment that addresses the number of persons detained, a description of forced labor practices in the camps, and an assessment of the surveillance, detection, and control methods associated with China's new high-tech policing model. Mr. Malinowski's amendment adds an additional requirement for the intelligence community to assess and identify the technological and financial support provided by U.S.-based companies to the Chinese Government's repressive operations in Xinjiang. In light of the alarming public reports detailing cooperation between prominent U.S. companies and foreign companies aiding and abetting the Chinese Communist Party's surveillance state, this amendment could not be timelier. Madam Chair, I thank my colleagues, particularly Mr. Malinowski for his tireless work to support human rights. Madam Chair, I am happy to support the amendment. I urge support for the amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from California (Mr. Schiff). The amendment was agreed to. Amendment No. 21 Offered by Mr. Schiff The Acting CHAIR. It is now in order to consider amendment No. 21 printed in part B of House Report 116-154. Mr. SCHIFF. Madam Chair, as the designee of the gentlewoman from Massachusetts (Ms. Pressley), I rise to offer an amendment. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 62, after line 4 insert the following: (6) Information regarding any training or resources provided by the Federal Bureau of Investigation, the Department of Homeland Security, or the National Counterterrorism Center, to assist Federal, State, local, and Tribal law enforcement agencies in understanding, detecting, deterring, and investigating acts of domestic terrorism, including the date, type, subject, and recipient agencies of such training or resources. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from California (Mr. Schiff) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from California. Mr. SCHIFF. Madam Chair, this amendment clarifies section 602 of the bill dealing with domestic terrorism. Section 602 would require the FBI, DHS, and the National Counterterrorism Center to produce an annual report and strategic intelligence assessment on domestic terrorism. Ms. Pressley's amendment would require more information regarding any training or resources on domestic terrorism provided by the FBI, DHS, and National Counterterrorism Center to assist Federal, State, local, and Tribal law enforcement agencies. This would enhance oversight and transparency in this area and give us a better sense of how domestic terrorism training has been provided to law enforcement throughout the United States. Madam Chair, I thank my colleague for her work, and I urge our colleagues to support the amendment and the underlying bill. I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from California (Mr. Schiff). The amendment was agreed to. Amendment No. 22 Offered by Mr. Rose of New York The Acting CHAIR. It is now in order to consider amendment No. 22 printed in part B of House Report 116-154. Mr. ROSE of New York. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7___. REPORT CONTAINING THREAT ASSESSMENT ON TERRORIST USE OF CONVENTIONAL AND ADVANCED CONVENTIONAL WEAPONS. (a) Report Required.--Not later than 180 days after the date of the enactment of this Act, and annually thereafter for a period of 4 years, the Under Secretary of Homeland Security for Intelligence and Analysis, in coordination with the Director of the Federal Bureau of Investigation, shall develop and submit to the entities in accordance with subsection (b) a report containing a threat assessment regarding the availability of conventional weapons, including conventional weapons lacking serial numbers, and advanced conventional weapons, for use in furthering acts of terrorism, including the provision of material support or resources to a foreign terrorist organization and to individuals or groups supporting or engaging in domestic terrorism. (b) Dissemination of Report.--Consistent with the protection of classified and confidential unclassified information, the Under Secretary shall-- (1) submit the initial report required under subsection (a) to Federal, State, local, and Tribal law enforcement officials, including officials who operate within State, local, and [[Page H5905]] regional fusion centers under the Department of Homeland Security State, Local, and Regional Fusion Center Initiative established by section 210A of the Homeland Security Act of 2002 (6 U.S.C. 124h); and (2) submit each report required under subsection (a) to the appropriate congressional committees. (c) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee on the Judiciary of the House of Representatives; and (B) the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee on the Judiciary of the Senate. (2) Domestic terrorism.--The term ``domestic terrorism'' has the meaning given that term in section 2331 of title 18, United States Code. (3) Foreign terrorist organization.--The term ``foreign terrorist organization'' means an organization designated as a foreign terrorist organization under section 219 of the Immigration and Nationality Act (8 U.S.C. 1189). The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from New York (Mr. Rose) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from New York. {time} 2115 Mr. ROSE of New York. Madam Chair, I yield myself such time as I may consume. Madam Chair, I rise in support of my amendment to H.R. 3494. Our law enforcement officers stand on the front lines of defending the American people from domestic and international terrorist threats. It is our job as Congress to make sure that they have the most up-to- date information about the evolving threats posed by terrorism, including the use of advanced conventional weapons. One such evolving threat is the danger posed by terrorist use of conventional and advanced conventional weapons, including unregistered weapons that lack serial numbers. To address this issue, my amendment to the Intelligence Authorization Act will require the Department of Homeland Security to conduct an annual assessment of the domestic and international terrorist threats posed by conventional weapons as well as advanced conventional weapons. This is a simple, straightforward amendment that seeks to put important information about terrorist threats in the hands of our law enforcement officers. Madam Chair, law enforcement needs to have the information they need to understand these threats. The assessment of the terrorist threat posed by conventional weapons and advanced conventional weapons that I call for in this amendment will do just that. Additionally, this assessment will then be shared with Congress and with law enforcement so that our frontline officers have the information they need to understand these evolving threats. Madam Chair, I urge all of my colleagues to support my amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from New York (Mr. Rose). The amendment was agreed to. Amendment No. 23 Offered by Mr. Rose of New York The Acting CHAIR. It is now in order to consider amendment No. 23 printed in part B of House Report 116-154. Mr. ROSE of New York. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 79, line 19, insert ``, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Homeland Security of the House of Representatives'' after ``congressional intelligence committees''. At the end of title VII, add the following new section: SEC. 7___. ASSESSMENT OF HOMELAND SECURITY VULNERABILITIES ASSOCIATED WITH CERTAIN RETIRED AND FORMER PERSONNEL OF THE INTELLIGENCE COMMUNITY. (a) Assessment Required.--Not later than the date that is 120 days after submission of the report required under section 704 of this Act, and annually thereafter, the Director of National Intelligence, in coordination with the Under Secretary of Homeland Security for Intelligence and Analysis, the Director of the Federal Bureau of Investigation, the Director of the Central Intelligence Agency, and the Director of the Defense Counterintelligence and Security Agency, shall submit to the appropriate congressional committees an assessment of the homeland security vulnerabilities associated with retired and former personnel of intelligence community providing covered intelligence assistance. (b) Form.--The assessment under subsection (a) may be submitted in classified form. (c) Definitions.--In this section: (1) Appropriate congressional committees.--The term ``appropriate congressional committees'' means-- (A) the congressional intelligence committees; (B) the Committee on Homeland Security and Governmental Affairs of the Senate; and (C) the Committee on Homeland Security of the House of Representatives. (2) Covered intelligence assistance.--The term ``covered intelligence assistance'' has the meaning given that term in section 704 of this Act. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from New York (Mr. Rose) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from New York. Mr. ROSE of New York. Madam Chair, I yield myself such time as I may consume. Madam Chair, I rise to offer an amendment to title VII of H.R. 3494, entitled, ``Reports and Other Matters.'' As a combat veteran, I can tell you firsthand that intelligence drives operations, and it is imperative to the security of our homeland that the U.S. maintains its superiority when it comes to intelligence. However, a growing concern I have is when our former or retired intelligence professionals choose to later work for a foreign government. We saw it with former NSA employees working as hackers for the United Arab Emirates' Project Raven. Interviews and documents showed that the NSA's surveillance techniques were central to the country's monitoring efforts. Reporting showed that American ex-intelligence personnel would target the UAE Government's opponents online. This information, provided to them by the country's NSA equivalent, didn't just target terrorists, but also human rights activists and journalists, those whom the UAE deemed unfavorable. It is concerning when our best and brightest go off to conduct or advise on intelligence operations for foreign governments that, in some cases, are against the very people our American ideals protect. We need to understand the nature and impact of this expertise in the hands of a foreign government. What are the homeland security implications of this? My amendment will do just that. It requires the Director of National Intelligence, in coordination with other intelligence community partners, to conduct an annual assessment of the homeland security vulnerabilities associated with former intelligence community employees providing intelligence assistance to a foreign government. Madam Chair, the invaluable training, tradecraft, and expertise developed by former or retired intelligence professionals to keep our country safe, to keep Americans safe, now in the hands of a foreign government for their benefit is absolutely chilling. My amendment will tackle these concerns head-on with an annual assessment of any homeland security vulnerabilities that may be associated with this capability, cultivated from years of service to our country, now being provided to foreign governments. Madam Chair, I urge all of my colleagues to support my amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from New York (Mr. Rose). The amendment was agreed to. Amendment No. 24 Offered by Mr. Pence The Acting CHAIR. It is now in order to consider amendment No. 24 printed in part B of House Report 116-154. Mr. PENCE. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: [[Page H5906]] SEC. 7___. EXPANSION OF AVAILABILITY OF FINANCIAL ASSETS OF IRAN TO VICTIMS OF TERRORISM. (a) Findings.--Congress makes the following findings: (1) On October 23, 1983, terrorists sponsored by the Government of Iran bombed the United States Marine barracks in Beirut, Lebanon. The terrorists killed 241 servicemen and injured scores more. (2) Those servicemen were killed or injured while on a peacekeeping mission. (3) Terrorism sponsored by the Government of Iran threatens the national security of the United States. (4) The United States has a vital interest in ensuring that members of the Armed Forces killed or injured by such terrorism, and the family members of such members, are able to seek justice. (b) Amendments.--Section 502 of the Iran Threat Reduction and Syria Human Rights Act of 2012 (22 U.S.C. 8772) is amended-- (1) in subsection (a)(1)-- (A) in subparagraph (A), by striking ``in the United States'' the first place it appears and inserting ``by or''; (B) in subparagraph (B), by inserting ``, or an asset that would be blocked if the asset were located in the United States,'' after ``unblocked)''; and (C) in the flush text at the end-- (i) by inserting after ``in aid of execution'' the following: ``, or to an order directing that the asset be brought to the State in which the court is located and subsequently to execution or attachment in aid of execution,''; and (ii) by inserting ``, without regard to concerns relating to international comity'' after ``resources for such an act''; and (2) in subsection (b)-- (A) by striking ``that are identified'' and inserting the following: ``that are-- ``(1) identified''; (B) by striking the period at the end and inserting ``; and''; and (C) by adding at the end the following: ``(2) identified in and the subject of proceedings in the United States District Court for the Southern District of New York in Peterson et al. v. Islamic Republic of Iran et al., Case No. 13 Civ. 9195 (LAP).''. (c) Report.-- (1) In general.--Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to Congress a report on threats against the United States military and defense interests, personnel, and their families, posed by organizations that are designated by the Secretary of State as a foreign terrorist organization pursuant to section 219 of the Immigration and Nationality Act (8 U.S.C. 1189) with connections to the Government of Iran, as determined by the Director. (2) Form.--The report under paragraph (1) shall be submitted in unclassified form, but may contain a classified annex. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Indiana (Mr. Pence) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Indiana. Mr. PENCE. Madam Chair, I rise in support of my amendment, which is deeply personal. Madam Chair, I was assigned to the 3rd Battalion, 3rd Marines. In 1983, my battalion was ordered to Beirut, Lebanon. On October 23 of that same year, an Iranian national affiliated with Hezbollah, a terror group founded, trained, and financially supported by the Iranian regime, drove a truck bomb into the U.S. barracks in Beirut, killing 241 servicemen, 220 of which were my fellow marines. It is by the grace of God that I am standing here today. My battalion shipped out 10 days before the bombing. I was lucky. I was able to come home to my wife, who was expecting our first child, and my family in Columbus, Indiana. As proud U.S. marines, Congressman Gallego and I authored this bipartisan, bicameral legislation to provide a sliver of justice for the 241 heroes who were not as lucky that day. Madam Chair, our amendment is simple. The OORAH Act would allow the families of the bombing victims to execute on the $1.6 billion in Iranian funds currently held by a European-based firm. These funds were laundered through New York before making their way to Europe, where they sit just outside the hand of justice. Regardless of the party you conference with or the district you represent, we can all agree that terrorists and those who support them financially must be held accountable for their actions. When I joined the Marines in 1979, I made a promise of Semper Fidelis. Semper Fi is a lifelong commitment held by every marine for the corps and America, a promise reciprocated by the corps to all marines. Madam Chair, we must uphold this promise. Marines are the first to fight, and this time we are fighting for the Gold Star families who lost their loved ones. Madam Chair, I urge my colleagues to support this amendment and stand with Congressman Gallego and me and our colleagues in the Senate to honor the faith and loyalty of the 241 American servicemen who made the ultimate sacrifice. Madam Chair, OORAH stands for Our Obligation to Recognize American Heroes, or as the Marines say, OORAH. Madam Chair, I reserve the balance of my time. Mr. GALLEGO. Madam Chair, I claim the time in opposition, although I am not opposed to the amendment. The Acting CHAIR. Without objection, the gentleman from Arizona is recognized for 5 minutes. There was no objection. Mr. GALLEGO. Madam Chair, I rise in proud support of the amendment sponsored by fellow marine and public servant, Mr. Pence. October 23, 1983, remains seared in the memory of all marines. On that day, over 300 innocent people were killed in a surprise terrorist attack sponsored by the Government of Iran. Most of the people killed 36 years ago were my brothers. They were U.S. marines. They were serving our country and doing their best to preserve the peace in war- torn Lebanon. We know that the wheels of justice turn slowly, Madam Chair. It took over 35 years for victims to get traction in U.S. courts. But now that they are getting that traction and winning judgments, marines in Congress are here to help to ensure that Iranian funds cannot be hidden from them in secret foreign bank accounts. This amendment helps the families of those killed and wounded by making sure that Iran is held liable for this attack. It makes it harder for Iran to hide money in overseas bank accounts when it should be paying for the pain and suffering of its victims. It shows that, even 36 years after the attack, we have not forgotten, and it once again proves that U.S. marines remain ``no better friend, no worse enemy.'' Madam Chair, I yield back the balance of my time. Mr. PENCE. Madam Chair, I thank the chairman and ranking member for their leadership and my colleague and fellow marine from Arizona (Mr. Gallego) for his faithful service and unwavering support on this legislation. Madam Chair, I yield back the balance of my time The Acting CHAIR. The question is on the amendment offered by the gentleman from Indiana (Mr. Pence). The amendment was agreed to. Amendment No. 25 Offered by Mr. Schiff The Acting CHAIR. It is now in order to consider amendment No. 25 printed in part B of House Report 116-154. Mr. SCHIFF. Madam Chair, as the designee of the gentlewoman from Michigan (Ms. Slotkin), I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 203, line 1, strike ``Report Required'' and insert ``report on foreign malign influence response''. Page 204, after line 10, insert the following new subsection: (c) Report on Ability to Identify Foreign Influence Efforts.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report concerning the ability of the intelligence community to-- (A) identify foreign influence efforts aimed at sowing discord or interfering, or both, in the political processes of the United States; and (B) report such efforts to appropriate authorities. (2) Contents.--The report under paragraph (1) shall include the following: (A) A description of the current level of ongoing communication and coordination across the intelligence community and law enforcement, including the Department of Justice, the Department of State, the Department of Homeland Security, and the Federal Bureau of Investigation, with respect to combating foreign influence efforts described in subparagraph (A) of such paragraph. (B) Identification of the offices or components of the departments and agencies of the Federal Government that are tasked with any responsibility with respect to combating such foreign influence efforts. (C) Identification of the number of personnel within each element of the intelligence community and other elements of [[Page H5907]] the Federal Government that are focused on combating such foreign influence efforts, whether on a temporary or permanent basis. (D) Identification of the legal authorities that are most relevant to combating such foreign influence efforts, including-- (i) which such legal authorities pose challenges or barriers to effectively combat such foreign influence efforts and a description of the reasons for such challenges or barriers; and (ii) which such legal authorities pose challenges or barriers with respect to elements of the intelligence community and other elements of the Federal Government working together to combat such foreign influence efforts and a description of the reasons for such challenges or barriers. (E) A description of the current level of communication or engagement between the intelligence community and private internet-platforms or social media companies with respect to combating such foreign influence efforts. (F) A description of the additional resources the Director determines is necessary to effectively identify such foreign influence efforts, and the roles and responsibilities across the intelligence community that would best support the shared objective of identifying such foreign influence efforts. (G) Any other matters the Director determines appropriate. (3) Form.--The report under paragraph (1) may be submitted in classified form. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from California (Mr. Schiff) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from California. Mr. SCHIFF. Madam Chair, the Intelligence Committee has invested considerable time and focus the last 3 years to study the painful lessons of foreign interference in our democratic system. Ms. Slotkin's amendment will enhance the work of the committee by compelling the Director of National Intelligence to identify barriers that prevent the intelligence community from fully understanding the scope and impact of these threats. Our adversaries are committed to employing a whole-of-government approach to execute their plan to disrupt our democratic system. In order to defeat these efforts, we must understand the scope of the threat. We must enlist our intelligence community to identify the scope of and the means by which our adversaries are attempting to achieve their goal. This amendment sets forth a framework by which the DNI will report to Congress on these threats and identify whether there are gaps in the IC's authorities that hinder its ability to find, assess, and enable action on foreign influence campaigns. Madam Chair, I believe this is an important amendment. I encourage my colleagues to support it, as well as the underlying bill, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from California (Mr. Schiff). The amendment was agreed to. {time} 2130 Amendment No. 26 Offered by Mr. Schiff The Acting CHAIR. It is now in order to consider amendment No. 26 printed in part B of House Report 116-154. Mr. SCHIFF. Madam Chairwoman, I rise as the designee of Ms. Slotkin to offer her second amendment. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title V, add the following new section: SEC. 507. ANNUAL REPORTS ON INFLUENCE OPERATIONS AND CAMPAIGNS IN THE UNITED STATES BY THE RUSSIAN FEDERATION. (a) Reports.--Title XI of the National Security Act of 1947 (50 U.S.C. 3231 et seq.), as amended by section 501, is further amended by adding at the end the following new section: ``SEC. 1107. ANNUAL REPORTS ON INFLUENCE OPERATIONS AND CAMPAIGNS IN THE UNITED STATES BY THE RUSSIAN FEDERATION. ``(a) Requirement.--On an annual basis, the Director of the National Counterintelligence and Security Center shall submit to the congressional intelligence committees a report on the influence operations and campaigns in the United States conducted by the Russian Federation. ``(b) Contents.--Each report under subsection (a) shall include the following: ``(1) A description and listing of the Russian organizations and persons involved in influence operations and campaigns operating in the United States as of the date of the report. ``(2) An assessment of organizations that are associated with or receive funding from organizations and persons identified in paragraph (1), particularly such entities operating in the United States. ``(3) A description of the efforts by the organizations and persons identified in paragraph (1) to target, coerce, and influence populations within the United States. ``(4) An assessment of the activities of the organizations and persons identified in paragraph (1) designed to influence the opinions of elected leaders of the United States or candidates for election in the United States. ``(5) With respect to reports submitted after the first report, an assessment of the change in goals, tactics, techniques, and procedures of the influence operations and campaigns conducted by the organizations and persons identified in paragraph (1). ``(c) Coordination.--In carrying out subsection (a), the Director shall coordinate with the Director of the Federal Bureau of Investigation, the Director of the Central Intelligence Agency, the Director of the National Security Agency, and any other relevant head of an element of the intelligence community. ``(d) Form.--Each report submitted under subsection (a) shall be submitted in unclassified form, but may include a classified annex.''. (b) Clerical Amendment.--The table of contents in the first section of the National Security Act of 1947, as amended by section 501, is further amended by inserting after the item relating to section 1106 the following new item: ``Sec. 1107. Annual reports on influence operations and campaigns in the United States by the Russian Federation.' '''. (c) Initial Report.--The Director of the National Counterintelligence and Security Center shall submit to the congressional intelligence committees the first report under section 1107 of the National Security Act of 1947, as added by subsection (a), by not later than 180 days after the date of the enactment of this Act. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from California (Mr. Schiff) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from California. Mr. SCHIFF. Madam Chairwoman, we are all too familiar with the influence operations perpetrated by the Russian Government during the 2016 U.S. election. As the IC articulated in its January 2017 intelligence community assessment, those operations were merely the most recent in a long history of efforts to undermine the liberal democratic order. We must remain vigilant and fully informed about the operations executed by the Government of Russia to influence and undermine our democratic system. To that end, this amendment requires an annual report from the Director of National Intelligence containing information about the influence operations and campaigns in the U.S. by the Russian Federation. I support the amendment and urge my colleagues to do the same. I urge support for the amendment, and I yield back the balance of my time The Acting CHAIR (Mrs. Murphy). The question is on the amendment offered by the gentleman from California (Mr. Schiff). The amendment was agreed to. Amendment No. 27 Offered by Mr. Yoho The Acting CHAIR. It is now in order to consider amendment No. 27 printed in part B of House Report 116-154. Mr. YOHO. Madam Chairwoman, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 81, line 12, strike ``and'' at the end. Page 81, after line 12 insert the following (and redesignate the succeeding paragraph): (2) the threat to the national security of the United States posed by telecommunications companies that are subject to the jurisdiction of a foreign adversary; and Page 81, line 22, strike ``and'' at the end. Page 81, after line 22 insert the following (and redesignate the succeeding paragraph): (3) the threat to the national security of the United States from acquisition, importation, transfer, installation, or use of any communications technology by any person subject to the jurisdiction of the United States that involves communications technology designed, developed, manufactured or supplied by, controlled by, or subject to, the jurisdiction of a foreign adversary; and The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Florida (Mr. Yoho) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Florida. Mr. YOHO. Madam Chairwoman, I stand in support of an amendment I [[Page H5908]] have offered to the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act. I would like to thank Representative Nunes and Representative Schiff for their work on this important legislation. My proposed amendment includes within the report on 5G technology, the threat to the national security of the United States posed by telecommunication companies that are subject to the jurisdiction of a foreign adversary; namely, China, Russia, Iran, North Korea, and Syria. This will cover threats from acquisitions, importations, transfers, or use of communications technology by any person subject to the jurisdiction of the United States that involved technology designed, developed or controlled by a foreign adversary. As globalization continues to shape the world we live in, it is increasingly important that the United States prioritizes the security of our cyber networks and infrastructure. Today, China controls over 60 percent of the 5G networks in the world. In 2012, the House Permanent Select Committee on Intelligence deemed telecommunication companies, Huawei and ZTE national security threats. Seven years later, these companies continue to harm and undermine U.S. cybersecurity interests. Should the U.S. continue to let these companies and others like them continue to proliferate our networks, we are putting the security of our citizens at risk and our national security. We must continue our maximum pressure campaign on these malicious companies until we can ensure that these actors do not pose threats to our national security. I yield back the balance of my time. The CHAIR. The question is on the amendment offered by the gentleman from Florida (Mr. Yoho). The amendment was agreed to. Amendment No. 28 Offered by Mr. Yoho The Acting CHAIR. It is now in order to consider amendment No. 28 printed in part B of House Report 116-154. Mr. YOHO. Madam Chairwoman, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VI, add the following new section: SEC. 6__. REPORT CHARACTERIZING DOMESTIC TERRORISM ACTIVITY WITHIN THE UNITED STATES. (a) Report.--Not later than 150 days after the date of the enactment of this Act, the Director of the Federal Bureau of Investigation, in coordination with the Under Secretary of Homeland Security for Intelligence and Analysis, shall submit to the congressional intelligence committees a report on domestic terrorism activity within the United States. (b) Contents.--The report under subsection (a) shall include the following: (1) Activities conducted by domestic terrorist groups to restrict free speech using violence or intimidation. (2) Activities conducted by domestic terrorist groups that are dangerous to human life and are a violation of the criminal laws of the United States or of any State. (3) The prevalence of any domestic terrorist group's activities within the United States and abroad. (c) Coordination.--The Director shall carry out subsection (a) in coordination with the head of any other agency of the Federal Government that the Director determines appropriate. (d) Form.--The report submitted under subsection (a) shall be submitted in unclassified form, but may include a classified annex. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Florida (Mr. Yoho) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Florida. Mr. YOHO. Madam Chairwoman, I rise today to offer an amendment to H.R. 3494. My amendment No. 28 would require the FBI Director, in coordination with the Under Secretary of Homeland Security for Intelligence and Analysis to submit a report on domestic terrorist activity in the United States to the congressional intelligence committees. The report will detail: Activities conducted by domestic terrorist groups that restrict free speech using violence or intimidation; Activities conducted by domestic terrorist groups that are a danger to human life and are a violation of the criminal laws of the United States or any State; and The prevalence of any domestic terrorist group within the United States and abroad or any group that claimed to be domestic yet have ties to foreign groups like al-Qaida or other terrorist organizations. There are abhorrent groups of people within the United States today whose reasons for existence is violence. They do not respect the rule of law or the values of America. Yes, we have the First Amendment that allows for freedom of speech, religion, and assembly, but with those freedoms, one must exercise responsibility. They seek to inflict harm on Americans or specific groups of Americans because of their race, religion, personal beliefs, or other reasons. We have seen this evil in recent years with the deadly attacks on the Tree of Life synagogue in Pittsburgh, the attack on the Mother Emanuel AME Church in Charleston, and, sadly, too many more. Moreover, we have seen violence used by groups that restrict free speech, most recently with the attack on Andy Ngo in Portland by the group Antifa. We are the most extraordinary Nation because of our belief in and the adherence to the idea ``that all men are created equal, that they are endowed by their creator with certain unalienable rights, that among these are life, liberty, and the pursuit of happiness,'' with the rule of law included. Groups that threaten these notions threaten our country and our very form of government. It is imperative that Congress be informed of domestic terrorist activities and understand the prevalence of these activities. By keeping Congress informed of these activities, we, as legislators, may continue to ensure laws are appropriately crafted to protect all Americans and safeguard the liberties we hold dear. I encourage my colleagues to support this amendment, and I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Florida (Mr. Yoho). The amendment was agreed to. Amendment No. 29 Offered by Ms. Omar The Acting CHAIR. It is now in order to consider amendment No. 29 printed in part B of House Report 116-154. Ms. OMAR. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 7__. REPORT ON TERRORIST SCREENING DATABASE. (a) Report.--Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence and the Secretary of State shall jointly submit to the congressional intelligence committees, the Committee on Foreign Affairs of the House of Representatives, and the Committee on Foreign Relations of the Senate a report on the terrorist screening database of the Federal Bureau of Investigation. (b) Matters Included.--The report under subsection (a) shall identify the following: (1) Which foreign countries receive access to the terrorist screening database. (2) Which foreign countries have successfully petitioned to add individuals to the terrorist screening database. (3) What standards exist for determining which countries get access to the terrorist screening database. (4) The extent to which the human rights record of the government of a foreign country is considered in the determination to give the country access to the terrorist screening database. (5) What procedures, if any, exist to remove access to the terrorist screening database from a foreign country. (6) What procedures, if any, exist to inform an individual, or the legal counsel of an individual, of the placement of the individual on the terrorist screening database. (c) Form.--The report under subsection (a) shall be submitted in unclassified form, but may include a classified annex. The Acting CHAIR. Pursuant to House Resolution 491, the gentlewoman from Minnesota (Ms. Omar) and a Member opposed each will control 5 minutes. The Chair recognizes the gentlewoman from Minnesota. Ms. OMAR. Madam Chairwoman, my amendment mandates reporting on the foreign governments with whom we share access to the Terrorist Screening Database. The database is shared with more than 60 foreign governments, including countries with appalling human rights records, such as Saudi Arabia and China. [[Page H5909]] An FBI official has acknowledged in sworn testimony that it has never stopped sharing watch-list information with a foreign government because of that government's human rights abuses. Many of the people who are included in the database have never been charged with a crime, and, yet, we share sensitive information about them with the same government that murdered Jamal Khashoggi. I have also received credible reports that there have been Uighurs added to the database at the request of the Chinese Government. I ask the Chair to think about that. There is universal outrage in Washington about the treatment of the Uighur population in China. What are we talking about? Let's be clear. These are the precursors to genocide. And while it is happening, while Members of both sides of the aisle and the Secretary of State are condemning what is happening, we are allowing the Chinese Government to add Uighurs to the Terrorist Screening Database. We are allowing them to track Uighurs in the United States. This is probably the most appalling aspect of our sharing this information with governments that violate human rights, but it is not the only appalling aspect. One thing we know for sure in almost two decades that we have been fighting the war on terror, is that dictators have been more than happy to call whoever opposes them a terrorist. The Saudis, whose family has direct, proven, and clear financial links to al-Qaida, are given access to this database. The Saudis, who have rounded up human rights activists, tortured them, mass executed them, and claiming they are terrorists, get to add people on this list. It is entirely possible that they get to add American citizens to this list. This isn't compatible with a free society. It isn't compatible with our essential concepts of civil liberties. It is important to note that the evidentiary standard for being placed in the database is very low. The government only needs reasonable suspicion that someone is involved in terrorism, which is not even enough to charge someone with a crime. It is also significant that individuals added to this database are not informed of their placements and have suffered preventable harms as a result. So my amendment asks some basic questions, questions that we as Members of Congress have not only a right to, but a responsibility to ask. I ask my colleagues to support this amendment. If they are concerned about civil liberties, they should be concerned about this. If they are concerned about human rights abroad, they should be concerned about this. And no matter how they feel about the database itself, this amendment asks that we need answers in order to make informed decisions about our national security policy. Madam Chair, I yield 1 minute to the gentleman from California (Mr. Schiff), the chairman. Mr. SCHIFF. Madam Chair, I thank the gentlewoman for yielding to me. This amendment requires a report on a number of civil liberties questions regarding the Terrorist Screening Database. We need to structure our counterterrorism programs by thinking about not only what we can do and what is constitutional to do, but what we should be doing so that we get the maximum security benefit along with the maximum privacy. Our aim is a healthy equilibrium between security and privacy. With that in mind, I support my colleague's amendment which will assist the Intelligence Committee with its oversight and inform the public about how the privacy security balance is being struck. I want to thank Ms. Omar for her work, and I encourage my colleagues to support her amendment. Ms. OMAR. Madam Chair, I am thankful to the chairman and ranking member for their support, and with that, I yield back the balance of my time The Acting CHAIR. The question is on the amendment offered by the gentlewoman from Minnesota (Ms. Omar). The amendment was agreed to. The Acting CHAIR. The Chair understands that amendment No. 30 will not be offered. Amendment No. 31 Offered by Mr. Crow The Acting CHAIR. It is now in order to consider amendment No. 31 printed in part B of House Report 116-154. Mr. CROW. Madam Chair, I have an amendment at the desk. The Acting CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: At the end of title VII, add the following new section: SEC. 708. SENSE OF CONGRESS ON AMERICANS AND FOREIGN INDIVIDUALS WHO CONTRIBUTE TO THE NATIONAL SECURITY OF THE UNITED STATES WHO ARE HELD CAPTIVE. It is the sense of Congress that the United States Government should-- (1) prioritize the safety and protection for all Americans, including citizens of the United States who are wrongfully detained by foreign governments; (2) make every effort to bring these Americans back home; and (3) provide assistance to and, as appropriate, advocate on behalf of foreign individuals detained abroad who contributed directly to the national security of the United States. The Acting CHAIR. Pursuant to House Resolution 491, the gentleman from Colorado (Mr. Crow) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Colorado. Mr. CROW. Madam Chairwoman, I rise today to offer an amendment to highlight the importance of honoring our commitments, to keep Americans and those who serve our country around the world safe. Unfortunately, by virtue of being Americans and representing the values of our country, our citizens are sometimes targeted by adversarial countries and wrongfully detained. In those situations, we must leverage all available tools and resources at our disposal to secure their safe return. We must employ a whole-of-government approach to return Americans wrongfully detained in foreign countries back to their families. {time} 2145 We are a nation founded on the principle of due process. We must hold other countries to the same expectations of equal treatment under the law. We must also support the foreign nationals who put their lives and the lives of their families at risk to contribute to our national security. We owe these extraordinary individuals our gratitude for their assistance, particularly in light of the dangers that they often face. Despite precautions, in some cases, their contributions have led to their detainment or imprisonment. One of our greatest strengths is the network of individuals and nations that want to help us because they can rely on us to keep our promises. That is why we must continue to stand by our commitments to our partners, particularly when they are persecuted for their contributions to the U.S. Simply stated, we must honor our commitments to those who have stood by us. This amendment asserts the importance of this position, not just because it is in the best interests of the United States, but because it is the right thing to do, and that moral responsibility is an essential virtue of being an American. Madam Chair, I yield 30 seconds to the gentleman from California (Mr. Schiff). Mr. SCHIFF. Madam Chair, I thank the gentleman for yielding. Securing the safe release of Americans held abroad is a top and urgent priority. Congress can play a role in keeping this issue at the forefront of public consciousness. With that in mind, I salute my colleague for all of his efforts. I thank Mr. Crow for drafting this sense of Congress that keeps the spotlight on this important issue. Madam Chair, I urge my colleagues to support the amendment and the underlying bill. Mr. CROW. Madam Chair, in closing, I urge my colleagues to support my amendment and uphold our obligations to our fellow Americans and partners around the world. We are a country that keeps its promises, and we must do so well into the future. Madam Chair, I yield back the balance of my time. The Acting CHAIR. The question is on the amendment offered by the gentleman from Colorado (Mr. Crow). The amendment was agreed to. [[Page H5910]] Mr. SCHIFF. Madam Chair, I move that the Committee do now rise. The motion was agreed to. Accordingly, the Committee rose; and the Speaker pro tempore (Ms. Omar) having assumed the chair, Mrs. Murphy, Acting Chair of the Committee of the Whole House on the state of the Union, reported that that Committee, having had under consideration the bill (H.R. 3494) to authorize appropriations for fiscal year 2020 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, had come to no resolution thereon. ____________________ [Congressional Record Volume 165, Number 120 (Wednesday, July 17, 2019)] [House] [Pages H5978-H5980] From the Congressional Record Online through the Government Publishing Office [www.gpo.gov] DAMON PAUL NELSON AND MATTHEW YOUNG POLLARD INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2018, 2019, AND 2020 The SPEAKER pro tempore. Pursuant to House Resolution 491 and rule XVIII, the Chair declares the House in the Committee of the Whole House on the state of the Union for the further consideration of the bill, H.R. 3494. Will the gentleman from New York (Mr. Espaillat) kindly take the chair. {time} 1825 In the Committee of the Whole Accordingly, the House resolved itself into the Committee of the Whole House on the state of the Union for the further consideration of the bill (H.R. 3494) to authorize appropriations for fiscal year 2020 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, with Mr. Espaillat (Acting Chair) in the chair. The Clerk read the title of the bill. The Acting CHAIR. When the Committee of the Whole rose on Tuesday, July 16, 2019, amendment No. 31 printed in part B of House Report 116- 154 offered by the gentleman from Colorado (Mr. Crow) had been disposed of. Announcement by the Acting Chair The Acting CHAIR. Pursuant to clause 6 of rule XVIII, proceedings will now resume on those amendments printed in part B of House Report 116-154 on which further proceedings were postponed, in the following order: Amendment No. 7 by Mr. Chabot of Ohio. Amendment No. 11 by Mr. Kennedy of Massachusetts. The Chair will reduce to 2 minutes the minimum time for any electronic vote in this series. Amendment No. 7 Offered by Mr. Chabot The Acting CHAIR. The unfinished business is the demand for a recorded vote on the amendment offered by the gentleman from Ohio (Mr. Chabot) on which further proceedings were postponed and on which the noes prevailed by voice vote. The Clerk will redesignate the amendment. The Clerk redesignated the amendment. Recorded Vote The Acting CHAIR. A recorded vote has been demanded. A recorded vote was ordered. The Acting CHAIR. This will be a 2-minute vote. The vote was taken by electronic device, and there were--ayes 178, noes 255, not voting 5, as follows: [Roll No. 490] AYES--178 Aderholt Allen Amash Amodei Armstrong Arrington Babin Bacon Baird Balderson Banks Barr Bergman Biggs Bilirakis Bishop (UT) Bost Brady Brooks (AL) Brooks (IN) Buck Bucshon Budd Burchett Burgess Byrne Calvert Carter (GA) Carter (TX) Chabot Cheney Cline Cloud Cole Collins (GA) Collins (NY) Comer Conaway Cook Crawford Crenshaw Curtis Davidson (OH) Davis, Rodney DesJarlais Diaz-Balart Duffy Duncan Dunn Emmer Estes Ferguson Fleischmann Flores Foxx (NC) Fulcher Gianforte Gibbs Gohmert Gonzalez (OH) Gonzalez-Colon (PR) Gooden Gosar Granger Graves (GA) Graves (MO) Green (TN) Griffith Grothman Guest Guthrie Hagedorn Harris Hartzler Hern, Kevin Hice (GA) Higgins (LA) Hill (AR) Holding Huizenga Hunter Johnson (LA) Johnson (OH) Johnson (SD) Jordan Joyce (OH) Joyce (PA) Keller Kelly (MS) Kelly (PA) King (IA) King (NY) Kinzinger Kustoff (TN) LaHood LaMalfa Lamborn Latta Lesko Long Loudermilk Lucas Luetkemeyer Marchant Marshall Massie McCarthy McClintock McKinley Meadows Meuser Miller Mitchell Moolenaar Mooney (WV) Mullin Newhouse Norman Nunes Olson Palazzo Palmer Pence Perry Posey Radewagen Ratcliffe Reschenthaler Rice (SC) Riggleman Roby Rodgers (WA) Roe, David P. Rogers (AL) Rogers (KY) Rose, John W. Rouzer Roy Rutherford Scalise Schweikert Scott, Austin Sensenbrenner Shimkus Simpson Smith (MO) Smith (NE) Smucker Spano Stauber Steil Steube Stewart Stivers Taylor Thornberry Timmons Tipton Turner Wagner Walberg Walden Walorski Waltz Watkins Weber (TX) Webster (FL) Wenstrup Westerman Williams Wilson (SC) Wittman Womack Woodall Wright Yoho Young Zeldin NOES--255 Adams Aguilar Allred Axne Barragan Bass Beatty Bera Beyer Bishop (GA) Blumenauer Blunt Rochester Bonamici Boyle, Brendan F. Brindisi Brown (MD) Brownley (CA) Buchanan Bustos Butterfield Carbajal Cardenas Carson (IN) Cartwright Case Casten (IL) Castor (FL) Castro (TX) Chu, Judy Cicilline Cisneros Clark (MA) Clarke (NY) Clay Cleaver Clyburn Cohen Connolly Cooper Correa Costa Courtney Cox (CA) Craig Crist Crow Cuellar Cummings Cunningham Davids (KS) Davis (CA) Davis, Danny K. Dean DeFazio DeGette DeLauro DelBene Delgado Demings DeSaulnier Deutch Dingell Doggett Doyle, Michael F. Engel Escobar Eshoo Espaillat Evans Finkenauer Fitzpatrick Fletcher Fortenberry Foster Frankel Fudge Gaetz Gallagher Gallego Garamendi Garcia (IL) Garcia (TX) Golden Gomez Gonzalez (TX) Gottheimer Graves (LA) Green, Al (TX) Grijalva Haaland Harder (CA) Hastings Hayes Heck Herrera Beutler Higgins (NY) Hill (CA) Himes Hollingsworth Horn, Kendra S. Horsford Houlahan Hoyer Huffman Hurd (TX) Jackson Lee Jayapal Jeffries Johnson (GA) Johnson (TX) Kaptur Katko Keating Kelly (IL) Kennedy Khanna Kildee Kilmer Kim Kind Kirkpatrick Krishnamoorthi Kuster (NH) Lamb Langevin Larsen (WA) Larson (CT) Lawrence Lawson (FL) Lee (CA) Lee (NV) Levin (CA) Levin (MI) Lewis Lieu, Ted Lipinski Loebsack Lofgren Lowenthal Lowey Lujan Luria Lynch Malinowski Maloney, Carolyn B. Maloney, Sean Mast Matsui McAdams McBath McCaul McCollum McEachin McGovern McHenry McNerney Meeks Meng Moore Morelle Moulton Mucarsel-Powell Murphy Nadler Napolitano Neal Neguse Norcross Norton O'Halleran Ocasio-Cortez Omar Pallone Panetta Pappas Pascrell Payne Perlmutter Peters Peterson Phillips Pingree Plaskett Pocan Porter Pressley Price (NC) Quigley Raskin Reed Rice (NY) Richmond Rooney (FL) Rose (NY) Rouda Roybal-Allard Ruiz Ruppersberger Rush Ryan Sablan Sanchez Sarbanes Scanlon Schakowsky Schiff Schneider Schrader Schrier Scott (VA) Scott, David Serrano Sewell (AL) Shalala Sherman Sherrill Sires Slotkin Smith (NJ) Smith (WA) Soto Spanberger Speier Stanton Stefanik Stevens Suozzi Swalwell (CA) Takano Thompson (CA) Thompson (MS) Thompson (PA) Titus Tlaib Tonko Torres (CA) Torres Small (NM) Trahan Trone Underwood Upton Van Drew Vargas Veasey Vela Velazquez Visclosky Wasserman Schultz Waters Watson Coleman Welch Wexton Wild Wilson (FL) Yarmuth NOT VOTING--5 Abraham Gabbard Hudson San Nicolas Walker Announcement by the Acting Chair The Acting CHAIR (during the vote). There is 1 minute remaining. [[Page H5979]] {time} 1828 Mr. GRAVES of Louisiana and Ms. HAALAND changed their vote from ``aye'' to ``no.'' So the amendment was rejected. The result of the vote was announced as above recorded. Amendment No. 11 Offered by Mr. Kennedy The Acting CHAIR. The unfinished business is the demand for a recorded vote on the amendment offered by the gentleman from Massachusetts (Mr. Kennedy) on which further proceedings were postponed and on which the ayes prevailed by voice vote. The Clerk will redesignate the amendment. The Clerk redesignated the amendment. Recorded Vote The Acting CHAIR. A recorded vote has been demanded. A recorded vote was ordered. The Acting CHAIR. This is a 2-minute vote. The vote was taken by electronic device, and there were--ayes 237, noes 196, not voting 5, as follows: [Roll No. 491] AYES--237 Adams Aguilar Allred Axne Barragan Bass Beatty Bera Beyer Bishop (GA) Blumenauer Blunt Rochester Bonamici Boyle, Brendan F. Brindisi Brown (MD) Brownley (CA) Bustos Butterfield Carbajal Cardenas Carson (IN) Cartwright Case Casten (IL) Castor (FL) Castro (TX) Chu, Judy Cicilline Cisneros Clark (MA) Clarke (NY) Clay Cleaver Clyburn Cohen Connolly Cooper Correa Costa Courtney Cox (CA) Craig Crist Crow Cuellar Cummings Cunningham Davids (KS) Davis (CA) Davis, Danny K. Dean DeFazio DeGette DeLauro DelBene Delgado Demings DeSaulnier Deutch Dingell Doggett Doyle, Michael F. Engel Escobar Eshoo Espaillat Evans Finkenauer Fletcher Foster Frankel Fudge Gallego Garamendi Garcia (IL) Garcia (TX) Golden Gomez Gonzalez (TX) Gottheimer Green, Al (TX) Grijalva Haaland Harder (CA) Hastings Hayes Heck Higgins (NY) Hill (CA) Himes Horn, Kendra S. Horsford Houlahan Hoyer Huffman Jackson Lee Jayapal Jeffries Johnson (GA) Johnson (TX) Kaptur Keating Kelly (IL) Kennedy Khanna Kildee Kilmer Kim Kind Kirkpatrick Krishnamoorthi Kuster (NH) Lamb Langevin Larsen (WA) Larson (CT) Lawrence Lawson (FL) Lee (CA) Lee (NV) Levin (CA) Levin (MI) Lewis Lieu, Ted Lipinski Loebsack Lofgren Lowenthal Lowey Lujan Luria Lynch Malinowski Maloney, Carolyn B. Maloney, Sean Matsui McAdams McBath McCollum McEachin McGovern McNerney Meeks Meng Moore Morelle Moulton Mucarsel-Powell Murphy Nadler Napolitano Neal Neguse Norcross Norton O'Halleran Ocasio-Cortez Omar Pallone Panetta Pappas Pascrell Payne Perlmutter Peters Peterson Phillips Pingree Plaskett Pocan Porter Pressley Price (NC) Quigley Raskin Rice (NY) Richmond Rooney (FL) Rose (NY) Rouda Roybal-Allard Ruiz Ruppersberger Rush Ryan Sablan Sanchez Sarbanes Scanlon Schakowsky Schiff Schneider Schrader Schrier Scott (VA) Scott, David Serrano Sewell (AL) Shalala Sherman Sherrill Sires Slotkin Smith (WA) Soto Spanberger Speier Stanton Stevens Suozzi Swalwell (CA) Takano Thompson (CA) Thompson (MS) Titus Tlaib Tonko Torres (CA) Torres Small (NM) Trahan Trone Underwood Van Drew Vargas Veasey Vela Velazquez Visclosky Wasserman Schultz Waters Watson Coleman Welch Wexton Wild Wilson (FL) Yarmuth NOES--196 Aderholt Allen Amash Amodei Armstrong Arrington Babin Bacon Baird Balderson Banks Barr Bergman Biggs Bilirakis Bishop (UT) Bost Brady Brooks (AL) Brooks (IN) Buchanan Buck Bucshon Budd Burchett Burgess Byrne Calvert Carter (GA) Carter (TX) Chabot Cheney Cline Cloud Cole Collins (GA) Collins (NY) Comer Conaway Cook Crawford Crenshaw Curtis Davidson (OH) Davis, Rodney DesJarlais Diaz-Balart Duffy Duncan Dunn Emmer Estes Ferguson Fitzpatrick Fleischmann Flores Fortenberry Foxx (NC) Fulcher Gaetz Gallagher Gianforte Gibbs Gohmert Gonzalez (OH) Gonzalez-Colon (PR) Gooden Gosar Granger Graves (GA) Graves (LA) Graves (MO) Green (TN) Griffith Grothman Guest Guthrie Hagedorn Harris Hartzler Hern, Kevin Herrera Beutler Hice (GA) Higgins (LA) Hill (AR) Holding Hollingsworth Huizenga Hunter Hurd (TX) Johnson (LA) Johnson (OH) Johnson (SD) Jordan Joyce (OH) Joyce (PA) Katko Keller Kelly (MS) Kelly (PA) King (IA) King (NY) Kinzinger Kustoff (TN) LaHood LaMalfa Lamborn Latta Lesko Long Loudermilk Lucas Luetkemeyer Marchant Marshall Massie Mast McCarthy McCaul McClintock McHenry McKinley Meadows Meuser Miller Mitchell Moolenaar Mooney (WV) Mullin Newhouse Norman Nunes Olson Palazzo Palmer Pence Perry Posey Radewagen Ratcliffe Reed Reschenthaler Rice (SC) Riggleman Roby Rodgers (WA) Roe, David P. Rogers (AL) Rogers (KY) Rose, John W. Rouzer Roy Rutherford Scalise Schweikert Scott, Austin Sensenbrenner Shimkus Simpson Smith (MO) Smith (NE) Smith (NJ) Smucker Spano Stauber Stefanik Steil Steube Stewart Stivers Taylor Thompson (PA) Thornberry Timmons Tipton Turner Upton Wagner Walberg Walden Walorski Waltz Watkins Weber (TX) Webster (FL) Wenstrup Westerman Williams Wilson (SC) Wittman Womack Woodall Wright Yoho Young Zeldin NOT VOTING--5 Abraham Gabbard Hudson San Nicolas Walker Announcement by the Acting Chair The Acting CHAIR (during the vote). There is 1 minute remaining. {time} 1833 So the amendment was agreed to. The result of the vote was announced as above recorded. The Acting CHAIR. There being no further amendments, under the rule, the Committee rises. Accordingly, the Committee rose; and the Speaker pro tempore (Mr. Sean Patrick Maloney of New York) having assumed the chair, Mr. Espaillat, Acting Chair of the Committee of the Whole House on the state of the Union, reported that that Committee, having had under consideration the bill (H.R. 3494) to authorize appropriations for fiscal year 2020 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, and, pursuant to House Resolution 491, he reported the bill, as amended by that resolution, back to the House with sundry further amendments adopted in the Committee of the Whole. The SPEAKER pro tempore. Under the rule, the previous question is ordered. Is a separate vote demanded on any amendment reported from the Committee of the Whole? If not, the Chair will put them en gros. The amendments were agreed to. The SPEAKER pro tempore. The question is on the engrossment and third reading of the bill. The bill was ordered to be engrossed and read a third time, and was read the third time. The SPEAKER pro tempore. The question is on the passage of the bill. The question was taken; and the Speaker pro tempore announced that the ayes appeared to have it. Mr. SCHIFF. Mr. Speaker, on that I demand the yeas and nays. The yeas and nays were ordered. The SPEAKER pro tempore. Pursuant to clause 9 of rule XX, this 5- minute vote on passage of the bill will be followed by a 5-minute vote on the motion to suspend the rules and pass H.R. 748. The vote was taken by electronic device, and there were--yeas 397, nays 31, not voting 4, as follows: [Roll No. 492] YEAS--397 Adams Aderholt Aguilar Allen Allred Amodei Armstrong Arrington Axne Babin Bacon Baird Balderson Banks Barr Barragan Bass Beatty Bera Bergman Beyer Bilirakis Bishop (GA) Bishop (UT) Blunt Rochester Bonamici Bost Boyle, Brendan F. Brady Brindisi Brooks (IN) Brown (MD) Brownley (CA) Buchanan Buck Bucshon Bustos Butterfield Byrne Calvert Carbajal Cardenas Carson (IN) Carter (GA) Carter (TX) Cartwright Case Casten (IL) Castor (FL) Castro (TX) Chabot Cheney Chu, Judy Cicilline Cisneros Clark (MA) Clarke (NY) Clay Cleaver [[Page H5980]] Cloud Clyburn Cohen Cole Collins (GA) Collins (NY) Conaway Connolly Cook Cooper Correa Costa Courtney Cox (CA) Craig Crawford Crenshaw Crist Crow Cuellar Cummings Cunningham Curtis Davids (KS) Davidson (OH) Davis (CA) Davis, Danny K. Davis, Rodney Dean DeGette DeLauro Delgado Demings DeSaulnier DesJarlais Deutch Diaz-Balart Dingell Doggett Doyle, Michael F. Duffy Dunn Emmer Engel Escobar Eshoo Espaillat Estes Evans Ferguson Finkenauer Fitzpatrick Fleischmann Fletcher Flores Fortenberry Foster Foxx (NC) Frankel Fudge Fulcher Gallagher Gallego Garamendi Garcia (IL) Garcia (TX) Gianforte Gibbs Golden Gomez Gonzalez (OH) Gonzalez (TX) Gooden Gottheimer Granger Graves (GA) Graves (LA) Graves (MO) Green (TN) Green, Al (TX) Griffith Grijalva Guest Guthrie Haaland Hagedorn Harder (CA) Hartzler Hastings Hayes Heck Hern, Kevin Herrera Beutler Hice (GA) Higgins (LA) Higgins (NY) Hill (AR) Hill (CA) Himes Holding Hollingsworth Horn, Kendra S. Horsford Houlahan Hoyer Huizenga Hunter Hurd (TX) Jackson Lee Jayapal Jeffries Johnson (GA) Johnson (LA) Johnson (OH) Johnson (SD) Johnson (TX) Joyce (OH) Joyce (PA) Kaptur Katko Keating Keller Kelly (IL) Kelly (MS) Kelly (PA) Kennedy Khanna Kildee Kilmer Kim Kind King (IA) King (NY) Kinzinger Kirkpatrick Krishnamoorthi Kuster (NH) Kustoff (TN) LaHood LaMalfa Lamb Lamborn Langevin Larsen (WA) Larson (CT) Latta Lawrence Lawson (FL) Lee (NV) Lesko Levin (CA) Levin (MI) Lewis Lieu, Ted Lipinski Loebsack Long Loudermilk Lowenthal Lowey Lucas Luetkemeyer Lujan Luria Lynch Malinowski Maloney, Carolyn B. Maloney, Sean Marchant Marshall Mast Matsui McAdams McBath McCarthy McCaul McCollum McEachin McGovern McHenry McKinley McNerney Meeks Meng Meuser Miller Mitchell Moolenaar Moore Morelle Moulton Mucarsel-Powell Mullin Murphy Nadler Napolitano Neal Neguse Newhouse Norcross Nunes O'Halleran Ocasio-Cortez Olson Omar Palazzo Pallone Palmer Panetta Pappas Pascrell Payne Pence Perlmutter Peters Peterson Phillips Pingree Pocan Porter Pressley Price (NC) Quigley Raskin Ratcliffe Reed Reschenthaler Rice (NY) Rice (SC) Richmond Riggleman Roby Rodgers (WA) Rogers (AL) Rogers (KY) Rooney (FL) Rose (NY) Rose, John W. Rouda Rouzer Roybal-Allard Ruiz Ruppersberger Rush Rutherford Ryan Sanchez Sarbanes Scalise Scanlon Schakowsky Schiff Schneider Schrader Schrier Schweikert Scott (VA) Scott, Austin Scott, David Sensenbrenner Serrano Sewell (AL) Shalala Sherman Sherrill Shimkus Simpson Sires Slotkin Smith (MO) Smith (NE) Smith (NJ) Smith (WA) Smucker Soto Spanberger Spano Speier Stanton Stauber Stefanik Steil Steube Stevens Stewart Stivers Suozzi Swalwell (CA) Takano Taylor Thompson (CA) Thompson (MS) Thompson (PA) Thornberry Timmons Tipton Titus Tonko Torres (CA) Torres Small (NM) Trahan Trone Turner Underwood Upton Van Drew Vargas Veasey Vela Velazquez Visclosky Wagner Walberg Walden Walorski Waltz Wasserman Schultz Waters Watkins Watson Coleman Weber (TX) Webster (FL) Welch Wenstrup Westerman Wexton Wild Williams Wilson (FL) Wilson (SC) Wittman Womack Woodall Wright Yarmuth Yoho Young Zeldin NAYS--31 Amash Biggs Blumenauer Brooks (AL) Budd Burchett Burgess Cline Comer DeFazio DelBene Duncan Gaetz Gohmert Gosar Grothman Harris Huffman Jordan Lee (CA) Lofgren Massie McClintock Meadows Mooney (WV) Norman Perry Posey Roe, David P. Roy Tlaib NOT VOTING--4 Abraham Gabbard Hudson Walker {time} 1842 So the bill was passed. The result of the vote was announced as above recorded. The title of the bill was amended so as to read: ``A bill to authorize appropriations for fiscal years 2018, 2019, and 2020 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes.''. A motion to reconsider was laid on the table. ____________________