[Congressional Record Volume 160, Number 147 (Thursday, December 4, 2014)]
[House]
[Pages H8385-H8632]

[...]

                      Motion Offered by Mr. McKeon

  Mr. McKEON. Mr. Speaker, I have a motion at the desk.
  The SPEAKER pro tempore. The Clerk will designate the motion.
  The text of the motion is as follows:

       Mr. McKeon moves that the House concur in the Senate 
     amendment to H.R. 3979 with an amendment consisting of the 
     text of Rules Committee Print 113-58 modified by the 
     amendments printed in part A of House Report 113-646 and the 
     amendment specified in section 5 of House Resolution 770.

  The text of the House amendment to the Senate amendment to the text 
is as follows:

[[Page H8388]]

       In lieu of the matter proposed to be inserted by the Senate 
     amendment to H.R. 3979, insert the following:

     SECTION 1. SHORT TITLE.

       (a) Short Title.--This Act may be cited as the ``Carl Levin 
     and Howard P. `Buck' McKeon National Defense Authorization 
     Act for Fiscal Year 2015''.

[...]

     SEC. 1052. RESPONSE OF THE DEPARTMENT OF DEFENSE TO 
                   COMPROMISES OF CLASSIFIED INFORMATION.

       (a) Findings.--Congress makes the following findings:
       (1) Compromises of classified information cause 
     indiscriminate and long-lasting damage to United States 
     national security and often have a direct impact on the 
     safety of warfighters.
       (2) In 2010, hundreds of thousands of classified documents 
     were illegally copied and disclosed across the Internet.
       (3) Classified information has been disclosed in numerous 
     public writings and manuscripts endangering current 
     operations.
       (4) In 2013, nearly 1,700,000 files were downloaded from 
     United States Government information systems, threatening the 
     national security of the United States and placing the lives 
     of United States personnel at extreme risk. The majority of 
     the information compromised relates to the capabilities, 
     operations, tactics, techniques, and procedures of the Armed 
     Forces of the United States, and is the single greatest 
     quantitative compromise in the history of the United States.
       (5) The Department of Defense is taking steps to mitigate 
     the harm caused by these leaks.
       (6) Congress must be kept apprised of the progress of the 
     mitigation efforts to ensure the protection of the national 
     security of the United States.
       (b) Reports Required.--
       (1) Initial report.--Not later than 60 days after the date 
     of the enactment of this Act, the Secretary of Defense shall 
     submit to the congressional defense committees a report on 
     actions taken by the Secretary in response to significant 
     compromises of classified information. Such report shall 
     include each of the following:
       (A) A description of any changes made to Department of 
     Defense policies or guidance

[[Page H8450]]

     relating to significant compromises of classified 
     information, including regarding security clearances for 
     employees of the Department, information technology, and 
     personnel actions.
       (B) An overview of the efforts made by any task force 
     responsible for the mitigation of such compromises of 
     classified information.
       (C) A description of the resources of the Department that 
     have been dedicated to efforts relating to such compromises.
       (D) A description of the plan of the Secretary to continue 
     evaluating the damage caused by, and to mitigate the damage 
     from, such compromises.
       (E) A general description and estimate of the anticipated 
     costs associated with mitigating such compromises.
       (2) Updates to report.--During calendar years 2015 and 
     2016, the Secretary shall submit to the congressional defense 
     committees quarterly updates to the report required by 
     paragraph (1). Each such update shall include information 
     regarding any changes or progress with respect to the matters 
     covered by such report.

[...]

     SEC. 1627. PROHIBITION ON NATIONAL INTELLIGENCE PROGRAM 
                   CONSOLIDATION.

       (a) Prohibition.--No amounts authorized to be appropriated 
     or otherwise made available to the Department of Defense may 
     be used during the period beginning on the date of the 
     enactment of this Act and ending on December 31, 2015, to 
     execute--
       (1) the separation of the National Intelligence Program 
     budget from the Department of Defense budget;
       (2) the consolidation of the National Intelligence Program 
     budget within the Department of Defense budget; or
       (3) the establishment of a new appropriations account or 
     appropriations account structure for the National 
     Intelligence Program budget.
       (b) Definitions.--In this section:
       (1) National intelligence program.--The term ``National 
     Intelligence Program'' has the meaning given the term in 
     section 3 of the National Security Act of 1947 (50 U.S.C. 
     3003).
       (2) National intelligence program budget.--The term 
     ``National Intelligence Program budget'' means the portions 
     of the Department of Defense budget designated as part of the 
     National Intelligence Program.

     SEC. 1628. PERSONNEL SECURITY AND INSIDER THREAT.

       (a) Report Required.--Not later than March 30, 2015, the 
     Secretary of Defense shall submit to Congress a report on the 
     plans of the Department to address--
       (1) the adoption of an interim capability to continuously 
     evaluate the security status of the employees and contractors 
     of the Department who have been determined eligible for and 
     granted access to classified information by the Department of 
     Defense Central Adjudication Facilities;
       (2) the use of an interim system to assist in developing 
     requirements, lessons learned, business rules, privacy 
     standards, and operational concepts applicable to the 
     objective automated records checks and continuous evaluation 
     capability required by the strategy for modernizing personnel 
     security;
       (3) the engineering for an interim system and the objective 
     automated records checks and continuous evaluation capability 
     for initial investigations and reinvestigations required by 
     the strategy for modernizing personnel security to support 
     automation-assisted insider threat analyses conducted across 
     the law enforcement, personnel security, human resources, 
     counterintelligence, physical security, network behavior 
     monitoring, and cybersecurity activities of all the 
     components of the Department of Defense, pursuant to 
     Executive Order 13587;
       (4) how competitive processes and open systems designs will 
     be used to acquire advanced commercial technologies 
     throughout the life cycle of the objective continuous 
     evaluation capability required by the strategy for 
     modernizing personnel security;
       (5) how the senior agency official in the Department of 
     Defense for insider threat detection and prevention will be 
     supported by experts in counterintelligence, personnel 
     security, law enforcement, human resources, physical 
     security, network monitoring, cybersecurity, and privacy and 
     civil liberties from relevant components of the Department 
     and experts in information technology, large-scale data 
     analysis, systems engineering, and program acquisition;
       (6) how the senior agency official, in developing the 
     integrated, automation-assisted insider threat capability, 
     will be supported by--
       (A) the Under Secretary of Defense for Acquisition, 
     Technology, and Logistics;
       (B) the Chief Information Officer of the Department of 
     Defense; and
       (C) the Under Secretary of Defense for Personnel and 
     Readiness; and
       (7) who will be responsible and accountable for managing 
     the development and fielding of the automation-assisted 
     insider threat capability.
       (b) Inclusion of Gaps.--The report required under 
     subsection (a) shall include specific gaps in policy and 
     statute to address the requirements placed on the Department 
     by section 907(c) of the National Defense Authorization Act 
     for Fiscal Year 2014 (Public Law 113-66) and Executive Order 
     13587.
       (c) Strategy for Modernizing Personnel Security Defined.--
     In this section, the term ``strategy for modernizing 
     personnel security'' means the strategy developed under 
     section 907(c) of the National Defense Authorization Act for 
     Fiscal Year 2014 (Public Law 113-66).

[...]