[Congressional Record Volume 160, Number 150 (Wednesday, December 10, 2014)]
[House]
[Pages H8951-H8962]



     INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2014 AND 2015

  Mr. ROGERS of Michigan. Mr. Speaker, I move to suspend the rules and 
concur in the Senate amendment to the bill (H.R. 4681) to authorize 
appropriations for fiscal years 2014 and 2015 for intelligence and 
intelligence-related activities of the United States Government, the 
Community Management Account, and the Central Intelligence Agency 
Retirement and Disability System, and for other purposes.
  The Clerk read the title of the bill.
  The text of the Senate amendment is as follows:
  Senate amendment:

       Strike all after the enacting clause and insert the 
     following:

     SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

       (a) Short Title.--This Act may be cited as the 
     ``Intelligence Authorization Act for Fiscal Year 2015''.

[[Page H8952]]

       (b) Table of Contents.--The table of contents for this Act 
     is as follows:

Sec. 1. Short title; table of contents.
Sec. 2. Definitions.
Sec. 3. Budgetary effects.

                    TITLE I--INTELLIGENCE ACTIVITIES

Sec. 101. Authorization of appropriations.
Sec. 102. Classified Schedule of Authorizations.
Sec. 103. Personnel ceiling adjustments.
Sec. 104. Intelligence Community Management Account.

 TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

Sec. 201. Authorization of appropriations.

                     TITLE III--GENERAL PROVISIONS

                      Subtitle A--General Matters

Sec. 301. Increase in employee compensation and benefits authorized by 
              law.
Sec. 302. Restriction on conduct of intelligence activities.
Sec. 303. National intelligence strategy.
Sec. 304. Software licensing.
Sec. 305. Reporting of certain employment activities by former 
              intelligence officers and employees.
Sec. 306. Inclusion of Predominantly Black Institutions in intelligence 
              officer training program.
Sec. 307. Management and oversight of financial intelligence.
Sec. 308. Analysis of private sector policies and procedures for 
              countering insider threats.
Sec. 309. Procedures for the retention of incidentally acquired 
              communications.
Sec. 310. Clarification of limitation of review to retaliatory security 
              clearance or access determinations.
Sec. 311. Feasibility study on consolidating classified databases of 
              cyber threat indicators and malware samples.
Sec. 312. Sense of Congress on cybersecurity threat and cybercrime 
              cooperation with Ukraine.
Sec. 313. Replacement of locally employed staff serving at United 
              States diplomatic facilities in the Russian Federation.
Sec. 314. Inclusion of Sensitive Compartmented Information Facilities 
              in United States diplomatic facilities in the Russian 
              Federation and adjacent countries.

                         Subtitle B--Reporting

Sec. 321. Report on declassification process.
Sec. 322. Report on intelligence community efficient spending targets.
Sec. 323. Annual report on violations of law or executive order.
Sec. 324. Annual report on intelligence activities of the Department of 
              Homeland Security.
Sec. 325. Report on political prison camps in North Korea.
Sec. 326. Assessment of security of domestic oil refineries and related 
              rail transportation infrastructure.
Sec. 327. Enhanced contractor level assessments for the intelligence 
              community.
Sec. 328. Assessment of the efficacy of memoranda of understanding to 
              facilitate intelligence-sharing.
Sec. 329. Report on foreign man-made electromagnetic pulse weapons.
Sec. 330. Report on United States counterterrorism strategy to disrupt, 
              dismantle, and defeat al-Qaeda and its affiliated or 
              associated groups.
Sec. 331. Feasibility study on retraining veterans in cybersecurity.

     SEC. 2. DEFINITIONS.

       In this Act:
       (1) Congressional intelligence committees.--The term 
     ``congressional intelligence committees'' means--
       (A) the Select Committee on Intelligence of the Senate; and
       (B) the Permanent Select Committee on Intelligence of the 
     House of Representatives.
       (2) Intelligence community.--The term ``intelligence 
     community'' has the meaning given that term in section 3(4) 
     of the National Security Act of 1947 (50 U.S.C. 3003(4)).

     SEC. 3. BUDGETARY EFFECTS.

       The budgetary effects of this Act, for the purpose of 
     complying with the Statutory Pay-As-You-Go-Act of 2010, shall 
     be determined by reference to the latest statement titled 
     ``Budgetary Effects of PAYGO Legislation'' for this Act, 
     submitted for printing in the Congressional Record by the 
     Chairman of the Senate Budget Committee, provided that such 
     statement has been submitted prior to the vote on passage.

                    TITLE I--INTELLIGENCE ACTIVITIES

     SEC. 101. AUTHORIZATION OF APPROPRIATIONS.

       Funds are hereby authorized to be appropriated for fiscal 
     year 2015 for the conduct of the intelligence and 
     intelligence-related activities of the following elements of 
     the United States Government:
       (1) The Office of the Director of National Intelligence.
       (2) The Central Intelligence Agency.
       (3) The Department of Defense.
       (4) The Defense Intelligence Agency.
       (5) The National Security Agency.
       (6) The Department of the Army, the Department of the Navy, 
     and the Department of the Air Force.
       (7) The Coast Guard.
       (8) The Department of State.
       (9) The Department of the Treasury.
       (10) The Department of Energy.
       (11) The Department of Justice.
       (12) The Federal Bureau of Investigation.
       (13) The Drug Enforcement Administration.
       (14) The National Reconnaissance Office.
       (15) The National Geospatial-Intelligence Agency.
       (16) The Department of Homeland Security.

     SEC. 102. CLASSIFIED SCHEDULE OF AUTHORIZATIONS.

       (a) Specifications of Amounts and Personnel Levels.--The 
     amounts authorized to be appropriated under section 101 and, 
     subject to section 103, the authorized personnel ceilings as 
     of September 30, 2015, for the conduct of the intelligence 
     activities of the elements listed in paragraphs (1) through 
     (16) of section 101, are those specified in the classified 
     Schedule of Authorizations prepared to accompany the bill 
     H.R. 4681 of the One Hundred Thirteenth Congress.
       (b) Availability of Classified Schedule of 
     Authorizations.--
       (1) Availability.--The classified Schedule of 
     Authorizations referred to in subsection (a) shall be made 
     available to the Committee on Appropriations of the Senate, 
     the Committee on Appropriations of the House of 
     Representatives, and to the President.
       (2) Distribution by the president.--Subject to paragraph 
     (3), the President shall provide for suitable distribution of 
     the classified Schedule of Authorizations, or of appropriate 
     portions of the Schedule, within the executive branch.
       (3) Limits on disclosure.--The President shall not publicly 
     disclose the classified Schedule of Authorizations or any 
     portion of such Schedule except--
       (A) as provided in section 601(a) of the Implementing 
     Recommendations of the 9/11 Commission Act of 2007 (50 U.S.C. 
     3306(a));
       (B) to the extent necessary to implement the budget; or
       (C) as otherwise required by law.

     SEC. 103. PERSONNEL CEILING ADJUSTMENTS.

       (a) Authority for Increases.--The Director of National 
     Intelligence may authorize employment of civilian personnel 
     in excess of the number authorized for fiscal year 2015 by 
     the classified Schedule of Authorizations referred to in 
     section 102(a) if the Director of National Intelligence 
     determines that such action is necessary to the performance 
     of important intelligence functions, except that the number 
     of personnel employed in excess of the number authorized 
     under such section may not, for any element of the 
     intelligence community, exceed 3 percent of the number of 
     civilian personnel authorized under such Schedule for such 
     element.
       (b) Treatment of Certain Personnel.--The Director of 
     National Intelligence shall establish guidelines that govern, 
     for each element of the intelligence community, the treatment 
     under the personnel levels authorized under section 102(a), 
     including any exemption from such personnel levels, of 
     employment or assignment in--
       (1) a student program, trainee program, or similar program;
       (2) a reserve corps or as a reemployed annuitant; or
       (3) details, joint duty, or long term, full-time training.
       (c) Notice to Congressional Intelligence Committees.--The 
     Director of National Intelligence shall notify the 
     congressional intelligence committees in writing at least 15 
     days prior to each exercise of an authority described in 
     subsection (a).

     SEC. 104. INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT.

       (a) Authorization of Appropriations.--There is authorized 
     to be appropriated for the Intelligence Community Management 
     Account of the Director of National Intelligence for fiscal 
     year 2015 the sum of $507,400,000. Within such amount, funds 
     identified in the classified Schedule of Authorizations 
     referred to in section 102(a) for advanced research and 
     development shall remain available until September 30, 2016.
       (b) Authorized Personnel Levels.--The elements within the 
     Intelligence Community Management Account of the Director of 
     National Intelligence are authorized 794 positions as of 
     September 30, 2015. Personnel serving in such elements may be 
     permanent employees of the Office of the Director of National 
     Intelligence or personnel detailed from other elements of the 
     United States Government.
       (c) Classified Authorizations.--
       (1) Authorization of appropriations.--In addition to 
     amounts authorized to be appropriated for the Intelligence 
     Community Management Account by subsection (a), there are 
     authorized to be appropriated for the Community Management 
     Account for fiscal year 2015 such additional amounts as are 
     specified in the classified Schedule of Authorizations 
     referred to in section 102(a). Such additional amounts for 
     advanced research and development shall remain available 
     until September 30, 2016.
       (2) Authorization of personnel.--In addition to the 
     personnel authorized by subsection (b) for elements of the 
     Intelligence Community Management Account as of September 30, 
     2015, there are authorized such additional personnel for the 
     Community Management Account as of that date as are specified 
     in the classified Schedule of Authorizations referred to in 
     section 102(a).

 TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

     SEC. 201. AUTHORIZATION OF APPROPRIATIONS.

       There is authorized to be appropriated for the Central 
     Intelligence Agency Retirement and Disability Fund for fiscal 
     year 2015 the sum of $514,000,000.

[[Page H8953]]

                     TITLE III--GENERAL PROVISIONS

                      Subtitle A--General Matters

     SEC. 301. INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS 
                   AUTHORIZED BY LAW.

       Appropriations authorized by this Act for salary, pay, 
     retirement, and other benefits for Federal employees may be 
     increased by such additional or supplemental amounts as may 
     be necessary for increases in such compensation or benefits 
     authorized by law.

     SEC. 302. RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES.

       The authorization of appropriations by this Act shall not 
     be deemed to constitute authority for the conduct of any 
     intelligence activity which is not otherwise authorized by 
     the Constitution or the laws of the United States.

     SEC. 303. NATIONAL INTELLIGENCE STRATEGY.

       (a) In General.--Title I of the National Security Act of 
     1947 (50 U.S.C. 3021 et seq.) is amended by inserting after 
     section 108 the following:

     ``SEC. 108A. NATIONAL INTELLIGENCE STRATEGY.

       ``(a) In General.--Beginning in 2017, and once every 4 
     years thereafter, the Director of National Intelligence shall 
     develop a comprehensive national intelligence strategy to 
     meet national security objectives for the following 4-year 
     period, or a longer period, if appropriate.
       ``(b) Requirements.--Each national intelligence strategy 
     required by subsection (a) shall--
       ``(1) delineate a national intelligence strategy consistent 
     with--
       ``(A) the most recent national security strategy report 
     submitted pursuant to section 108;
       ``(B) the strategic plans of other relevant departments and 
     agencies of the United States; and
       ``(C) other relevant national-level plans;
       ``(2) address matters related to national and military 
     intelligence, including counterintelligence;
       ``(3) identify the major national security missions that 
     the intelligence community is currently pursuing and will 
     pursue in the future to meet the anticipated security 
     environment;
       ``(4) describe how the intelligence community will utilize 
     personnel, technology, partnerships, and other capabilities 
     to pursue the major national security missions identified in 
     paragraph (3);
       ``(5) assess current, emerging, and future threats to the 
     intelligence community, including threats from foreign 
     intelligence and security services and insider threats;
       ``(6) outline the organizational roles and missions of the 
     elements of the intelligence community as part of an 
     integrated enterprise to meet customer demands for 
     intelligence products, services, and support;
       ``(7) identify sources of strategic, institutional, 
     programmatic, fiscal, and technological risk; and
       ``(8) analyze factors that may affect the intelligence 
     community's performance in pursuing the major national 
     security missions identified in paragraph (3) during the 
     following 10-year period.
       ``(c) Submission to Congress.--The Director of National 
     Intelligence shall submit to the congressional intelligence 
     committees a report on each national intelligence strategy 
     required by subsection (a) not later than 45 days after the 
     date of the completion of such strategy.''.
       (b) Table of Contents Amendments.--The table of contents in 
     the first section of the National Security Act of 1947 is 
     amended by inserting after the item relating to section 108 
     the following new item:

``Sec. 108A. National intelligence strategy.''.

     SEC. 304. SOFTWARE LICENSING.

       Section 109 of the National Security Act of 1947 (50 U.S.C. 
     3044) is amended--
       (1) in subsection (a)(2), by striking ``usage; and'' and 
     inserting ``usage, including--
       ``(A) increasing the centralization of the management of 
     software licenses;
       ``(B) increasing the regular tracking and maintaining of 
     comprehensive inventories of software licenses using 
     automated discovery and inventory tools and metrics;
       ``(C) analyzing software license data to inform investment 
     decisions; and
       ``(D) providing appropriate personnel with sufficient 
     software licenses management training; and'';
       (2) in subsection (b)--
       (A) in paragraph (1), by striking ``; and'' and inserting a 
     semicolon;
       (B) in paragraph (2), by striking ``usage.'' and inserting 
     ``usage, including--
       ``(A) increasing the centralization of the management of 
     software licenses;
       ``(B) increasing the regular tracking and maintaining of 
     comprehensive inventories of software licenses using 
     automated discovery and inventory tools and metrics;
       ``(C) analyzing software license data to inform investment 
     decisions; and
       ``(D) providing appropriate personnel with sufficient 
     software licenses management training; and''; and
       (C) by adding at the end the following new paragraph:
       ``(3) based on the assessment required under paragraph (2), 
     make such recommendations with respect to software 
     procurement and usage to the Director of National 
     Intelligence as the Chief Information Officer considers 
     appropriate.''; and
       (3) by adding at the end the following new subsection:
       ``(d) Implementation of Recommendations.--Not later than 
     180 days after the date on which the Director of National 
     Intelligence receives recommendations from the Chief 
     Information Officer of the Intelligence Community in 
     accordance with subsection (b)(3), the Director of National 
     Intelligence shall, to the extent practicable, issue 
     guidelines for the intelligence community on software 
     procurement and usage based on such recommendations.''.

     SEC. 305. REPORTING OF CERTAIN EMPLOYMENT ACTIVITIES BY 
                   FORMER INTELLIGENCE OFFICERS AND EMPLOYEES.

       (a) Restriction.--Title III of the National Security Act of 
     1947 (50 U.S.C. 3071 et seq.) is amended by inserting after 
     section 303 the following new section:

     ``SEC. 304. REPORTING OF CERTAIN EMPLOYMENT ACTIVITIES BY 
                   FORMER INTELLIGENCE OFFICERS AND EMPLOYEES.

       ``(a) In General.--The head of each element of the 
     intelligence community shall issue regulations requiring each 
     employee of such element occupying a covered position to sign 
     a written agreement requiring the regular reporting of 
     covered employment to the head of such element.
       ``(b) Agreement Elements.--The regulations required under 
     subsection (a) shall provide that an agreement contain 
     provisions requiring each employee occupying a covered 
     position to, during the two-year period beginning on the date 
     on which such employee ceases to occupy such covered 
     position--
       ``(1) report covered employment to the head of the element 
     of the intelligence community that employed such employee in 
     such covered position upon accepting such covered employment; 
     and
       ``(2) annually (or more frequently if the head of such 
     element considers it appropriate) report covered employment 
     to the head of such element.
       ``(c) Definitions.--In this section:
       ``(1) Covered employment.--The term `covered employment' 
     means direct employment by, representation of, or the 
     provision of advice relating to national security to the 
     government of a foreign country or any person whose 
     activities are directly or indirectly supervised, directed, 
     controlled, financed, or subsidized, in whole or in major 
     part, by any government of a foreign country.
       ``(2) Covered position.--The term `covered position' means 
     a position within an element of the intelligence community 
     that, based on the level of access of a person occupying such 
     position to information regarding sensitive intelligence 
     sources or methods or other exceptionally sensitive matters, 
     the head of such element determines should be subject to the 
     requirements of this section.
       ``(3) Government of a foreign country.--The term 
     `government of a foreign country' has the meaning given the 
     term in section 1(e) of the Foreign Agents Registration Act 
     of 1938 (22 U.S.C. 611(e)).''.
       (b) Regulations and Certification.--
       (1) Regulations.--Not later than 90 days after the date of 
     the enactment of this Act, the head of each element of the 
     intelligence community shall issue the regulations required 
     under section 304 of the National Security Act of 1947, as 
     added by subsection (a) of this section.
       (2) Certification.--Not later than 180 days after the date 
     of the enactment of this Act, the Director of National 
     Intelligence shall submit to the congressional intelligence 
     committees--
       (A) a certification that each head of an element of the 
     intelligence community has prescribed the regulations 
     required under section 304 of the National Security Act of 
     1947, as added by subsection (a) of this section; or
       (B) if the Director is unable to submit the certification 
     described under subparagraph (A), an explanation as to why 
     the Director is unable to submit such certification, 
     including a designation of which heads of an element of the 
     intelligence community have prescribed the regulations 
     required under such section 304 and which have not.
       (c) Table of Contents Amendments.--The table of contents in 
     the first section of the National Security Act of 1947 is 
     amended--
       (1) by striking the second item relating to section 302 
     (Under Secretaries and Assistant Secretaries) and the items 
     relating to sections 304, 305, and 306; and
       (2) by inserting after the item relating to section 303 the 
     following new item:

``Sec. 304. Reporting of certain employment activities by former 
              intelligence officers and employees.''.

     SEC. 306. INCLUSION OF PREDOMINANTLY BLACK INSTITUTIONS IN 
                   INTELLIGENCE OFFICER TRAINING PROGRAM.

       Section 1024 of the National Security Act of 1947 (50 
     U.S.C. 3224) is amended--
       (1) in subsection (c)(1), by inserting ``and Predominantly 
     Black Institutions'' after ``universities''; and
       (2) in subsection (g)--
       (A) by redesignating paragraph (4) as paragraph (5); and
       (B) by inserting after paragraph (3) the following new 
     paragraph:
       ``(4) Predominantly black institution.--The term 
     `Predominantly Black Institution' has the meaning given the 
     term in section 318 of the Higher education Act of 1965 (20 
     U.S.C. 1059e).''.

     SEC. 307. MANAGEMENT AND OVERSIGHT OF FINANCIAL INTELLIGENCE.

       (a) Requirement for Plan.--Not later than 90 days after the 
     date of the enactment of this Act, the Director of National 
     Intelligence shall prepare a plan for management of the 
     elements of the intelligence community that carry out 
     financial intelligence activities.
       (b) Contents of Plan.--The plan required by subsection (a) 
     shall establish a governance framework, procedures for 
     sharing and harmonizing the acquisition and use of financial 
     analytic tools, standards for quality of analytic products, 
     procedures for oversight and evaluation of resource 
     allocations associated with the joint development of 
     information sharing efforts

[[Page H8954]]

     and tools, and an education and training model for elements 
     of the intelligence community that carry out financial 
     intelligence activities.
       (c) Briefing to Congress.--Not later than 180 days after 
     the date of the enactment of this Act, the Director of 
     National Intelligence shall brief the congressional 
     intelligence committees on the actions the Director proposes 
     to implement the plan required by subsection (a).

     SEC. 308. ANALYSIS OF PRIVATE SECTOR POLICIES AND PROCEDURES 
                   FOR COUNTERING INSIDER THREATS.

       (a) Analysis.--Not later than 180 days after the date of 
     the enactment of this Act, the Director of National 
     Intelligence, in consultation with the National 
     Counterintelligence Executive, shall submit to the 
     congressional intelligence committees an analysis of private 
     sector policies and procedures for countering insider 
     threats.
       (b) Content.--The analysis required by subsection (a) shall 
     include--
       (1) a review of whether and how the intelligence community 
     could utilize private sector hiring and human resources best 
     practices to screen, vet, and validate the credentials, 
     capabilities, and character of applicants for positions 
     involving trusted access to sensitive information;
       (2) an analysis of private sector policies for holding 
     supervisors and subordinates accountable for violations of 
     established security protocols and whether the intelligence 
     community should adopt similar policies for positions of 
     trusted access to sensitive information;
       (3) an assessment of the feasibility and advisability of 
     applying mandatory leave policies, similar to those endorsed 
     by the Federal Deposit Insurance Corporation and the 
     Securities and Exchange Commission to identify fraud in the 
     financial services industry, to certain positions within the 
     intelligence community; and
       (4) recommendations for how the intelligence community 
     could utilize private sector risk indices, such as credit 
     risk scores, to make determinations about employee access to 
     sensitive information.

     SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY 
                   ACQUIRED COMMUNICATIONS.

       (a) Definitions.--In this section:
       (1) Covered communication.--The term ``covered 
     communication'' means any nonpublic telephone or electronic 
     communication acquired without the consent of a person who is 
     a party to the communication, including communications in 
     electronic storage.
       (2) Head of an element of the intelligence community.--The 
     term ``head of an element of the intelligence community'' 
     means, as appropriate--
       (A) the head of an element of the intelligence community; 
     or
       (B) the head of the department or agency containing such 
     element.
       (3) United states person.--The term ``United States 
     person'' has the meaning given that term in section 101 of 
     the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 
     1801).
       (b) Procedures for Covered Communications.--
       (1) Requirement to adopt.--Not later than 2 years after the 
     date of the enactment of this Act each head of an element of 
     the intelligence community shall adopt procedures approved by 
     the Attorney General for such element that ensure compliance 
     with the requirements of paragraph (3).
       (2) Coordination and approval.--The procedures required by 
     paragraph (1) shall be--
       (A) prepared in coordination with the Director of National 
     Intelligence; and
       (B) approved by the Attorney General prior to issuance.
       (3) Procedures.--
       (A) Application.--The procedures required by paragraph (1) 
     shall apply to any intelligence collection activity not 
     otherwise authorized by court order (including an order or 
     certification issued by a court established under subsection 
     (a) or (b) of section 103 of the Foreign Intelligence 
     Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or 
     similar legal process that is reasonably anticipated to 
     result in the acquisition of a covered communication to or 
     from a United States person and shall permit the acquisition, 
     retention, and dissemination of covered communications 
     subject to the limitation in subparagraph (B).
       (B) Limitation on retention.--A covered communication shall 
     not be retained in excess of 5 years, unless--
       (i) the communication has been affirmatively determined, in 
     whole or in part, to constitute foreign intelligence or 
     counterintelligence or is necessary to understand or assess 
     foreign intelligence or counterintelligence;
       (ii) the communication is reasonably believed to constitute 
     evidence of a crime and is retained by a law enforcement 
     agency;
       (iii) the communication is enciphered or reasonably 
     believed to have a secret meaning;
       (iv) all parties to the communication are reasonably 
     believed to be non-United States persons;
       (v) retention is necessary to protect against an imminent 
     threat to human life, in which case both the nature of the 
     threat and the information to be retained shall be reported 
     to the congressional intelligence committees not later than 
     30 days after the date such retention is extended under this 
     clause;
       (vi) retention is necessary for technical assurance or 
     compliance purposes, including a court order or discovery 
     obligation, in which case access to information retained for 
     technical assurance or compliance purposes shall be reported 
     to the congressional intelligence committees on an annual 
     basis; or
       (vii) retention for a period in excess of 5 years is 
     approved by the head of the element of the intelligence 
     community responsible for such retention, based on a 
     determination that retention is necessary to protect the 
     national security of the United States, in which case the 
     head of such element shall provide to the congressional 
     intelligence committees a written certification describing--

       (I) the reasons extended retention is necessary to protect 
     the national security of the United States;
       (II) the duration for which the head of the element is 
     authorizing retention;
       (III) the particular information to be retained; and
       (IV) the measures the element of the intelligence community 
     is taking to protect the privacy interests of United States 
     persons or persons located inside the United States.

     SEC. 310. CLARIFICATION OF LIMITATION OF REVIEW TO 
                   RETALIATORY SECURITY CLEARANCE OR ACCESS 
                   DETERMINATIONS.

       Section 3001(b)(7) of the Intelligence Reform and Terrorism 
     Prevention Act of 2004 (50 U.S.C. 3341(b)(7)) is amended--
       (1) in the matter preceding subparagraph (A), by striking 
     ``2014--'' and inserting ``2014, and consistent with 
     subsection (j)--'';
       (2) in subparagraph (A), by striking ``to appeal a 
     determination to suspend or revoke a security clearance or 
     access to classified information'' and inserting ``alleging 
     reprisal for having made a protected disclosure (provided the 
     individual does not disclose classified information or other 
     information contrary to law) to appeal any action affecting 
     an employee's access to classified information''; and
       (3) in subparagraph (B), by striking ``information,'' 
     inserting ``information following a protected disclosure,''.

     SEC. 311. FEASIBILITY STUDY ON CONSOLIDATING CLASSIFIED 
                   DATABASES OF CYBER THREAT INDICATORS AND 
                   MALWARE SAMPLES.

       (a) In General.--Not later than 180 days after the date of 
     the enactment of this Act, the Director of National 
     Intelligence, in consultation with the Secretary of Homeland 
     Security, the Director of the National Security Agency, the 
     Director of the Central Intelligence Agency, and the Director 
     of the Federal Bureau of Investigation, shall conduct a 
     feasibility study on consolidating classified databases of 
     cyber threat indicators and malware samples in the 
     intelligence community.
       (b) Elements.--The feasibility study required by subsection 
     (a) shall include the following:
       (1) An inventory of classified databases of cyber threat 
     indicators and malware samples in the intelligence community.
       (2) An assessment of actions that could be carried out to 
     consolidate such databases to achieve the greatest possible 
     information sharing within the intelligence community and 
     cost savings for the Federal Government.
       (3) An assessment of any impediments to such consolidation.
       (4) An assessment of whether the Intelligence Community 
     Information Technology Enterprise can support such 
     consolidation.
       (c) Report to Congress.--Not later than 30 days after the 
     date on which the Director of National Intelligence completes 
     the feasibility study required by subsection (a), the 
     Director shall submit to the congressional intelligence 
     committees a written report that summarizes the feasibility 
     study, including the information required under subsection 
     (b).

     SEC. 312. SENSE OF CONGRESS ON CYBERSECURITY THREAT AND 
                   CYBERCRIME COOPERATION WITH UKRAINE.

       It is the sense of Congress that--
       (1) cooperation between the intelligence and law 
     enforcement agencies of the United States and Ukraine should 
     be increased to improve cybersecurity policies between these 
     two countries;
       (2) the United States should pursue improved extradition 
     procedures among the Governments of the United States, 
     Ukraine, and other countries from which cybercriminals target 
     United States citizens and entities;
       (3) the President should--
       (A) initiate a round of formal United States-Ukraine 
     bilateral talks on cybersecurity threat and cybercrime 
     cooperation, with additional multilateral talks that include 
     other law enforcement partners such as Europol and Interpol; 
     and
       (B) work to obtain a commitment from the Government of 
     Ukraine to end cybercrime directed at persons outside Ukraine 
     and to work with the United States and other allies to deter 
     and convict known cybercriminals;
       (4) the President should establish a capacity building 
     program with the Government of Ukraine, which could include--
       (A) a joint effort to improve cyber capacity building, 
     including intelligence and law enforcement services in 
     Ukraine;
       (B) sending United States law enforcement agents to aid law 
     enforcement agencies in Ukraine in investigating cybercrimes; 
     and
       (C) agreements to improve communications networks to 
     enhance law enforcement cooperation, such as a hotline 
     directly connecting law enforcement agencies in the United 
     States and Ukraine; and
       (5) the President should establish and maintain an 
     intelligence and law enforcement cooperation scorecard with 
     metrics designed to measure the number of instances that 
     intelligence and law enforcement agencies in the United 
     States request assistance from intelligence and law 
     enforcement agencies in Ukraine and the number and type of 
     responses received to such requests.

     SEC. 313. REPLACEMENT OF LOCALLY EMPLOYED STAFF SERVING AT 
                   UNITED STATES DIPLOMATIC FACILITIES IN THE 
                   RUSSIAN FEDERATION.

       (a) Employment Requirement.--
       (1) In general.--The Secretary of State shall ensure that, 
     not later than one year after the

[[Page H8955]]

     date of the enactment of this Act, every supervisory position 
     at a United States diplomatic facility in the Russian 
     Federation shall be occupied by a citizen of the United 
     States who has passed, and shall be subject to, a thorough 
     background check.
       (2) Extension.--The Secretary of State may extend the 
     deadline under paragraph (1) for up to one year by providing 
     advance written notification and justification of such 
     extension to the appropriate congressional committees.
       (3) Progress report.--Not later than 180 days after the 
     date of the enactment of this Act, the Secretary of State 
     shall submit to the appropriate congressional committees a 
     report on progress made toward meeting the employment 
     requirement under paragraph (1).
       (b) Plan for Reduced Use of Locally Employed Staff.--Not 
     later than 180 days after the date of the enactment of this 
     Act, the Secretary of State, in coordination with other 
     appropriate government agencies, shall submit to the 
     appropriate congressional committees a plan to further reduce 
     the reliance on locally employed staff in United States 
     diplomatic facilities in the Russian Federation. The plan 
     shall, at a minimum, include cost estimates, timelines, and 
     numbers of employees to be replaced.
       (c) Appropriate Congressional Committees Defined.--In this 
     section, the term ``appropriate congressional committees'' 
     means--
       (1) the congressional intelligence committees;
       (2) the Committee on Armed Services, the Committee on 
     Foreign Relations, and the Committee on Appropriations of the 
     Senate; and
       (3) the Committee on Armed Services, the Committee on 
     Foreign Affairs, and the Committee on Appropriations of the 
     House of Representatives.
       (d) Rule of Construction.--Nothing in this section shall be 
     construed to infringe on the power of the President, by and 
     with the advice and consent of the Senate, to appoint 
     ambassadors, other public ministers, and consuls.''

     SEC. 314. INCLUSION OF SENSITIVE COMPARTMENTED INFORMATION 
                   FACILITIES IN UNITED STATES DIPLOMATIC 
                   FACILITIES IN THE RUSSIAN FEDERATION AND 
                   ADJACENT COUNTRIES.

       (a) Sensitive Compartmented Information Facility 
     Requirement.--Each United States diplomatic facility that, 
     after the date of the enactment of this Act, is constructed 
     in, or undergoes a construction upgrade in, the Russian 
     Federation, any country that shares a land border with the 
     Russian Federation, or any country that is a former member of 
     the Soviet Union shall be constructed to include a Sensitive 
     Compartmented Information Facility.
       (b) National Security Waiver.--The Secretary of State may 
     waive the requirement under subsection (a) if the Secretary 
     determines that such waiver is in the national security 
     interest of the United States and submits a written 
     justification to the appropriate congressional committees not 
     later than 180 days before exercising such waiver.
       (c) Appropriate Congressional Committees Defined.--In this 
     section, the term ``appropriate congressional committees'' 
     means--
       (1) the congressional intelligence committees;
       (2) the Committee on Armed Services, the Committee on 
     Foreign Relations, and the Committee on Appropriations of the 
     Senate; and
       (3) the Committee on Armed Services, the Committee on 
     Foreign Affairs, and the Committee on Appropriations of the 
     House of Representatives.

                         Subtitle B--Reporting

     SEC. 321. REPORT ON DECLASSIFICATION PROCESS.

       Not later than December 31, 2016, the Director of National 
     Intelligence shall submit to Congress a report describing--
       (1) proposals to improve the declassification process 
     throughout the intelligence community; and
       (2) steps the intelligence community could take, or 
     legislation that may be necessary, to enable the National 
     Declassification Center to better accomplish the missions 
     assigned to the Center by Executive Order No. 13526 (75 Fed. 
     Reg. 707).

     SEC. 322. REPORT ON INTELLIGENCE COMMUNITY EFFICIENT SPENDING 
                   TARGETS.

       (a) In General.--Not later than April 1, 2016, and April 1, 
     2017, the Director of National Intelligence shall submit to 
     the congressional intelligence committees a report on the 
     status and effectiveness of efforts to reduce administrative 
     costs for the intelligence community during the preceding 
     year.
       (b) Elements.--Each report under subsection (a) shall 
     include for each element of the intelligence community the 
     following:
       (1) A description of the status and effectiveness of 
     efforts to devise alternatives to government travel and 
     promote efficient travel spending, such as teleconferencing 
     and video conferencing.
       (2) A description of the status and effectiveness of 
     efforts to limit costs related to hosting and attending 
     conferences.
       (3) A description of the status and effectiveness of 
     efforts to assess information technology inventories and 
     usage, and establish controls, to reduce costs related to 
     underutilized information technology equipment, software, or 
     services.
       (4) A description of the status and effectiveness of 
     efforts to limit the publication and printing of hard copy 
     documents.
       (5) A description of the status and effectiveness of 
     efforts to improve the performance of Federal fleet motor 
     vehicles and limit executive transportation.
       (6) A description of the status and effectiveness of 
     efforts to limit the purchase of extraneous promotional 
     items, such as plaques, clothing, and commemorative items.
       (7) A description of the status and effectiveness of 
     efforts to consolidate and streamline workforce training 
     programs to focus on the highest priority workforce and 
     mission needs.
       (8) Such other matters relating to efforts to reduce 
     intelligence community administrative costs as the Director 
     may specify for purposes of this section.

     SEC. 323. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE 
                   ORDER.

       (a) In General.--Title V of the National Security Act of 
     1947 (50 U.S.C. 3091 et seq.) is amended by adding at the end 
     the following:

     ``SEC. 511. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE 
                   ORDER.

       ``(a) Annual Reports Required.--The Director of National 
     Intelligence shall annually submit to the congressional 
     intelligence committees a report on violations of law or 
     executive order relating to intelligence activities by 
     personnel of an element of the intelligence community that 
     were identified during the previous calendar year.
       ``(b) Elements.--Each report submitted under subsection (a) 
     shall, consistent with the need to preserve ongoing criminal 
     investigations, include a description of, and any action 
     taken in response to, any violation of law or executive order 
     (including Executive Order No. 12333 (50 U.S.C. 3001 note)) 
     relating to intelligence activities committed by personnel of 
     an element of the intelligence community in the course of the 
     employment of such personnel that, during the previous 
     calendar year, was--
       ``(1) determined by the director, head, or general counsel 
     of any element of the intelligence community to have 
     occurred;
       ``(2) referred to the Department of Justice for possible 
     criminal prosecution; or
       ``(3) substantiated by the inspector general of any element 
     of the intelligence community.''.
       (b) Initial Report.--The first report required under 
     section 511 of the National Security Act of 1947, as added by 
     subsection (a), shall be submitted not later than one year 
     after the date of the enactment of this Act.
       (c) Guidelines.--Not later than 180 days after the date of 
     the enactment of this Act, the Director of National 
     Intelligence, in consultation with the head of each element 
     of the intelligence community, shall--
       (1) issue guidelines to carry out section 511 of the 
     National Security Act of 1947, as added by subsection (a); 
     and
       (2) submit such guidelines to the congressional 
     intelligence committees.
       (d) Table of Contents Amendment.--The table of sections in 
     the first section of the National Security Act of 1947 is 
     amended by adding after the item relating to section 510 the 
     following new item:

``Sec. 511. Annual report on violations of law or executive order.''.
       (e) Rule of Construction.--Nothing in this section or the 
     amendments made by this section shall be construed to alter 
     any requirement existing on the date of the enactment of this 
     Act to submit a report under any provision of law.

     SEC. 324. ANNUAL REPORT ON INTELLIGENCE ACTIVITIES OF THE 
                   DEPARTMENT OF HOMELAND SECURITY.

       (a) In General.--For each fiscal year and along with the 
     budget materials submitted in support of the budget of the 
     Department of Homeland Security pursuant to section 1105(a) 
     of title 31, United States Code, the Under Secretary for 
     Intelligence and Analysis of the Department shall submit to 
     the congressional intelligence committees a report for such 
     fiscal year on each intelligence activity of each 
     intelligence component of the Department, as designated by 
     the Under Secretary, that includes the following:
       (1) The amount of funding requested for each such 
     intelligence activity.
       (2) The number of full-time employees funded to perform 
     each such intelligence activity.
       (3) The number of full-time contractor employees (or the 
     equivalent of full-time in the case of part-time contractor 
     employees) funded to perform or in support of each such 
     intelligence activity.
       (4) A determination as to whether each such intelligence 
     activity is predominantly in support of national intelligence 
     or departmental missions.
       (5) The total number of analysts of the Intelligence 
     Enterprise of the Department that perform--
       (A) strategic analysis; or
       (B) operational analysis.
       (b) Feasibility and Advisability Report.--Not later than 
     120 days after the date of the enactment of this Act, the 
     Secretary of Homeland Security, acting through the Under 
     Secretary for Intelligence and Analysis, shall submit to the 
     congressional intelligence committees a report that--
       (1) examines the feasibility and advisability of including 
     the budget request for all intelligence activities of each 
     intelligence component of the Department that predominantly 
     support departmental missions, as designated by the Under 
     Secretary for Intelligence and Analysis, in the Homeland 
     Security Intelligence Program; and
       (2) includes a plan to enhance the coordination of 
     department-wide intelligence activities to achieve greater 
     efficiencies in the performance of the Department of Homeland 
     Security intelligence functions.
       (c) Intelligence Component of the Department.--In this 
     section, the term ``intelligence component of the 
     Department'' has the meaning given that term in section 2 of 
     the Homeland Security Act of 2002 (6 U.S.C. 101).

     SEC. 325. REPORT ON POLITICAL PRISON CAMPS IN NORTH KOREA.

       (a) In General.--The Director of National Intelligence, in 
     consultation with the Secretary of State, shall submit to the 
     congressional intelligence committees, the Committee on 
     Foreign Relations of the Senate, and the Committee on Foreign 
     Affairs of the House of Representatives a report on political 
     prison camps in North Korea.

[[Page H8956]]

       (b) Elements.--The report required by subsection (a) 
     shall--
       (1) describe the actions the United States is taking to 
     support implementation of the recommendations of the United 
     Nations Commission of Inquiry on Human Rights in the 
     Democratic People's Republic of Korea, including the eventual 
     establishment of a tribunal to hold individuals accountable 
     for abuses; and
       (2) include, with respect to each political prison camp in 
     North Korea to the extent information is available--
       (A) the estimated prisoner population of each such camp;
       (B) the geographical coordinates of each such camp;
       (C) the reasons for confinement of the prisoners at each 
     such camp;
       (D) a description of the primary industries and products 
     made at each such camp, and the end users of any goods 
     produced in such camp;
       (E) information regarding involvement of any non-North 
     Korean entity or individual involved in the operations of 
     each such camp, including as an end user or source of any 
     good or products used in, or produced by, in such camp;
       (F) information identifying individuals and agencies 
     responsible for conditions in each such camp at all levels of 
     the Government of North Korea;
       (G) a description of the conditions under which prisoners 
     are confined, with respect to the adequacy of food, shelter, 
     medical care, working conditions, and reports of ill-
     treatment of prisoners, at each such camp; and
       (H) unclassified imagery, including satellite imagery, of 
     each such camp.
       (c) Form.--The report required by subsection (a) shall be 
     submitted in an unclassified form and may include a 
     classified annex if necessary.

     SEC. 326. ASSESSMENT OF SECURITY OF DOMESTIC OIL REFINERIES 
                   AND RELATED RAIL TRANSPORTATION INFRASTRUCTURE.

       (a) Assessment.--The Under Secretary of Homeland Security 
     for Intelligence and Analysis shall conduct an intelligence 
     assessment of the security of domestic oil refineries and 
     related rail transportation infrastructure.
       (b) Submission.--Not later than 180 days after the date of 
     the enactment of this Act, the Under Secretary of Homeland 
     Security for Intelligence and Analysis shall submit to the 
     congressional intelligence committees--
       (1) the results of the assessment required under subsection 
     (a); and
       (2) any recommendations with respect to intelligence 
     sharing or intelligence collection to improve the security of 
     domestic oil refineries and related rail transportation 
     infrastructure to protect the communities surrounding such 
     refineries or such infrastructure from potential harm that 
     the Under Secretary considers appropriate.

     SEC. 327. ENHANCED CONTRACTOR LEVEL ASSESSMENTS FOR THE 
                   INTELLIGENCE COMMUNITY.

       Section 506B(c) of the National Security Act of 1947 (50 
     U.S.C. 3098(c)) is amended--
       (1) in paragraph (11), by striking ``or contracted'';
       (2) by redesignating paragraph (12) as paragraph (13); and
       (3) by inserting after paragraph (11) the following:
       ``(12) The best estimate of the number of intelligence 
     collectors and analysts contracted by each element of the 
     intelligence community and a description of the functions 
     performed by such contractors.''.

     SEC. 328. ASSESSMENT OF THE EFFICACY OF MEMORANDA OF 
                   UNDERSTANDING TO FACILITATE INTELLIGENCE-
                   SHARING.

       Not later than 90 days after the date of the enactment of 
     this Act, the Under Secretary of Homeland Security for 
     Intelligence and Analysis, in consultation with the Director 
     of the Federal Bureau of Investigation and the Program 
     Manager of the Information Sharing Environment, shall submit 
     to the congressional intelligence committees, the Committee 
     on Homeland Security and Governmental Affairs of the Senate, 
     the Committee on Homeland Security of the House of 
     Representatives, the Committee on the Judiciary of the 
     Senate, and the Committee on the Judiciary of the House of 
     Representatives an assessment of the efficacy of the 
     memoranda of understanding signed between Federal, State, 
     local, tribal, and territorial agencies to facilitate 
     intelligence-sharing within and separate from the Joint 
     Terrorism Task Force. Such assessment shall include--
       (1) any language within such memoranda of understanding 
     that prohibited or may be construed to prohibit intelligence-
     sharing between Federal, State, local, tribal, and 
     territorial agencies; and
       (2) any recommendations for memoranda of understanding to 
     better facilitate intelligence-sharing between Federal, 
     State, local, tribal, and territorial agencies.

     SEC. 329. REPORT ON FOREIGN MAN-MADE ELECTROMAGNETIC PULSE 
                   WEAPONS.

       (a) Report.--Not later than 180 days after the date of the 
     enactment of this Act, the Director of National Intelligence 
     shall submit to the congressional intelligence committees, 
     the Committee on Armed Services of the Senate, and the 
     Committee on Armed Services of the House of Representatives a 
     report on the threat posed by man-made electromagnetic pulse 
     weapons to United States interests through 2025, including 
     threats from foreign countries and foreign non-State actors.
       (b) Form.--The report required under subsection (a) shall 
     be submitted in unclassified form, but may include a 
     classified annex.

     SEC. 330. REPORT ON UNITED STATES COUNTERTERRORISM STRATEGY 
                   TO DISRUPT, DISMANTLE, AND DEFEAT AL-QAEDA AND 
                   ITS AFFILIATED OR ASSOCIATED GROUPS.

       (a) Report.--
       (1) In general.--Not later than 180 days after the date of 
     the enactment of this Act, the Director of National 
     Intelligence shall submit to the appropriate committees of 
     Congress a comprehensive report on the United States 
     counterterrorism strategy to disrupt, dismantle, and defeat 
     al-Qaeda and its affiliated or associated groups.
       (2) Coordination.--The report required by paragraph (1) 
     shall be prepared in coordination with the Secretary of 
     State, the Secretary of the Treasury, the Attorney General, 
     and the Secretary of Defense, and the head of any other 
     department or agency of the United States Government that has 
     responsibility for activities directed at combating al-Qaeda 
     and its affiliated or associated groups.
       (3) Elements.--The report required by paragraph (1) shall 
     include the following:
       (A) A definition of--
       (i) al-Qaeda core, including a list of which known 
     individuals constitute al-Qaeda core;
       (ii) an affiliated group of al-Qaeda, including a list of 
     which known groups constitute an affiliate group of al-Qaeda;
       (iii) an associated group of al-Qaeda, including a list of 
     which known groups constitute an associated group of al-
     Qaeda; and
       (iv) a group aligned with al-Qaeda, including a description 
     of what actions a group takes or statements it makes that 
     qualify it as a group aligned with al-Qaeda.
       (B) A list of any other group, including the organization 
     that calls itself the Islamic State (also known as ``ISIS'' 
     or ``ISIL''), that adheres to the core mission of al-Qaeda, 
     or who espouses the same violent jihad ideology as al-Qaeda.
       (C) An assessment of the relationship between al-Qaeda core 
     and the groups referred to in subparagraph (B).
       (D) An assessment of the strengthening or weakening of al-
     Qaeda and the groups referred to in subparagraph (B) from 
     January 1, 2010, to the present, including a description of 
     the metrics that are used to assess strengthening or 
     weakening and an assessment of the relative increase or 
     decrease in violent attacks attributed to such entities.
       (E) An assessment of whether or not an individual can be a 
     member of al-Qaeda core if such individual is not located in 
     Afghanistan or Pakistan.
       (F) An assessment of whether or not an individual can be a 
     member of al-Qaeda core as well as a member of a group 
     referred to in subparagraph (B).
       (G) A definition of defeat of core al-Qaeda.
       (H) An assessment of the extent or coordination, command, 
     and control between core al-Qaeda and the groups referred to 
     in subparagraph (B), specifically addressing each such group.
       (I) An assessment of the effectiveness of counterterrorism 
     operations against core al-Qaeda and the groups referred to 
     in subparagraph (B), and whether such operations have had a 
     sustained impact on the capabilities and effectiveness of 
     core al-Qaeda and such groups.
       (4) Form.--The report required by paragraph (1) shall be 
     submitted in unclassified form, but may include a classified 
     annex.
       (b) Appropriate Committees of Congress Defined.--In this 
     section, the term ``appropriate committees of Congress'' 
     means--
       (1) the congressional intelligence committees;
       (2) the Committee on Foreign Relations and the Committee on 
     Armed Services of the Senate; and
       (3) the Committee on Foreign Affairs and the Committee on 
     Armed Services of the House of Representatives.

     SEC. 331. FEASIBILITY STUDY ON RETRAINING VETERANS IN 
                   CYBERSECURITY.

       Not later than 180 days after the date of the enactment of 
     this Act, the Director of National Intelligence, in 
     consultation with the Secretary of Defense, the Secretary of 
     Veterans Affairs, and the Secretary of Homeland Security, 
     shall submit to Congress a feasibility study on retraining 
     veterans and retired members of elements of the intelligence 
     community in cybersecurity.

  The SPEAKER pro tempore. Pursuant to the rule, the gentleman from 
Michigan (Mr. Rogers) and the gentleman from Maryland (Mr. 
Ruppersberger) each will control 20 minutes.
  The Chair recognizes the gentleman from Michigan.


                             General Leave

  Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that all 
Members may have 5 legislative days to revise and extend their remarks 
and to include extraneous material on the bill, H.R. 4681.
  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Michigan?
  There was no objection.
  Mr. ROGERS of Michigan. Mr. Speaker, I yield myself such time as I 
may consume.
  Mr. Speaker, I will enter into the Record at the end of my remarks 
the Joint Explanatory Statement prepared by the House and Senate 
Intelligence Committees.
  Mr. Speaker, when Mr. Ruppersberger and I assumed the helm of the 
committee, we committed to return to the practice of passing the annual 
intelligence authorization bill, recognizing that it is one of the most 
critical tools that Congress has to control the intelligence activities 
of the

[[Page H8957]]

United States Government. I am proud today that we are bringing the 
fifth such authorization bill to the floor since Mr. Ruppersberger 
assumed the role of ranking member and I assumed the role of chairman 4 
years ago.
  As most of the intelligence budget involves highly classified 
programs, the bulk of the committee's direction is found in the 
classified annex to the bill, which is very similar to the version 
passed by the House earlier this year.
  At an unclassified level, I can report that the classified annex 
increases the President's budget request by less than 1 percent and is 
consistent with the Bipartisan Budget Act funding caps. Key committee 
funding initiatives, vital to national security, are preserved in this 
bill. These funding initiatives are offset by reductions to unnecessary 
programs and increased efficiencies.
  The bill's modest net increase reflects the committee's concern that 
the President's request does not properly fund a number of important 
initiatives and leaves several unacceptable shortfalls when it comes to 
the matters of national security. The bill also provides substantial 
intelligence resources to help defeat Islamic State in Iraq and the 
Levant.
  Earlier this year, the House passed its version of this bill with 
overwhelming bipartisan support. This bill contains all of the 
provisions that were not previously enacted into law in the fiscal year 
2014 bill, along with provisions added by the Senate. None of these 
provisions are considered controversial, and we have worked through and 
vetted to make sure that is accurate with both Republican and Democrat 
staff and Members.
  Mr. Speaker, we find ourselves in a very interesting time in history. 
ISIL is attempting to build a state across the Middle East, from 
Lebanon to Iraq, including Syria, Jordan, and Israel. The group already 
controls a swath of land across Iraq and Syria about the size of the 
State of Indiana, and it is growing. The goal of our counterterrorism 
strategy is to deny safe haven from which terrorists can plot attacks 
against the United States and/or our allies. Regrettably, we have not 
prevented ISIL from establishing such a safe haven, and, as a result, 
we face a growing threat from that region.
  At the same time, state actors like Russia and China view this time 
as an opportunity to expand their reach and expand their influence. 
Uneven leadership in recent years has emboldened these adversaries to 
change the international order, at the expense of U.S. interests.
  We rightly demand that our intelligence agencies provide policymakers 
with the best and most timely information possible on the threats we 
face. We ask them to track terrorists wherever they train, plan, and 
fundraise. We ask them to stop devastating cyber attacks that steal 
American jobs through theft of intellectual property. We ask them to 
track nuclear and missile threats. We demand they get it right every 
time.
  This bill will ensure that the dedicated men and women of our 
intelligence community have the funding and authorities and support 
that they need to meet their mission and to keep us safe.
  I take this moment, Mr. Speaker, at a time when certainly voices both 
around the country and around the world are seeking to condemn the very 
courageous men and women who show up in the intelligence business to 
provide the information to keep America safe. They are silent warriors. 
They are faithful patriots. They don't ask for recognition. They don't 
ask for time. You don't see their names in the front pages of the paper 
or on TV. They really don't seek that recognition.
  But they seek the very purpose of being the first to be able to 
develop that one piece of information that might prevent further 
conflict, it might prevent a terrorist attack, it might prevent a 
nuclear launch, it might prevent one Nation from attacking another.
  In the haze of what seems to be self-loathing these days, by 
targeting that against these very courageous men and women who cannot 
defend themselves in public, we are doing a disservice to their courage 
and their commitment to keep America safe. We find that it is easy to, 
at some point, go back and point fingers at what we believe may or may 
not have happened in the work of keeping America safe. It is 
realistically and holistically unfair that we would do that to these 
very brave souls who risk their lives today.
  But here is the good news for Americans. These folks that work in the 
shadows understand that they have accepted these dangerous and quiet 
roles, and they will get up this morning, like they have every other 
morning, and understand it is between them and the United States when 
it comes to any terrorist attack, or worse, bigger, broader conflict 
somewhere in the world.
  So they will do their job; they will do their duty; they will do 
their mission. They will read the papers and fold them and put them on 
their desk and go about their work, their important work. But it is 
wrong that years later we ask these people to have to believe that they 
might have to get a lawyer to do their job.
  The next time that America asks them to do something hard and 
difficult in defense of the United States, we shouldn't be giving them 
lawyers and subpoenas and the United Nations condemning their actions 
and looking for prosecutions in their effort to tear the United States 
down one more level. We ought to be giving them ticker tape parades 
when they come home from these places and say: Thank you for your 
sacrifice, and thank you for your family's sacrifice. We can sleep 
better at night knowing that you have had the courage to stand where no 
other American was willing to stand in defense of the United States.
  I hope they take this as certainly my final bill on this particular 
floor to encourage them to do their good work, to know that Americans 
who are kissing their kids and putting them on the bus this morning 
understand that it takes their efforts to keep this country safe, that 
somebody that shows up for work and is engaged in international 
commerce understands that it takes their work to keep America safe. 
Believe me, outside of this town, people across America understand the 
value and importance and really the essential work that these people do 
for the defense of America. We should not condemn them, we should be 
proud of their work, and we should stand behind them. This bill I think 
represents the work in a bipartisan way that allows them to continue 
that work, to do the work that protects America.
  I would be remiss if I didn't thank my good friend Dutch 
Ruppersberger. Over the last 4 years, these five budgets could not have 
happened without your work and your staff's work in making sure that we 
had the best product available to make sure that the intelligence 
community had the resources that they need, the policies that they 
need, the support that they need, and, yes, every once in a while, the 
kick in the can that they needed.
  With that, I reserve the balance of my time.
  Mr. Speaker, when Dutch and I assumed the helm of the Committee, we 
committed to return to the practice of passing the annual intelligence 
authorization bill, recognizing that it is one of the most critical 
tools Congress has to control the intelligence activities of the U.S. 
Government. I am proud today that we are bringing the fifth such 
authorization bill to the floor since I assumed the Chairmanship four 
years ago.
  As most of the intelligence budget involves highly classified 
programs, the bulk of the Committee's direction is found in the 
classified annex to the bill, which is very similar to the version 
passed by the House earlier this year.
  At an unclassified level, I can report that the classified annex 
increases the President's budget request by less than one percent and 
is consistent with the Bipartisan Budget Act funding caps. Key 
Committee funding initiatives, vital to national security, are 
preserved in this bill. These funding initiatives are offset by 
reductions to unnecessary programs and increased efficiencies. The 
bill's modest net increase reflects the Committee's concern that the 
President's request does not properly fund a number of important 
initiatives and leaves several unacceptable shortfalls. The bill also 
provides substantial intelligence resources to help defeat ISIL.
  Earlier this year the House passed its version of this bill by an 
overwhelming bipartisan vote. This bill contains all of those 
provisions that were not previously enacted into law in the FY 14 bill, 
along with provisions added by the Senate. None of those provisions are 
considered controversial.
  Mr. Speaker, we find ourselves in a very interesting time in history. 
ISIL is attempting to

[[Page H8958]]

build a state across the Middle East--from Lebanon to Iraq, including 
Syria, Jordan, and Israel. The group already controls a swath of land 
across Iraq and Syria. The goal of our counterterrorism strategy is to 
deny safe haven from which terrorists can plot attacks against the 
United States and our allies. Regrettably, we have not prevented ISIL 
from establishing such a safe haven, and as a result we face a growing 
threat from the region.
  At the same time, state actors like Russia and China view this time 
as an opportunity to expand their reach and influence. Uneven 
leadership in recent years has emboldened these adversaries to change 
the international order--at the expense of U.S. interests.
  We rightly demand that our intelligence agencies provide policy 
makers with the best and most timely information possible on the 
threats we face. We ask them to track terrorists wherever they train, 
plan, and fundraise. We ask them to stop devastating cyber attacks that 
steal American jobs. We ask them to track nuclear and missile threats. 
And we demand they get it right--every time.
  This bill will ensure that the dedicated men and women of our 
Intelligence Community have the funding and authorities--and support--
they need to meet their mission and to keep us safe.
  Before closing, I want to take a moment to thank the men and women of 
this country who serve in our Intelligence Community today. It has been 
a distinct honor to get to know so many of them, and I am proud to have 
played a role in contributing to their success.
  I would also like to extend thanks to all of my dedicated staff on 
the Committee who worked hard over the years to get us back on track in 
passing the annual Authorization bill and in our daily oversight of the 
Intelligence Community.
  Thank you to my current committee staff: Darren Dick, Katie 
Wheelbarger, Sarah Geffroy, Andy Keiser, Bryan Smith, Ashley Lowry, 
Susan Phalen, Tom Corcoran, Michael Ellis, Chelsey Campbell, Geof Kahn, 
Brooke Eisele, Randy Smith, Jim Hildebrand, Shannon Stuart, Rachel 
Wilson, Lisa Major, Diane Rinaldo. Thank you, as well as to those who 
are no longer with the staff but played an influential role in 
committee activities during my tenure as Chairman: Michael Allen, Chris 
Donesa, Jamil Jaffer, Nathan Hauser, Todd Jones, Frank Garcia, George 
Pappas, Will Koella, Leah Scott, Fred Fleitz, and Stephanie Pelton.
  Finally, a big thank you to our dedicated Security and Information 
Technology staff who keep us up and running everyday: Brandon Smith, 
Kristin Jepson and Kevin Klein.

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE INTELLIGENCE AUTHORIZATION 
                        ACT FOR FISCAL YEAR 2015

       The following consists of the explanatory material to 
     accompany the Intelligence Authorization Act for Fiscal Year 
     2015.
       This joint explanatory statement shall have the same effect 
     with respect to the implementation of this Act as if it were 
     a joint explanatory statement of a committee of conference.
       This explanatory statement is accompanied by a classified 
     annex that contains a classified Schedule of Authorizations. 
     The classified Schedule of Authorizations is incorporated by 
     reference in the Act and has the legal status of public law.
       The classified annex and classified Schedule of 
     Authorizations are the result of negotiations between the 
     Senate Select Committee on Intelligence and the House 
     Permanent Select Committee on Intelligence to reconcile 
     differences in their respective versions of the Intelligence 
     Authorization Act for Fiscal Year 2015. The congressionally 
     directed actions described in Senate Report No. 113-233, the 
     classified annex that accompanied Senate Report No. 113-233, 
     and the classified annex that accompanied House Report No. 
     113-463 should be carried out to the extent they are not 
     amended, altered, substituted, or otherwise specifically 
     addressed in either this Joint Explanatory Statement or in 
     the classified annex to this Statement.

              Section-by-Section Analysis and Explanation

       The following is a section-by-section analysis and 
     explanation of the Intelligence Authorization Act for Fiscal 
     Year 2015.

                    Title I--Intelligence Activities

     Section 101. Authorization of appropriations
       Section 101 lists the United States Government departments, 
     agencies, and other elements for which the Act authorizes 
     appropriations for intelligence and intelligence-related 
     activities for Fiscal Year 2015.
     Section 102. Classified Schedule of Authorizations
       Section 102 provides that the details of the amounts 
     authorized to be appropriated for intelligence and 
     intelligence-related activities and the applicable personnel 
     levels by program for Fiscal Year 2015 are contained in the 
     classified Schedule of Authorizations and that the classified 
     Schedule of Authorizations shall be made available to the 
     Committees on Appropriations of the Senate and House of 
     Representatives and to the President.
     Section 103. Personnel ceiling adjustments
       Section 103 is intended to provide additional flexibility 
     to the DNI in managing the civilian personnel of the 
     Intelligence Community (IC). Section 103 provides that the 
     DNI may authorize employment of civilian personnel in Fiscal 
     Year 2015 in excess of the number of authorized positions by 
     an amount not exceeding three percent of the total limit 
     applicable to each IC element under Section 102. The DNI may 
     do so only if necessary to the performance of important 
     intelligence functions.
     Section 104. Intelligence Community Management Account
       Section 104 authorizes appropriations for the Intelligence 
     Community Management Account (ICMA) of the DNI and sets the 
     authorized personnel levels for the elements within the ICMA 
     for Fiscal Year 2015.

 Title II--Central Intelligence Agency Retirement and Disability System

     Section 201. Authorization of appropriations
       Section 201 authorizes appropriations in the amount of 
     $514,000,000 for Fiscal Year 2015 for the Central 
     Intelligence Agency Retirement and Disability Fund.

                     Title III--General Provisions


                      Subtitle A--General Matters

     Section 301. Increase in employee compensation and benefits 
         authorized by law
       Section 301 provides that funds authorized to be 
     appropriated by the Act for salary, pay, retirement, and 
     other benefits for federal employees may be increased by such 
     additional or supplemental amounts as may be necessary for 
     increases in compensation or benefits authorized by law.
     Section 302. Restriction on conduct of intelligence 
         activities
       Section 302 provides that the authorization of 
     appropriations by the Act shall not be deemed to constitute 
     authority for the conduct of any intelligence activity that 
     is not otherwise authorized by the Constitution or laws of 
     the United States.
     Section 303. National intelligence strategy
       Section 303 amends the National Security Act of 1947 to 
     require the DNI to develop a comprehensive national 
     intelligence strategy every four years beginning in 2017.
     Section 304. Software licensing
       Section 304 amends Section 109 of the National Security Act 
     of 1947, which requires chief information officers within the 
     IC to prepare biennial inventories and assessments concerning 
     the use and procurement of software licenses, to make certain 
     enhancements to the biennial assessments required under 
     Section 109.
     Section 305. Reporting of certain employment activities by 
         former intelligence officers and employees
       Section 305 requires the head of each element of the IC to 
     issue regulations that require an employee occupying 
     positions with access to particularly sensitive information 
     within such element to sign a written agreement that requires 
     the regular reporting of any employment by, representation 
     of, or the provision of advice relating to national security 
     to the government of a foreign country, or any person whose 
     activities are supervised, directed, controlled, financed, or 
     subsidized by any government of a foreign country, for a two-
     year period after the employee ceases employment with the IC 
     element.
     Section 306. Inclusion of Predominantly Black Institutions in 
         intelligence officer training program
       Section 306 amends the National Security Act of 1947 to 
     include predominantly black institutions in the intelligence 
     officer training programs established under Section 1024 of 
     the Act.
     Section 307. Management and oversight of financial 
         intelligence
       Section 307 requires the DNI to prepare a plan for 
     management of the elements of the IC that carry out financial 
     intelligence activities.
     Section 308. Analysis of private sector policies and 
         procedures for countering insider threats
       Section 308 directs the DNI to submit to the congressional 
     intelligence committees an analysis of private sector 
     policies and procedures for countering insider threats.
     Section 309. Procedures for the retention of incidentally 
         acquired communications
       Section 309 requires the head of each element of the IC to 
     adopt Attorney General-approved procedures that govern the 
     retention of nonpublic telephone or electronic communications 
     acquired without consent of a person who is a party to the 
     communications, including communications in electronic 
     storage.
       The procedures required under this section shall apply to 
     any intelligence activity that is reasonably anticipated to 
     result in the acquisition of such telephone or electronic 
     communications to or from a United States person not 
     otherwise authorized by court order, subpoena, or similar 
     legal process, regardless of the location where the 
     collection occurs. The procedures shall prohibit the 
     retention of such telephone or electronic communications for 
     a period in excess of five years, unless the communications 
     are determined to fall within one of several categories, 
     enumerated in subsection (b)(3)(B), for which retention in 
     excess of five years is authorized, to include communications 
     that have been affirmatively determined to constitute foreign 
     intelligence or counterintelligence, communications that are 
     reasonably

[[Page H8959]]

     believed to constitute evidence of a crime and are retained 
     by a law enforcement agency, and communications that are 
     enciphered or reasonably believed to have a secret meaning.
       Because it may be necessary in certain instances for IC 
     elements to retain communications covered by this section for 
     a period in excess of five years that do not fall into the 
     categories specifically enumerated in subsection (b)(3)(B), 
     subsection (b)(3)(B)(vii) provides flexibility for the head 
     of each element of the intelligence community to authorize 
     such extended retention where the head of the element 
     determines that it is necessary to protect the national 
     security of the United States. In the absence of such a 
     determination, Section 309 is intended to establish a default 
     rule for intelligence collection activities, not otherwise 
     authorized by legal process, that requires agencies to delete 
     communications covered by this section after five years, 
     unless a determination is made that the communications 
     constitute foreign intelligence or counterintelligence or 
     otherwise meet the retention requirements set forth in this 
     section.
     Section 310. Clarification of limitation of review to 
         retaliatory security clearance or access determinations
       Section 310 makes a technical amendment to Section 
     3001(b)(7) of the Intelligence Reform and Terrorism 
     Prevention Act of 2004 to clarify that the policies and 
     procedures prescribed by that section (to permit individuals 
     to appeal adverse security clearance or access 
     determinations) are only required to apply to adverse 
     security clearance or access determinations alleged to be in 
     reprisal for having made a protected whistleblower 
     disclosure.
     Section 311. Feasibility study on consolidating classified 
         databases of cyber threat indicators and malware samples
       Section 307 requires the DNI to conduct a feasibility study 
     on consolidating classified databases of cyber threat 
     indicators and malware samples in the IC and to provide a 
     report to the congressional intelligence committees 
     summarizing the feasibility study.
     Section 312. Sense of Congress on cybersecurity threat and 
         cybercrime cooperation with Ukraine
       Section 312 expresses the sense of Congress concerning 
     cybersecurity threat and cybercrime cooperation between the 
     United States and Ukraine.
     Section 313. Replacement of locally employed staff serving at 
         United States diplomatic facilities in the Russian 
         Federation
       Section 313 requires the Secretary of State to ensure that 
     every supervisory position at a U.S. diplomatic facility in 
     the Russian Federation is occupied by a citizen of the United 
     States who has passed a background check and to provide 
     Congress with a plan to further reduce reliance on locally 
     employed staff.
     Section 314. Inclusion of Sensitive Compartmented Information 
         Facilities in United States diplomatic facilities in the 
         Russian Federation and adjacent countries
       Section 314 requires that each U.S. diplomatic facility 
     that is constructed in, or undergoes a construction upgrade 
     in, the Russian Federation, any country that shares a land 
     border with the Russian Federation, or any country that is a 
     former member of the Soviet Union, shall be constructed to 
     include a Sensitive Compartmented Information Facility. The 
     Secretary of State may waive the requirements of this section 
     upon a determination that it is in the national security 
     interest of the United States.


                         Subtitle B--Reporting

     Section 321. Report on declassification process
       Section 321 requires the DNI to submit a report to Congress 
     describing proposals to improve the declassification process 
     and steps the IC could take or legislation that may be 
     necessary, to enable the National Declassification Center to 
     better accomplish the missions assigned to the Center by 
     Executive Order 13526.
     Section 322. Report on intelligence community efficient 
         spending targets
       Section 322 requires the DNI to submit a report to the 
     congressional intelligence committees on the status and 
     effectiveness of efforts to reduce administrative costs for 
     the IC during the preceding year.
     Section 323. Annual report on violations of law or executive 
         order
       Section 323 requires the DNI to report annually to the 
     congressional intelligence committees on violations of law or 
     executive order by personnel of an element of the IC that 
     were identified during the previous calendar year. Under the 
     National Security Act, the President is required to keep the 
     congressional intelligence committees fully and currently 
     informed of the intelligence activities of the United States 
     government. Nonetheless, this annual reporting requirement is 
     necessary to ensure that the intelligence oversight 
     committees of the House and Senate are made fully aware of 
     violations of law or executive order, including, in 
     particular, violations of Executive order 12333 for 
     activities not otherwise subject to the Foreign Intelligence 
     Surveillance Act.
     Section 324. Annual report on intelligence activities of the 
         Department of Homeland Security
       Section 324 requires the Under Secretary for Intelligence 
     and Analysis of the DHS to provide the congressional 
     intelligence committees with a report on each intelligence 
     activity of each intelligence component of the Department 
     that includes, among other things, the amount of funding 
     requested, the number of full-time employees, and the number 
     of full-time contractor employees. In addition, Section 324 
     requires the Secretary of Homeland Security to submit to the 
     congressional intelligence committees a report that examines 
     the feasibility and advisability of consolidating the 
     planning, programming, and resourcing of such activities 
     within the Homeland Security Intelligence Program (HSIP).
       The HSIP budget was established to fund those intelligence 
     activities that principally support missions of the DHS 
     separately from those of the NIP. To date, however, this 
     mechanism has only been used to supplement the budget for the 
     office of Intelligence and Analysis. It has not been used to 
     fund the activities of the non-IC components in the DHS that 
     conduct intelligence-related activities. As a result, there 
     is no comprehensive reporting to Congress regarding the 
     overall resources and personnel required in support of the 
     Department's intelligence activities.
     Section 325. Report on political prison camps in North Korea
       Section 325 requires the DNI to submit a report on 
     political prison camps in North Korea to the congressional 
     intelligence committees.
     Section 326. Assessment of security of domestic oil 
         refineries and related rail transportation infrastructure
       Section 326 requires the Under Secretary of Homeland 
     Security for Intelligence and Analysis to conduct an 
     intelligence assessment of the security of domestic oil 
     refineries and related rail transportation infrastructure.
     Section 327. Enhanced contractor level assessments for the 
         intelligence community
       Section 327 amends the National Security Act of 1947 to 
     require that the annual personnel level assessments for the 
     IC, required under Section 506B of the Act, include a 
     separate estimate of the number of intelligence collectors 
     and analysts contracted by each element of the IC and a 
     description of the functions performed by such contractors.
     Section 328. Assessment of the efficacy of memoranda of 
         understanding to facilitate intelligence-sharing
       Section 328 requires the Under Secretary of Homeland 
     Security for Intelligence and Analysis to provide appropriate 
     congressional committees with an assessment of the efficacy 
     of the memoranda of understanding signed between Federal, 
     State, local, tribal, and territorial agencies to facilitate 
     intelligence-sharing within and separate from the Joint 
     Terrorism Task Force. This study should help identify any 
     obstacles to intelligence sharing between agencies, 
     particularly any obstacles that might have impeded 
     intelligence sharing in the wake of the April 2013 bombing of 
     the Boston Marathon, and find improvements to existing 
     intelligence sharing relationships.
     Section 329. Report on foreign man-made electromagnetic pulse 
         weapons
       Section 329 requires the DNI to provide appropriate 
     congressional committees with a report on the threat posed by 
     manmade electromagnetic pulse weapons to United States 
     interests through 2025.
     Section 330. Report on United States counterterrorism 
         strategy to disrupt, dismantle, and defeat al-Qaeda and 
         its affiliated or associated groups
       Section 330 requires the DNI to provide appropriate 
     congressional committees with a report on the United States 
     counterterrorism strategy to disrupt, dismantle, and defeat 
     al-Qaeda and its affiliated or associated groups.
     Section 331. Feasibility study on retraining veterans in 
         cybersecurity
       Section 331 requires the DNI to submit to Congress a 
     feasibility study on retraining veterans and retired members 
     of elements of the IC in cybersecurity.

  Mr. RUPPERSBERGER. Mr. Speaker, I yield myself such time as I may 
consume.
  Chairman Rogers, this is my last opportunity on the floor to thank 
you again for your leadership. It has, once again, produced a strong, 
bipartisan, and bicameral Intelligence Authorization Act.
  Our committee believes that our Nation's security is too important to 
be a political football. We have had different views, we argue, but we 
work it out for the good of American people.
  Mr. Chairman, I hope that your legacy of bipartisanship, hard work, 
rigorous oversight, and problem-solving continues and spreads 
throughout the Congress. It is amazing what we can accomplish when we 
work together to solve problems.
  I also want to thank our counterparts in the Senate Intelligence 
Committee, Senators Feinstein and Chambliss, for working very closely 
with us and each member of our committee. On the Democratic side, I 
want to acknowledge all the hard work of Mr. Thompson--who is sitting 
here to my left--Ms. Schakowsky, Mr. Langevin,

[[Page H8960]]

Mr. Schiff, Mr. Gutierrez, Mr. Pastor, Mr. Himes, and Ms. Sewell. And I 
want to thank our staff and the dedicated men and women of the 
intelligence community who work every day and all night throughout the 
world to protect us. I do agree with the chairman's statements about 
those men and women throughout the world who are out there protecting 
us and putting their lives on the line.
  Now, today, we look beyond this Congress. We come together to set the 
stage for the continuing oversight of intelligence programs, personnel, 
and dollars. By doing so, we reinforce to the American people, and to 
the world, that there are checks and balances. We reinforce that the 
tools we authorize are for the sole purpose of keeping us, our allies, 
and our partners safe.
  In May, the House passed the Intelligence Authorization Act for 
fiscal years 2014 and 2015 by 345 votes to 19. The Senate, however, 
took up each year separately. Over the summer, this House passed the 
FY14 bill, which the President signed.
  So, we now take up the FY15 bill, which the Senate amended and sent 
back to us. This amended bill largely mirrors the relevant portions of 
the House-passed combined bill.
  Passing a detailed Intelligence Authorization Act ensures that our 
intelligence agencies spend money only on programs Congress is informed 
of, approves, and can continuously oversee.

                              {time}  1300

  Oversight is extremely important. It helps to make sure that 
everything our intelligence agencies do follows the Constitution and 
the laws of the United States and maximizes the civil liberties and 
privacy of Americans. At the same time, the intelligence agencies need 
the clear authorization, direction, and guidance from Congress to do 
their vital work to protect and defend America, its allies, and its 
partners.
  The Intelligence Authorization Act is split into four parts: the 
unclassified legislative text; the unclassified report; the classified 
annex, which explains our intent for the classified aspects of the 
bill; and the classified schedule of authorizations.
  While we have made cuts to certain areas and added money in others to 
produce a responsible, well thought out, and fiscally prudent budget, 
the budget for fiscal year 2015 slightly exceeds the President's 
request.
  While over the last 4 years we have reduced the intelligence 
community's budget by over a billion dollars, this year's bill 
acknowledges the need to make corrections after the drastic cuts of 
sequestration and the Budget Control Act.
  Additionally, this bill acknowledges the need to step up our 
intelligence efforts to counter evolving threats such as ISIL. It is a 
dangerous world out there, and our bill accounts for that.
  Let me also mention some specifics in the bill. First, it continues 
to emphasize the value of our space programs and endorses aggressive 
action to decrease our reliance on Russian-made engines to launch our 
national security satellites.
  Two, it makes investments into research and development to defend 
against next generation threats and to stay ahead of countries like 
China and Russia. Three, it further improves the continuous evaluation 
of insider threats while safeguarding privacy and civil liberties.
  Next, it enables better intelligence and information sharing to 
prevent foreign fighters coming in and out of Syria. It also enables 
cutting-edge Defense Intelligence Agency technology. We must stay ahead 
of the curve in technology.
  The bill also further refines the Department of Defense human 
intelligence capabilities while supporting communitywide human 
intelligence efforts to better understand the enemies' plans and 
intentions. It also establishes increased accountability measures for 
our most sensitive programs.
  The committee has worked with the intelligence community and the 
Senate to produce this solid, bipartisan bill. This bill also 
incorporates the valuable floor amendments the House passed in May. It 
represents a culmination of our committee's work through extensive 
hearings and briefings, travel, and in-depth studies. The bill is 
strong, and I am proud to support it.
  For the sake of keeping the country, its allies, and partners safe 
and for the sake of thoroughly overseeing even the most classified 
intelligence programs, I urge my colleagues to pass the bill today.
  Mr. Speaker, I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Speaker, I yield myself such time as I 
may consume.
  I thought I would take a moment to extend my thanks to all the 
dedicated staff on the committee, certainly from the Republican side 
and to the Democrats as well, who worked hard over the years to get us 
back on track in passing this annual authorization bill in our daily 
oversight of the intelligence community.
  If you will indulge me, Mr. Speaker, thank you to my current 
committee staff: Darren Dick, Katie Wheelbarger, Sarah Geffroy, Andy 
Keiser, Bryan Smith, Ashley Lowry, Susan Phalen, Tom Corcoran, Michael 
Ellis, Chelsey Campbell, Geof Kahn, Brooke Eisele, Randy Smith, Jim 
Hildebrand, Shannon Stuart, Rachel Wilson, Lisa Major, and Diane 
Rinaldo.
  Thank you as well to staff who have played an influential role in the 
committee activities during my tenure as chairman in reengaging this as 
a force for oversight in the Intelligence Committee: Michael Allen, 
Chris Donesa, Jamil Jaffer, Nathan Hauser, Todd Jones, Frank Garcia, 
George Pappas, Will Koella, Leah Scott, Fred Fleitz, and Stephanie 
Pelton.
  Finally, a big thank you to our dedicated security and information 
technology staff, by the way, who have done well to beat back the 
hordes of our nation state actors who, for some reason, Mr. Speaker, 
took a good interest in what we were doing in that classified space, 
and they kept us up and running every single day: Brandon Smith, 
Kristin Jepson, and Kevin Klein.
  Mr. Speaker, I reserve the balance of my time.
  Mr. RUPPERSBERGER. Mr. Chairman, I yield 2 minutes to the gentleman 
from California (Mr. Thompson), a great member of our committee who 
specialized in infrastructure and also worked very hard to make sure 
that our Embassies have the intelligence information they need to 
protect themselves.
  Mr. THOMPSON of California. I thank the gentleman for yielding and 
for all the good work you did on the committee as the ranking member. I 
also want to thank Chairman Rogers for the good work that he did as the 
chairman.
  Working together, he was very accommodating and allowed all of us to 
be able to address specific issues that were of concern to us and 
regarding the security of our great Nation. Thank you, Mr. Chairman. We 
are going to miss you.
  Mr. Speaker, I rise today in strong support of the passage of this 
bill. This bill will provide greater national security for our country 
and the people that we all represent.
  The bill contains two important provisions that I authored that 
protect our communities at home and diplomatic facilities abroad.
  My district is home to several oil refineries, employing thousands of 
people, providing well-paying, good, middle class jobs, and are a key 
part of our regional economy.
  As domestic oil production continues to increase in the region, I 
have heard from several of my constituents and my local governments 
about their growing concern regarding the security of the shipment and 
storage of crude oil and subsequent refined products. I believe we have 
the responsibility to protect our workers, our domestic refineries, and 
our communities from potential threats.
  Included in this bill is a provision that directs the Department of 
Homeland Security Office of Intelligence and Analysis to conduct an 
assessment of the security of our Nation's oil refineries and related 
rail transportation infrastructure. It directs the office to make 
recommendations on how to improve intelligence collection and sharing 
of information to better protect those facilities in the surrounding 
communities from any harm.
  Additionally, studies conducted in response to the terrible 2012 
attack on Benghazi identified the need for security personnel at U.S. 
diplomatic posts to receive threat information in a more timely manner.

[[Page H8961]]

  The SPEAKER pro tempore. The time of the gentleman has expired.
  Mr. RUPPERSBERGER. Mr. Speaker, I yield the gentleman an additional 
30 seconds.
  Mr. THOMPSON of California. In response to this need, this bill 
requires the Director of National Intelligence to provide an assessment 
of the status of threat information sharing between the intelligence 
community and diplomatic security personnel and to propose actions to 
help make sure security personnel at U.S. Embassies are better able to 
request and receive security enhancements in a timely manner.

  By making sure our intelligence community is taking concerns 
seriously and sharing the necessary information, we can better assess 
and mitigate threats and increase security at home and abroad and make 
our country safer.
  I urge my colleagues to join me in passing this good piece of 
legislation.
  Mr. ROGERS of Michigan. Mr. Speaker, I reserve the balance of my 
time.
  Mr. RUPPERSBERGER. Mr. Speaker, I yield 2 minutes to the gentleman 
from California, Mr. Adam Schiff, a great member of our committee with 
a tremendous work ethic. He reads almost every piece of intelligence 
information and comes to quality and informed conclusions.
  He also has focused a lot and specialized in working with legislation 
involving transparency and accountability and has spent a lot of time 
on an area that is very important to our Intelligence Committee, the 
space program.
  Mr. SCHIFF. Mr. Speaker, I thank the gentleman for yielding, and I 
want to join my colleagues in urging the House to support the 2015 
Intelligence Authorization Act which has now returned to us from the 
Senate, but before I address the substance of the bill, I would like to 
congratulate Chairman Rogers and Ranking Member Ruppersberger for their 
extraordinary efforts to get this bill passed and to the President.
  As a member of the Intelligence Committee, I know how hard they and 
the staff have worked to make this happen, and I would especially like 
to congratulate Chairman Rogers and wish him well as he prepares to 
leave the House at the end of the year. It has been a great pleasure 
working with you, and I wish you all the very best.
  These are challenging days for America's intelligence officers and 
analysts. As ISIS continues to threaten the Middle East; as Russia's 
``little green men'' continue to coordinate attacks on the Ukrainian 
Government; as North Korea's young, isolated, and often dangerously 
erratic leader continues his behavior; and as the international 
community continues its efforts to secure Iran's agreement to dismantle 
its nuclear weapons program and infrastructure, our intelligence 
professionals play a vital role in keeping us safe and secure.
  Developing and maintaining actionable intelligence on ISIS is of 
particular urgency. While the intelligence community has been following 
ISIS' growth for some time, the group's takeover of a large swath of 
Syria and Iraq has made it a top intelligence priority.
  If we are to be effective in partnering with regional allies to 
degrade and destroy ISIS, we need to be able to develop the very best 
intelligence and accurate ground truth. That takes time, and it takes 
assets--on the ground, in the air, in space--to collect information. It 
also takes the world class analysts of our intelligence community to 
turn that information into recommendations for policymakers.
  We must also remain focused on Russian efforts to destabilize its 
neighbors, particularly Ukraine, but also the Baltic States. Our 
intelligence community has given us insight into Russian involvement in 
these efforts and into the events that led to the tragic downing of the 
Malaysian airliner last summer.
  The bill also prioritizes vital efforts at nonproliferation and will 
help give us the tools that we need to assess events on the ground in 
North Korea and Iran and wherever there is a threat of WMD.
  These are but a few of the important matters covered in the 
Intelligence Authorization bill. As a member of the committee who has 
been proud to work closely with both the chair and ranking member, I am 
confident it supports our intelligence professionals while providing 
oversight that is so critical to the proper functioning of our 
intelligence agencies.
  Mr. ROGERS of Michigan. Mr. Speaker, I continue to reserve the 
balance of my time.
  Mr. RUPPERSBERGER. Mr. Speaker, I yield myself such time as I may 
consume.
  Mr. Speaker, in closing, I urge my colleagues to vote for this 
important bipartisan and bicameral bill. It is the single most 
effective oversight tool we have, and it ensures that our intelligence 
community has what it needs to keep us and our allies safe. 
Intelligence is often the first line of defense against a dangerous 
world. Without it, we are in the dark, and we are vulnerable.
  Finally, once again, let me just say thank you to my good friend, Mr. 
Chairman, and to the members of the committee, to our colleagues in the 
Senate, and to the men and women of the intelligence community. It has 
been my honor and privilege to work with you under your great 
leadership during the 113th Congress.
  I also want to thank the Republican and Democratic staffs for working 
together. That is what makes it work. You are only as good as your team 
and your staff.
  I also would like to acknowledge the Democratic staff: Staff Director 
Heather Molino, Amanda Rogers-Thorpe, Bob Minehart, Linda Cohen, Carly 
Blake, Allison Getty, Deb Haynie, and Michael Bahar.
  I also thank staff members who were with us but have retired: Mike 
Shank, Janet Fisher, and Khizer Sayed.
  Mr. Speaker, I yield back the balance of my time.
  Mr. ROGERS of Michigan. Mr. Speaker, I yield myself the balance of my 
time.
  Mr. Speaker, again, I want to thank my friends on the other side of 
the aisle, from Dutch to Heather, and the whole entire team for putting 
this product together by putting our country first. It is very 
important.
  I challenge every Member to read this material next year when it is 
announced that you can review the classified annex. Review the 
classified annex. I think they will have a better perspective at the 
huge number of challenges facing the United States when it comes to 
real threats developing around the world.
  Mr. Speaker, I would again say thanks to all, and I yield back the 
balance of my time.
  Mr. LANGEVIN. Mr. Speaker, I am proud to support the Intelligence 
Authorization Act. As a member of the Armed Services and Intelligence 
Committees, I know these Authorization bills provide the necessary 
accountability, direction, and resources for those who keep our nation 
safe.
  Today's bill reflects the continuation of the Committee's bipartisan 
and bicameral work, and I want to thank Chairman Rogers and Ranking 
Member Ruppersberger for their strong and consistent leadership on 
these critical issues.
  Today I want to highlight two areas of specific interest to me.
  First, this legislation strikes a careful balance between ensuring 
that our nation's secrets are kept safe and providing appropriate 
transparency with the American people. There are lawful ways to raise 
concerns of wrongdoing and procedures to declassify information when 
appropriate. In the past, Congress has strengthened these avenues, 
including by enhancing whistleblower protections and the role of 
Inspectors General.
  As it has each year, this bill adds to the mission of 
counterintelligence to ensure that information is protected and that 
the tools utilized by security professionals are handled lawfully and 
with full consideration for the privacy and civil liberties of our 
intelligence professionals. This bill continues this important 
direction, asking the DNI to establish appropriate guidelines to govern 
how publicly available information can be utilized.
  Second, this bill continues to support the work of the men and women 
at the front lines of cybersecurity. It helps cyber professionals at 
NSA, FBI, and DHS to hone their tools and skills to protect us, while 
supporting initiatives to grow the next-generation cyber workforce. And 
it will further aid the Intelligence Community in understanding and 
defending certain networks from cyber threats.
  Mr. Speaker, I am proud of our work on this bill, and I urge its 
passage.
  The SPEAKER pro tempore. The question is on the motion offered by the 
gentleman from Michigan (Mr. Rogers) that the House suspend the

[[Page H8962]]

rules and concur in the Senate amendment to the bill, H.R. 4681.
  The question was taken.
  The SPEAKER pro tempore. In the opinion of the Chair, two-thirds 
being in the affirmative, the ayes have it.
  Mr. AMASH. Mr. Speaker, on that I demand the yeas and nays.
  The yeas and nays were ordered.
  The SPEAKER pro tempore. Pursuant to clause 8 of rule XX, further 
proceedings on this motion will be postponed.

                          ____________________

[Congressional Record Volume 160, Number 150 (Wednesday, December 10, 2014)]
[House]
[Pages H8991-H8992]
From the Congressional Record Online through the Government Printing Office [www.gpo.gov]




     INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEARS 2014 AND 2015

  The SPEAKER pro tempore. The unfinished business is the vote on the 
motion to suspend the rules and concur in the Senate amendment to the 
bill (H.R. 4681) to authorize appropriations for fiscal years 2014 and 
2015 for intelligence and intelligence-related activities of the United 
States Government, the Community Management Account, and the Central 
Intelligence Agency Retirement and Disability System, and for other 
purposes, on which the yeas and nays were ordered.
  The Clerk read the title of the bill.
  The SPEAKER pro tempore. The question is on the motion offered by the 
gentleman from Michigan (Mr. Rogers) that the House suspend the rules 
and concur in the Senate amendment.
  This is a 5-minute vote.
  The vote was taken by electronic device, and there were--yeas 325, 
nays 100, not voting 9, as follows:

                             [Roll No. 558]

                               YEAS--325

     Adams
     Aderholt
     Amodei
     Bachmann
     Bachus
     Barber
     Barletta
     Barr
     Barrow (GA)
     Barton
     Beatty
     Becerra
     Benishek
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Black
     Blackburn
     Boustany
     Brady (PA)
     Brady (TX)
     Braley (IA)
     Brooks (IN)
     Brown (FL)
     Brownley (CA)
     Buchanan
     Bucshon
     Bustos
     Butterfield
     Byrne
     Calvert
     Camp
     Capito
     Capps
     Cardenas
     Carney
     Carson (IN)
     Carter
     Cartwright
     Cassidy
     Castor (FL)
     Castro (TX)
     Chabot
     Chaffetz
     Cicilline
     Clay
     Cleaver
     Clyburn
     Coble
     Coffman
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Connolly
     Cook
     Cooper
     Costa
     Cotton
     Courtney
     Cramer
     Crawford
     Crenshaw
     Crowley
     Cuellar
     Culberson
     Daines
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeGette
     Delaney
     DeLauro
     Denham
     Dent
     DeSantis
     Deutch
     Diaz-Balart
     Dingell
     Duffy
     Edwards
     Ellison
     Ellmers
     Engel
     Enyart
     Esty
     Farenthold
     Fattah
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Flores
     Forbes
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen

[[Page H8992]]


     Fudge
     Gabbard
     Gallego
     Gardner
     Gerlach
     Gibbs
     Gingrey (GA)
     Goodlatte
     Granger
     Graves (MO)
     Green, Al
     Green, Gene
     Griffin (AR)
     Grimm
     Guthrie
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (WA)
     Heck (NV)
     Hensarling
     Herrera Beutler
     Higgins
     Himes
     Hinojosa
     Holding
     Horsford
     Hoyer
     Hudson
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jeffries
     Jenkins
     Johnson (GA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jolly
     Joyce
     Keating
     Kelly (IL)
     Kelly (PA)
     Kennedy
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     LaMalfa
     Lamborn
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Larson (CT)
     Latham
     Latta
     Levin
     Lipinski
     LoBiondo
     Loebsack
     Long
     Lowey
     Lucas
     Luetkemeyer
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Lynch
     Maffei
     Maloney, Carolyn
     Maloney, Sean
     Marchant
     Marino
     Matheson
     McAllister
     McCarthy (CA)
     McCarthy (NY)
     McCaul
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     McNerney
     Meehan
     Meeks
     Meng
     Messer
     Michaud
     Miller (MI)
     Miller, George
     Moran
     Mullin
     Murphy (FL)
     Murphy (PA)
     Napolitano
     Neal
     Neugebauer
     Noem
     Nolan
     Norcross
     Nunes
     Nunnelee
     Olson
     Owens
     Palazzo
     Pascrell
     Pastor (AZ)
     Paulsen
     Payne
     Pearce
     Pelosi
     Perlmutter
     Peters (CA)
     Peters (MI)
     Peterson
     Petri
     Pingree (ME)
     Pittenger
     Pitts
     Pompeo
     Price (GA)
     Price (NC)
     Quigley
     Rahall
     Reed
     Reichert
     Renacci
     Rice (SC)
     Richmond
     Rigell
     Roby
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Roybal-Allard
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Rush
     Ryan (OH)
     Ryan (WI)
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Scalise
     Schiff
     Schneider
     Schock
     Schwartz
     Schweikert
     Scott (VA)
     Scott, David
     Sessions
     Sewell (AL)
     Shea-Porter
     Sherman
     Shimkus
     Shuster
     Simpson
     Sinema
     Sires
     Slaughter
     Smith (MO)
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Southerland
     Stewart
     Stivers
     Stutzman
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tiberi
     Titus
     Tonko
     Tsongas
     Turner
     Upton
     Valadao
     Van Hollen
     Vargas
     Veasey
     Vela
     Visclosky
     Wagner
     Walberg
     Walden
     Walorski
     Walz
     Wasserman Schultz
     Waxman
     Webster (FL)
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (FL)
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Yoder
     Young (AK)
     Young (IN)

                               NAYS--100

     Amash
     Bass
     Bentivolio
     Blumenauer
     Bonamici
     Brat
     Bridenstine
     Brooks (AL)
     Broun (GA)
     Burgess
     Chu
     Clark (MA)
     Clarke (NY)
     Clawson (FL)
     Cohen
     Conyers
     Cummings
     DeFazio
     DelBene
     DesJarlais
     Doggett
     Doyle
     Duncan (SC)
     Duncan (TN)
     Eshoo
     Farr
     Garamendi
     Garcia
     Garrett
     Gibson
     Gohmert
     Gosar
     Gowdy
     Graves (GA)
     Grayson
     Griffith (VA)
     Grijalva
     Gutierrez
     Hahn
     Hanabusa
     Hastings (FL)
     Heck (WA)
     Holt
     Honda
     Huelskamp
     Huffman
     Jackson Lee
     Jones
     Jordan
     Kaptur
     Kildee
     Kingston
     Labrador
     Lee (CA)
     Lewis
     Lofgren
     Lowenthal
     Lummis
     Massie
     Matsui
     McClintock
     McCollum
     McDermott
     McGovern
     Meadows
     Mica
     Moore
     Mulvaney
     Nadler
     Nugent
     O'Rourke
     Pallone
     Perry
     Pocan
     Poe (TX)
     Polis
     Posey
     Rangel
     Ribble
     Roe (TN)
     Rohrabacher
     Salmon
     Sanford
     Schakowsky
     Scott, Austin
     Sensenbrenner
     Serrano
     Speier
     Stockman
     Swalwell (CA)
     Takano
     Tierney
     Tipton
     Velazquez
     Waters
     Weber (TX)
     Welch
     Woodall
     Yarmuth
     Yoho

                             NOT VOTING--9

     Campbell
     Capuano
     Duckworth
     Hall
     Miller (FL)
     Miller, Gary
     Negrete McLeod
     Schrader
     Smith (WA)


                Announcement by the Speaker Pro Tempore

  The SPEAKER pro tempore (Mr. Hultgren) (during the vote). There are 2 
minutes remaining.

                              {time}  1704

  Mr. SERRANO changed his vote from ``yea'' to ``nay.''
  Mr. ELLISON changed his vote from ``nay'' to ``yea.''
  So (two-thirds being in the affirmative) the rules were suspended and 
the Senate amendment was concurred in.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.
  Stated against:
  Mr. ELLISON. Mr. Speaker, during rollcall vote No. 558 on H.R. 4681, 
I mistakenly recorded my vote as ``yes'' when I should have voted 
``no.''

                          ____________________